/system/security/keystore/ |
keystore.cpp | 253 // Keymaster 0.3 keys are valid keymaster 1.0 keys, so silently upgrade. 445 ALOGE("Keymaster error %d importing key pair, falling back", error); 458 ALOGE("Keymaster error while importing key pair with fallback: %d", error); 474 ALOGW("can't get keymaster device");
|
IKeystoreService.cpp | 156 ALOGE("Error reading keymaster argument from parcel"); 277 ALOGE("Failed to writeInplace keymaster cert chain entry"); 323 ALOGE("Failed to writeInplace keymaster blob param"); 379 ALOGE("Failed to allocate buffer for keymaster blob param"); 436 ALOGE("Failed to read keymaster argument"); [all...] |
/system/keymaster/ |
aes_operation.cpp | 29 #include <keymaster/logger.h> 34 namespace keymaster { namespace 651 } // namespace keymaster
|
rsa_operation.cpp | 25 #include <keymaster/logger.h> 31 namespace keymaster { namespace 626 } // namespace keymaster
|
Makefile | 4 # This makefile builds and runs the keymaster unit tests locally on the development 22 # Then return to $ANDROID_BUILD_TOP/system/keymaster and run "make".
|
authorization_set_test.cpp | 19 #include <keymaster/authorization_set.h> 20 #include <keymaster/android_keymaster_utils.h> 24 namespace keymaster { namespace 630 } // namespace keymaster
|
android_keymaster_test.cpp | 25 #include <keymaster/key_factory.h> 26 #include <keymaster/soft_keymaster_context.h> 27 #include <keymaster/soft_keymaster_device.h> 28 #include <keymaster/softkeymaster.h> 50 namespace keymaster { namespace 147 SoftKeymasterDevice* keymaster = new SoftKeymasterDevice(context_); local 148 keymaster->SetHardwareDevice(counting_keymaster0_device_); 152 keymaster->keymaster2_device()->configure(keymaster->keymaster2_device(), &version_info); 153 return keymaster->keymaster2_device() [all...] |
soft_keymaster_context.cpp | 17 #include <keymaster/soft_keymaster_context.h> 27 #include <keymaster/android_keymaster_utils.h> 28 #include <keymaster/logger.h> 44 namespace keymaster { namespace [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
KeyStoreTest.java | 23 import android.security.keymaster.ExportResult; 24 import android.security.keymaster.KeyCharacteristics; 25 import android.security.keymaster.KeymasterArguments; 26 import android.security.keymaster.KeymasterBlob; 27 import android.security.keymaster.KeymasterDefs; 28 import android.security.keymaster.OperationResult; [all...] |
/frameworks/base/core/java/android/security/keymaster/ |
KeymasterDefs.java | 17 package android.security.keymaster; 23 * Class tracking all the keymaster enum values needed for the binder API to keystore.
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
RSASignatureTest.java | 134 // Assert that either initSign or sign fails. We don't expect all keymaster
|
AuthorizationList.java | 86 // Keymaster tag classes 98 // Keymaster tags
|
KeyAttestationTest.java | 672 assertThat("TEE attestation can only come from TEE keymaster", [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreKeyPairGeneratorSpi.java | 23 import android.security.keymaster.KeyCharacteristics; 24 import android.security.keymaster.KeymasterArguments; 25 import android.security.keymaster.KeymasterCertificateChain; 26 import android.security.keymaster.KeymasterDefs; [all...] |
KeyProperties.java | 23 import android.security.keymaster.KeymasterDefs; 239 * @return keymaster digest or {@code -1} if the algorithm does not involve a digest.
|
AndroidKeyStoreSpi.java | 23 import android.security.keymaster.KeyCharacteristics; 24 import android.security.keymaster.KeymasterArguments; 25 import android.security.keymaster.KeymasterDefs; 634 // implies SHA-256 digest). Because keymaster HMAC key is authorized only for one [all...] |
/system/sepolicy/ |
vold.te | 147 # talk to keymaster
|
/system/vold/ |
cryptfs.c | 123 SLOGI("keymaster module name is %s", mod->name); 124 SLOGI("keymaster version is %d", mod->module_api_version); 137 ALOGE("could not open keymaster device in %s (%s)", 150 /* Should we use keymaster? */ 158 SLOGE("Failed to init keymaster"); 196 /* Create a new keymaster key and store it in this footer */ 209 SLOGE("Failed to init keymaster"); 271 SLOGE("Keymaster key too large for crypto footer"); 288 /* This signs the given object using the keymaster key. */ 299 SLOGE("Failed to init keymaster"); [all...] |
cryptfs.h | 85 /* Maximum allowed keymaster blob size. */
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
AndroidKeyPairGeneratorTest.java | 22 import android.security.keymaster.ExportResult; 23 import android.security.keymaster.KeymasterDefs;
|
/system/security/softkeymaster/ |
keymaster_openssl.cpp | 21 #include <keymaster/softkeymaster.h> 181 ALOGE("cannot read key; it was not made by this keymaster"); 785 .name = "Keymaster OpenSSL HAL",
|
/docs/source.android.com/src/security/authentication/ |
fingerprint-hal.jd | 86 <li><strong>Keystore API and Keymaster</strong>. These components provide hardware-backed cryptography
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 340 << "Should be able to find a keymaster hardware module"; 342 std::cout << "Using keymaster module: " << mod->name << std::endl; 345 << "Should be able to open the keymaster device"; 348 << "Keymaster should implement API version 2"; [all...] |
/docs/source.android.com/src/security/verifiedboot/ |
verified-boot.jd | 278 the TEE to bind the Keymaster root of trust, after partition verification and
|
/system/core/rootdir/ |
init.rc | 260 # Now we can mount /data. File encryption requires keymaster to decrypt
|