HomeSort by relevance Sort by last modified time
    Searched full:keymaster (Results 201 - 225 of 231) sorted by null

1 2 3 4 5 6 7 8910

  /system/security/keystore/
keystore.cpp 253 // Keymaster 0.3 keys are valid keymaster 1.0 keys, so silently upgrade.
445 ALOGE("Keymaster error %d importing key pair, falling back", error);
458 ALOGE("Keymaster error while importing key pair with fallback: %d", error);
474 ALOGW("can't get keymaster device");
IKeystoreService.cpp 156 ALOGE("Error reading keymaster argument from parcel");
277 ALOGE("Failed to writeInplace keymaster cert chain entry");
323 ALOGE("Failed to writeInplace keymaster blob param");
379 ALOGE("Failed to allocate buffer for keymaster blob param");
436 ALOGE("Failed to read keymaster argument");
    [all...]
  /system/keymaster/
aes_operation.cpp 29 #include <keymaster/logger.h>
34 namespace keymaster { namespace
651 } // namespace keymaster
rsa_operation.cpp 25 #include <keymaster/logger.h>
31 namespace keymaster { namespace
626 } // namespace keymaster
Makefile 4 # This makefile builds and runs the keymaster unit tests locally on the development
22 # Then return to $ANDROID_BUILD_TOP/system/keymaster and run "make".
authorization_set_test.cpp 19 #include <keymaster/authorization_set.h>
20 #include <keymaster/android_keymaster_utils.h>
24 namespace keymaster { namespace
630 } // namespace keymaster
android_keymaster_test.cpp 25 #include <keymaster/key_factory.h>
26 #include <keymaster/soft_keymaster_context.h>
27 #include <keymaster/soft_keymaster_device.h>
28 #include <keymaster/softkeymaster.h>
50 namespace keymaster { namespace
147 SoftKeymasterDevice* keymaster = new SoftKeymasterDevice(context_); local
148 keymaster->SetHardwareDevice(counting_keymaster0_device_);
152 keymaster->keymaster2_device()->configure(keymaster->keymaster2_device(), &version_info);
153 return keymaster->keymaster2_device()
    [all...]
soft_keymaster_context.cpp 17 #include <keymaster/soft_keymaster_context.h>
27 #include <keymaster/android_keymaster_utils.h>
28 #include <keymaster/logger.h>
44 namespace keymaster { namespace
    [all...]
  /frameworks/base/keystore/tests/src/android/security/
KeyStoreTest.java 23 import android.security.keymaster.ExportResult;
24 import android.security.keymaster.KeyCharacteristics;
25 import android.security.keymaster.KeymasterArguments;
26 import android.security.keymaster.KeymasterBlob;
27 import android.security.keymaster.KeymasterDefs;
28 import android.security.keymaster.OperationResult;
    [all...]
  /frameworks/base/core/java/android/security/keymaster/
KeymasterDefs.java 17 package android.security.keymaster;
23 * Class tracking all the keymaster enum values needed for the binder API to keystore.
  /cts/tests/tests/keystore/src/android/keystore/cts/
RSASignatureTest.java 134 // Assert that either initSign or sign fails. We don't expect all keymaster
AuthorizationList.java 86 // Keymaster tag classes
98 // Keymaster tags
KeyAttestationTest.java 672 assertThat("TEE attestation can only come from TEE keymaster",
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreKeyPairGeneratorSpi.java 23 import android.security.keymaster.KeyCharacteristics;
24 import android.security.keymaster.KeymasterArguments;
25 import android.security.keymaster.KeymasterCertificateChain;
26 import android.security.keymaster.KeymasterDefs;
    [all...]
KeyProperties.java 23 import android.security.keymaster.KeymasterDefs;
239 * @return keymaster digest or {@code -1} if the algorithm does not involve a digest.
AndroidKeyStoreSpi.java 23 import android.security.keymaster.KeyCharacteristics;
24 import android.security.keymaster.KeymasterArguments;
25 import android.security.keymaster.KeymasterDefs;
634 // implies SHA-256 digest). Because keymaster HMAC key is authorized only for one
    [all...]
  /system/sepolicy/
vold.te 147 # talk to keymaster
  /system/vold/
cryptfs.c 123 SLOGI("keymaster module name is %s", mod->name);
124 SLOGI("keymaster version is %d", mod->module_api_version);
137 ALOGE("could not open keymaster device in %s (%s)",
150 /* Should we use keymaster? */
158 SLOGE("Failed to init keymaster");
196 /* Create a new keymaster key and store it in this footer */
209 SLOGE("Failed to init keymaster");
271 SLOGE("Keymaster key too large for crypto footer");
288 /* This signs the given object using the keymaster key. */
299 SLOGE("Failed to init keymaster");
    [all...]
cryptfs.h 85 /* Maximum allowed keymaster blob size. */
  /frameworks/base/keystore/tests/src/android/security/keystore/
AndroidKeyPairGeneratorTest.java 22 import android.security.keymaster.ExportResult;
23 import android.security.keymaster.KeymasterDefs;
  /system/security/softkeymaster/
keymaster_openssl.cpp 21 #include <keymaster/softkeymaster.h>
181 ALOGE("cannot read key; it was not made by this keymaster");
785 .name = "Keymaster OpenSSL HAL",
  /docs/source.android.com/src/security/authentication/
fingerprint-hal.jd 86 <li><strong>Keystore API and Keymaster</strong>. These components provide hardware-backed cryptography
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 340 << "Should be able to find a keymaster hardware module";
342 std::cout << "Using keymaster module: " << mod->name << std::endl;
345 << "Should be able to open the keymaster device";
348 << "Keymaster should implement API version 2";
    [all...]
  /docs/source.android.com/src/security/verifiedboot/
verified-boot.jd 278 the TEE to bind the Keymaster root of trust, after partition verification and
  /system/core/rootdir/
init.rc 260 # Now we can mount /data. File encryption requires keymaster to decrypt

Completed in 356 milliseconds

1 2 3 4 5 6 7 8910