/system/keymaster/ |
hmac_key.cpp | 51 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && 52 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { 67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) 71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) {
|
aes_key.cpp | 56 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && 57 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { 75 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length))
|
rsa_key_factory.cpp | 62 if (!authorizations.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { 68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 144 if (!updated_description->GetTagValue(TAG_RSA_PUBLIC_EXPONENT, public_exponent)) 153 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size)) 162 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm))
|
ecies_kem.cpp | 27 if (!authorizations.GetTagValue(TAG_EC_CURVE, &curve_)) { 46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { 65 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bytes_to_generate_)) { 71 single_hash_mode_ = authorizations.GetTagValue(TAG_ECIES_SINGLE_HASH_MODE);
|
ec_key_factory.cpp | 47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) { 49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) { 63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) && 173 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size_bits)) 179 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm))
|
hmac_operation.cpp | 40 if (!key.authorizations().GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) { 47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { 61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) {
|
authorization_set_test.cpp | 89 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &int_val)); 93 EXPECT_TRUE(set.GetTagValue(TAG_APPLICATION_ID, &blob_val)); 430 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &val)); 434 EXPECT_FALSE(set.GetTagValue(TAG_KEY_SIZE, &val)); 450 EXPECT_TRUE(set1.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val)); 454 EXPECT_FALSE(set2.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val)); 472 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 0, &val)); 474 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 1, &val)); 478 EXPECT_FALSE(set2.GetTagValue(TAG_USER_SECURE_ID, &val)); 492 EXPECT_TRUE(set.GetTagValue(TAG_ALGORITHM, &val)) [all...] |
operation.cpp | 92 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { 117 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) {
|
rsa_keymaster0_key.cpp | 44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
|
symmetric_key.cpp | 42 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || 77 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size_bits)) {
|
asymmetric_key.cpp | 270 if ((!sw_enforced.GetTagValue(TAG_ALGORITHM, &sign_algorithm) && 271 !tee_enforced.GetTagValue(TAG_ALGORITHM, &sign_algorithm))) 312 authorizations().GetTagValue(TAG_ACTIVE_DATETIME, &activeDateTime); 319 authorizations().GetTagValue(TAG_USAGE_EXPIRE_DATETIME, &usageExpireDateTime);
|
android_keymaster.cpp | 55 if (tee_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel) || 56 sw_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel)) { 194 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || 228 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, algorithm) && 229 !sw_enforced.GetTagValue(TAG_ALGORITHM, algorithm)) 254 if (!key->authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) 428 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
|
aes_operation.cpp | 55 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { 60 if (!key_params.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length_bits)) { 95 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { 127 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE); 349 if (!input_params.GetTagValue(TAG_NONCE, &iv_blob)) { 383 if (input_params.GetTagValue(TAG_ASSOCIATED_DATA, &aad)) {
|
attestation_record.cpp | 409 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) { 478 if (!attestation_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge)) 494 if (tee_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) { 498 if (!sw_enforced.GetTagValue(TAG_CREATION_DATETIME, &creation_datetime)) { 504 sw_enforced.GetTagValue(TAG_APPLICATION_ID, &application_id); 509 attestation_params.GetTagValue(TAG_RESET_SINCE_ID_ROTATION), &unique_id);
|
keymaster1_engine.cpp | 369 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) 371 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data))
|
keymaster_enforcement.cpp | 80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && 441 if (!operation_params.GetTagValue(TAG_AUTH_TOKEN, &auth_token_blob)) {
|
soft_keymaster_device.cpp | 355 if (in_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) 357 if (in_params.GetTagValue(TAG_APPLICATION_DATA, &app_data)) 610 if (!params_copy.GetTagValue(TAG_OS_VERSION, &os_version) || 611 !params_copy.GetTagValue(TAG_OS_PATCHLEVEL, &os_patchlevel)) { 714 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { [all...] |
android_keymaster_test_utils.cpp | 479 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob)); 510 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob)); 529 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob)); [all...] |
soft_keymaster_context.cpp | [all...] |
android_keymaster_test.cpp | [all...] |
/system/security/keystore/ |
keystore_client_impl.cpp | 103 if (!output_params.GetTagValue(keymaster::TAG_NONCE, &init_vector_blob)) { 477 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) && 478 !software_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm)) || 484 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size) && 485 !software_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size)) || 491 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_BLOCK_MODE, &block_mode) && 492 !software_enforced_characteristics.GetTagValue(keymaster::TAG_BLOCK_MODE, &block_mode)) || 498 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_PADDING, &padding_mode) && 499 !software_enforced_characteristics.GetTagValue(keymaster::TAG_PADDING, &padding_mode)) || 522 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) & [all...] |
auth_token_table.cpp | 74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); 81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); 93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type); 136 key_info.GetTagValue(TAG_AUTH_TIMEOUT, &timeout);
|
/system/keymaster/include/keymaster/ |
authorization_set.h | 246 inline bool GetTagValue(TypedTag<KM_UINT, T> tag, uint32_t* val) const { 256 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, uint32_t* val) const { 265 inline bool GetTagValue(TypedTag<KM_ULONG, T> tag, uint64_t* val) const { 275 bool GetTagValue(TypedTag<KM_ULONG_REP, Tag> tag, size_t instance, uint64_t* val) const { 284 bool GetTagValue(TypedEnumTag<KM_ENUM, Tag, T> tag, T* val) const { 294 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, size_t instance, T* val) const { 304 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T* val) const { 315 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, 325 bool GetTagValue(TypedTag<KM_BYTES, Tag> tag, keymaster_blob_t* val) const { 334 bool GetTagValue(TypedTag<KM_BIGNUM, Tag> tag, keymaster_blob_t* val) const [all...] |
/system/vold/ |
KeyStorage.cpp | 147 if (!outParams.GetTagValue(keymaster::TAG_NONCE, &nonceBlob)) {
|