HomeSort by relevance Sort by last modified time
    Searched full:authorizations (Results 1 - 25 of 34) sorted by null

1 2

  /system/keymaster/
ec_key_factory.cpp 81 AuthorizationSet authorizations(key_description);
85 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size);
88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) {
89 authorizations.push_back(TAG_KEY_SIZE, key_size);
90 } else if (!authorizations.Contains(TAG_EC_CURVE, ec_curve)) {
91 authorizations.push_back(TAG_EC_CURVE, ec_curve);
123 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_GENERATED, key_material, key_blob,
136 AuthorizationSet authorizations;
139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
143 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_IMPORTED, input_key_material
    [all...]
rsa_key_factory.cpp 61 const AuthorizationSet& authorizations(key_description);
64 if (!authorizations.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) {
74 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
101 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_GENERATED, key_material, key_blob,
114 AuthorizationSet authorizations;
119 &authorizations, &public_exponent, &key_size);
122 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_IMPORTED, input_key_material,
operation.cpp 102 !key.authorizations().Contains(TAG_PADDING, *padding) &&
103 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) {
127 !key.authorizations().Contains(TAG_DIGEST, *digest) &&
128 !key.authorizations().Contains(TAG_DIGEST_OLD, *digest)) {
symmetric_key.cpp 74 AuthorizationSet authorizations(key_description);
77 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size_bits)) {
80 authorizations.push_back(TAG_KEY_SIZE, key_size_bits);
99 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_IMPORTED, input_key_material,
ecies_kem.cpp 25 const AuthorizationSet& authorizations(kem_description);
27 if (!authorizations.GetTagValue(TAG_EC_CURVE, &curve_)) {
46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) {
65 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bytes_to_generate_)) {
71 single_hash_mode_ = authorizations.GetTagValue(TAG_ECIES_SINGLE_HASH_MODE);
ec_keymaster0_key.cpp 79 AuthorizationSet authorizations;
82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
96 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_UNKNOWN, imported_hw_key,
hmac_operation.cpp 40 if (!key.authorizations().GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) {
61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) {
62 LOG_E("%d digests found in HMAC key authorizations; must be exactly 1",
rsa_keymaster0_key.cpp 77 AuthorizationSet authorizations;
82 &authorizations, &public_exponent, &key_size);
97 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_UNKNOWN, imported_hw_key,
key.h 51 const AuthorizationSet& authorizations() const { return authorizations_; } function in class:keymaster::Key
android_keymaster.cpp 254 if (!key->authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm))
274 request.purpose, key_id, key->authorizations(), request.additional_params,
285 operation->SetAuthorizations(key->authorizations());
301 operation->purpose(), operation->key_id(), operation->authorizations(),
330 operation->purpose(), operation->key_id(), operation->authorizations(),
operation.h 101 const AuthorizationSet authorizations() { return key_auths_; } function in class:keymaster::Operation
aes_operation.cpp 103 } else if (!key.authorizations().Contains(TAG_BLOCK_MODE, block_mode)) {
111 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length);
127 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE);
asymmetric_key.cpp 303 authorizations().GetTagValue(TAG_ACTIVE_DATETIME, &activeDateTime);
310 authorizations().GetTagValue(TAG_USAGE_EXPIRE_DATETIME, &usageExpireDateTime);
  /hardware/interfaces/keymaster/3.0/vts/functional/
authorization_set.h 265 AuthorizationSetBuilder& Authorizations(AuthorizationSet&& set);
266 AuthorizationSetBuilder& Authorizations(const AuthorizationSet& set);
302 inline AuthorizationSetBuilder& AuthorizationSetBuilder::Authorizations(AuthorizationSet&& set) {
309 AuthorizationSetBuilder::Authorizations(const AuthorizationSet& set) {
keymaster_tags.h 25 * authorizations. For example, it's an error to create a KeyParameter with tag == Tag::PURPOSE
256 "TagType::BOOL Authorizations do not take parameters. Presence is truth.");
  /system/keymaster/include/keymaster/
keymaster_context.h 42 * are used for random number generation, all AndroidKeymaster-enforced authorizations are
47 * key, OpenSSL is used for random number generation, no AndroidKeymaster-enforced authorizations
keymaster_tags.h 24 * impossible to make certain classes of mistakes when operating on keymaster authorizations. For
28 * to manipulate authorizations of multiple types can't be written, because they need to know which
  /docs/source.android.com/src/security/keystore/
features.jd 186 <li>Enforce exact matching (not enforcement) of all authorizations.
187 Authorization lists in key blobs must exactly match the authorizations
191 <li>Declare the authorizations whose semantic values are enforced.
195 <p>The API mechanism for declaring hardware-enforced authorizations is in the
202 authorizations, whether they're enforced by the secure hardware or not.</p>
219 <h3 id=cryptographic_message_construction_authorizations>Cryptographic message construction authorizations</h3>
implementer-ref.jd 682 <p>Generates a new cryptographic key, specifying associated authorizations, which
684 impossible to use a key in any way inconsistent with the authorizations
685 specified at generation time. With respect to authorizations that the secure
687 ensuring that the unenforceable authorizations associated with the key cannot
690 must allocate authorizations correctly between the hardware-enforced and
    [all...]
  /external/tpm2/
ExecCommand.c 28 // 2) check the authorizations; and
257 // If the command requires authorizations, then CheckAuthNoSession() will
299 // and authorizations.
NV_DefineSpace.c 16 // TPM_RC_HIERARCHY for authorizations using TPM_RH_PLATFORM phEnable_NV is
  /system/security/keystore/include/keystore/
keymaster_tags.h 25 * authorizations. For example, it's an error to create a KeyParameter with tag == Tag::PURPOSE
272 "TagType::BOOL Authorizations do not take parameters. Presence is truth.");
  /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/
Tpm2EnhancedAuthorization.c 204 This command allows options in authorizations without requiring that the TPM evaluate all of the options.
  /frameworks/base/keystore/java/android/security/keystore/
KeyGenParameterSpec.java 45 * the key's validity start and end dates. Key use authorizations expressed in the spec apply
95 * A known bug in Android 6.0 (API Level 23) causes user authentication-related authorizations to be
567 * authorizations, including the content of the attestation challenge value. If the key is in
    [all...]
  /docs/source.android.com/src/security/authentication/
index.jd 196 crypto operation. Currently used by transactional fingerprint authorizations.

Completed in 1359 milliseconds

1 2