/system/keymaster/ |
ec_key_factory.cpp | 81 AuthorizationSet authorizations(key_description); 85 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); 88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { 89 authorizations.push_back(TAG_KEY_SIZE, key_size); 90 } else if (!authorizations.Contains(TAG_EC_CURVE, ec_curve)) { 91 authorizations.push_back(TAG_EC_CURVE, ec_curve); 123 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_GENERATED, key_material, key_blob, 136 AuthorizationSet authorizations; 139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 143 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_IMPORTED, input_key_material [all...] |
rsa_key_factory.cpp | 61 const AuthorizationSet& authorizations(key_description); 64 if (!authorizations.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { 74 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 101 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_GENERATED, key_material, key_blob, 114 AuthorizationSet authorizations; 119 &authorizations, &public_exponent, &key_size); 122 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_IMPORTED, input_key_material,
|
operation.cpp | 102 !key.authorizations().Contains(TAG_PADDING, *padding) && 103 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) { 127 !key.authorizations().Contains(TAG_DIGEST, *digest) && 128 !key.authorizations().Contains(TAG_DIGEST_OLD, *digest)) {
|
symmetric_key.cpp | 74 AuthorizationSet authorizations(key_description); 77 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size_bits)) { 80 authorizations.push_back(TAG_KEY_SIZE, key_size_bits); 99 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_IMPORTED, input_key_material,
|
ecies_kem.cpp | 25 const AuthorizationSet& authorizations(kem_description); 27 if (!authorizations.GetTagValue(TAG_EC_CURVE, &curve_)) { 46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { 65 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bytes_to_generate_)) { 71 single_hash_mode_ = authorizations.GetTagValue(TAG_ECIES_SINGLE_HASH_MODE);
|
ec_keymaster0_key.cpp | 79 AuthorizationSet authorizations; 82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 96 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_UNKNOWN, imported_hw_key,
|
hmac_operation.cpp | 40 if (!key.authorizations().GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) { 61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) { 62 LOG_E("%d digests found in HMAC key authorizations; must be exactly 1",
|
rsa_keymaster0_key.cpp | 77 AuthorizationSet authorizations; 82 &authorizations, &public_exponent, &key_size); 97 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_UNKNOWN, imported_hw_key,
|
key.h | 51 const AuthorizationSet& authorizations() const { return authorizations_; } function in class:keymaster::Key
|
android_keymaster.cpp | 254 if (!key->authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) 274 request.purpose, key_id, key->authorizations(), request.additional_params, 285 operation->SetAuthorizations(key->authorizations()); 301 operation->purpose(), operation->key_id(), operation->authorizations(), 330 operation->purpose(), operation->key_id(), operation->authorizations(),
|
operation.h | 101 const AuthorizationSet authorizations() { return key_auths_; } function in class:keymaster::Operation
|
aes_operation.cpp | 103 } else if (!key.authorizations().Contains(TAG_BLOCK_MODE, block_mode)) { 111 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); 127 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE);
|
asymmetric_key.cpp | 303 authorizations().GetTagValue(TAG_ACTIVE_DATETIME, &activeDateTime); 310 authorizations().GetTagValue(TAG_USAGE_EXPIRE_DATETIME, &usageExpireDateTime);
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
authorization_set.h | 265 AuthorizationSetBuilder& Authorizations(AuthorizationSet&& set); 266 AuthorizationSetBuilder& Authorizations(const AuthorizationSet& set); 302 inline AuthorizationSetBuilder& AuthorizationSetBuilder::Authorizations(AuthorizationSet&& set) { 309 AuthorizationSetBuilder::Authorizations(const AuthorizationSet& set) {
|
keymaster_tags.h | 25 * authorizations. For example, it's an error to create a KeyParameter with tag == Tag::PURPOSE 256 "TagType::BOOL Authorizations do not take parameters. Presence is truth.");
|
/system/keymaster/include/keymaster/ |
keymaster_context.h | 42 * are used for random number generation, all AndroidKeymaster-enforced authorizations are 47 * key, OpenSSL is used for random number generation, no AndroidKeymaster-enforced authorizations
|
keymaster_tags.h | 24 * impossible to make certain classes of mistakes when operating on keymaster authorizations. For 28 * to manipulate authorizations of multiple types can't be written, because they need to know which
|
/docs/source.android.com/src/security/keystore/ |
features.jd | 186 <li>Enforce exact matching (not enforcement) of all authorizations. 187 Authorization lists in key blobs must exactly match the authorizations 191 <li>Declare the authorizations whose semantic values are enforced. 195 <p>The API mechanism for declaring hardware-enforced authorizations is in the 202 authorizations, whether they're enforced by the secure hardware or not.</p> 219 <h3 id=cryptographic_message_construction_authorizations>Cryptographic message construction authorizations</h3>
|
implementer-ref.jd | 682 <p>Generates a new cryptographic key, specifying associated authorizations, which 684 impossible to use a key in any way inconsistent with the authorizations 685 specified at generation time. With respect to authorizations that the secure 687 ensuring that the unenforceable authorizations associated with the key cannot 690 must allocate authorizations correctly between the hardware-enforced and [all...] |
/external/tpm2/ |
ExecCommand.c | 28 // 2) check the authorizations; and 257 // If the command requires authorizations, then CheckAuthNoSession() will 299 // and authorizations.
|
NV_DefineSpace.c | 16 // TPM_RC_HIERARCHY for authorizations using TPM_RH_PLATFORM phEnable_NV is
|
/system/security/keystore/include/keystore/ |
keymaster_tags.h | 25 * authorizations. For example, it's an error to create a KeyParameter with tag == Tag::PURPOSE 272 "TagType::BOOL Authorizations do not take parameters. Presence is truth.");
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2EnhancedAuthorization.c | 204 This command allows options in authorizations without requiring that the TPM evaluate all of the options.
|
/frameworks/base/keystore/java/android/security/keystore/ |
KeyGenParameterSpec.java | 45 * the key's validity start and end dates. Key use authorizations expressed in the spec apply 95 * A known bug in Android 6.0 (API Level 23) causes user authentication-related authorizations to be 567 * authorizations, including the content of the attestation challenge value. If the key is in [all...] |
/docs/source.android.com/src/security/authentication/ |
index.jd | 196 crypto operation. Currently used by transactional fingerprint authorizations.
|