/system/keymaster/km_openssl/ |
hmac_key.cpp | 51 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && 52 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { 67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) 71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) {
|
aes_key.cpp | 56 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && 57 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { 76 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length))
|
ecies_kem.cpp | 27 if (!authorizations.GetTagValue(TAG_EC_CURVE, &curve_)) { 46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { 65 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bytes_to_generate_)) { 71 single_hash_mode_ = authorizations.GetTagValue(TAG_ECIES_SINGLE_HASH_MODE);
|
ec_key_factory.cpp | 47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) { 49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) { 63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) && 173 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size_bits)) { 184 if (!updated_description->GetTagValue(TAG_EC_CURVE, &curve)) { 191 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) {
|
rsa_key_factory.cpp | 62 if (!authorizations.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { 72 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 148 if (!updated_description->GetTagValue(TAG_RSA_PUBLIC_EXPONENT, public_exponent)) 157 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size)) 166 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm))
|
hmac_operation.cpp | 40 if (!key.authorizations().GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) { 47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { 61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) {
|
symmetric_key.cpp | 41 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || 76 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bits)) {
|
attestation_record.cpp | 342 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) { 429 if (!attestation_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge)) 440 if (!attestation_params.GetTagValue(TAG_ATTESTATION_APPLICATION_ID, &attestation_app_id)) 468 if (tee_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) { 472 if (!sw_enforced.GetTagValue(TAG_CREATION_DATETIME, &creation_datetime)) { 478 sw_enforced.GetTagValue(TAG_APPLICATION_ID, &application_id); 483 attestation_params.GetTagValue(TAG_RESET_SINCE_ID_ROTATION), &unique_id);
|
block_cipher_operation.cpp | 56 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { 61 if (!key_params.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length_bits)) { 84 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { 116 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE); 258 if (!input_params.GetTagValue(TAG_NONCE, &iv_blob)) { 293 if (input_params.GetTagValue(TAG_ASSOCIATED_DATA, &aad)) {
|
attestation_utils.cpp | 308 if ((!key.sw_enforced().GetTagValue(TAG_ALGORITHM, &sign_algorithm) && 309 !key.hw_enforced().GetTagValue(TAG_ALGORITHM, &sign_algorithm))) 338 key.authorizations().GetTagValue(TAG_ACTIVE_DATETIME, &activeDateTime); 345 key.authorizations().GetTagValue(TAG_USAGE_EXPIRE_DATETIME, &usageExpireDateTime);
|
/system/keymaster/legacy_support/ |
keymaster_passthrough_key.cpp | 62 if (additional_parameters_.GetTagValue(TAG_APPLICATION_DATA, &km_app_data)) { 68 if (additional_parameters_.GetTagValue(TAG_APPLICATION_ID, &km_client_id)) {
|
rsa_keymaster0_key.cpp | 44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
|
keymaster1_legacy_support.cpp | 163 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { 184 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { 213 if (key_description.GetTagValue(TAG_EC_CURVE, &curve)) { 222 if (key_description.GetTagValue(TAG_KEY_SIZE, &key_size_from_desc)) {
|
/system/security/keystore/ |
keystore_client_impl.cpp | 89 auto init_vector_blob = output_params.GetTagValue(TAG_NONCE); 478 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), 479 software_enforced_characteristics.GetTagValue(TAG_ALGORITHM)); 484 auto key_size = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_KEY_SIZE), 485 software_enforced_characteristics.GetTagValue(TAG_KEY_SIZE)); 490 auto block_mode = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_BLOCK_MODE), 491 software_enforced_characteristics.GetTagValue(TAG_BLOCK_MODE)); 496 auto padding_mode = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_PADDING), 497 software_enforced_characteristics.GetTagValue(TAG_PADDING)); 519 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM) [all...] |
auth_token_table.cpp | 103 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); 109 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); 119 defaultOr(key_info.GetTagValue(TAG_USER_AUTH_TYPE), HardwareAuthenticatorType::NONE); 158 auto timeout = defaultOr(key_info.GetTagValue(TAG_AUTH_TIMEOUT), 0); 164 if (key_info.GetTagValue(TAG_ALLOW_WHILE_ON_BODY).isOk()) {
|
/system/keymaster/contexts/ |
keymaster2_passthrough_context.cpp | 76 if (!additional_params.GetTagValue(TAG_APPLICATION_ID, clientIdPtr)) { 79 if (!additional_params.GetTagValue(TAG_APPLICATION_DATA, applicationDataPtr)) { 98 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && 99 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) {
|
keymaster1_passthrough_context.cpp | 120 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) 122 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data)) 166 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && 167 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { 236 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) {
|
soft_keymaster_context.cpp | 288 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && 289 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { 405 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) 407 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data)) 451 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) {
|
pure_soft_keymaster_context.cpp | 172 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && 173 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { 229 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) {
|
/system/keymaster/include/keymaster/ |
authorization_set.h | 259 inline bool GetTagValue(TypedTag<KM_UINT, T> tag, uint32_t* val) const { 269 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, uint32_t* val) const { 278 inline bool GetTagValue(TypedTag<KM_ULONG, T> tag, uint64_t* val) const { 288 bool GetTagValue(TypedTag<KM_ULONG_REP, Tag> tag, size_t instance, uint64_t* val) const { 297 bool GetTagValue(TypedEnumTag<KM_ENUM, Tag, T> tag, T* val) const { 307 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, size_t instance, T* val) const { 317 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T* val) const { 328 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, 338 bool GetTagValue(TypedTag<KM_BYTES, Tag> tag, keymaster_blob_t* val) const { 347 bool GetTagValue(TypedTag<KM_BIGNUM, Tag> tag, keymaster_blob_t* val) const [all...] |
/system/keymaster/android_keymaster/ |
operation.cpp | 93 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { 118 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) {
|
android_keymaster.cpp | 50 if (tee_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel) || 51 sw_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel)) { 224 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || 271 if (!key->authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) 402 if (request.attest_params.GetTagValue(TAG_ATTESTATION_APPLICATION_ID, 437 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || 518 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
|
/system/keymaster/tests/ |
authorization_set_test.cpp | 89 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &int_val)); 93 EXPECT_TRUE(set.GetTagValue(TAG_APPLICATION_ID, &blob_val)); 439 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &val)); 443 EXPECT_FALSE(set.GetTagValue(TAG_KEY_SIZE, &val)); 459 EXPECT_TRUE(set1.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val)); 463 EXPECT_FALSE(set2.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val)); 481 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 0, &val)); 483 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 1, &val)); 487 EXPECT_FALSE(set2.GetTagValue(TAG_USER_SECURE_ID, &val)); 501 EXPECT_TRUE(set.GetTagValue(TAG_ALGORITHM, &val)) [all...] |
wrapped_key_test.cpp | 95 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size); 99 auth_list.GetTagValue(TAG_ALGORITHM, &algorithm);
|
/system/keymaster/key_blob_utils/ |
software_keyblobs.cpp | 84 if (input_set.GetTagValue(TAG_APPLICATION_ID, &entry)) 86 if (input_set.GetTagValue(TAG_APPLICATION_DATA, &entry))
|