/system/keymaster/legacy_support/ |
rsa_keymaster1_operation.cpp | 48 AuthorizationSet begin_params(input_params); 49 int pos = begin_params.find(TAG_DIGEST); 52 begin_params[pos].enumerated = KM_DIGEST_NONE; 54 pos = begin_params.find(TAG_PADDING); 57 switch (begin_params[pos].enumerated) { 62 begin_params[pos].enumerated = KM_PAD_NONE; 72 &begin_params, nullptr /* out_params */, &operation_handle_); 115 const AuthorizationSet& begin_params, 118 if (!GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr; 121 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr [all...] |
ecdsa_keymaster1_operation.cpp | 49 AuthorizationSet begin_params(input_params); 50 int pos = begin_params.find(TAG_DIGEST); 53 begin_params[pos].enumerated = KM_DIGEST_NONE; 56 &begin_params, nullptr /* out_params */, &operation_handle_); 99 const AuthorizationSet& begin_params, 102 if (!GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr;
|
ecdsa_keymaster1_operation.h | 110 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
rsa_keymaster1_operation.h | 110 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
keymaster1_engine.cpp | 154 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error));
|
/system/keymaster/android_keymaster/ |
operation.cpp | 89 bool OperationFactory::GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key, 93 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { 94 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING)); 114 bool OperationFactory::GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, 118 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) { 119 LOG_E("%d digests specified in begin params", begin_params.GetTagCount(TAG_DIGEST));
|
/system/keymaster/tests/ |
android_keymaster_test.cpp | 492 AuthorizationSet begin_params(client_params()); 493 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE); 494 begin_params.push_back(TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN); 495 EXPECT_EQ(KM_ERROR_INCOMPATIBLE_PADDING_MODE, BeginOperation(KM_PURPOSE_SIGN, begin_params)); 534 AuthorizationSet begin_params(client_params()); 535 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE); 536 begin_params.push_back(TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN); 537 EXPECT_EQ(KM_ERROR_OK, BeginOperation(KM_PURPOSE_SIGN, begin_params)); 556 AuthorizationSet begin_params(client_params()); 557 begin_params.push_back(TAG_DIGEST, KM_DIGEST_SHA_2_256) [all...] |
android_keymaster_test_utils.cpp | 370 const AuthorizationSet& begin_params, 373 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); 381 const string& signature, const AuthorizationSet& begin_params, 384 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); 467 AuthorizationSet begin_params(client_params()), output_params; 468 begin_params.push_back(TAG_PADDING, padding); 471 ProcessMessage(KM_PURPOSE_ENCRYPT, message, begin_params, update_params, &output_params); 498 AuthorizationSet begin_params(client_params()), output_params; 499 begin_params.push_back(TAG_PADDING, padding); 500 begin_params.push_back(TAG_DIGEST, digest) [all...] |
android_keymaster_test_utils.h | 230 const AuthorizationSet& begin_params, 234 const std::string& signature, const AuthorizationSet& begin_params, 264 const AuthorizationSet& begin_params, 284 const AuthorizationSet& begin_params,
|
keymaster_enforcement_test.cpp | 534 AuthorizationSet begin_params(AuthorizationSetBuilder().Authorization(TAG_NONCE, "foo", 3)); 538 begin_params, 0 /* challenge */, true /* is_begin_operation */)); 541 begin_params, 0 /* challenge */, true /* is_begin_operation */)); 544 begin_params, 0 /* challenge */, 548 begin_params, 0 /* challenge */, true /* is_begin_operation */)); [all...] |
/system/keymaster/include/keymaster/ |
operation.h | 55 virtual OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params, 80 bool GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key, 82 bool GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key,
|
/system/keymaster/km_openssl/ |
hmac_operation.cpp | 37 OperationPtr HmacOperationFactory::CreateOperation(Key&& key, const AuthorizationSet& begin_params, 47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { 63 begin_params.GetTagCount(TAG_DIGEST));
|
hmac_operation.h | 58 virtual OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
block_cipher_operation.cpp | 52 static keymaster_error_t GetAndValidateGcmTagLength(const AuthorizationSet& begin_params, 56 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { 80 const AuthorizationSet& begin_params, 84 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { 85 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE)); 100 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); 107 if (!GetAndValidatePadding(begin_params, key, &padding, error)) {
|
ecdsa_operation.cpp | 31 OperationPtr EcdsaOperationFactory::CreateOperation(Key&& key, const AuthorizationSet& begin_params, 42 if (!GetAndValidateDigest(begin_params, ecdsa_key, &digest, error)) return nullptr;
|
rsa_operation.cpp | 63 const AuthorizationSet& begin_params, 66 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr; 72 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr; 92 const AuthorizationSet& begin_params, 95 RsaOperationFactory::CreateRsaOperation(move(key), begin_params, error));
|
block_cipher_operation.h | 54 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
/system/keymaster/include/keymaster/legacy_support/ |
keymaster1_engine.h | 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), 64 AuthorizationSet begin_params; member in struct:keymaster::Keymaster1Engine::KeyData
|
/system/keymaster/include/keymaster/km_openssl/ |
rsa_operation.h | 190 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params, 192 return OperationPtr(CreateRsaOperation(move(key), begin_params, error)); 198 virtual RsaOperation* CreateRsaOperation(Key&& key, const AuthorizationSet& begin_params, 222 RsaOperation* CreateRsaOperation(Key&& key, const AuthorizationSet& begin_params,
|
ecdsa_operation.h | 86 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
keymaster_hidl_hal_test.cpp | 2810 auto begin_params = AuthorizationSetBuilder() local 3019 auto begin_params = AuthorizationSetBuilder() local 3078 auto begin_params = AuthorizationSetBuilder() local 3127 auto begin_params = AuthorizationSetBuilder() local 3171 auto begin_params = AuthorizationSetBuilder() local 3353 AuthorizationSetBuilder begin_params; local 3575 auto begin_params = local 3594 auto begin_params = local 3639 auto begin_params = local 3664 auto begin_params = AuthorizationSetBuilder() local [all...] |
KeymasterHidlTest.cpp | 478 auto begin_params = AuthorizationSetBuilder().BlockMode(block_mode).Padding(padding_mode); local 479 if (iv.size()) begin_params.Authorization(TAG_NONCE, iv.data(), iv.size()); 481 string output = ProcessMessage(key_blob_, purpose, input, begin_params, &output_params);
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
keymaster_hidl_hal_test.cpp | 3420 auto begin_params = AuthorizationSetBuilder() local 3628 auto begin_params = AuthorizationSetBuilder() local 3687 auto begin_params = AuthorizationSetBuilder() local 3736 auto begin_params = AuthorizationSetBuilder() local 3780 auto begin_params = AuthorizationSetBuilder() local [all...] |