/aosp12/system/keymaster/km_openssl/ |
H A D | hmac_key.cpp | 48 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && in LoadKey() 49 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { in LoadKey() 63 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) in validate_algorithm_specific_new_key_params() 67 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) { in validate_algorithm_specific_new_key_params()
|
H A D | aes_key.cpp | 53 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && in LoadKey() 54 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { in LoadKey() 72 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length)) in validate_algorithm_specific_new_key_params()
|
H A D | ec_key_factory.cpp | 52 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) { in GetCurveAndSize() 54 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) { in GetCurveAndSize() 68 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) && in GetCurveAndSize() 215 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size_bits)) { in UpdateImportKeyDescription() 225 if (!updated_description->GetTagValue(TAG_EC_CURVE, &curve)) { in UpdateImportKeyDescription() 232 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) { in UpdateImportKeyDescription()
|
H A D | ecies_kem.cpp | 27 if (!authorizations.GetTagValue(TAG_EC_CURVE, &curve_)) { in EciesKem() 46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { in EciesKem() 65 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bytes_to_generate_)) { in EciesKem() 71 single_hash_mode_ = authorizations.GetTagValue(TAG_ECIES_SINGLE_HASH_MODE); in EciesKem()
|
H A D | rsa_key_factory.cpp | 61 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { in GenerateKey() 71 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { in GenerateKey() 187 if (!updated_description->GetTagValue(TAG_RSA_PUBLIC_EXPONENT, public_exponent)) in UpdateImportKeyDescription() 196 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size)) in UpdateImportKeyDescription() 205 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) in UpdateImportKeyDescription()
|
H A D | certificate_utils.cpp | 119 if (caller_params.GetTagValue(TAG_CERTIFICATE_SERIAL, &serial_blob)) { in get_certificate_params() 140 if (caller_params.GetTagValue(TAG_ACTIVE_DATETIME, &tmp)) { in get_certificate_params() 144 if (caller_params.GetTagValue(TAG_ORIGINATION_EXPIRE_DATETIME, &tmp)) { in get_certificate_params() 151 if (!caller_params.GetTagValue(TAG_CERTIFICATE_NOT_BEFORE, &tmp)) { in get_certificate_params() 157 if (!caller_params.GetTagValue(TAG_CERTIFICATE_NOT_AFTER, &tmp)) { in get_certificate_params() 168 if (caller_params.GetTagValue(TAG_CERTIFICATE_SUBJECT, &subject) && subject.data_length) { in get_certificate_params()
|
H A D | hmac_operation.cpp | 38 if (!key.authorizations().GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) { in CreateOperation() 45 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { in CreateOperation() 64 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) { in CreateOperation()
|
H A D | block_cipher_operation.cpp | 54 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { in GetAndValidateGcmTagLength() 59 if (!key_params.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length_bits)) { in GetAndValidateGcmTagLength() 82 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { in CreateOperation() 114 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE); in CreateOperation() 261 if (!input_params.GetTagValue(TAG_NONCE, &iv_blob)) { in GetIv() 296 if (input_params.GetTagValue(TAG_ASSOCIATED_DATA, &aad)) { in HandleAad()
|
H A D | symmetric_key.cpp | 43 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || in GenerateKey() 78 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bits)) { in ImportKey()
|
H A D | attestation_record.cpp | 477 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) { in build_eat_submod() 776 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) { in build_auth_list() 853 if (!attestation_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge)) { in build_eat_record() 871 if (!sw_enforced.GetTagValue(TAG_ATTESTATION_APPLICATION_ID, &existing_app_id)) { in build_eat_record() 915 if (attestation_params.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) { in build_eat_record() 919 if (!sw_enforced.GetTagValue(TAG_CREATION_DATETIME, &creation_datetime)) { in build_eat_record() 926 attestation_params.GetTagValue(TAG_RESET_SINCE_ID_ROTATION), &error); in build_eat_record() 1017 if (!attestation_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge)) { in build_attestation_record() 1062 if (attestation_params.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) { in build_attestation_record() 1066 if (!sw_enforced.GetTagValue(TAG_CREATION_DATETIME, &creation_datetime)) { in build_attestation_record() [all …]
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | authorization_set.h | 264 inline bool GetTagValue(TypedTag<KM_UINT, T> tag, uint32_t* val) const { in GetTagValue() function 283 inline bool GetTagValue(TypedTag<KM_ULONG, T> tag, uint64_t* val) const { in GetTagValue() function 302 bool GetTagValue(TypedEnumTag<KM_ENUM, Tag, T> tag, T* val) const { in GetTagValue() function 322 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T* val) const { in GetTagValue() function 332 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, in GetTagValue() function 342 bool GetTagValue(TypedTag<KM_BYTES, Tag> tag, keymaster_blob_t* val) const { in GetTagValue() function 351 bool GetTagValue(TypedTag<KM_BIGNUM, Tag> tag, keymaster_blob_t* val) const { in GetTagValue() function 358 template <keymaster_tag_t Tag> bool GetTagValue(TypedTag<KM_BOOL, Tag> tag) const { in GetTagValue() function 705 template <typename... ARGS> bool GetTagValue(ARGS&&... args) const { in GetTagValue() function 706 return hw_enforced_.GetTagValue(forward<ARGS>(args)...) || in GetTagValue() [all …]
|
/aosp12/system/keymaster/tests/ |
H A D | authorization_set_test.cpp | 96 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &int_val)); in TEST() 100 EXPECT_TRUE(set.GetTagValue(TAG_APPLICATION_ID, &blob_val)); in TEST() 446 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &val)); in TEST() 450 EXPECT_FALSE(set.GetTagValue(TAG_KEY_SIZE, &val)); in TEST() 508 EXPECT_TRUE(set.GetTagValue(TAG_ALGORITHM, &val)); in TEST() 513 EXPECT_FALSE(set.GetTagValue(TAG_PADDING, &val2)); in TEST() 527 EXPECT_TRUE(set.GetTagValue(TAG_PURPOSE, 0, &val)); in TEST() 529 EXPECT_TRUE(set.GetTagValue(TAG_PURPOSE, 1, &val)); in TEST() 533 EXPECT_FALSE(set.GetTagValue(TAG_PURPOSE, 2, &val)); in TEST() 548 EXPECT_TRUE(set.GetTagValue(TAG_ACTIVE_DATETIME, &val)); in TEST() [all …]
|
H A D | wrapped_key_test.cpp | 94 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size); in TEST() 98 auth_list.GetTagValue(TAG_ALGORITHM, &algorithm); in TEST()
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | DeviceUniqueAttestationTest.cpp | 161 auto vendor_pl = auths.GetTagValue(TAG_VENDOR_PATCHLEVEL); in TEST_P() 165 auto boot_pl = auths.GetTagValue(TAG_BOOT_PATCHLEVEL); in TEST_P() 214 auto vendor_pl = auths.GetTagValue(TAG_VENDOR_PATCHLEVEL); in TEST_P() 218 auto boot_pl = auths.GetTagValue(TAG_BOOT_PATCHLEVEL); in TEST_P() 282 auto vendor_pl = auths.GetTagValue(TAG_VENDOR_PATCHLEVEL); in TEST_P() 286 auto boot_pl = auths.GetTagValue(TAG_BOOT_PATCHLEVEL); in TEST_P()
|
H A D | KeyMintAidlTestBase.cpp | 176 auto patchlevel = allAuths.GetTagValue(TAG_BOOT_PATCHLEVEL); in boot_patch_level() 245 auto algorithm = key_desc.GetTagValue(TAG_ALGORITHM); in GenerateKey() 294 auto algorithm = key_desc.GetTagValue(TAG_ALGORITHM); in ImportKey() 342 auto algorithm = allAuths.GetTagValue(TAG_ALGORITHM); in ImportWrappedKey() 703 Digest digest = params.GetTagValue(TAG_DIGEST).value(); in LocalVerifyMessage() 705 auto tag = params.GetTagValue(TAG_PADDING); in LocalVerifyMessage() 814 auto digest_tag = params.GetTagValue(TAG_DIGEST); in LocalRsaEncryptMessage() 816 auto pad_tag = params.GetTagValue(TAG_PADDING); in LocalRsaEncryptMessage() 818 auto mgf_tag = params.GetTagValue(TAG_RSA_OAEP_MGF_DIGEST); in LocalRsaEncryptMessage() 929 auto ivVal = out_params.GetTagValue(TAG_NONCE); in EncryptMessage()
|
/aosp12/system/keymaster/legacy_support/ |
H A D | keymaster1_legacy_support.cpp | 167 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { in RequiresSoftwareDigesting() 191 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { in RequiresSoftwareDigesting() 237 if (key_description.GetTagValue(TAG_EC_CURVE, &curve)) { in GenerateKey() 246 if (key_description.GetTagValue(TAG_KEY_SIZE, &key_size_from_desc)) { in GenerateKey() 266 if (!additional_params.GetTagValue(TAG_DIGEST, &digest)) { in LoadKey() 285 if (!additional_params.GetTagValue(TAG_DIGEST, &digest)) { in LoadKey()
|
H A D | keymaster_passthrough_key.cpp | 57 if (additional_parameters_.GetTagValue(TAG_APPLICATION_DATA, &km_app_data)) { in formatted_key_material() 63 if (additional_parameters_.GetTagValue(TAG_APPLICATION_ID, &km_client_id)) { in formatted_key_material()
|
/aosp12/system/keymaster/contexts/ |
H A D | keymaster2_passthrough_context.cpp | 79 if (!additional_params.GetTagValue(TAG_APPLICATION_ID, clientIdPtr)) { in ParseKeyBlob() 82 if (!additional_params.GetTagValue(TAG_APPLICATION_DATA, applicationDataPtr)) { in ParseKeyBlob() 101 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && in ParseKeyBlob() 102 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { in ParseKeyBlob()
|
H A D | soft_keymaster_context.cpp | 268 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && in ParseKeyBlob() 269 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { in ParseKeyBlob() 345 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) client_id_ptr = &client_id; in ParseKeymaster1HwBlob() 346 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data)) app_data_ptr = &app_data; in ParseKeymaster1HwBlob() 371 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) { in GenerateAttestation() 392 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) { in GenerateSelfSignedCertificate()
|
H A D | keymaster1_passthrough_context.cpp | 124 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) client_id_ptr = &client_id; in parseKeymaster1HwBlob() 125 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data)) app_data_ptr = &app_data; in parseKeymaster1HwBlob() 168 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && in ParseKeyBlob() 169 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { in ParseKeyBlob() 233 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) { in GenerateAttestation()
|
H A D | pure_soft_keymaster_context.cpp | 137 if (key_description.GetTagValue(TAG_ROLLBACK_RESISTANCE)) { in CreateKeyBlob() 254 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && in ParseKeyBlob() 255 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { in ParseKeyBlob() 344 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) { in GenerateAttestation() 354 if (attest_params.GetTagValue(TAG_DEVICE_UNIQUE_ATTESTATION)) { in GenerateAttestation() 372 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) { in GenerateSelfSignedCertificate()
|
H A D | soft_keymaster_device.cpp | 569 if (!params_copy.GetTagValue(TAG_OS_VERSION, &request.os_version) || in configure() 570 !params_copy.GetTagValue(TAG_OS_PATCHLEVEL, &request.os_patchlevel)) { in configure() 666 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { in KeyRequiresSoftwareDigesting() 743 request.key_description.GetTagValue(TAG_EC_CURVE, &curve)) { in generate_key() 752 if (request.key_description.GetTagValue(TAG_KEY_SIZE, &key_size_from_desc)) { in generate_key() 1001 request.attest_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge); in attest_key() 1123 if (!akmKey->hw_enforced().GetTagValue(TAG_ALGORITHM, &algorithm) && in begin() 1124 !akmKey->sw_enforced().GetTagValue(TAG_ALGORITHM, &algorithm)) { in begin() 1132 if (!akmKey->hw_enforced().GetTagValue(TAG_DIGEST, &digest) && in begin() 1133 !akmKey->sw_enforced().GetTagValue(TAG_DIGEST, &digest)) { in begin()
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | operation.cpp | 90 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding() 121 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) { in GetAndValidateDigest()
|
H A D | android_keymaster.cpp | 64 if (tee_enforced.GetTagValue(tag, &key_patchlevel) || in CheckPatchLevel() 65 sw_enforced.GetTagValue(tag, &key_patchlevel)) { in CheckPatchLevel() 312 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || in get_key_factory() 547 if (!key->authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) return; in BeginOperation() 679 if (!request.additional_params.GetTagValue(TAG_CONFIRMATION_TOKEN, in FinishOperation() 742 if (request.attest_params.GetTagValue(TAG_ATTESTATION_APPLICATION_ID, in AttestKey() 770 request.key_description.GetTagValue(TAG_EARLY_BOOT_ONLY) && in ImportKey()
|
H A D | keymaster_enforcement.cpp | 77 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && in is_public_key_algorithm() 453 if (!operation_params.GetTagValue(TAG_AUTH_TOKEN, &auth_token_blob)) { in GetAndValidateAuthToken()
|