/aosp12/hardware/interfaces/keymaster/4.1/support/ |
H A D | Keymaster.cpp | 76 std::ostream& operator<<(std::ostream& os, const Keymaster& keymaster) { in operator <<() 85 Keymaster::KeymasterSet enumerateDevices(const sp<IServiceManager>& serviceManager) { in enumerateDevices() 86 Keymaster::KeymasterSet result; in enumerateDevices() 110 void Keymaster::logIfKeymasterVendorError(ErrorCode ec) const { in logIfKeymasterVendorError() 123 Keymaster::KeymasterSet Keymaster::enumerateAvailableDevices() { in enumerateAvailableDevices() 145 const Keymaster::KeymasterSet& keymasters) { in getHmacParameters() 163 static void computeHmac(const Keymaster::KeymasterSet& keymasters, in computeHmac() 191 void Keymaster::performHmacKeyAgreement(const KeymasterSet& keymasters) { in performHmacKeyAgreement()
|
H A D | Android.bp | 36 "Keymaster.cpp",
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | Keymaster.h | 41 class Keymaster : public IKeymasterDevice { 43 using KeymasterSet = std::vector<android::sp<Keymaster>>; 45 Keymaster(const hidl_string& descriptor, const hidl_string& instanceName) in Keymaster() function 47 virtual ~Keymaster() {} in ~Keymaster() 99 std::ostream& operator<<(std::ostream& os, const Keymaster& keymaster);
|
H A D | Keymaster3.h | 34 class Keymaster3 : public Keymaster { 40 : Keymaster(IKeymaster3Device::descriptor, instanceName), in Keymaster3()
|
H A D | Keymaster4.h | 28 class Keymaster4 : public Keymaster { 35 : Keymaster(V4_1::IKeymasterDevice::descriptor, instanceName), in Keymaster4()
|
/aosp12/system/vold/ |
H A D | Keymaster.cpp | 106 Keymaster::Keymaster() { in Keymaster() function in android::vold::Keymaster 130 bool Keymaster::generateKey(const km::AuthorizationSet& inParams, std::string* key) { in generateKey() 153 bool Keymaster::exportKey(const KeyBuffer& kmKey, std::string* key) { in exportKey() 178 bool Keymaster::deleteKey(const std::string& key) { in deleteKey() 191 KeymasterOperation Keymaster::begin(const std::string& key, const km::AuthorizationSet& inParams, in begin() 220 void Keymaster::earlyBootEnded() { in earlyBootEnded() 233 void Keymaster::deleteAllKeys() { in deleteAllKeys()
|
H A D | Keymaster.h | 105 friend class Keymaster; variable 109 class Keymaster { 111 Keymaster(); 135 DISALLOW_COPY_AND_ASSIGN(Keymaster);
|
H A D | KeyStorage.cpp | 127 static bool generateKeymasterKey(Keymaster& keymaster, in generateKeymasterKey() 142 static bool generateKeyStorageKey(Keymaster& keymaster, const std::string& appId, in generateKeyStorageKey() 154 Keymaster keymaster; in generateWrappedStorageKey() 166 Keymaster keymaster; in exportWrappedStorageKey() 223 static bool CommitUpgradedKey(Keymaster& keymaster, const std::string& dir) { in CommitUpgradedKey() 248 Keymaster keymaster; in DeferredCommitKeys() 310 static void DeleteUpgradedKey(Keymaster& keymaster, const std::string& path) { in DeleteUpgradedKey() 378 static bool encryptWithKeymasterKey(Keymaster& keymaster, const std::string& dir, in encryptWithKeymasterKey() 586 Keymaster keymaster; in storeKey() 638 Keymaster keymaster; in retrieveKey() [all …]
|
H A D | wait_for_keymaster.cpp | 30 android::vold::Keymaster keymaster; in main()
|
H A D | Android.bp | 126 "Keymaster.cpp", 249 "Keymaster.cpp",
|
H A D | MetadataCrypt.cpp | 120 Keymaster::deleteAllKeys(); in read_key()
|
H A D | cryptfs.cpp | 352 Keymaster dev; in keymaster_create_key_for_cryptfs_scrypt() 398 Keymaster dev; in keymaster_sign_object_for_cryptfs_scrypt()
|
H A D | VoldNativeService.cpp | 980 Keymaster::earlyBootEnded(); in earlyBootEnded()
|
/aosp12/system/security/keystore2/src/km_compat/ |
H A D | km_compat.h | 50 using ::android::hardware::keymaster::V4_1::support::Keymaster; 82 ::android::sp<Keymaster> mDevice; 86 explicit KeyMintDevice(::android::sp<Keymaster>, KeyMintSecurityLevel); 144 KeyMintOperation(::android::sp<Keymaster> device, uint64_t operationHandle, in KeyMintOperation() 182 ::android::sp<Keymaster> mDevice; 189 ::android::sp<Keymaster> mDevice; 192 SharedSecret(::android::sp<Keymaster> device) : mDevice(device) {} in SharedSecret() 202 ::android::sp<Keymaster> mDevice; 205 SecureClock(::android::sp<Keymaster> device) : mDevice(device) {} in SecureClock()
|
H A D | km_compat.cpp | 974 makeCert(::android::sp<Keymaster> mDevice, const std::vector<KeyParameter>& keyParams, in makeCert() 1262 using keymasterNs::support::Keymaster; 1282 using KeymasterDevices = Devices<sp<Keymaster>, 3>; 1302 sp<Keymaster> kmDevice(new Wrapper(device, name)); in enumerateKeymasterDevices() 1363 KeyMintDevice::KeyMintDevice(sp<Keymaster> device, KeyMintSecurityLevel securityLevel) in KeyMintDevice() 1374 sp<Keymaster> getDevice(KeyMintSecurityLevel securityLevel) { in getDevice() 1376 static sp<Keymaster> teeDevice; in getDevice() 1377 static sp<Keymaster> sbDevice; in getDevice()
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/performance/ |
H A D | README | 1 # Keymaster Benchmark 3 The Keymaster Benchmark is a standalone tool for measuring the performance of keymaster implementat… 17 Keymaster Benchmark is built on [Google microbenchmark library](https://github.com/google/benchmark…
|
/aosp12/packages/apps/KeyChain/ |
H A D | OWNERS | 9 # KeyStore / Keymaster owners
|
/aosp12/hardware/interfaces/rebootescrow/aidl/vts/functional/ |
H A D | README.md | 1 Many of the tests in this directory may require that TEE Keymaster
|
/aosp12/hardware/interfaces/keymaster/4.0/ |
H A D | types.hal | 222 * disks, where the file system may not be available until after a Keymaster key is used to 305 * fails because the table is full, Keymaster returns ErrorCode::TOO_MANY_OPERATIONS. 321 * counters for keys with this tag. Because Keymaster memory is often limited, this table can 322 * have a fixed maximum size and Keymaster can fail operations that attempt to use keys with 461 * key or another with TRUSTED_USER_PRESENCE_REQUIRED, Keymaster must return 548 * operating system booted (if any). This tag is never provided to or returned from Keymaster 828 * Keymaster and returned from begin. 958 * Keymaster did not record origin. This value can only be seen on keys in a keymaster0 995 * Keymaster error codes. 1254 * between multiple Keymaster instances. Sharing parameters are returned in this struct by [all …]
|
H A D | IKeymasterDevice.hal | 23 * Keymaster device definition. 217 * must be a TEE Keymaster as well. The HMAC key used to MAC and verify authentication tokens 324 * sharingCheck = HMAC(H, "Keymaster HMAC Verification") 339 * For every StrongBox operation, Keystore is required to call this method on the TEE Keymaster, 349 * @param operationHandle the operation handle returned by StrongBox Keymaster's begin(). 369 * Adds entropy to the RNG used by Keymaster. Entropy added through this method must not be the 649 * Keymaster. 824 * Note that Keymaster versions 2 and 3 required that the system and boot images have the same 986 * in which case the Keymaster implementation cannot build a proper PKCS#1 v1.5 signature
|
/aosp12/hardware/interfaces/keymaster/3.0/ |
H A D | IKeymasterDevice.hal | 20 * Keymaster device definition. For thorough documentation see the implementer's reference, at 40 * launched with Nougat or later must support hardware enforcement of Keymaster 43 * @return supportsAttestation is true if the hardware supports generation of Keymaster public 182 * Upgrades an old key. Keys can become "old" in two ways: Keymaster can be upgraded to a new
|
H A D | types.hal | 235 UNKNOWN = 3, /* Keymaster did not record origin. This value can only be seen on keys in a 266 * Keymaster error codes.
|
/aosp12/hardware/interfaces/confirmationui/1.0/ |
H A D | IConfirmationResultCallback.hal | 57 * which is shared with Keymaster. In test mode the test key MUST be
|
/aosp12/hardware/interfaces/keymaster/4.1/ |
H A D | types.hal | 50 * HAL attests to Credential Keys. IIdentityCredential produces Keymaster-style attestations.
|
/aosp12/system/keymaster/tests/ |
H A D | android_keymaster_test_utils.cpp | 34 #error Keymaster test code requires that KEYMASTER_NAME_TAGS is defined
|