/aosp12/system/keymaster/tests/ |
H A D | android_keymaster_test.cpp | 905 begin_params.push_back(TAG_MAC_LENGTH, 264); in TEST_P() 917 begin_params.push_back(TAG_MAC_LENGTH, 120); in TEST_P() 2677 begin_params.push_back(begin_out_params); in TEST_P() 2701 begin_params.push_back(TAG_MAC_LENGTH, 96); in TEST_P() 2740 begin_params.Reinitialize(client_params()); in TEST_P() 2741 begin_params.push_back(begin_out_params); in TEST_P() 2835 begin_params.push_back(begin_out_params); in TEST_P() 2892 begin_params.push_back(begin_out_params); in TEST_P() 2950 begin_params.push_back(begin_out_params); in TEST_P() 2997 begin_params.push_back(begin_out_params); in TEST_P() [all …]
|
H A D | android_keymaster_test_utils.cpp | 467 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage() 505 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage() 506 begin_params.push_back(TAG_DIGEST, digest); in EncryptMessage() 525 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage() 526 begin_params.push_back(TAG_DIGEST, digest); in EncryptMessage() 544 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage() 569 begin_params.push_back(TAG_PADDING, padding); in DecryptMessage() 579 begin_params.push_back(TAG_DIGEST, digest); in DecryptMessage() 599 begin_params.push_back(TAG_DIGEST, digest); in DecryptMessage() 621 begin_params.push_back(TAG_DIGEST, digest); in DecryptMessage() [all …]
|
H A D | android_keymaster_test_utils.h | 225 const AuthorizationSet& begin_params, 229 const std::string& signature, const AuthorizationSet& begin_params, 265 const AuthorizationSet& begin_params, 287 const AuthorizationSet& begin_params,
|
H A D | keymaster_enforcement_test.cpp | 543 AuthorizationSet begin_params(AuthorizationSetBuilder().Authorization(TAG_NONCE, "foo", 3)); in TEST_F() local 547 begin_params, 0 /* challenge */, true /* is_begin_operation */)); in TEST_F() 550 begin_params, 0 /* challenge */, true /* is_begin_operation */)); in TEST_F() 553 begin_params, 0 /* challenge */, in TEST_F() 557 begin_params, 0 /* challenge */, true /* is_begin_operation */)); in TEST_F()
|
/aosp12/system/keymaster/legacy_support/ |
H A D | rsa_keymaster1_operation.cpp | 47 AuthorizationSet begin_params(input_params); in Begin() local 48 int pos = begin_params.find(TAG_DIGEST); in Begin() 53 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE); in Begin() 55 begin_params[pos].enumerated = KM_DIGEST_NONE; in Begin() 58 pos = begin_params.find(TAG_PADDING); in Begin() 60 switch (begin_params[pos].enumerated) { in Begin() 65 begin_params[pos].enumerated = KM_PAD_NONE; in Begin() 75 &begin_params, nullptr /* out_params */, &operation_handle_); in Begin() 117 const AuthorizationSet& begin_params, in CreateOperation() argument 120 if (!GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr; in CreateOperation() [all …]
|
H A D | ecdsa_keymaster1_operation.cpp | 48 AuthorizationSet begin_params(input_params); in Begin() local 49 int pos = begin_params.find(TAG_DIGEST); in Begin() 51 begin_params[pos].enumerated = KM_DIGEST_NONE; in Begin() 54 &begin_params, nullptr /* out_params */, &operation_handle_); in Begin() 96 const AuthorizationSet& begin_params, in CreateOperation() argument 99 if (!GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr; in CreateOperation()
|
H A D | ecdsa_keymaster1_operation.h | 108 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
H A D | rsa_keymaster1_operation.h | 107 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
H A D | keymaster1_engine.cpp | 147 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error)); in BuildRsaKey()
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | operation.cpp | 86 bool OperationFactory::GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key, in GetAndValidatePadding() argument 90 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding() 91 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING)); in GetAndValidatePadding() 111 bool OperationFactory::GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, in GetAndValidateDigest() argument 114 return GetAndValidateDigest(begin_params, key, digest, error, false); in GetAndValidateDigest() 117 bool OperationFactory::GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, in GetAndValidateDigest() argument 121 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) { in GetAndValidateDigest() 129 begin_params.GetTagCount(TAG_DIGEST)); in GetAndValidateDigest()
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | operation.h | 55 virtual OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params, 80 bool GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key, 82 bool GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, 84 bool GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key,
|
/aosp12/system/keymaster/km_openssl/ |
H A D | rsa_operation.cpp | 62 const AuthorizationSet& begin_params, in CreateRsaOperation() argument 65 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr; in CreateRsaOperation() 72 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error, true)) { in CreateRsaOperation() 94 const AuthorizationSet& begin_params, in CreateRsaOperation() argument 98 *error = GetAndValidateMgfDigest(begin_params, key, &mgf_digest); in CreateRsaOperation() 101 RsaOperationFactory::CreateRsaOperation(move(key), begin_params, error)); in CreateRsaOperation() 129 const AuthorizationSet& begin_params, const Key& key, keymaster_digest_t* digest) const { in GetAndValidateMgfDigest() argument 131 if (!begin_params.Contains(TAG_PADDING, KM_PAD_RSA_OAEP)) { in GetAndValidateMgfDigest() 136 if (!begin_params.GetTagValue(TAG_RSA_OAEP_MGF_DIGEST, digest)) { in GetAndValidateMgfDigest() 143 begin_params.GetTagCount(TAG_RSA_OAEP_MGF_DIGEST)); in GetAndValidateMgfDigest()
|
H A D | block_cipher_operation.cpp | 50 static keymaster_error_t GetAndValidateGcmTagLength(const AuthorizationSet& begin_params, in GetAndValidateGcmTagLength() argument 54 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { in GetAndValidateGcmTagLength() 78 const AuthorizationSet& begin_params, in CreateOperation() argument 82 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { in CreateOperation() 83 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE)); in CreateOperation() 98 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); in CreateOperation() 105 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation()
|
H A D | hmac_operation.cpp | 35 OperationPtr HmacOperationFactory::CreateOperation(Key&& key, const AuthorizationSet& begin_params, in CreateOperation() argument 45 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { in CreateOperation() 66 begin_params.GetTagCount(TAG_DIGEST)); in CreateOperation()
|
H A D | ecdsa_operation.cpp | 31 OperationPtr EcdsaOperationFactory::CreateOperation(Key&& key, const AuthorizationSet& begin_params, in CreateOperation() argument 42 if (!GetAndValidateDigest(begin_params, ecdsa_key, &digest, error, true)) { in CreateOperation()
|
H A D | hmac_operation.h | 58 virtual OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
H A D | block_cipher_operation.h | 54 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | rsa_operation.h | 198 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params, in CreateOperation() argument 200 return OperationPtr(CreateRsaOperation(move(key), begin_params, error)); in CreateOperation() 206 virtual RsaOperation* CreateRsaOperation(Key&& key, const AuthorizationSet& begin_params, 230 RsaOperation* CreateRsaOperation(Key&& key, const AuthorizationSet& begin_params, 235 keymaster_error_t GetAndValidateMgfDigest(const AuthorizationSet& begin_params, const Key& key,
|
H A D | ecdh_operation.h | 54 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
H A D | ecdsa_operation.h | 86 OperationPtr CreateOperation(Key&& key, const AuthorizationSet& begin_params,
|
/aosp12/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster1_engine.h | 58 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), in KeyData() 62 AuthorizationSet begin_params; member
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 3255 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 3275 begin_params.push_back(begin_out_params); in TEST_P() 3306 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 3327 begin_params.push_back(begin_out_params); in TEST_P() 3551 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 3583 begin_params.push_back(begin_out_params); in TEST_P() 3676 begin_params.push_back(begin_out_params); in TEST_P() 3885 AuthorizationSetBuilder begin_params; in TEST_P() local 4107 auto begin_params = in TEST_P() local 4126 auto begin_params = in TEST_P() local [all …]
|
H A D | KeymasterHidlTest.cpp | 495 auto begin_params = AuthorizationSetBuilder().BlockMode(block_mode).Padding(padding_mode); in CheckTripleDesTestVector() local 496 if (iv.size()) begin_params.Authorization(TAG_NONCE, iv.data(), iv.size()); in CheckTripleDesTestVector() 498 string output = ProcessMessage(key_blob_, purpose, input, begin_params, &output_params); in CheckTripleDesTestVector()
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | KeyMintTest.cpp | 4863 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 4878 begin_params.push_back(begin_out_params); in TEST_P() 4906 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 4924 begin_params.push_back(begin_out_params); in TEST_P() 5167 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 5186 begin_params.push_back(begin_out_params); in TEST_P() 5256 begin_params.push_back(begin_out_params); in TEST_P() 5447 AuthorizationSetBuilder begin_params; in TEST_P() local 5690 auto begin_params = in TEST_P() local 5710 auto begin_params = in TEST_P() local [all …]
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | keymaster_hidl_hal_test.cpp | 3389 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 3399 ASSERT_EQ(ErrorCode::OK, Begin(KeyPurpose::ENCRYPT, begin_params, &begin_out_params)) in TEST_P() 3407 begin_params.push_back(begin_out_params); in TEST_P() 3597 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 3628 begin_params.push_back(begin_out_params); in TEST_P() 3634 EXPECT_EQ(ErrorCode::OK, Begin(KeyPurpose::DECRYPT, begin_params)); in TEST_P() 3656 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 3705 auto begin_params = AuthorizationSetBuilder() in TEST_P() local 3722 begin_params.push_back(begin_out_params); in TEST_P() 3749 auto begin_params = AuthorizationSetBuilder() in TEST_P() local [all …]
|