Home
last modified time | relevance | path

Searched refs:key_id (Results 1 – 22 of 22) sorted by relevance

/system/keymaster/tests/
Dkeymaster_enforcement_test.cpp91 static const km_id_t key_id = 0xa; member in keymaster::test::KeymasterBaseTest
104 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(single_auth_set, empty)); in TEST_F()
119 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty))); in TEST_F()
123 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty))); in TEST_F()
135 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty)); in TEST_F()
149 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty))); in TEST_F()
153 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty))); in TEST_F()
165 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty)); in TEST_F()
178 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty)); in TEST_F()
192 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty)); in TEST_F()
[all …]
/system/security/keystore-engine/
Dandroid_engine.cpp31 EVP_PKEY* EVP_PKEY_from_keystore(const char* key_id) __attribute__((visibility("default")));
37 EVP_PKEY* EVP_PKEY_from_keystore(const char* key_id) { in EVP_PKEY_from_keystore() argument
38 ALOGV("EVP_PKEY_from_keystore(\"%s\")", key_id); in EVP_PKEY_from_keystore()
40 return EVP_PKEY_from_keystore2(key_id); in EVP_PKEY_from_keystore()
Dkeystore2_engine.h21 extern "C" EVP_PKEY* EVP_PKEY_from_keystore2(const char* key_id);
Dkeystore2_engine.cpp365 extern "C" EVP_PKEY* EVP_PKEY_from_keystore2(const char* key_id) { in EVP_PKEY_from_keystore2() argument
374 std::string alias = key_id; in EVP_PKEY_from_keystore2()
/system/security/keystore2/src/
Ddatabase.rs170 fn load_from_db(key_id: i64, tx: &Transaction) -> Result<Self> { in load_from_db()
181 .query(params![key_id]) in load_from_db()
197 fn store_in_db(&self, key_id: i64, tx: &Transaction) -> Result<()> { in store_in_db()
207 stmt.insert(params![key_id, tag, entry,]).with_context(|| { in store_in_db()
567 fn get(&self, key_id: i64) -> KeyIdGuard { in get()
569 while locked_keys.contains(&key_id) { in get()
572 locked_keys.insert(key_id); in get()
573 KeyIdGuard(key_id) in get()
580 fn try_get(&self, key_id: i64) -> Option<KeyIdGuard> { in try_get()
582 if locked_keys.insert(key_id) { in try_get()
[all …]
Denforcements.rs320 if let Some(key_id) = self.key_usage_limited { in after_finish()
325 .check_and_update_key_usage_count(key_id) in after_finish()
414 let (key_id, key_params) = match key_properties { in authorize_create()
415 Some((key_id, key_params)) => (*key_id, key_params), in authorize_create()
539 key_usage_limited = Some(key_id); in authorize_create()
Dsuper_key.rs135 if let Some(EncryptedBy::KeyId(key_id)) = metadata.encrypted_by() { in from_metadata()
136 Some(SuperKeyIdentifier::DatabaseId(*key_id)) in from_metadata()
376 fn lookup_key(&self, key_id: &SuperKeyIdentifier) -> Result<Option<Arc<SuperKey>>> { in lookup_key()
377 Ok(match key_id { in lookup_key()
393 id: *key_id, in lookup_key()
424 Ok(if let Some(key_id) = SuperKeyIdentifier::from_metadata(metadata) { in unwrap_key_if_required()
426 .lookup_key(&key_id) in unwrap_key_if_required()
713 let key_id = SuperKeyIdentifier::BootLevel(level); in handle_super_encryption_on_key_init() localVariable
715 .lookup_key(&key_id) in handle_super_encryption_on_key_init()
Dsecurity_level.rs189 let key_id = db in store_new_key() localVariable
202 nspace: key_id.id(), in store_new_key()
347 if let Some((key_id, _)) = key_properties { in create_operation()
349 DB.with(|db| db.borrow_mut().load_key_descriptor(key_id)) in create_operation()
1087 let key_id = 0; in test_rkpd_attestation_key_upgrade() localVariable
1091 let key = get_rkpd_attestation_key(&rpc_name, key_id).unwrap(); in test_rkpd_attestation_key_upgrade()
Dkey_parameter.rs1436 key_id: i64, in insert_into_keyparameter()
1444 params![key_id, tag, *value, security_level], in insert_into_keyparameter()
1450 fn store_keyparameter(db: &Connection, key_id: i64, kp: &KeyParameter) -> Result<()> { in store_keyparameter()
1454 params![key_id, kp.get_tag().0, kp.key_parameter_value(), kp.security_level().0], in store_keyparameter()
/system/core/mini_keyctl/
Dmini_keyctl_utils.cpp65 std::string key_id = "0x" + tokens[0]; in GetKeyringId() local
74 if (!android::base::ParseInt(key_id.c_str(), &keyring_id)) { in GetKeyringId()
75 LOG(ERROR) << "Unexpected key format in /proc/keys: " << key_id; in GetKeyringId()
/system/keymaster/include/keymaster/
Doperation.h107 void set_key_id(uint64_t key_id) { key_id_ = key_id; } in set_key_id() argument
108 uint64_t key_id() const { return key_id_; } in key_id() function
/system/security/keystore2/rkpd_client/src/
Dlib.rs560 let key_id = get_next_key_id(); in test_get_rkpd_attestation_key() localVariable
561 let key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_get_rkpd_attestation_key()
569 let key_id = get_next_key_id(); in test_get_rkpd_attestation_key_same_caller() localVariable
572 let first_key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_get_rkpd_attestation_key_same_caller()
573 let second_key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_get_rkpd_attestation_key_same_caller()
601 let key_id = get_next_key_id(); in test_store_rkpd_attestation_key() localVariable
602 let key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_store_rkpd_attestation_key()
609 let new_key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_store_rkpd_attestation_key()
621 let key_id = get_next_key_id(); in test_stress_get_rkpd_attestation_key() localVariable
629 let key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_stress_get_rkpd_attestation_key()
/system/keymaster/android_keymaster/
Dpure_soft_secure_key_storage.cpp57 for (km_id_t key_id : keyid_list_) in KeyExists() local
58 if (key_id == keyid) return true; in KeyExists()
Dandroid_keymaster.cpp630 km_id_t key_id; in BeginOperation() local
632 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) return; in BeginOperation()
633 operation->set_key_id(key_id); in BeginOperation()
635 request.purpose, key_id, operation->authorizations(), request.additional_params, in BeginOperation()
675 operation->purpose(), operation->key_id(), operation->authorizations(), in UpdateOperation()
719 operation->purpose(), operation->key_id(), operation->authorizations(), in FinishOperation()
740 context_->secure_key_storage()->DeleteKey(operation->key_id()); in FinishOperation()
/system/keymint/common/src/crypto/
Dec.rs195 key_id: Option<Vec<u8>>, in public_cose_key()
242 if let Some(key_id) = key_id { in public_cose_key()
243 builder = builder.key_id(key_id); in public_cose_key()
/system/secretkeeper/core/src/
Dcipher.rs54 .key_id(session_id.to_vec()) in encrypt_message()
Dta.rs241 let kid: &[u8; SESSION_ID_LEN] = key_id(&encrypt0) in secret_management()
447 fn key_id(encrypted_packet: &CoseEncrypt0) -> &[u8] { in key_id() function
448 &encrypted_packet.protected.header.key_id in key_id()
/system/security/keystore2/test_utils/
Dffi_test_utils.cpp26 extern "C" EVP_PKEY* EVP_PKEY_from_keystore(const char* key_id);
570 char key_id[KEY_ID_LEN] = ""; in performCryptoOpUsingKeystoreEngine() local
571 snprintf(key_id, KEY_ID_LEN, "%" PRIx64, grant_id); in performCryptoOpUsingKeystoreEngine()
572 std::string str_key = std::string(keystore2_grant_id_prefix) + key_id; in performCryptoOpUsingKeystoreEngine()
/system/keymint/ta/src/
Dlib.rs85 key_id: KeyId, field
493 fn key_id(&self, keyblob: &[u8]) -> Result<KeyId, Error> { in key_id() method
505 fn update_use_count(&mut self, key_id: KeyId, max_uses: u32) -> Result<(), Error> { in update_use_count()
512 Some(UseCount { key_id: k, count: _count }) if *k == key_id => { in update_use_count()
522 self.use_count[idx] = Some(UseCount { key_id, count: 0 }); in update_use_count()
Doperation.rs658 let key_id = self.key_id(key_blob)?; in check_begin_auths() localVariable
659 self.update_use_count(key_id, *max_uses)?; in check_begin_auths()
/system/extras/simpleperf/scripts/
Dpprof_proto_generator.py179 def __init__(self, key_id: int, str_id: int):
181 self.key_id = key_id
578 label.key = l.key_id
/system/keymaster/cppcose/
Dcppcose.cpp566 auto& key_id = unprotParms->asMap()->get(KEY_ID); in getSenderPubKeyFromCoseEncrypt() local
567 if (key_id && key_id->asBstr()) { in getSenderPubKeyFromCoseEncrypt()
568 return std::make_pair(publicKey, key_id->asBstr()->value()); in getSenderPubKeyFromCoseEncrypt()