/system/keymaster/tests/ |
D | keymaster_enforcement_test.cpp | 91 static const km_id_t key_id = 0xa; member in keymaster::test::KeymasterBaseTest 104 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(single_auth_set, empty)); in TEST_F() 119 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty))); in TEST_F() 123 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty))); in TEST_F() 135 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty)); in TEST_F() 149 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty))); in TEST_F() 153 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty))); in TEST_F() 165 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty)); in TEST_F() 178 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty)); in TEST_F() 192 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty)); in TEST_F() [all …]
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 31 EVP_PKEY* EVP_PKEY_from_keystore(const char* key_id) __attribute__((visibility("default"))); 37 EVP_PKEY* EVP_PKEY_from_keystore(const char* key_id) { in EVP_PKEY_from_keystore() argument 38 ALOGV("EVP_PKEY_from_keystore(\"%s\")", key_id); in EVP_PKEY_from_keystore() 40 return EVP_PKEY_from_keystore2(key_id); in EVP_PKEY_from_keystore()
|
D | keystore2_engine.h | 21 extern "C" EVP_PKEY* EVP_PKEY_from_keystore2(const char* key_id);
|
D | keystore2_engine.cpp | 365 extern "C" EVP_PKEY* EVP_PKEY_from_keystore2(const char* key_id) { in EVP_PKEY_from_keystore2() argument 374 std::string alias = key_id; in EVP_PKEY_from_keystore2()
|
/system/security/keystore2/src/ |
D | database.rs | 170 fn load_from_db(key_id: i64, tx: &Transaction) -> Result<Self> { in load_from_db() 181 .query(params![key_id]) in load_from_db() 197 fn store_in_db(&self, key_id: i64, tx: &Transaction) -> Result<()> { in store_in_db() 207 stmt.insert(params![key_id, tag, entry,]).with_context(|| { in store_in_db() 567 fn get(&self, key_id: i64) -> KeyIdGuard { in get() 569 while locked_keys.contains(&key_id) { in get() 572 locked_keys.insert(key_id); in get() 573 KeyIdGuard(key_id) in get() 580 fn try_get(&self, key_id: i64) -> Option<KeyIdGuard> { in try_get() 582 if locked_keys.insert(key_id) { in try_get() [all …]
|
D | enforcements.rs | 320 if let Some(key_id) = self.key_usage_limited { in after_finish() 325 .check_and_update_key_usage_count(key_id) in after_finish() 414 let (key_id, key_params) = match key_properties { in authorize_create() 415 Some((key_id, key_params)) => (*key_id, key_params), in authorize_create() 539 key_usage_limited = Some(key_id); in authorize_create()
|
D | super_key.rs | 135 if let Some(EncryptedBy::KeyId(key_id)) = metadata.encrypted_by() { in from_metadata() 136 Some(SuperKeyIdentifier::DatabaseId(*key_id)) in from_metadata() 376 fn lookup_key(&self, key_id: &SuperKeyIdentifier) -> Result<Option<Arc<SuperKey>>> { in lookup_key() 377 Ok(match key_id { in lookup_key() 393 id: *key_id, in lookup_key() 424 Ok(if let Some(key_id) = SuperKeyIdentifier::from_metadata(metadata) { in unwrap_key_if_required() 426 .lookup_key(&key_id) in unwrap_key_if_required() 713 let key_id = SuperKeyIdentifier::BootLevel(level); in handle_super_encryption_on_key_init() localVariable 715 .lookup_key(&key_id) in handle_super_encryption_on_key_init()
|
D | security_level.rs | 189 let key_id = db in store_new_key() localVariable 202 nspace: key_id.id(), in store_new_key() 347 if let Some((key_id, _)) = key_properties { in create_operation() 349 DB.with(|db| db.borrow_mut().load_key_descriptor(key_id)) in create_operation() 1087 let key_id = 0; in test_rkpd_attestation_key_upgrade() localVariable 1091 let key = get_rkpd_attestation_key(&rpc_name, key_id).unwrap(); in test_rkpd_attestation_key_upgrade()
|
D | key_parameter.rs | 1436 key_id: i64, in insert_into_keyparameter() 1444 params![key_id, tag, *value, security_level], in insert_into_keyparameter() 1450 fn store_keyparameter(db: &Connection, key_id: i64, kp: &KeyParameter) -> Result<()> { in store_keyparameter() 1454 params![key_id, kp.get_tag().0, kp.key_parameter_value(), kp.security_level().0], in store_keyparameter()
|
/system/core/mini_keyctl/ |
D | mini_keyctl_utils.cpp | 65 std::string key_id = "0x" + tokens[0]; in GetKeyringId() local 74 if (!android::base::ParseInt(key_id.c_str(), &keyring_id)) { in GetKeyringId() 75 LOG(ERROR) << "Unexpected key format in /proc/keys: " << key_id; in GetKeyringId()
|
/system/keymaster/include/keymaster/ |
D | operation.h | 107 void set_key_id(uint64_t key_id) { key_id_ = key_id; } in set_key_id() argument 108 uint64_t key_id() const { return key_id_; } in key_id() function
|
/system/security/keystore2/rkpd_client/src/ |
D | lib.rs | 560 let key_id = get_next_key_id(); in test_get_rkpd_attestation_key() localVariable 561 let key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_get_rkpd_attestation_key() 569 let key_id = get_next_key_id(); in test_get_rkpd_attestation_key_same_caller() localVariable 572 let first_key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_get_rkpd_attestation_key_same_caller() 573 let second_key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_get_rkpd_attestation_key_same_caller() 601 let key_id = get_next_key_id(); in test_store_rkpd_attestation_key() localVariable 602 let key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_store_rkpd_attestation_key() 609 let new_key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_store_rkpd_attestation_key() 621 let key_id = get_next_key_id(); in test_stress_get_rkpd_attestation_key() localVariable 629 let key = get_rkpd_attestation_key(DEFAULT_RPC_SERVICE_NAME, key_id).unwrap(); in test_stress_get_rkpd_attestation_key()
|
/system/keymaster/android_keymaster/ |
D | pure_soft_secure_key_storage.cpp | 57 for (km_id_t key_id : keyid_list_) in KeyExists() local 58 if (key_id == keyid) return true; in KeyExists()
|
D | android_keymaster.cpp | 630 km_id_t key_id; in BeginOperation() local 632 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) return; in BeginOperation() 633 operation->set_key_id(key_id); in BeginOperation() 635 request.purpose, key_id, operation->authorizations(), request.additional_params, in BeginOperation() 675 operation->purpose(), operation->key_id(), operation->authorizations(), in UpdateOperation() 719 operation->purpose(), operation->key_id(), operation->authorizations(), in FinishOperation() 740 context_->secure_key_storage()->DeleteKey(operation->key_id()); in FinishOperation()
|
/system/keymint/common/src/crypto/ |
D | ec.rs | 195 key_id: Option<Vec<u8>>, in public_cose_key() 242 if let Some(key_id) = key_id { in public_cose_key() 243 builder = builder.key_id(key_id); in public_cose_key()
|
/system/secretkeeper/core/src/ |
D | cipher.rs | 54 .key_id(session_id.to_vec()) in encrypt_message()
|
D | ta.rs | 241 let kid: &[u8; SESSION_ID_LEN] = key_id(&encrypt0) in secret_management() 447 fn key_id(encrypted_packet: &CoseEncrypt0) -> &[u8] { in key_id() function 448 &encrypted_packet.protected.header.key_id in key_id()
|
/system/security/keystore2/test_utils/ |
D | ffi_test_utils.cpp | 26 extern "C" EVP_PKEY* EVP_PKEY_from_keystore(const char* key_id); 570 char key_id[KEY_ID_LEN] = ""; in performCryptoOpUsingKeystoreEngine() local 571 snprintf(key_id, KEY_ID_LEN, "%" PRIx64, grant_id); in performCryptoOpUsingKeystoreEngine() 572 std::string str_key = std::string(keystore2_grant_id_prefix) + key_id; in performCryptoOpUsingKeystoreEngine()
|
/system/keymint/ta/src/ |
D | lib.rs | 85 key_id: KeyId, field 493 fn key_id(&self, keyblob: &[u8]) -> Result<KeyId, Error> { in key_id() method 505 fn update_use_count(&mut self, key_id: KeyId, max_uses: u32) -> Result<(), Error> { in update_use_count() 512 Some(UseCount { key_id: k, count: _count }) if *k == key_id => { in update_use_count() 522 self.use_count[idx] = Some(UseCount { key_id, count: 0 }); in update_use_count()
|
D | operation.rs | 658 let key_id = self.key_id(key_blob)?; in check_begin_auths() localVariable 659 self.update_use_count(key_id, *max_uses)?; in check_begin_auths()
|
/system/extras/simpleperf/scripts/ |
D | pprof_proto_generator.py | 179 def __init__(self, key_id: int, str_id: int): 181 self.key_id = key_id 578 label.key = l.key_id
|
/system/keymaster/cppcose/ |
D | cppcose.cpp | 566 auto& key_id = unprotParms->asMap()->get(KEY_ID); in getSenderPubKeyFromCoseEncrypt() local 567 if (key_id && key_id->asBstr()) { in getSenderPubKeyFromCoseEncrypt() 568 return std::make_pair(publicKey, key_id->asBstr()->value()); in getSenderPubKeyFromCoseEncrypt()
|