/system/keymaster/android_keymaster/ |
D | pure_soft_secure_key_storage.cpp | 31 bool WriteKey(km_id_t keyid); 34 bool KeyExists(km_id_t keyid) const; 37 void DeleteKey(km_id_t keyid); 50 bool PureSoftSecureStorageMap::WriteKey(km_id_t keyid) { in WriteKey() argument 52 keyid_list_.push_back(keyid); in WriteKey() 56 bool PureSoftSecureStorageMap::KeyExists(km_id_t keyid) const { in KeyExists() 58 if (key_id == keyid) return true; in KeyExists() 62 void PureSoftSecureStorageMap::DeleteKey(km_id_t keyid) { in DeleteKey() argument 65 if (*iter == keyid) in DeleteKey() 87 keymaster_error_t PureSoftSecureKeyStorage::WriteKey(const km_id_t keyid, in WriteKey() argument [all …]
|
D | keymaster_enforcement.cpp | 39 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 43 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 47 km_id_t keyid; member 61 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 65 bool IncrementKeyAccessCount(km_id_t keyid); 69 km_id_t keyid; member 118 const km_id_t keyid, in AuthorizeOperation() argument 141 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation() 202 const km_id_t keyid, in AuthorizeBegin() argument 260 if (!MinTimeBetweenOpsPassed(min_ops_timeout, keyid)) in AuthorizeBegin() [all …]
|
/system/keymaster/include/keymaster/ |
D | secure_key_storage.h | 43 virtual keymaster_error_t WriteKey(const km_id_t keyid, const KeymasterKeyBlob& blob) = 0; 49 virtual keymaster_error_t KeyExists(const km_id_t keyid, bool* exists) = 0; 54 virtual keymaster_error_t DeleteKey(const km_id_t keyid) = 0;
|
D | pure_soft_secure_key_storage.h | 37 keymaster_error_t WriteKey(const km_id_t keyid, const KeymasterKeyBlob& blob) override; 42 keymaster_error_t KeyExists(const km_id_t keyid, bool* exists) override; 47 keymaster_error_t DeleteKey(const km_id_t keyid) override;
|
D | keymaster_enforcement.h | 58 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, 69 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, 203 virtual bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid) const = 0; 226 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 227 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
/system/security/keystore2/src/crypto/ |
D | certificate_utils.cpp | 79 std::vector<uint8_t> keyid(20); in makeKeyId() local 81 if (!X509_pubkey_digest(cert, EVP_sha1(), keyid.data(), &len)) { in makeKeyId() 84 return keyid; in makeKeyId() 88 makeAuthorityKeyExtension(const std::vector<uint8_t>& keyid) { in makeAuthorityKeyExtension() argument 94 auth_key->keyid = ASN1_OCTET_STRING_new(); in makeAuthorityKeyExtension() 95 if (auth_key->keyid == nullptr) { in makeAuthorityKeyExtension() 99 if (!ASN1_OCTET_STRING_set(auth_key->keyid, keyid.data(), keyid.size())) { in makeAuthorityKeyExtension() 107 makeSubjectKeyExtension(const std::vector<uint8_t>& keyid) { in makeSubjectKeyExtension() argument 111 if (!keyid_str || !ASN1_OCTET_STRING_set(keyid_str.get(), keyid.data(), keyid.size())) { in makeSubjectKeyExtension() 346 auto& keyid = std::get<std::vector<uint8_t>>(keyidV); in makeCert() local [all …]
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 258 km_id_t keyid; in CreateKeyBlob() local 259 if (!soft_keymaster_enforcement_.CreateKeyId(*blob, &keyid)) return KM_ERROR_UNKNOWN_ERROR; in CreateKeyBlob() 261 return pure_soft_secure_key_storage_->WriteKey(keyid, *blob); in CreateKeyBlob() 319 km_id_t keyid; in ParseKeyBlob() local 321 if (!soft_keymaster_enforcement_.CreateKeyId(blob, &keyid)) in ParseKeyBlob() 323 error = pure_soft_secure_key_storage_->KeyExists(keyid, &exists); in ParseKeyBlob() 358 km_id_t keyid; in DeleteKey() local 359 if (!soft_keymaster_enforcement_.CreateKeyId(blob, &keyid)) return KM_ERROR_UNKNOWN_ERROR; in DeleteKey() 360 return pure_soft_secure_key_storage_->DeleteKey(keyid); in DeleteKey()
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 75 km_id_t* keyid) const { in CreateKeyId() 83 assert(hash_len >= sizeof(*keyid)); in CreateKeyId() 84 memcpy(keyid, hash, sizeof(*keyid)); in CreateKeyId()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.h | 40 bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid) const override;
|
/system/ca-certificates/files/ |
D | 83e9984f.0 | 44 keyid:87:11:15:08:D1:AA:C1:78:0C:B1:AF:CE:C6:C9:90:EF:BF:30:04:C0
|
D | cbb3f32b.0 | 41 keyid:89:8F:2F:A3:E8:2B:A0:14:54:7B:F3:56:B8:26:5F:67:38:0B:9C:D0
|
D | 073bfcc5.0 | 42 keyid:A5:BB:4A:97:CE:B3:2B:7F:A4:31:DE:97:83:59:83:A6:6F:71:CB:DE
|
D | 88950faa.0 | 44 keyid:82:D1:85:73:30:E7:35:04:D3:8E:02:92:FB:E5:A4:D1:C4:21:E8:CD
|
D | 7892ad52.0 | 44 keyid:5B:CA:5E:E5:DE:D2:81:AA:CD:A8:2D:64:51:B6:D9:72:9B:97:E6:4F
|
D | fde84897.0 | 62 keyid:1A:ED:FE:41:39:90:B4:24:59:BE:01:F2:52:D5:45:F6:5A:39:DC:11
|
D | 219d9499.0 | 62 keyid:D2:C4:B0:D2:91:D4:4C:11:71:B3:61:CB:3D:A1:FE:DD:A8:6A:D4:E3
|
D | 81b9768f.0 | 66 keyid:B1:3E:C3:69:03:F8:BF:47:01:D4:98:26:1A:08:02:EF:63:64:2B:C3
|
D | b872f2b4.0 | 61 keyid:A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
|
D | 399e7759.0 | 65 keyid:03:DE:50:35:56:D1:4C:BB:66:F0:A3:E2:1B:1B:C3:97:B2:3D:D1:55
|
D | 23f4c490.0 | 62 keyid:BF:5F:B7:D1:CE:DD:1F:86:F4:5B:55:AC:DC:D7:10:C2:0E:A9:88:E7
|
D | 69105f4f.0 | 65 keyid:45:EB:A2:AF:F4:92:CB:82:31:2D:51:8B:A7:A7:21:9D:F3:6D:C8:0F
|
D | bf64f35b.0 | 69 keyid:68:90:E4:67:A4:A6:53:80:C7:86:66:A4:F1:F7:4B:43:FB:84:BD:6D
|
D | e8651083.0 | 66 keyid:CB:0F:C6:DF:42:43:CC:3D:CB:B5:48:23:A1:1A:7A:A6:2A:BB:34:68
|
/system/core/fs_mgr/libdm/include/libdm/ |
D | dm_target.h | 163 const std::string& keyid) in DmTargetAndroidVerity() argument 164 : DmTarget(start, length), keyid_(keyid), block_device_(block_device) {} in DmTargetAndroidVerity()
|
/system/core/fs_mgr/tools/ |
D | dmctl.cpp | 116 std::string keyid = NextArg(); in Next() local 118 return std::make_unique<DmTargetAndroidVerity>(start_sector, num_sectors, keyid, in Next()
|