/system/keymaster/tests/ |
D | keymaster_enforcement_test.cpp | 36 const AuthProxy& auth_set) { in AuthorizeOperation() argument 39 purpose, keyid, auth_set, empty_set, 0 /* op_handle */, true /* is_begin_operation */); in AuthorizeOperation() 116 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() local 119 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty))); in TEST_F() 123 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty))); in TEST_F() 132 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() local 135 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty)); in TEST_F() 146 AuthorizationSet auth_set(params, array_length(params)); in TEST_F() local 149 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, AuthProxy(auth_set, empty))); in TEST_F() 153 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, AuthProxy(auth_set, empty))); in TEST_F() [all …]
|
/system/keymaster/android_keymaster/ |
D | keymaster_enforcement.cpp | 75 bool is_public_key_algorithm(const AuthProxy& auth_set) { in is_public_key_algorithm() argument 77 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && in is_public_key_algorithm() 82 const AuthProxy& auth_set) { in authorized_purpose() argument 90 if (auth_set.Contains(TAG_PURPOSE, purpose)) return KM_ERROR_OK; in authorized_purpose() 118 const AuthProxy& auth_set, in AuthorizeOperation() argument 122 if (is_public_key_algorithm(auth_set)) { in AuthorizeOperation() 140 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation() 142 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeOperation() 148 KeymasterEnforcement::AuthorizeUpdateOrFinish(const AuthProxy& auth_set, in AuthorizeUpdateOrFinish() argument 153 for (size_t pos = 0; pos < auth_set.size(); ++pos) { in AuthorizeUpdateOrFinish() [all …]
|
/system/keymaster/include/keymaster/ |
D | keymaster_enforcement.h | 56 const AuthProxy& auth_set, 67 const AuthProxy& auth_set, 75 keymaster_error_t AuthorizeUpdate(const AuthProxy& auth_set, in AuthorizeUpdate() argument 78 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeUpdate() 86 keymaster_error_t AuthorizeFinish(const AuthProxy& auth_set, in AuthorizeFinish() argument 89 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeFinish() 209 keymaster_error_t AuthorizeUpdateOrFinish(const AuthProxy& auth_set, 217 bool AuthTokenMatches(const AuthProxy& auth_set, const AuthorizationSet& operation_params,
|
D | soft_keymaster_device.h | 89 AuthorizationSet* auth_set);
|
/system/keymaster/contexts/ |
D | soft_keymaster_device.cpp | 1500 AuthorizationSet* auth_set) { in StoreDefaultNewKeyParams() argument 1501 auth_set->push_back(TAG_PURPOSE, KM_PURPOSE_SIGN); in StoreDefaultNewKeyParams() 1502 auth_set->push_back(TAG_PURPOSE, KM_PURPOSE_VERIFY); in StoreDefaultNewKeyParams() 1503 auth_set->push_back(TAG_ALL_USERS); in StoreDefaultNewKeyParams() 1504 auth_set->push_back(TAG_NO_AUTH_REQUIRED); in StoreDefaultNewKeyParams() 1507 auth_set->push_back(TAG_DIGEST, KM_DIGEST_NONE); in StoreDefaultNewKeyParams() 1508 auth_set->push_back(TAG_DIGEST, KM_DIGEST_MD5); in StoreDefaultNewKeyParams() 1509 auth_set->push_back(TAG_DIGEST, KM_DIGEST_SHA1); in StoreDefaultNewKeyParams() 1510 auth_set->push_back(TAG_DIGEST, KM_DIGEST_SHA_2_224); in StoreDefaultNewKeyParams() 1511 auth_set->push_back(TAG_DIGEST, KM_DIGEST_SHA_2_256); in StoreDefaultNewKeyParams() [all …]
|
/system/keymaster/km_openssl/ |
D | wrapped_key.cpp | 43 const AuthorizationSet& auth_set, in build_wrapped_key() argument 58 auto err = build_auth_list(auth_set, wrapped_key->wrapped_key_description->auth_list); in build_wrapped_key()
|