Searched refs:key_info (Results 1 – 8 of 8) sorted by relevance
/system/security/keystore/ |
D | auth_token_table.cpp | 71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, in KeyRequiresAuthentication() argument 74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthentication() 75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication() 78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, in KeyRequiresAuthPerOperation() argument 81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthPerOperation() 82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation() 85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info, in FindAuthorization() argument 89 if (!KeyRequiresAuthentication(key_info, purpose)) in FindAuthorization() 93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type); in FindAuthorization() 96 ExtractSids(key_info, &key_sids); in FindAuthorization() [all …]
|
D | auth_token_table.h | 73 Error FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, 151 const AuthorizationSet& key_info, const hw_auth_token_t** found); 152 void ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids);
|
/system/security/keystore/tests/ |
D | auth_token_table_test.cpp | 274 auto key_info = make_set(1, 5 /* five second timeout */); in TEST() local 284 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST() 286 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST() 288 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST() 290 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST() 292 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST() 294 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST()
|
/system/tpm/attestation/common/ |
D | tpm_utility.h | 64 std::string* key_info,
|
D | tpm_utility_v1.h | 55 std::string* key_info,
|
D | tpm_utility_v1.cc | 177 std::string* key_info, in CreateCertifiedKey() argument 179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof); in CreateCertifiedKey() 277 key_info->assign(TSSBufferAsString(validation.rgbData, in CreateCertifiedKey()
|
/system/tpm/attestation/client/ |
D | main.cc | 413 const GetKeyInfoReply& key_info) { in Encrypt2() argument 416 if (!crypto.EncryptForUnbind(key_info.public_key(), input, &output)) { in Encrypt2() 469 const GetKeyInfoReply& key_info) { in VerifySignature2() argument 471 if (crypto.VerifySignature(key_info.public_key(), input, signature)) { in VerifySignature2()
|
/system/tpm/attestation/server/ |
D | attestation_service.cc | 742 std::string key_info; in CreateKey() local 753 &key_info, in CreateKey() 761 key->set_certified_key_info(key_info); in CreateKey()
|