Home
last modified time | relevance | path

Searched refs:key_info (Results 1 – 8 of 8) sorted by relevance

/system/security/keystore/
Dauth_token_table.cpp71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, in KeyRequiresAuthentication() argument
74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthentication()
75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication()
78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, in KeyRequiresAuthPerOperation() argument
81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthPerOperation()
82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation()
85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info, in FindAuthorization() argument
89 if (!KeyRequiresAuthentication(key_info, purpose)) in FindAuthorization()
93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type); in FindAuthorization()
96 ExtractSids(key_info, &key_sids); in FindAuthorization()
[all …]
Dauth_token_table.h73 Error FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose,
151 const AuthorizationSet& key_info, const hw_auth_token_t** found);
152 void ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids);
/system/security/keystore/tests/
Dauth_token_table_test.cpp274 auto key_info = make_set(1, 5 /* five second timeout */); in TEST() local
284 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST()
286 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST()
288 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST()
290 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST()
292 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST()
294 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); in TEST()
/system/tpm/attestation/common/
Dtpm_utility.h64 std::string* key_info,
Dtpm_utility_v1.h55 std::string* key_info,
Dtpm_utility_v1.cc177 std::string* key_info, in CreateCertifiedKey() argument
179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof); in CreateCertifiedKey()
277 key_info->assign(TSSBufferAsString(validation.rgbData, in CreateCertifiedKey()
/system/tpm/attestation/client/
Dmain.cc413 const GetKeyInfoReply& key_info) { in Encrypt2() argument
416 if (!crypto.EncryptForUnbind(key_info.public_key(), input, &output)) { in Encrypt2()
469 const GetKeyInfoReply& key_info) { in VerifySignature2() argument
471 if (crypto.VerifySignature(key_info.public_key(), input, signature)) { in VerifySignature2()
/system/tpm/attestation/server/
Dattestation_service.cc742 std::string key_info; in CreateKey() local
753 &key_info, in CreateKey()
761 key->set_certified_key_info(key_info); in CreateKey()