Home
last modified time | relevance | path

Searched refs:op_handle (Results 1 – 17 of 17) sorted by relevance

/system/keymaster/
Doperation_table.cpp35 keymaster_operation_handle_t* op_handle) { in Add() argument
43 if (RAND_bytes(reinterpret_cast<uint8_t*>(op_handle), sizeof(*op_handle)) != 1) in Add()
45 if (*op_handle == 0) { in Add()
54 table_[i].handle = *op_handle; in Add()
61 Operation* OperationTable::Find(keymaster_operation_handle_t op_handle) { in Find() argument
62 if (op_handle == 0) in Find()
69 if (table_[i].handle == op_handle) in Find()
75 bool OperationTable::Delete(keymaster_operation_handle_t op_handle) { in Delete() argument
80 if (table_[i].handle == op_handle) { in Delete()
Dandroid_keymaster.cpp241 response->op_handle = 0; in BeginOperation()
286 response->error = operation_table_->Add(operation.release(), &response->op_handle); in BeginOperation()
295 Operation* operation = operation_table_->Find(request.op_handle); in UpdateOperation()
302 request.additional_params, request.op_handle, false /* is_begin_operation */); in UpdateOperation()
304 operation_table_->Delete(request.op_handle); in UpdateOperation()
314 operation_table_->Delete(request.op_handle); in UpdateOperation()
324 Operation* operation = operation_table_->Find(request.op_handle); in FinishOperation()
331 request.additional_params, request.op_handle, false /* is_begin_operation */); in FinishOperation()
333 operation_table_->Delete(request.op_handle); in FinishOperation()
340 operation_table_->Delete(request.op_handle); in FinishOperation()
[all …]
Doperation_table.h42 keymaster_error_t Add(Operation* operation, keymaster_operation_handle_t* op_handle);
43 Operation* Find(keymaster_operation_handle_t op_handle);
Dkeymaster_enforcement.cpp122 keymaster_operation_handle_t op_handle, in AuthorizeOperation() argument
141 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeOperation()
149 keymaster_operation_handle_t op_handle) { in AuthorizeUpdateOrFinish() argument
181 auth_timeout_index, op_handle, false /* is_begin_operation */)) in AuthorizeUpdateOrFinish()
435 const keymaster_operation_handle_t op_handle, in AuthTokenMatches() argument
465 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { in AuthTokenMatches()
466 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle); in AuthTokenMatches()
Dandroid_keymaster_messages.cpp153 return sizeof(op_handle); in NonErrorSerializedSize()
155 return sizeof(op_handle) + output_params.SerializedSize(); in NonErrorSerializedSize()
159 buf = append_uint64_to_buf(buf, end, op_handle); in NonErrorSerialize()
166 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle); in NonErrorDeserialize()
174 return sizeof(op_handle) + input.SerializedSize(); in SerializedSize()
176 return sizeof(op_handle) + input.SerializedSize() + additional_params.SerializedSize(); in SerializedSize()
180 buf = append_uint64_to_buf(buf, end, op_handle); in Serialize()
188 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end); in Deserialize()
244 size += sizeof(op_handle) + signature.SerializedSize(); in SerializedSize()
255 buf = append_uint64_to_buf(buf, end, op_handle); in Serialize()
[all …]
Dkeymaster1_engine.h60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), in KeyData()
63 keymaster_operation_handle_t op_handle; member
Dandroid_keymaster_messages_test.cpp215 msg.op_handle = 0xDEADBEEF; in TEST()
233 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle); in TEST()
254 msg.op_handle = 0xDEADBEEF; in TEST()
264 msg.op_handle = 0xDEADBEEF; in TEST()
333 msg.op_handle = 0xDEADBEEF; in TEST()
352 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle); in TEST()
Decdsa_keymaster1_operation.cpp68 key_data->op_handle = operation_handle_; in PrepareFinish()
Dkeymaster1_engine.cpp272 if (key_data->op_handle == 0) in Keymaster1Finish()
279 device()->update(device(), key_data->op_handle, &key_data->finish_params, &input, in Keymaster1Finish()
284 return device()->finish(device(), key_data->op_handle, &key_data->finish_params, in Keymaster1Finish()
Drsa_keymaster1_operation.cpp84 key_data->op_handle = operation_handle_; in PrepareFinish()
Dsoft_keymaster_device.cpp1230 *operation_handle = response.op_handle; in begin()
1283 request.op_handle = operation_handle; in update()
1359 request.op_handle = operation_handle; in finish()
1422 request.op_handle = operation_handle; in abort()
/system/keymaster/include/keymaster/
Dkeymaster_enforcement.h55 keymaster_operation_handle_t op_handle,
74 keymaster_operation_handle_t op_handle) { in AuthorizeUpdate() argument
75 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeUpdate()
85 keymaster_operation_handle_t op_handle) { in AuthorizeFinish() argument
86 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeFinish()
149 keymaster_operation_handle_t op_handle);
156 const keymaster_operation_handle_t op_handle,
Dandroid_keymaster_messages.h348 keymaster_operation_handle_t op_handle; member
359 keymaster_operation_handle_t op_handle; member
384 keymaster_operation_handle_t op_handle; member
406 return append_uint64_to_buf(buf, end, op_handle); in Serialize()
409 return copy_uint64_from_buf(buf_ptr, end, &op_handle); in Deserialize()
412 keymaster_operation_handle_t op_handle; member
Dandroid_keymaster.h82 bool has_operation(keymaster_operation_handle_t op_handle) const;
/system/security/keystore/
Dauth_token_table.h74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found);
87 keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, in FindAuthorization() argument
89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found); in FindAuthorization()
96 void MarkCompleted(const keymaster_operation_handle_t op_handle);
153 keymaster_operation_handle_t op_handle,
Dauth_token_table.cpp87 keymaster_operation_handle_t op_handle, in FindAuthorization() argument
99 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found); in FindAuthorization()
106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) { in FindAuthPerOpAuthorization() argument
107 if (op_handle == 0) in FindAuthPerOpAuthorization()
111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); in FindAuthPerOpAuthorization()
178 void AuthTokenTable::MarkCompleted(const keymaster_operation_handle_t op_handle) { in MarkCompleted() argument
179 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); in MarkCompleted()
/system/vold/
Dcryptfs.c360 keymaster_operation_handle_t op_handle; in keymaster_sign_object() local
363 &op_handle); in keymaster_sign_object()
369 &op_handle); in keymaster_sign_object()
379 error = keymaster1_dev->update(keymaster1_dev, op_handle, NULL /* in_params */, in keymaster_sign_object()
390 keymaster1_dev->abort(keymaster1_dev, op_handle); in keymaster_sign_object()
396 error = keymaster1_dev->finish(keymaster1_dev, op_handle, NULL /* in_params */, in keymaster_sign_object()