/system/keymaster/ |
D | operation_table.cpp | 35 keymaster_operation_handle_t* op_handle) { in Add() argument 43 if (RAND_bytes(reinterpret_cast<uint8_t*>(op_handle), sizeof(*op_handle)) != 1) in Add() 45 if (*op_handle == 0) { in Add() 54 table_[i].handle = *op_handle; in Add() 61 Operation* OperationTable::Find(keymaster_operation_handle_t op_handle) { in Find() argument 62 if (op_handle == 0) in Find() 69 if (table_[i].handle == op_handle) in Find() 75 bool OperationTable::Delete(keymaster_operation_handle_t op_handle) { in Delete() argument 80 if (table_[i].handle == op_handle) { in Delete()
|
D | android_keymaster.cpp | 241 response->op_handle = 0; in BeginOperation() 286 response->error = operation_table_->Add(operation.release(), &response->op_handle); in BeginOperation() 295 Operation* operation = operation_table_->Find(request.op_handle); in UpdateOperation() 302 request.additional_params, request.op_handle, false /* is_begin_operation */); in UpdateOperation() 304 operation_table_->Delete(request.op_handle); in UpdateOperation() 314 operation_table_->Delete(request.op_handle); in UpdateOperation() 324 Operation* operation = operation_table_->Find(request.op_handle); in FinishOperation() 331 request.additional_params, request.op_handle, false /* is_begin_operation */); in FinishOperation() 333 operation_table_->Delete(request.op_handle); in FinishOperation() 340 operation_table_->Delete(request.op_handle); in FinishOperation() [all …]
|
D | operation_table.h | 42 keymaster_error_t Add(Operation* operation, keymaster_operation_handle_t* op_handle); 43 Operation* Find(keymaster_operation_handle_t op_handle);
|
D | keymaster_enforcement.cpp | 122 keymaster_operation_handle_t op_handle, in AuthorizeOperation() argument 141 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeOperation() 149 keymaster_operation_handle_t op_handle) { in AuthorizeUpdateOrFinish() argument 181 auth_timeout_index, op_handle, false /* is_begin_operation */)) in AuthorizeUpdateOrFinish() 435 const keymaster_operation_handle_t op_handle, in AuthTokenMatches() argument 465 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { in AuthTokenMatches() 466 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle); in AuthTokenMatches()
|
D | android_keymaster_messages.cpp | 153 return sizeof(op_handle); in NonErrorSerializedSize() 155 return sizeof(op_handle) + output_params.SerializedSize(); in NonErrorSerializedSize() 159 buf = append_uint64_to_buf(buf, end, op_handle); in NonErrorSerialize() 166 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle); in NonErrorDeserialize() 174 return sizeof(op_handle) + input.SerializedSize(); in SerializedSize() 176 return sizeof(op_handle) + input.SerializedSize() + additional_params.SerializedSize(); in SerializedSize() 180 buf = append_uint64_to_buf(buf, end, op_handle); in Serialize() 188 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end); in Deserialize() 244 size += sizeof(op_handle) + signature.SerializedSize(); in SerializedSize() 255 buf = append_uint64_to_buf(buf, end, op_handle); in Serialize() [all …]
|
D | keymaster1_engine.h | 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), in KeyData() 63 keymaster_operation_handle_t op_handle; member
|
D | android_keymaster_messages_test.cpp | 215 msg.op_handle = 0xDEADBEEF; in TEST() 233 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle); in TEST() 254 msg.op_handle = 0xDEADBEEF; in TEST() 264 msg.op_handle = 0xDEADBEEF; in TEST() 333 msg.op_handle = 0xDEADBEEF; in TEST() 352 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle); in TEST()
|
D | ecdsa_keymaster1_operation.cpp | 68 key_data->op_handle = operation_handle_; in PrepareFinish()
|
D | keymaster1_engine.cpp | 272 if (key_data->op_handle == 0) in Keymaster1Finish() 279 device()->update(device(), key_data->op_handle, &key_data->finish_params, &input, in Keymaster1Finish() 284 return device()->finish(device(), key_data->op_handle, &key_data->finish_params, in Keymaster1Finish()
|
D | rsa_keymaster1_operation.cpp | 84 key_data->op_handle = operation_handle_; in PrepareFinish()
|
D | soft_keymaster_device.cpp | 1230 *operation_handle = response.op_handle; in begin() 1283 request.op_handle = operation_handle; in update() 1359 request.op_handle = operation_handle; in finish() 1422 request.op_handle = operation_handle; in abort()
|
/system/keymaster/include/keymaster/ |
D | keymaster_enforcement.h | 55 keymaster_operation_handle_t op_handle, 74 keymaster_operation_handle_t op_handle) { in AuthorizeUpdate() argument 75 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeUpdate() 85 keymaster_operation_handle_t op_handle) { in AuthorizeFinish() argument 86 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); in AuthorizeFinish() 149 keymaster_operation_handle_t op_handle); 156 const keymaster_operation_handle_t op_handle,
|
D | android_keymaster_messages.h | 348 keymaster_operation_handle_t op_handle; member 359 keymaster_operation_handle_t op_handle; member 384 keymaster_operation_handle_t op_handle; member 406 return append_uint64_to_buf(buf, end, op_handle); in Serialize() 409 return copy_uint64_from_buf(buf_ptr, end, &op_handle); in Deserialize() 412 keymaster_operation_handle_t op_handle; member
|
D | android_keymaster.h | 82 bool has_operation(keymaster_operation_handle_t op_handle) const;
|
/system/security/keystore/ |
D | auth_token_table.h | 74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found); 87 keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, in FindAuthorization() argument 89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found); in FindAuthorization() 96 void MarkCompleted(const keymaster_operation_handle_t op_handle); 153 keymaster_operation_handle_t op_handle,
|
D | auth_token_table.cpp | 87 keymaster_operation_handle_t op_handle, in FindAuthorization() argument 99 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found); in FindAuthorization() 106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) { in FindAuthPerOpAuthorization() argument 107 if (op_handle == 0) in FindAuthPerOpAuthorization() 111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); in FindAuthPerOpAuthorization() 178 void AuthTokenTable::MarkCompleted(const keymaster_operation_handle_t op_handle) { in MarkCompleted() argument 179 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; }); in MarkCompleted()
|
/system/vold/ |
D | cryptfs.c | 360 keymaster_operation_handle_t op_handle; in keymaster_sign_object() local 363 &op_handle); in keymaster_sign_object() 369 &op_handle); in keymaster_sign_object() 379 error = keymaster1_dev->update(keymaster1_dev, op_handle, NULL /* in_params */, in keymaster_sign_object() 390 keymaster1_dev->abort(keymaster1_dev, op_handle); in keymaster_sign_object() 396 error = keymaster1_dev->finish(keymaster1_dev, op_handle, NULL /* in_params */, in keymaster_sign_object()
|