• Home
  • Raw
  • Download

Lines Matching refs:params

57 bool containsTag(const hidl_vec<KeyParameter>& params, Tag tag) {  in containsTag()  argument
58 return params.end() != std::find_if(params.begin(), params.end(), in containsTag()
62 bool isAuthenticationBound(const hidl_vec<KeyParameter>& params) { in isAuthenticationBound() argument
63 return !containsTag(params, Tag::NO_AUTH_REQUIRED); in isAuthenticationBound()
96 KeyStoreServiceReturnCode updateParamsForAttestation(uid_t callingUid, AuthorizationSet* params) { in updateParamsForAttestation() argument
102 if (factoryResetSinceIdRotation) params->push_back(TAG_RESET_SINCE_ID_ROTATION); in updateParamsForAttestation()
119 params->push_back(TAG_ATTESTATION_APPLICATION_ID, asn1_attestation_id); in updateParamsForAttestation()
388 keystore::AuthorizationSet params; in generate() local
389 add_legacy_key_authorizations(keyType, &params); in generate()
393 params.push_back(TAG_ALGORITHM, Algorithm::EC); in generate()
400 params.push_back(TAG_KEY_SIZE, keySize); in generate()
404 params.push_back(TAG_ALGORITHM, Algorithm::RSA); in generate()
411 params.push_back(TAG_KEY_SIZE, keySize); in generate()
435 params.push_back(TAG_RSA_PUBLIC_EXPONENT, exponent); in generate()
444 auto rc = generateKey(name, params.hidl_data(), hidl_vec<uint8_t>(), targetUid, flags, in generate()
468 AuthorizationSet params; in import() local
469 add_legacy_key_authorizations(type, &params); in import()
472 params.push_back(TAG_ALGORITHM, Algorithm::RSA); in import()
475 params.push_back(TAG_ALGORITHM, Algorithm::EC); in import()
482 auto rc = importKey(name, params.hidl_data(), KeyFormat::PKCS8, data, targetUid, flags, in import()
719 const hidl_vec<KeyParameter>& params, in generateKey() argument
736 if (containsTag(params, Tag::INCLUDE_UNIQUE_ID)) { in generateKey()
745 AuthorizationSet keyCharacteristics = params; in generateKey()
769 if (isAuthenticationBound(params) && !keyBlob.isCriticalToDeviceEncryption()) { in generateKey()
777 rc = KS_HANDLE_HIDL_ERROR(dev->generateKey(params, hidl_cb)); in generateKey()
788 rc = KS_HANDLE_HIDL_ERROR(fallback.value()->generateKey(params, hidl_cb)); in generateKey()
905 KeyStoreService::importKey(const String16& name, const hidl_vec<KeyParameter>& params, in importKey() argument
942 if (isAuthenticationBound(params) && !ksBlob.isCriticalToDeviceEncryption()) { in importKey()
950 rc = KS_HANDLE_HIDL_ERROR(dev->importKey(params, format, keyData, hidlCb)); in importKey()
963 rc = KS_HANDLE_HIDL_ERROR(fallback.value()->importKey(params, format, keyData, hidlCb)); in importKey()
977 AuthorizationSet opParams = params; in importKey()
1053 static inline void addAuthTokenToParams(AuthorizationSet* params, const HardwareAuthToken* token) { in addAuthTokenToParams() argument
1055 params->push_back(TAG_AUTH_TOKEN, authToken2HidlVec(*token)); in addAuthTokenToParams()
1060 bool pruneable, const hidl_vec<KeyParameter>& params, in begin() argument
1076 if (!checkAllowedOperationParams(params)) { in begin()
1092 AuthorizationSet opParams = params; in begin()
1232 void KeyStoreService::update(const sp<IBinder>& token, const hidl_vec<KeyParameter>& params, in update() argument
1235 if (!checkAllowedOperationParams(params)) { in update()
1248 AuthorizationSet opParams = params; in update()
1284 void KeyStoreService::finish(const sp<IBinder>& token, const hidl_vec<KeyParameter>& params, in finish() argument
1288 if (!checkAllowedOperationParams(params)) { in finish()
1301 AuthorizationSet opParams = params; in finish()
1415 bool isDeviceIdAttestationRequested(const hidl_vec<KeyParameter>& params) { in isDeviceIdAttestationRequested() argument
1416 for (size_t i = 0; i < params.size(); ++i) { in isDeviceIdAttestationRequested()
1417 switch (params[i].tag) { in isDeviceIdAttestationRequested()
1435 const hidl_vec<KeyParameter>& params, in attestKey() argument
1442 if (!checkAllowedOperationParams(params)) { in attestKey()
1446 if (isDeviceIdAttestationRequested(params)) { in attestKey()
1453 AuthorizationSet mutableParams = params; in attestKey()
1484 KeyStoreServiceReturnCode KeyStoreService::attestDeviceIds(const hidl_vec<KeyParameter>& params, in attestDeviceIds() argument
1491 if (!checkAllowedOperationParams(params)) { in attestDeviceIds()
1495 if (!isDeviceIdAttestationRequested(params)) { in attestDeviceIds()
1511 AuthorizationSet mutableParams = params; in attestDeviceIds()
1689 bool KeyStoreService::checkAllowedOperationParams(const hidl_vec<KeyParameter>& params) { in checkAllowedOperationParams() argument
1690 for (size_t i = 0; i < params.size(); ++i) { in checkAllowedOperationParams()
1691 switch (params[i].tag) { in checkAllowedOperationParams()
1705 const AuthorizationSet& params, in getOperationCharacteristics() argument
1709 for (auto param : params) { in getOperationCharacteristics()
1787 AuthorizationSet* params) { in addOperationAuthTokenIfNeeded() argument
1807 addAuthTokenToParams(params, authToken); in addOperationAuthTokenIfNeeded()
1835 void KeyStoreService::addLegacyBeginParams(const String16& name, AuthorizationSet* params) { in addLegacyBeginParams() argument
1837 params->push_back(TAG_DIGEST, Digest::NONE); in addLegacyBeginParams()
1838 params->push_back(TAG_PADDING, PaddingMode::NONE); in addLegacyBeginParams()
1853 params->push_back(TAG_ALGORITHM, algorithm.value()); in addLegacyBeginParams()
1922 const AuthorizationSet& params, in upgradeKeyBlob() argument
1971 KS_HANDLE_HIDL_ERROR(dev->upgradeKey(hidlKey, params.hidl_data(), hidlCb)); in upgradeKeyBlob()