Searched defs:key_info (Results 1 - 2 of 2) sorted by relevance

/system/security/keystore/tests/
H A Dauth_token_table_test.cpp275 auto key_info = make_set(1, 5 /* five second timeout */); local
278 // sixth request should fail, since key_info says the key is good for five seconds.
284 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
285 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
286 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
287 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
288 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
290 table.FindAuthorization(key_info, 0 /* no op handle */, &found));
/system/security/keystore/
H A Dauth_token_table.cpp71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, argument
74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1;
78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, argument
81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1;
85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info, argument
89 if (!KeyRequiresAuthentication(key_info, purpose))
93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type);
96 ExtractSids(key_info,
123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument
146 ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids) argument
[all...]

Completed in 202 milliseconds