Searched defs:key_info (Results 1 - 2 of 2) sorted by relevance
/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 275 auto key_info = make_set(1, 5 /* five second timeout */); local 278 // sixth request should fail, since key_info says the key is good for five seconds. 284 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found)); 285 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found)); 286 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found)); 287 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found)); 288 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found)); 290 table.FindAuthorization(key_info, 0 /* no op handle */, &found));
|
/system/security/keystore/ |
H A D | auth_token_table.cpp | 71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, argument 74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); 75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; 78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, argument 81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); 82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; 85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info, argument 89 if (!KeyRequiresAuthentication(key_info, purpose)) 93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type); 96 ExtractSids(key_info, 123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument 146 ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids) argument [all...] |
Completed in 202 milliseconds