Searched refs:op_handle (Results 1 - 12 of 12) sorted by relevance

/system/keymaster/
H A Doperation_table.cpp35 keymaster_operation_handle_t* op_handle) {
43 if (RAND_bytes(reinterpret_cast<uint8_t*>(op_handle), sizeof(*op_handle)) != 1)
45 if (*op_handle == 0) {
54 table_[i].handle = *op_handle;
61 Operation* OperationTable::Find(keymaster_operation_handle_t op_handle) { argument
62 if (op_handle == 0)
69 if (table_[i].handle == op_handle)
75 bool OperationTable::Delete(keymaster_operation_handle_t op_handle) { argument
80 if (table_[i].handle == op_handle) {
34 Add(Operation* operation, keymaster_operation_handle_t* op_handle) argument
[all...]
H A Doperation_table.h42 keymaster_error_t Add(Operation* operation, keymaster_operation_handle_t* op_handle);
43 Operation* Find(keymaster_operation_handle_t op_handle);
H A Dandroid_keymaster.cpp216 response->op_handle = 0;
250 0 /* op_handle */, true /* is_begin_operation */);
261 response->error = operation_table_->Add(operation.release(), &response->op_handle);
270 Operation* operation = operation_table_->Find(request.op_handle);
277 request.additional_params, request.op_handle, false /* is_begin_operation */);
287 operation_table_->Delete(request.op_handle);
297 Operation* operation = operation_table_->Find(request.op_handle);
304 request.additional_params, request.op_handle, false /* is_begin_operation */);
311 operation_table_->Delete(request.op_handle);
319 Operation* operation = operation_table_->Find(request.op_handle);
[all...]
H A Dandroid_keymaster_messages.cpp153 return sizeof(op_handle);
155 return sizeof(op_handle) + output_params.SerializedSize();
159 buf = append_uint64_to_buf(buf, end, op_handle);
166 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle);
174 return sizeof(op_handle) + input.SerializedSize();
176 return sizeof(op_handle) + input.SerializedSize() + additional_params.SerializedSize();
180 buf = append_uint64_to_buf(buf, end, op_handle);
188 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end);
228 return sizeof(op_handle) + signature.SerializedSize();
230 return sizeof(op_handle)
[all...]
H A Dkeymaster_enforcement.cpp122 keymaster_operation_handle_t op_handle,
140 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
148 keymaster_operation_handle_t op_handle) {
180 auth_timeout_index, op_handle, false /* is_begin_operation */))
272 auth_type_index, auth_timeout_index, 0 /* op_handle */,
419 const keymaster_operation_handle_t op_handle,
449 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) {
450 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle);
118 AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, keymaster_operation_handle_t op_handle, bool is_begin_operation) argument
146 AuthorizeUpdateOrFinish(const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, keymaster_operation_handle_t op_handle) argument
415 AuthTokenMatches(const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, const uint64_t user_secure_id, const int auth_type_index, const int auth_timeout_index, const keymaster_operation_handle_t op_handle, bool is_begin_operation) const argument
H A Dsoft_keymaster_device.cpp394 update_request.op_handle = begin_response.op_handle;
404 finish_request.op_handle = begin_response.op_handle;
445 update_request.op_handle = begin_response.op_handle;
455 finish_request.op_handle = begin_response.op_handle;
850 *operation_handle = response.op_handle;
873 request.op_handle
[all...]
H A Dandroid_keymaster_messages_test.cpp215 msg.op_handle = 0xDEADBEEF;
232 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle);
252 msg.op_handle = 0xDEADBEEF;
262 msg.op_handle = 0xDEADBEEF;
328 msg.op_handle = 0xDEADBEEF;
343 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle);
/system/keymaster/include/keymaster/
H A Dkeymaster_enforcement.h55 keymaster_operation_handle_t op_handle,
74 keymaster_operation_handle_t op_handle) {
75 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
85 keymaster_operation_handle_t op_handle) {
86 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
149 keymaster_operation_handle_t op_handle);
156 const keymaster_operation_handle_t op_handle,
72 AuthorizeUpdate(const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, keymaster_operation_handle_t op_handle) argument
83 AuthorizeFinish(const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, keymaster_operation_handle_t op_handle) argument
H A Dandroid_keymaster_messages.h302 keymaster_operation_handle_t op_handle; member in struct:keymaster::BeginOperationResponse
313 keymaster_operation_handle_t op_handle; member in struct:keymaster::UpdateOperationRequest
338 keymaster_operation_handle_t op_handle; member in struct:keymaster::FinishOperationRequest
359 return append_uint64_to_buf(buf, end, op_handle);
362 return copy_uint64_from_buf(buf_ptr, end, &op_handle);
365 keymaster_operation_handle_t op_handle; member in struct:keymaster::AbortOperationRequest
/system/security/keystore/
H A Dauth_token_table.h54 OP_HANDLE_REQUIRED = -4, // The key requires auth per use but op_handle was zero.
74 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found);
87 keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle,
89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found);
96 void MarkCompleted(const keymaster_operation_handle_t op_handle);
147 keymaster_operation_handle_t op_handle,
86 FindAuthorization(const keymaster_key_param_t* params, size_t params_count, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
H A Dauth_token_table.cpp87 keymaster_operation_handle_t op_handle,
99 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found);
106 keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) {
107 if (op_handle == 0)
111 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); });
167 void AuthTokenTable::MarkCompleted(const keymaster_operation_handle_t op_handle) { argument
168 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; });
85 FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
104 FindAuthPerOpAuthorization( const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, keymaster_operation_handle_t op_handle, const hw_auth_token_t** found) argument
/system/vold/
H A Dcryptfs.c343 keymaster_operation_handle_t op_handle; local
346 &op_handle);
352 &op_handle);
362 error = keymaster1_dev->update(keymaster1_dev, op_handle, NULL /* in_params */,
373 keymaster1_dev->abort(keymaster1_dev, op_handle);
379 error = keymaster1_dev->finish(keymaster1_dev, op_handle, NULL /* in_params */,

Completed in 161 milliseconds