Searched defs:key_info (Results 1 - 5 of 5) sorted by relevance

/system/security/keystore/tests/
H A Dauth_token_table_test.cpp274 auto key_info = make_set(1, 5 /* five second timeout */); local
277 // sixth request should fail, since key_info says the key is good for five seconds.
284 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
286 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
288 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
290 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
292 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
294 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
/system/security/keystore/
H A Dauth_token_table.cpp71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, argument
74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1;
78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, argument
81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1;
85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info, argument
89 if (!KeyRequiresAuthentication(key_info, purpose))
93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type);
96 ExtractSids(key_info,
123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument
146 ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids) argument
[all...]
/system/tpm/attestation/client/
H A Dmain.cc413 const GetKeyInfoReply& key_info) {
416 if (!crypto.EncryptForUnbind(key_info.public_key(), input, &output)) {
469 const GetKeyInfoReply& key_info) {
471 if (crypto.VerifySignature(key_info.public_key(), input, signature)) {
412 Encrypt2(const std::string& input, const GetKeyInfoReply& key_info) argument
467 VerifySignature2(const std::string& input, const std::string& signature, const GetKeyInfoReply& key_info) argument
/system/tpm/attestation/common/
H A Dtpm_utility_v1.cc177 std::string* key_info,
179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof);
277 key_info->assign(TSSBufferAsString(validation.rgbData,
170 CreateCertifiedKey(KeyType key_type, KeyUsage key_usage, const std::string& identity_key_blob, const std::string& external_data, std::string* key_blob, std::string* public_key, std::string* public_key_tpm_format, std::string* key_info, std::string* proof) argument
/system/tpm/attestation/server/
H A Dattestation_service.cc742 std::string key_info; local
753 &key_info,
761 key->set_certified_key_info(key_info);

Completed in 237 milliseconds