Searched defs:key_info (Results 1 - 5 of 5) sorted by relevance
/system/security/keystore/tests/ |
H A D | auth_token_table_test.cpp | 274 auto key_info = make_set(1, 5 /* five second timeout */); local 277 // sixth request should fail, since key_info says the key is good for five seconds. 284 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 286 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 288 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 290 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 292 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 294 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
|
/system/security/keystore/ |
H A D | auth_token_table.cpp | 71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, argument 74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); 75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; 78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, argument 81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); 82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; 85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info, argument 89 if (!KeyRequiresAuthentication(key_info, purpose)) 93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type); 96 ExtractSids(key_info, 123 FindTimedAuthorization(const std::vector<uint64_t>& sids, hw_authenticator_type_t auth_type, const AuthorizationSet& key_info, const hw_auth_token_t** found) argument 146 ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids) argument [all...] |
/system/tpm/attestation/client/ |
H A D | main.cc | 413 const GetKeyInfoReply& key_info) { 416 if (!crypto.EncryptForUnbind(key_info.public_key(), input, &output)) { 469 const GetKeyInfoReply& key_info) { 471 if (crypto.VerifySignature(key_info.public_key(), input, signature)) { 412 Encrypt2(const std::string& input, const GetKeyInfoReply& key_info) argument 467 VerifySignature2(const std::string& input, const std::string& signature, const GetKeyInfoReply& key_info) argument
|
/system/tpm/attestation/common/ |
H A D | tpm_utility_v1.cc | 177 std::string* key_info, 179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof); 277 key_info->assign(TSSBufferAsString(validation.rgbData, 170 CreateCertifiedKey(KeyType key_type, KeyUsage key_usage, const std::string& identity_key_blob, const std::string& external_data, std::string* key_blob, std::string* public_key, std::string* public_key_tpm_format, std::string* key_info, std::string* proof) argument
|
/system/tpm/attestation/server/ |
H A D | attestation_service.cc | 742 std::string key_info; local 753 &key_info, 761 key->set_certified_key_info(key_info);
|
Completed in 237 milliseconds