/system/keymaster/include/keymaster/ |
H A D | keymaster_enforcement.h | 53 const AuthorizationSet& auth_set, 64 const AuthorizationSet& auth_set, 72 keymaster_error_t AuthorizeUpdate(const AuthorizationSet& auth_set, argument 75 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 83 keymaster_error_t AuthorizeFinish(const AuthorizationSet& auth_set, argument 86 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 147 keymaster_error_t AuthorizeUpdateOrFinish(const AuthorizationSet& auth_set, 153 bool AuthTokenMatches(const AuthorizationSet& auth_set,
|
/system/security/keystore/ |
H A D | keymaster_enforcement.h | 53 const AuthorizationSet& auth_set, 63 const AuthorizationSet& auth_set, 71 ErrorCode AuthorizeUpdate(const AuthorizationSet& auth_set, argument 73 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 81 ErrorCode AuthorizeFinish(const AuthorizationSet& auth_set, argument 83 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 144 ErrorCode AuthorizeUpdateOrFinish(const AuthorizationSet& auth_set, 149 bool AuthTokenMatches(const AuthorizationSet& auth_set,
|
H A D | keymaster_enforcement.cpp | 77 bool is_public_key_algorithm(const AuthorizationSet& auth_set) { argument 78 auto algorithm = auth_set.GetTagValue(TAG_ALGORITHM); 83 static ErrorCode authorized_purpose(const KeyPurpose purpose, const AuthorizationSet& auth_set) { argument 89 if (auth_set.Contains(TAG_PURPOSE, purpose)) return ErrorCode::OK; 116 const AuthorizationSet& auth_set, 119 if (is_public_key_algorithm(auth_set)) { 136 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); 138 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 143 ErrorCode KeymasterEnforcement::AuthorizeUpdateOrFinish(const AuthorizationSet& auth_set, argument 147 for (size_t pos = 0; pos < auth_set 115 AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, uint64_t op_handle, bool is_begin_operation) argument 189 AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params) argument 465 AuthTokenMatches(const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, const uint64_t user_secure_id, const int auth_type_index, const int auth_timeout_index, const uint64_t op_handle, bool is_begin_operation) const argument [all...] |
/system/keymaster/ |
H A D | keymaster_enforcement.cpp | 78 bool is_public_key_algorithm(const AuthorizationSet& auth_set) { argument 80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && 85 const AuthorizationSet& auth_set) { 91 if (auth_set.Contains(TAG_PURPOSE, purpose)) 120 const AuthorizationSet& auth_set, 124 if (is_public_key_algorithm(auth_set)) { 139 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); 141 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 147 KeymasterEnforcement::AuthorizeUpdateOrFinish(const AuthorizationSet& auth_set, argument 151 for (size_t pos = 0; pos < auth_set 84 authorized_purpose(const keymaster_purpose_t purpose, const AuthorizationSet& auth_set) argument 118 AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, keymaster_operation_handle_t op_handle, bool is_begin_operation) argument 192 AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params) argument 440 AuthTokenMatches(const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, const uint64_t user_secure_id, const int auth_type_index, const int auth_timeout_index, const keymaster_operation_handle_t op_handle, bool is_begin_operation) const argument [all...] |
H A D | keymaster_enforcement_test.cpp | 36 const AuthorizationSet& auth_set) { 39 purpose, keyid, auth_set, empty_set, 0 /* op_handle */, true /* is_begin_operation */); 112 AuthorizationSet auth_set(params, array_length(params)); 115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 126 AuthorizationSet auth_set(params, array_length(params)); 128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 138 AuthorizationSet auth_set(params, array_length(params)); 140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 35 AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, const AuthorizationSet& auth_set) argument [all...] |
H A D | soft_keymaster_device.cpp | 1623 AuthorizationSet* auth_set) { 1624 auth_set->push_back(TAG_PURPOSE, KM_PURPOSE_SIGN); 1625 auth_set->push_back(TAG_PURPOSE, KM_PURPOSE_VERIFY); 1626 auth_set->push_back(TAG_ALL_USERS); 1627 auth_set->push_back(TAG_NO_AUTH_REQUIRED); 1630 auth_set->push_back(TAG_DIGEST, KM_DIGEST_NONE); 1631 auth_set->push_back(TAG_DIGEST, KM_DIGEST_MD5); 1632 auth_set->push_back(TAG_DIGEST, KM_DIGEST_SHA1); 1633 auth_set->push_back(TAG_DIGEST, KM_DIGEST_SHA_2_224); 1634 auth_set 1622 StoreDefaultNewKeyParams(keymaster_algorithm_t algorithm, AuthorizationSet* auth_set) argument [all...] |