Lines Matching refs:request

97 void AndroidKeymaster::SupportedAlgorithms(const SupportedAlgorithmsRequest& /* request */,
133 void AndroidKeymaster::SupportedBlockModes(const SupportedBlockModesRequest& request,
135 GetSupported(*context_, request.algorithm, request.purpose,
139 void AndroidKeymaster::SupportedPaddingModes(const SupportedPaddingModesRequest& request,
141 GetSupported(*context_, request.algorithm, request.purpose,
145 void AndroidKeymaster::SupportedDigests(const SupportedDigestsRequest& request,
147 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests,
151 void AndroidKeymaster::SupportedImportFormats(const SupportedImportFormatsRequest& request,
153 if (response == NULL || !check_supported(*context_, request.algorithm, response))
158 context_->GetKeyFactory(request.algorithm)->SupportedImportFormats(&count);
162 void AndroidKeymaster::SupportedExportFormats(const SupportedExportFormatsRequest& request,
164 if (response == NULL || !check_supported(*context_, request.algorithm, response))
169 context_->GetKeyFactory(request.algorithm)->SupportedExportFormats(&count);
186 AndroidKeymaster::ComputeSharedHmac(const ComputeSharedHmacRequest& request) {
194 response.error = policy->ComputeSharedHmac(request.params_array, &response.sharing_check);
199 AndroidKeymaster::VerifyAuthorization(const VerifyAuthorizationRequest& request) {
207 return policy->VerifyAuthorization(request);
210 void AndroidKeymaster::AddRngEntropy(const AddEntropyRequest& request,
212 response->error = context_->AddRngEntropy(request.random_data.peek_read(),
213 request.random_data.available_read());
216 void AndroidKeymaster::GenerateKey(const GenerateKeyRequest& request,
224 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
231 response->error = factory->GenerateKey(request.key_description, &key_blob,
238 void AndroidKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request,
245 context_->ParseKeyBlob(KeymasterKeyBlob(request.key_blob), request.additional_params,
257 void AndroidKeymaster::BeginOperation(const BeginOperationRequest& request,
265 response->error = LoadKey(request.key_blob, request.additional_params, &key_factory, &key);
275 OperationFactory* factory = key_factory->GetOperationFactory(request.purpose);
279 factory->CreateOperation(move(*key), request.additional_params, &response->error));
285 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) return;
288 request.purpose, key_id, operation->authorizations(), request.additional_params,
294 response->error = operation->Begin(request.additional_params, &response->output_params);
302 void AndroidKeymaster::UpdateOperation(const UpdateOperationRequest& request,
308 Operation* operation = operation_table_->Find(request.op_handle);
315 request.additional_params, request.op_handle, false /* is_begin_operation */);
317 operation_table_->Delete(request.op_handle);
323 operation->Update(request.additional_params, request.input, &response->output_params,
327 operation_table_->Delete(request.op_handle);
331 void AndroidKeymaster::FinishOperation(const FinishOperationRequest& request,
337 Operation* operation = operation_table_->Find(request.op_handle);
344 request.additional_params, request.op_handle, false /* is_begin_operation */);
346 operation_table_->Delete(request.op_handle);
351 response->error = operation->Finish(request.additional_params, request.input, request.signature,
353 operation_table_->Delete(request.op_handle);
356 void AndroidKeymaster::AbortOperation(const AbortOperationRequest& request,
361 Operation* operation = operation_table_->Find(request.op_handle);
368 operation_table_->Delete(request.op_handle);
371 void AndroidKeymaster::ExportKey(const ExportKeyRequest& request, ExportKeyResponse* response) {
377 context_->ParseKeyBlob(KeymasterKeyBlob(request.key_blob), request.additional_params, &key);
383 response->error = key->formatted_key_material(request.key_format, &out_key, &size);
390 void AndroidKeymaster::AttestKey(const AttestKeyRequest& request, AttestKeyResponse* response) {
396 response->error = LoadKey(request.key_blob, request.attest_params,
402 if (request.attest_params.GetTagValue(TAG_ATTESTATION_APPLICATION_ID,
408 response->error = context_->GenerateAttestation(*key, request.attest_params, &certchain);
418 void AndroidKeymaster::UpgradeKey(const UpgradeKeyRequest& request, UpgradeKeyResponse* response) {
423 response->error = context_->UpgradeKeyBlob(KeymasterKeyBlob(request.key_blob),
424 request.upgrade_params, &upgraded_key);
430 void AndroidKeymaster::ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response) {
437 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
441 keymaster_key_blob_t key_material = {request.key_data, request.key_data_length};
443 response->error = factory->ImportKey(request.key_description, request.key_format,
451 void AndroidKeymaster::DeleteKey(const DeleteKeyRequest& request, DeleteKeyResponse* response) {
454 response->error = context_->DeleteKey(KeymasterKeyBlob(request.key_blob));
463 void AndroidKeymaster::Configure(const ConfigureRequest& request, ConfigureResponse* response) {
466 response->error = context_->SetSystemVersion(request.os_version, request.os_patchlevel);
485 void AndroidKeymaster::ImportWrappedKey(const ImportWrappedKeyRequest& request,
494 context_->UnwrapKey(request.wrapped_key, request.wrapping_key, request.additional_params,
495 request.masking_key, &key_description, &key_format, &secret_key);
509 key_description.push_back(TAG_USER_SECURE_ID, request.password_sid);
512 key_description.push_back(TAG_USER_SECURE_ID, request.biometric_sid);