HomeSort by relevance Sort by last modified time
    Searched refs:begin_params (Results 1 - 21 of 21) sorted by null

  /system/keymaster/
rsa_keymaster1_operation.cpp 49 AuthorizationSet begin_params(input_params);
50 int pos = begin_params.find(TAG_DIGEST);
53 begin_params[pos].enumerated = KM_DIGEST_NONE;
55 pos = begin_params.find(TAG_PADDING);
58 switch (begin_params[pos].enumerated) {
63 begin_params[pos].enumerated = KM_PAD_NONE;
73 &begin_params, nullptr /* out_params */, &operation_handle_);
116 const AuthorizationSet& begin_params,
119 if (!GetAndValidateDigest(begin_params, key, &digest, error))
123 if (!GetAndValidatePadding(begin_params, key, &padding, error)
    [all...]
ecdsa_keymaster1_operation.cpp 50 AuthorizationSet begin_params(input_params);
51 int pos = begin_params.find(TAG_DIGEST);
54 begin_params[pos].enumerated = KM_DIGEST_NONE;
57 &begin_params, nullptr /* out_params */, &operation_handle_);
100 const AuthorizationSet& begin_params,
103 if (!GetAndValidateDigest(begin_params, key, &digest, error))
operation.cpp 88 bool OperationFactory::GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key,
92 if (!begin_params.GetTagValue(TAG_PADDING, padding)) {
93 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING));
113 bool OperationFactory::GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key,
117 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) {
118 LOG_E("%d digests specified in begin params", begin_params.GetTagCount(TAG_DIGEST));
android_keymaster_test.cpp 541 AuthorizationSet begin_params(client_params());
542 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE);
543 begin_params.push_back(TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN);
544 EXPECT_EQ(KM_ERROR_INCOMPATIBLE_PADDING_MODE, BeginOperation(KM_PURPOSE_SIGN, begin_params));
583 AuthorizationSet begin_params(client_params());
584 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE);
585 begin_params.push_back(TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN);
586 EXPECT_EQ(KM_ERROR_OK, BeginOperation(KM_PURPOSE_SIGN, begin_params));
605 AuthorizationSet begin_params(client_params());
606 begin_params.push_back(TAG_DIGEST, KM_DIGEST_SHA_2_256)
    [all...]
android_keymaster_test_utils.cpp 367 const AuthorizationSet& begin_params,
370 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params));
378 const string& signature, const AuthorizationSet& begin_params,
381 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params));
464 AuthorizationSet begin_params(client_params()), output_params;
465 begin_params.push_back(TAG_PADDING, padding);
468 ProcessMessage(KM_PURPOSE_ENCRYPT, message, begin_params, update_params, &output_params);
495 AuthorizationSet begin_params(client_params()), output_params;
496 begin_params.push_back(TAG_PADDING, padding);
497 begin_params.push_back(TAG_DIGEST, digest)
    [all...]
operation.h 54 virtual Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
79 bool GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key,
81 bool GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key,
hmac_operation.cpp 37 const AuthorizationSet& begin_params,
47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) {
63 begin_params.GetTagCount(TAG_DIGEST));
keymaster1_engine.h 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK),
64 AuthorizationSet begin_params; member in struct:keymaster::Keymaster1Engine::KeyData
hmac_operation.h 59 virtual Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
rsa_operation.h 179 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
181 return CreateRsaOperation(key, begin_params, error);
187 virtual RsaOperation* CreateRsaOperation(const Key& key, const AuthorizationSet& begin_params,
209 RsaOperation* CreateRsaOperation(const Key& key, const AuthorizationSet& begin_params,
aes_operation.cpp 51 static keymaster_error_t GetAndValidateGcmTagLength(const AuthorizationSet& begin_params,
55 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) {
79 const AuthorizationSet& begin_params,
95 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) {
96 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE));
111 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length);
118 if (!GetAndValidatePadding(begin_params, key, &padding, error)) {
ecdsa_keymaster1_operation.h 107 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
ecdsa_operation.h 81 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
rsa_keymaster1_operation.h 107 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
ecdsa_operation.cpp 32 const AuthorizationSet& begin_params,
47 if (!GetAndValidateDigest(begin_params, key, &digest, error))
rsa_operation.cpp 66 const AuthorizationSet& begin_params,
69 if (!GetAndValidatePadding(begin_params, key, &padding, error))
76 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error))
98 const AuthorizationSet& begin_params,
100 UniquePtr<RsaOperation> op(RsaOperationFactory::CreateRsaOperation(key, begin_params, error));
aes_operation.h 35 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
keymaster_enforcement_test.cpp 482 AuthorizationSet begin_params(AuthorizationSetBuilder().Authorization(TAG_NONCE, "foo", 3));
485 kmen.AuthorizeOperation(KM_PURPOSE_ENCRYPT, key_id, caller_nonce, begin_params,
488 kmen.AuthorizeOperation(KM_PURPOSE_DECRYPT, key_id, caller_nonce, begin_params,
491 kmen.AuthorizeOperation(KM_PURPOSE_ENCRYPT, key_id, no_caller_nonce, begin_params,
494 kmen.AuthorizeOperation(KM_PURPOSE_DECRYPT, key_id, no_caller_nonce, begin_params,
    [all...]
android_keymaster_test_utils.h 229 const AuthorizationSet& begin_params,
233 const std::string& signature, const AuthorizationSet& begin_params,
263 const AuthorizationSet& begin_params,
keymaster1_engine.cpp 155 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error));
  /hardware/interfaces/keymaster/3.0/vts/functional/
keymaster_hidl_hal_test.cpp 3351 auto begin_params = AuthorizationSetBuilder() local
3559 auto begin_params = AuthorizationSetBuilder() local
3618 auto begin_params = AuthorizationSetBuilder() local
3667 auto begin_params = AuthorizationSetBuilder() local
3711 auto begin_params = AuthorizationSetBuilder() local
    [all...]

Completed in 1138 milliseconds