HomeSort by relevance Sort by last modified time
    Searched refs:op_handle (Results 1 - 20 of 20) sorted by null

  /system/keymaster/
operation_table.cpp 35 keymaster_operation_handle_t* op_handle) {
43 if (RAND_bytes(reinterpret_cast<uint8_t*>(op_handle), sizeof(*op_handle)) != 1)
45 if (*op_handle == 0) {
54 table_[i].handle = *op_handle;
61 Operation* OperationTable::Find(keymaster_operation_handle_t op_handle) {
62 if (op_handle == 0)
69 if (table_[i].handle == op_handle)
75 bool OperationTable::Delete(keymaster_operation_handle_t op_handle) {
80 if (table_[i].handle == op_handle) {
    [all...]
operation_table.h 42 keymaster_error_t Add(Operation* operation, keymaster_operation_handle_t* op_handle);
43 Operation* Find(keymaster_operation_handle_t op_handle);
android_keymaster.cpp 241 response->op_handle = 0;
275 0 /* op_handle */, true /* is_begin_operation */);
286 response->error = operation_table_->Add(operation.release(), &response->op_handle);
295 Operation* operation = operation_table_->Find(request.op_handle);
302 request.additional_params, request.op_handle, false /* is_begin_operation */);
304 operation_table_->Delete(request.op_handle);
314 operation_table_->Delete(request.op_handle);
324 Operation* operation = operation_table_->Find(request.op_handle);
331 request.additional_params, request.op_handle, false /* is_begin_operation */);
333 operation_table_->Delete(request.op_handle);
    [all...]
keymaster1_engine.h 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK),
63 keymaster_operation_handle_t op_handle; member in struct:keymaster::Keymaster1Engine::KeyData
keymaster_enforcement.cpp 122 keymaster_operation_handle_t op_handle,
141 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
149 keymaster_operation_handle_t op_handle) {
181 auth_timeout_index, op_handle, false /* is_begin_operation */))
273 auth_type_index, auth_timeout_index, 0 /* op_handle */,
444 const keymaster_operation_handle_t op_handle,
474 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) {
475 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle);
android_keymaster_messages.cpp 153 return sizeof(op_handle);
155 return sizeof(op_handle) + output_params.SerializedSize();
159 buf = append_uint64_to_buf(buf, end, op_handle);
166 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle);
174 return sizeof(op_handle) + input.SerializedSize();
176 return sizeof(op_handle) + input.SerializedSize() + additional_params.SerializedSize();
180 buf = append_uint64_to_buf(buf, end, op_handle);
188 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end);
244 size += sizeof(op_handle) + signature.SerializedSize();
255 buf = append_uint64_to_buf(buf, end, op_handle);
    [all...]
ecdsa_keymaster1_operation.cpp 68 key_data->op_handle = operation_handle_;
keymaster1_engine.cpp 268 if (key_data->op_handle == 0)
275 device()->update(device(), key_data->op_handle, &key_data->finish_params, &input,
280 return device()->finish(device(), key_data->op_handle, &key_data->finish_params,
rsa_keymaster1_operation.cpp 84 key_data->op_handle = operation_handle_;
android_keymaster_messages_test.cpp 215 msg.op_handle = 0xDEADBEEF;
233 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle);
254 msg.op_handle = 0xDEADBEEF;
264 msg.op_handle = 0xDEADBEEF;
333 msg.op_handle = 0xDEADBEEF;
352 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle);
soft_keymaster_device.cpp     [all...]
  /system/keymaster/include/keymaster/
keymaster_enforcement.h 55 keymaster_operation_handle_t op_handle,
74 keymaster_operation_handle_t op_handle) {
75 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
85 keymaster_operation_handle_t op_handle) {
86 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
149 keymaster_operation_handle_t op_handle);
156 const keymaster_operation_handle_t op_handle,
android_keymaster.h 82 bool has_operation(keymaster_operation_handle_t op_handle) const;
android_keymaster_messages.h 348 keymaster_operation_handle_t op_handle; member in struct:keymaster::BeginOperationResponse
359 keymaster_operation_handle_t op_handle; member in struct:keymaster::UpdateOperationRequest
384 keymaster_operation_handle_t op_handle; member in struct:keymaster::FinishOperationRequest
406 return append_uint64_to_buf(buf, end, op_handle);
409 return copy_uint64_from_buf(buf_ptr, end, &op_handle);
412 keymaster_operation_handle_t op_handle; member in struct:keymaster::AbortOperationRequest
  /system/security/keystore/
keymaster_enforcement.h 54 const AuthorizationSet& operation_params, uint64_t op_handle,
72 const AuthorizationSet& operation_params, uint64_t op_handle) {
73 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
82 const AuthorizationSet& operation_params, uint64_t op_handle) {
83 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
145 const AuthorizationSet& operation_params, uint64_t op_handle);
152 const uint64_t op_handle, bool is_begin_operation) const;
auth_token_table.h 57 OP_HANDLE_REQUIRED = -4, // The key requires auth per use but op_handle was zero.
77 uint64_t op_handle, const HardwareAuthToken** found);
83 void MarkCompleted(const uint64_t op_handle);
138 HardwareAuthenticatorType auth_type, uint64_t op_handle,
auth_token_table.cpp 109 KeyPurpose purpose, uint64_t op_handle,
120 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found);
127 HardwareAuthenticatorType auth_type, uint64_t op_handle,
129 if (op_handle == 0) return OP_HANDLE_REQUIRED;
132 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); });
196 void AuthTokenTable::MarkCompleted(const uint64_t op_handle) {
197 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; });
keymaster_enforcement.cpp 118 uint64_t op_handle, bool is_begin_operation) {
138 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle);
145 uint64_t op_handle) {
178 auth_type_index, auth_timeout_index, op_handle,
275 auth_timeout_index, 0 /* op_handle */,
469 const uint64_t op_handle,
499 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) {
501 op_handle);
  /system/core/trusty/keymaster/
trusty_keymaster_device.cpp 314 update_request.op_handle = begin_response.op_handle;
325 finish_request.op_handle = begin_response.op_handle;
365 update_request.op_handle = begin_response.op_handle;
373 finish_request.op_handle = begin_response.op_handle;
  /hardware/interfaces/keymaster/3.0/vts/functional/
keymaster_hidl_hal_test.cpp 545 AuthorizationSet* out_params, OperationHandle* op_handle) {
548 OperationHandle saved_handle = *op_handle;
556 *op_handle = hidl_op_handle;
560 // Some implementations may modify *op_handle on error.
561 *op_handle = saved_handle;
581 ErrorCode Update(OperationHandle op_handle, const AuthorizationSet& in_params,
587 ->update(op_handle, in_params.hidl_data(), HidlBuf(input),
609 ErrorCode Finish(OperationHandle op_handle, const AuthorizationSet& in_params,
616 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature),
654 ErrorCode Abort(OperationHandle op_handle) {
    [all...]

Completed in 209 milliseconds