/system/keymaster/ |
operation_table.cpp | 35 keymaster_operation_handle_t* op_handle) { 43 if (RAND_bytes(reinterpret_cast<uint8_t*>(op_handle), sizeof(*op_handle)) != 1) 45 if (*op_handle == 0) { 54 table_[i].handle = *op_handle; 61 Operation* OperationTable::Find(keymaster_operation_handle_t op_handle) { 62 if (op_handle == 0) 69 if (table_[i].handle == op_handle) 75 bool OperationTable::Delete(keymaster_operation_handle_t op_handle) { 80 if (table_[i].handle == op_handle) { [all...] |
operation_table.h | 42 keymaster_error_t Add(Operation* operation, keymaster_operation_handle_t* op_handle); 43 Operation* Find(keymaster_operation_handle_t op_handle);
|
android_keymaster.cpp | 241 response->op_handle = 0; 275 0 /* op_handle */, true /* is_begin_operation */); 286 response->error = operation_table_->Add(operation.release(), &response->op_handle); 295 Operation* operation = operation_table_->Find(request.op_handle); 302 request.additional_params, request.op_handle, false /* is_begin_operation */); 304 operation_table_->Delete(request.op_handle); 314 operation_table_->Delete(request.op_handle); 324 Operation* operation = operation_table_->Find(request.op_handle); 331 request.additional_params, request.op_handle, false /* is_begin_operation */); 333 operation_table_->Delete(request.op_handle); [all...] |
keymaster1_engine.h | 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), 63 keymaster_operation_handle_t op_handle; member in struct:keymaster::Keymaster1Engine::KeyData
|
keymaster_enforcement.cpp | 122 keymaster_operation_handle_t op_handle, 141 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 149 keymaster_operation_handle_t op_handle) { 181 auth_timeout_index, op_handle, false /* is_begin_operation */)) 273 auth_type_index, auth_timeout_index, 0 /* op_handle */, 444 const keymaster_operation_handle_t op_handle, 474 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { 475 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle);
|
android_keymaster_messages.cpp | 153 return sizeof(op_handle); 155 return sizeof(op_handle) + output_params.SerializedSize(); 159 buf = append_uint64_to_buf(buf, end, op_handle); 166 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle); 174 return sizeof(op_handle) + input.SerializedSize(); 176 return sizeof(op_handle) + input.SerializedSize() + additional_params.SerializedSize(); 180 buf = append_uint64_to_buf(buf, end, op_handle); 188 bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end); 244 size += sizeof(op_handle) + signature.SerializedSize(); 255 buf = append_uint64_to_buf(buf, end, op_handle); [all...] |
ecdsa_keymaster1_operation.cpp | 68 key_data->op_handle = operation_handle_;
|
keymaster1_engine.cpp | 268 if (key_data->op_handle == 0) 275 device()->update(device(), key_data->op_handle, &key_data->finish_params, &input, 280 return device()->finish(device(), key_data->op_handle, &key_data->finish_params,
|
rsa_keymaster1_operation.cpp | 84 key_data->op_handle = operation_handle_;
|
android_keymaster_messages_test.cpp | 215 msg.op_handle = 0xDEADBEEF; 233 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle); 254 msg.op_handle = 0xDEADBEEF; 264 msg.op_handle = 0xDEADBEEF; 333 msg.op_handle = 0xDEADBEEF; 352 EXPECT_EQ(0xDEADBEEF, deserialized->op_handle);
|
soft_keymaster_device.cpp | [all...] |
/system/keymaster/include/keymaster/ |
keymaster_enforcement.h | 55 keymaster_operation_handle_t op_handle, 74 keymaster_operation_handle_t op_handle) { 75 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 85 keymaster_operation_handle_t op_handle) { 86 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 149 keymaster_operation_handle_t op_handle); 156 const keymaster_operation_handle_t op_handle,
|
android_keymaster.h | 82 bool has_operation(keymaster_operation_handle_t op_handle) const;
|
android_keymaster_messages.h | 348 keymaster_operation_handle_t op_handle; member in struct:keymaster::BeginOperationResponse 359 keymaster_operation_handle_t op_handle; member in struct:keymaster::UpdateOperationRequest 384 keymaster_operation_handle_t op_handle; member in struct:keymaster::FinishOperationRequest 406 return append_uint64_to_buf(buf, end, op_handle); 409 return copy_uint64_from_buf(buf_ptr, end, &op_handle); 412 keymaster_operation_handle_t op_handle; member in struct:keymaster::AbortOperationRequest
|
/system/security/keystore/ |
keymaster_enforcement.h | 54 const AuthorizationSet& operation_params, uint64_t op_handle, 72 const AuthorizationSet& operation_params, uint64_t op_handle) { 73 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 82 const AuthorizationSet& operation_params, uint64_t op_handle) { 83 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 145 const AuthorizationSet& operation_params, uint64_t op_handle); 152 const uint64_t op_handle, bool is_begin_operation) const;
|
auth_token_table.h | 57 OP_HANDLE_REQUIRED = -4, // The key requires auth per use but op_handle was zero. 77 uint64_t op_handle, const HardwareAuthToken** found); 83 void MarkCompleted(const uint64_t op_handle); 138 HardwareAuthenticatorType auth_type, uint64_t op_handle,
|
auth_token_table.cpp | 109 KeyPurpose purpose, uint64_t op_handle, 120 return FindAuthPerOpAuthorization(key_sids, auth_type, op_handle, found); 127 HardwareAuthenticatorType auth_type, uint64_t op_handle, 129 if (op_handle == 0) return OP_HANDLE_REQUIRED; 132 entries_, [&](Entry& e) { return e.token()->challenge == op_handle && !e.completed(); }); 196 void AuthTokenTable::MarkCompleted(const uint64_t op_handle) { 197 auto found = find_if(entries_, [&](Entry& e) { return e.token()->challenge == op_handle; });
|
keymaster_enforcement.cpp | 118 uint64_t op_handle, bool is_begin_operation) { 138 return AuthorizeUpdateOrFinish(auth_set, operation_params, op_handle); 145 uint64_t op_handle) { 178 auth_type_index, auth_timeout_index, op_handle, 275 auth_timeout_index, 0 /* op_handle */, 469 const uint64_t op_handle, 499 if (auth_timeout_index == -1 && op_handle && op_handle != auth_token.challenge) { 501 op_handle);
|
/system/core/trusty/keymaster/ |
trusty_keymaster_device.cpp | 314 update_request.op_handle = begin_response.op_handle; 325 finish_request.op_handle = begin_response.op_handle; 365 update_request.op_handle = begin_response.op_handle; 373 finish_request.op_handle = begin_response.op_handle;
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
keymaster_hidl_hal_test.cpp | 545 AuthorizationSet* out_params, OperationHandle* op_handle) { 548 OperationHandle saved_handle = *op_handle; 556 *op_handle = hidl_op_handle; 560 // Some implementations may modify *op_handle on error. 561 *op_handle = saved_handle; 581 ErrorCode Update(OperationHandle op_handle, const AuthorizationSet& in_params, 587 ->update(op_handle, in_params.hidl_data(), HidlBuf(input), 609 ErrorCode Finish(OperationHandle op_handle, const AuthorizationSet& in_params, 616 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature), 654 ErrorCode Abort(OperationHandle op_handle) { [all...] |