Home
last modified time | relevance | path

Searched refs:begin_params (Results 1 – 14 of 14) sorted by relevance

/system/keymaster/
Dandroid_keymaster_test.cpp555 AuthorizationSet begin_params(client_params()); in TEST_P() local
556 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE); in TEST_P()
557 begin_params.push_back(TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
558 EXPECT_EQ(KM_ERROR_INCOMPATIBLE_PADDING_MODE, BeginOperation(KM_PURPOSE_SIGN, begin_params)); in TEST_P()
594 AuthorizationSet begin_params(client_params()); in TEST_P() local
595 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE); in TEST_P()
596 begin_params.push_back(TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
597 EXPECT_EQ(KM_ERROR_OK, BeginOperation(KM_PURPOSE_SIGN, begin_params)); in TEST_P()
618 AuthorizationSet begin_params(client_params()); in TEST_P() local
619 begin_params.push_back(TAG_DIGEST, KM_DIGEST_SHA_2_256); in TEST_P()
[all …]
Dandroid_keymaster_test_utils.cpp320 const AuthorizationSet& begin_params, in ProcessMessage() argument
323 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); in ProcessMessage()
335 const string& signature, const AuthorizationSet& begin_params, in ProcessMessage() argument
338 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); in ProcessMessage()
428 AuthorizationSet begin_params(client_params()), output_params; in EncryptMessage() local
429 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage()
432 ProcessMessage(KM_PURPOSE_ENCRYPT, message, begin_params, update_params, &output_params); in EncryptMessage()
459 AuthorizationSet begin_params(client_params()), output_params; in EncryptMessage() local
460 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage()
461 begin_params.push_back(TAG_DIGEST, digest); in EncryptMessage()
[all …]
Doperation.cpp87 bool OperationFactory::GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key, in GetAndValidatePadding() argument
91 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding()
92 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING)); in GetAndValidatePadding()
112 bool OperationFactory::GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, in GetAndValidateDigest() argument
116 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) { in GetAndValidateDigest()
117 LOG_E("%d digests specified in begin params", begin_params.GetTagCount(TAG_DIGEST)); in GetAndValidateDigest()
Doperation.h54 virtual Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
79 bool GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key,
81 bool GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key,
Dhmac_operation.cpp37 const AuthorizationSet& begin_params, in CreateOperation() argument
47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { in CreateOperation()
63 begin_params.GetTagCount(TAG_DIGEST)); in CreateOperation()
Daes_operation.cpp53 static keymaster_error_t GetAndValidateGcmTagLength(const AuthorizationSet& begin_params, in GetAndValidateGcmTagLength() argument
57 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { in GetAndValidateGcmTagLength()
81 const AuthorizationSet& begin_params, in CreateOperation() argument
97 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { in CreateOperation()
98 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE)); in CreateOperation()
113 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); in CreateOperation()
120 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation()
Drsa_operation.h175 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params, in CreateOperation() argument
177 return CreateRsaOperation(key, begin_params, error); in CreateOperation()
183 virtual RsaOperation* CreateRsaOperation(const Key& key, const AuthorizationSet& begin_params,
207 RsaOperation* CreateRsaOperation(const Key& key, const AuthorizationSet& begin_params,
Drsa_operation.cpp67 const AuthorizationSet& begin_params, in CreateRsaOperation() argument
70 if (!GetAndValidatePadding(begin_params, key, &padding, error)) in CreateRsaOperation()
77 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error)) in CreateRsaOperation()
79 if (!require_digest && begin_params.find(TAG_DIGEST) != -1) { in CreateRsaOperation()
103 const AuthorizationSet& begin_params, in CreateRsaOperation() argument
105 UniquePtr<RsaOperation> op(RsaOperationFactory::CreateRsaOperation(key, begin_params, error)); in CreateRsaOperation()
Decdsa_operation.cpp32 const AuthorizationSet& begin_params, in CreateOperation() argument
47 if (!GetAndValidateDigest(begin_params, key, &digest, error)) in CreateOperation()
Dhmac_operation.h59 virtual Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
Decdsa_operation.h79 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
Dkeymaster_enforcement_test.cpp482 AuthorizationSet begin_params(AuthorizationSetBuilder().Authorization(TAG_NONCE, "foo", 3)); in TEST_F() local
485 kmen.AuthorizeOperation(KM_PURPOSE_ENCRYPT, key_id, caller_nonce, begin_params, in TEST_F()
488 kmen.AuthorizeOperation(KM_PURPOSE_DECRYPT, key_id, caller_nonce, begin_params, in TEST_F()
491 kmen.AuthorizeOperation(KM_PURPOSE_ENCRYPT, key_id, no_caller_nonce, begin_params, in TEST_F()
494 kmen.AuthorizeOperation(KM_PURPOSE_DECRYPT, key_id, no_caller_nonce, begin_params, in TEST_F()
Dandroid_keymaster_test_utils.h211 const AuthorizationSet& begin_params,
215 const std::string& signature, const AuthorizationSet& begin_params,
245 const AuthorizationSet& begin_params,
Daes_operation.h35 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,