Lines Matching refs:params
281 KeymasterArguments params; in generate() local
282 add_legacy_key_authorizations(keyType, ¶ms.params); in generate()
286 params.params.push_back(keymaster_param_enum(KM_TAG_ALGORITHM, KM_ALGORITHM_EC)); in generate()
293 params.params.push_back(keymaster_param_int(KM_TAG_KEY_SIZE, keySize)); in generate()
297 params.params.push_back(keymaster_param_enum(KM_TAG_ALGORITHM, KM_ALGORITHM_RSA)); in generate()
304 params.params.push_back(keymaster_param_int(KM_TAG_KEY_SIZE, keySize)); in generate()
328 params.params.push_back(keymaster_param_long(KM_TAG_RSA_PUBLIC_EXPONENT, exponent)); in generate()
337 int32_t rc = generateKey(name, params, NULL, 0, targetUid, flags, in generate()
358 KeymasterArguments params; in import() local
359 add_legacy_key_authorizations(type, ¶ms.params); in import()
362 params.params.push_back(keymaster_param_enum(KM_TAG_ALGORITHM, KM_ALGORITHM_RSA)); in import()
365 params.params.push_back(keymaster_param_enum(KM_TAG_ALGORITHM, KM_ALGORITHM_EC)); in import()
371 int32_t rc = importKey(name, params, KM_KEY_FORMAT_PKCS8, data, length, targetUid, flags, in import()
593 int32_t KeyStoreService::generateKey(const String16& name, const KeymasterArguments& params, in generateKey() argument
609 std::vector<keymaster_key_param_t> opParams(params.params); in generateKey()
723 int32_t KeyStoreService::importKey(const String16& name, const KeymasterArguments& params, in importKey() argument
740 std::vector<keymaster_key_param_t> opParams(params.params); in importKey()
816 const KeymasterArguments& params, const uint8_t* entropy, in begin() argument
830 if (!checkAllowedOperationParams(params.params)) { in begin()
848 std::vector<keymaster_key_param_t> opParams(params.params); in begin()
953 if (outParams.params) { in begin()
954 result->outParams.params.assign(outParams.params, outParams.params + outParams.length); in begin()
955 free(outParams.params); in begin()
959 void KeyStoreService::update(const sp<IBinder>& token, const KeymasterArguments& params, in update() argument
961 if (!checkAllowedOperationParams(params.params)) { in update()
974 std::vector<keymaster_key_param_t> opParams(params.params); in update()
1002 if (outParams.params) { in update()
1003 result->outParams.params.assign(outParams.params, outParams.params + outParams.length); in update()
1004 free(outParams.params); in update()
1008 void KeyStoreService::finish(const sp<IBinder>& token, const KeymasterArguments& params, in finish() argument
1012 if (!checkAllowedOperationParams(params.params)) { in finish()
1025 std::vector<keymaster_key_param_t> opParams(params.params); in finish()
1071 if (outParams.params) { in finish()
1072 result->outParams.params.assign(outParams.params, outParams.params + outParams.length); in finish()
1073 free(outParams.params); in finish()
1130 int32_t KeyStoreService::attestKey(const String16& name, const KeymasterArguments& params, in attestKey() argument
1135 if (!checkAllowedOperationParams(params.params)) { in attestKey()
1156 const_cast<keymaster_key_param_t*>(params.params.data()), params.params.size()}; in attestKey()
1305 const std::vector<keymaster_key_param_t>& params) { in checkAllowedOperationParams() argument
1306 for (auto param : params) { in checkAllowedOperationParams()
1319 const std::vector<keymaster_key_param_t>& params, keymaster_key_characteristics_t* out) { in getOperationCharacteristics() argument
1322 for (auto param : params) { in getOperationCharacteristics()
1362 allCharacteristics.push_back(characteristics->sw_enforced.params[i]); in getAuthToken()
1365 allCharacteristics.push_back(characteristics->hw_enforced.params[i]); in getAuthToken()
1386 inline void KeyStoreService::addAuthToParams(std::vector<keymaster_key_param_t>* params, in addAuthToParams() argument
1389 params->push_back(keymaster_param_blob( in addAuthToParams()
1406 std::vector<keymaster_key_param_t>* params) { in addOperationAuthTokenIfNeeded() argument
1426 addAuthToParams(params, authToken); in addOperationAuthTokenIfNeeded()
1444 if (characteristics->hw_enforced.params[i].tag == KM_TAG_ALGORITHM) { in getKeyAlgorithm()
1445 return &characteristics->hw_enforced.params[i]; in getKeyAlgorithm()
1449 if (characteristics->sw_enforced.params[i].tag == KM_TAG_ALGORITHM) { in getKeyAlgorithm()
1450 return &characteristics->sw_enforced.params[i]; in getKeyAlgorithm()
1457 std::vector<keymaster_key_param_t>& params) { in addLegacyBeginParams() argument
1459 params.push_back(keymaster_param_enum(KM_TAG_DIGEST, KM_DIGEST_NONE)); in addLegacyBeginParams()
1460 params.push_back(keymaster_param_enum(KM_TAG_PADDING, KM_PAD_NONE)); in addLegacyBeginParams()
1474 params.push_back(*algorithm); in addLegacyBeginParams()
1485 addLegacyBeginParams(name, inArgs.params); in doLegacySignVerify()
1498 inArgs.params.clear(); in doLegacySignVerify()
1540 const AuthorizationSet& params, Blob* blob) { in upgradeKeyBlob() argument
1551 int32_t rc = dev->upgrade_key(dev, &key, ¶ms, &upgraded_key); in upgradeKeyBlob()