Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 17 of 17) sorted by relevance

/system/tpm/trunks/
Dpassword_authorization_delegate.cc39 TPMS_AUTH_COMMAND auth; in GetCommandAuthorization() local
40 auth.session_handle = TPM_RS_PW; in GetCommandAuthorization()
41 auth.nonce.size = 0; in GetCommandAuthorization()
42 auth.session_attributes = kContinueSession; in GetCommandAuthorization()
43 auth.hmac = password_; in GetCommandAuthorization()
45 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization()
Dhmac_authorization_delegate.cc63 TPMS_AUTH_COMMAND auth; in GetCommandAuthorization() local
64 auth.session_handle = session_handle_; in GetCommandAuthorization()
68 auth.nonce = caller_nonce_; in GetCommandAuthorization()
69 auth.session_attributes = kContinueSession; in GetCommandAuthorization()
72 auth.session_attributes |= kDecryptSession; in GetCommandAuthorization()
75 auth.session_attributes |= kEncryptSession; in GetCommandAuthorization()
81 CHECK_EQ(Serialize_TPMA_SESSION(auth.session_attributes, &attributes_bytes), in GetCommandAuthorization()
99 auth.hmac = Make_TPM2B_DIGEST(digest); in GetCommandAuthorization()
101 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization()
Dmock_tpm.h465 const TPM2B_AUTH& auth,
472 const TPM2B_AUTH& auth,
477 void(const TPM2B_AUTH& auth,
482 TPM_RC(const TPM2B_AUTH& auth,
745 void(const TPMI_RH_PROVISION& auth,
753 TPM_RC(const TPMI_RH_PROVISION& auth,
827 const TPM2B_DIGEST& auth,
833 const TPM2B_DIGEST& auth,
853 const TPMT_SIGNATURE& auth,
863 const TPMT_SIGNATURE& auth,
[all …]
Dmock_tpm.cc139 const TPMT_SIGNATURE& auth, in PolicySigned() argument
143 policy_ref, expiration, auth, authorization_delegate, in PolicySigned()
155 const TPMT_SIGNATURE& auth, in PolicySignedSync() argument
160 cp_hash_a, policy_ref, expiration, auth, timeout, in PolicySignedSync()
Dtpm_generated.h4123 const TPM2B_AUTH& auth,
4133 const TPM2B_AUTH& auth,
4139 const TPM2B_AUTH& auth,
4147 const TPM2B_AUTH& auth,
4155 virtual void HashSequenceStart(const TPM2B_AUTH& auth,
4160 const TPM2B_AUTH& auth,
4599 const TPMI_RH_PROVISION& auth,
4610 const TPMI_RH_PROVISION& auth,
4618 const TPMI_RH_PROVISION& auth,
4755 const TPM2B_DIGEST& auth,
[all …]
Dtpm_generated.cc15116 const TPM2B_AUTH& auth, in SerializeCommand_HMAC_Start() argument
15140 rc = Serialize_TPM2B_AUTH(auth, &auth_bytes); in SerializeCommand_HMAC_Start()
15309 const TPM2B_AUTH& auth, in HMAC_Start() argument
15319 TPM_RC rc = SerializeCommand_HMAC_Start(handle, handle_name, auth, hash_alg, in HMAC_Start()
15330 const TPM2B_AUTH& auth, in HMAC_StartSync() argument
15336 TPM_RC rc = SerializeCommand_HMAC_Start(handle, handle_name, auth, hash_alg, in HMAC_StartSync()
15348 const TPM2B_AUTH& auth, in SerializeCommand_HashSequenceStart() argument
15367 rc = Serialize_TPM2B_AUTH(auth, &auth_bytes); in SerializeCommand_HashSequenceStart()
15533 void Tpm::HashSequenceStart(const TPM2B_AUTH& auth, in HashSequenceStart() argument
15543 TPM_RC rc = SerializeCommand_HashSequenceStart(auth, hash_alg, &command, in HashSequenceStart()
[all …]
/system/vold/
DKeyStorage.cpp107 static bool generateKeymasterKey(Keymaster& keymaster, const KeyAuthentication& auth, in generateKeymasterKey() argument
115 if (auth.token.empty()) { in generateKeymasterKey()
120 if (auth.token.size() != sizeof(hw_auth_token_t)) { in generateKeymasterKey()
122 << auth.token.size() << " bytes"; in generateKeymasterKey()
125 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data()); in generateKeymasterKey()
133 static AuthorizationSet beginParams(const KeyAuthentication& auth, in beginParams() argument
140 if (!auth.token.empty()) { in beginParams()
142 paramBuilder.Authorization(TAG_AUTH_TOKEN, blob2hidlVec(auth.token)); in beginParams()
235 static std::string getStretching(const KeyAuthentication& auth) { in getStretching() argument
236 if (!auth.usesKeymaster()) { in getStretching()
[all …]
DKeyStorage.h46 bool storeKey(const std::string& dir, const KeyAuthentication& auth, const std::string& key);
49 bool retrieveKey(const std::string& dir, const KeyAuthentication& auth, std::string* key);
DExt4Crypt.cpp254 const android::vold::KeyAuthentication& auth, in read_and_fixate_user_ce_key() argument
260 if (android::vold::retrieveKey(ce_key_path, auth, ce_key)) { in read_and_fixate_user_ce_key()
271 const android::vold::KeyAuthentication& auth) { in read_and_install_user_ce_key() argument
274 if (!read_and_fixate_user_ce_key(user_id, auth, &ce_key)) return false; in read_and_install_user_ce_key()
317 const android::vold::KeyAuthentication& auth, const std::string& key) { in store_key() argument
325 if (!android::vold::storeKey(tmp_path, auth, key)) return false; in store_key()
637 auto auth = secret.empty() ? kEmptyAuthentication in e4crypt_add_user_key_auth() local
649 if (!store_key(ce_key_path, user_key_temp, auth, ce_key)) return false; in e4crypt_add_user_key_auth()
680 android::vold::KeyAuthentication auth(token, secret); in e4crypt_unlock_user_key() local
681 if (!read_and_install_user_ce_key(user_id, auth)) { in e4crypt_unlock_user_key()
/system/netd/server/
DXfrmController.cpp385 saInfo.auth = XfrmAlgo{ in ipSecAddSecurityAssociation()
583 nlattr_algo_auth auth{}; in createTransportModeSecurityAssociation() local
593 {&auth, 0}, // adjust size if auth algo is present in createTransportModeSecurityAssociation()
604 len = iov[AUTH].iov_len = fillNlAttrXfrmAlgoAuth(record.auth, &auth); in createTransportModeSecurityAssociation()
622 strncpy(algo->auth.alg_name, inAlgo.name.c_str(), sizeof(algo->auth.alg_name)); in fillNlAttrXfrmAlgoAuth()
623 algo->auth.alg_key_len = inAlgo.key.size() * 8; // bits in fillNlAttrXfrmAlgoAuth()
626 algo->auth.alg_trunc_len = inAlgo.truncLenBits; in fillNlAttrXfrmAlgoAuth()
DXfrmController.h87 XfrmAlgo auth; member
172 xfrm_algo_auth auth; member
/system/sepolicy/public/
Dfingerprintd.te18 # Need to add auth tokens to KeyStore
Dgatekeeperd.te24 # Need to add auth tokens to KeyStore
/system/tpm/trunks/generator/
Draw_commands.txt4494 size of public auth policy or sensitive auth value does not match
6679 // Can not change auth on sequence object
6682 // Make sure that the auth value is consistent with the nameAlg
11260 auth.
11414 auth
11614 &in->auth,
11641 sequence to the value in auth. A sequence structure for an Event (hashAlg = TPM_ALG_NULL) contains
11681 auth
11779 return ObjectCreateEventSequence(&in->auth, &out->sequenceHandle);
11782 return ObjectCreateHashSequence(in->hashAlg, &in->auth, &out->sequenceHandle);
[all …]
Draw_commands_fixed.txt4496 size of public auth policy or sensitive auth value does not match
6683 // Can not change auth on sequence object
6686 // Make sure that the auth value is consistent with the nameAlg
11271 auth.
11425 auth
11625 &in->auth,
11652 sequence to the value in auth. A sequence structure for an Event (hashAlg = TPM_ALG_NULL) contains
11692 auth
11790 return ObjectCreateEventSequence(&in->auth, &out->sequenceHandle);
11793 return ObjectCreateHashSequence(in->hashAlg, &in->auth, &out->sequenceHandle);
[all …]
Draw_structures_fixed.txt12835 the USER auth secret value
17684 policy/auth
Draw_structures.txt12823 the USER auth secret value
17703 policy/auth