/system/tpm/trunks/ |
D | password_authorization_delegate.cc | 39 TPMS_AUTH_COMMAND auth; in GetCommandAuthorization() local 40 auth.session_handle = TPM_RS_PW; in GetCommandAuthorization() 41 auth.nonce.size = 0; in GetCommandAuthorization() 42 auth.session_attributes = kContinueSession; in GetCommandAuthorization() 43 auth.hmac = password_; in GetCommandAuthorization() 45 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization()
|
D | hmac_authorization_delegate.cc | 63 TPMS_AUTH_COMMAND auth; in GetCommandAuthorization() local 64 auth.session_handle = session_handle_; in GetCommandAuthorization() 68 auth.nonce = caller_nonce_; in GetCommandAuthorization() 69 auth.session_attributes = kContinueSession; in GetCommandAuthorization() 72 auth.session_attributes |= kDecryptSession; in GetCommandAuthorization() 75 auth.session_attributes |= kEncryptSession; in GetCommandAuthorization() 81 CHECK_EQ(Serialize_TPMA_SESSION(auth.session_attributes, &attributes_bytes), in GetCommandAuthorization() 99 auth.hmac = Make_TPM2B_DIGEST(digest); in GetCommandAuthorization() 101 TPM_RC serialize_error = Serialize_TPMS_AUTH_COMMAND(auth, authorization); in GetCommandAuthorization()
|
D | mock_tpm.h | 465 const TPM2B_AUTH& auth, 472 const TPM2B_AUTH& auth, 477 void(const TPM2B_AUTH& auth, 482 TPM_RC(const TPM2B_AUTH& auth, 745 void(const TPMI_RH_PROVISION& auth, 753 TPM_RC(const TPMI_RH_PROVISION& auth, 827 const TPM2B_DIGEST& auth, 833 const TPM2B_DIGEST& auth, 853 const TPMT_SIGNATURE& auth, 863 const TPMT_SIGNATURE& auth, [all …]
|
D | mock_tpm.cc | 139 const TPMT_SIGNATURE& auth, in PolicySigned() argument 143 policy_ref, expiration, auth, authorization_delegate, in PolicySigned() 155 const TPMT_SIGNATURE& auth, in PolicySignedSync() argument 160 cp_hash_a, policy_ref, expiration, auth, timeout, in PolicySignedSync()
|
D | tpm_generated.h | 4123 const TPM2B_AUTH& auth, 4133 const TPM2B_AUTH& auth, 4139 const TPM2B_AUTH& auth, 4147 const TPM2B_AUTH& auth, 4155 virtual void HashSequenceStart(const TPM2B_AUTH& auth, 4160 const TPM2B_AUTH& auth, 4599 const TPMI_RH_PROVISION& auth, 4610 const TPMI_RH_PROVISION& auth, 4618 const TPMI_RH_PROVISION& auth, 4755 const TPM2B_DIGEST& auth, [all …]
|
D | tpm_generated.cc | 15116 const TPM2B_AUTH& auth, in SerializeCommand_HMAC_Start() argument 15140 rc = Serialize_TPM2B_AUTH(auth, &auth_bytes); in SerializeCommand_HMAC_Start() 15309 const TPM2B_AUTH& auth, in HMAC_Start() argument 15319 TPM_RC rc = SerializeCommand_HMAC_Start(handle, handle_name, auth, hash_alg, in HMAC_Start() 15330 const TPM2B_AUTH& auth, in HMAC_StartSync() argument 15336 TPM_RC rc = SerializeCommand_HMAC_Start(handle, handle_name, auth, hash_alg, in HMAC_StartSync() 15348 const TPM2B_AUTH& auth, in SerializeCommand_HashSequenceStart() argument 15367 rc = Serialize_TPM2B_AUTH(auth, &auth_bytes); in SerializeCommand_HashSequenceStart() 15533 void Tpm::HashSequenceStart(const TPM2B_AUTH& auth, in HashSequenceStart() argument 15543 TPM_RC rc = SerializeCommand_HashSequenceStart(auth, hash_alg, &command, in HashSequenceStart() [all …]
|
/system/vold/ |
D | KeyStorage.cpp | 107 static bool generateKeymasterKey(Keymaster& keymaster, const KeyAuthentication& auth, in generateKeymasterKey() argument 115 if (auth.token.empty()) { in generateKeymasterKey() 120 if (auth.token.size() != sizeof(hw_auth_token_t)) { in generateKeymasterKey() 122 << auth.token.size() << " bytes"; in generateKeymasterKey() 125 const hw_auth_token_t* at = reinterpret_cast<const hw_auth_token_t*>(auth.token.data()); in generateKeymasterKey() 133 static AuthorizationSet beginParams(const KeyAuthentication& auth, in beginParams() argument 140 if (!auth.token.empty()) { in beginParams() 142 paramBuilder.Authorization(TAG_AUTH_TOKEN, blob2hidlVec(auth.token)); in beginParams() 235 static std::string getStretching(const KeyAuthentication& auth) { in getStretching() argument 236 if (!auth.usesKeymaster()) { in getStretching() [all …]
|
D | KeyStorage.h | 46 bool storeKey(const std::string& dir, const KeyAuthentication& auth, const std::string& key); 49 bool retrieveKey(const std::string& dir, const KeyAuthentication& auth, std::string* key);
|
D | Ext4Crypt.cpp | 254 const android::vold::KeyAuthentication& auth, in read_and_fixate_user_ce_key() argument 260 if (android::vold::retrieveKey(ce_key_path, auth, ce_key)) { in read_and_fixate_user_ce_key() 271 const android::vold::KeyAuthentication& auth) { in read_and_install_user_ce_key() argument 274 if (!read_and_fixate_user_ce_key(user_id, auth, &ce_key)) return false; in read_and_install_user_ce_key() 317 const android::vold::KeyAuthentication& auth, const std::string& key) { in store_key() argument 325 if (!android::vold::storeKey(tmp_path, auth, key)) return false; in store_key() 637 auto auth = secret.empty() ? kEmptyAuthentication in e4crypt_add_user_key_auth() local 649 if (!store_key(ce_key_path, user_key_temp, auth, ce_key)) return false; in e4crypt_add_user_key_auth() 680 android::vold::KeyAuthentication auth(token, secret); in e4crypt_unlock_user_key() local 681 if (!read_and_install_user_ce_key(user_id, auth)) { in e4crypt_unlock_user_key()
|
/system/netd/server/ |
D | XfrmController.cpp | 385 saInfo.auth = XfrmAlgo{ in ipSecAddSecurityAssociation() 583 nlattr_algo_auth auth{}; in createTransportModeSecurityAssociation() local 593 {&auth, 0}, // adjust size if auth algo is present in createTransportModeSecurityAssociation() 604 len = iov[AUTH].iov_len = fillNlAttrXfrmAlgoAuth(record.auth, &auth); in createTransportModeSecurityAssociation() 622 strncpy(algo->auth.alg_name, inAlgo.name.c_str(), sizeof(algo->auth.alg_name)); in fillNlAttrXfrmAlgoAuth() 623 algo->auth.alg_key_len = inAlgo.key.size() * 8; // bits in fillNlAttrXfrmAlgoAuth() 626 algo->auth.alg_trunc_len = inAlgo.truncLenBits; in fillNlAttrXfrmAlgoAuth()
|
D | XfrmController.h | 87 XfrmAlgo auth; member 172 xfrm_algo_auth auth; member
|
/system/sepolicy/public/ |
D | fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 24 # Need to add auth tokens to KeyStore
|
/system/tpm/trunks/generator/ |
D | raw_commands.txt | 4494 size of public auth policy or sensitive auth value does not match 6679 // Can not change auth on sequence object 6682 // Make sure that the auth value is consistent with the nameAlg 11260 auth. 11414 auth 11614 &in->auth, 11641 sequence to the value in auth. A sequence structure for an Event (hashAlg = TPM_ALG_NULL) contains 11681 auth 11779 return ObjectCreateEventSequence(&in->auth, &out->sequenceHandle); 11782 return ObjectCreateHashSequence(in->hashAlg, &in->auth, &out->sequenceHandle); [all …]
|
D | raw_commands_fixed.txt | 4496 size of public auth policy or sensitive auth value does not match 6683 // Can not change auth on sequence object 6686 // Make sure that the auth value is consistent with the nameAlg 11271 auth. 11425 auth 11625 &in->auth, 11652 sequence to the value in auth. A sequence structure for an Event (hashAlg = TPM_ALG_NULL) contains 11692 auth 11790 return ObjectCreateEventSequence(&in->auth, &out->sequenceHandle); 11793 return ObjectCreateHashSequence(in->hashAlg, &in->auth, &out->sequenceHandle); [all …]
|
D | raw_structures_fixed.txt | 12835 the USER auth secret value 17684 policy/auth
|
D | raw_structures.txt | 12823 the USER auth secret value 17703 policy/auth
|