Lines Matching refs:key_description

307 const KeyFactory* get_key_factory(const AuthorizationSet& key_description,  in get_key_factory()  argument
312 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || in get_key_factory()
324 get_key_factory(request.key_description, *context_, &response->error); in GenerateKey()
336 response->error = factory->GenerateKey(request.key_description, in GenerateKey()
357 gen_key_request.key_description.Reinitialize(kKeyMintEcdsaP256Params, in GenerateRkpKey()
766 get_key_factory(request.key_description, *context_, &response->error); in ImportKey()
770 request.key_description.GetTagValue(TAG_EARLY_BOOT_ONLY) && in ImportKey()
784 response->error = factory->ImportKey(request.key_description, // in ImportKey()
849 AuthorizationSet key_description; in ImportWrappedKey() local
854 request.masking_key, &key_description, &key_format, &secret_key); in ImportWrappedKey()
860 int sid_idx = key_description.find(TAG_USER_SECURE_ID); in ImportWrappedKey()
862 uint8_t sids = key_description[sid_idx].long_integer; in ImportWrappedKey()
863 if (!key_description.erase(sid_idx)) { in ImportWrappedKey()
868 key_description.push_back(TAG_USER_SECURE_ID, request.password_sid); in ImportWrappedKey()
871 key_description.push_back(TAG_USER_SECURE_ID, request.biometric_sid); in ImportWrappedKey()
875 key_description.push_back(TAG_CERTIFICATE_NOT_BEFORE, 0); in ImportWrappedKey()
876 key_description.push_back(TAG_CERTIFICATE_NOT_AFTER, kUndefinedExpirationDateTime); in ImportWrappedKey()
880 const KeyFactory* factory = get_key_factory(key_description, *context_, &response->error); in ImportWrappedKey()
883 response->error = factory->ImportKey(key_description, // in ImportWrappedKey()