Searched refs:authorizations (Results 1 – 11 of 11) sorted by relevance
36 KeyParameter[] authorizations;
39 android.hardware.security.keymint.KeyParameter[] authorizations;
159 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()212 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()280 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
80 if (entry.authorizations.empty()) return false; in KeyCharacteristicsBasicallyValid()174 allAuths.push_back(AuthorizationSet(entry.authorizations)); in boot_patch_level()340 allAuths.push_back(AuthorizationSet(entry.authorizations)); in ImportWrappedKey()1189 return (found == key_characteristics.end()) ? kEmptyAuthList : found->authorizations; in SecLevelAuthorizations()1197 return (found == key_characteristics.end()) ? kEmptyAuthList : found->authorizations; in SecLevelAuthorizations()1484 authList.push_back(AuthorizationSet(entry.authorizations)); in HwEnforcedAuthorizations()1495 authList.push_back(AuthorizationSet(entry.authorizations)); in SwEnforcedAuthorizations()
56 AuthorizationSet a_auths(a.authorizations); in operator ()()57 AuthorizationSet b_auths(b.authorizations); in operator ()()505 auths.push_back(AuthorizationSet(entry.authorizations)); in CheckCommonParams()1053 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()1240 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()1296 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()1880 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()2067 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()2261 auto authorizations = AuthorizationSetBuilder() in TEST_P() local2270 ASSERT_EQ(ErrorCode::OK, GenerateKey(authorizations)); in TEST_P()[all …]
87 for (auto& entry : value.authorizations) {
124 * caller-provided authorizations into two lists, those it enforces in hardware and those it does126 * the KeyCharacteristics struct. The IKeymasterDevice must also add the following authorizations334 * Verify authorizations for another IKeymasterDevice instance.337 * to ask the TEE IKeymasterDevice to verify authorizations for a key hosted in StrongBox.342 * authorizations it can and return those it validated in the VerificationToken. If it cannot351 * @param parametersToVerify Set of authorizations to verify. The caller may provide an empty388 * of a key in any way inconsistent with the authorizations specified at generation time. With903 * the key authorizations. If the specified purpose does not match, begin() must return967 * digest and padding, which means that the key authorizations need to contain the specified1025 * Tag::MIN_MAC_LENGTH in the key authorizations. For MAC lengths greater than 128 or[all …]
1275 * VerificationToken enables one Keymaster instance to validate authorizations for another. See
41 * authorizations.
1656 auto authorizations = AuthorizationSetBuilder() in TEST_P() local1664 ASSERT_EQ(ErrorCode::OK, GenerateKey(authorizations)); in TEST_P()