Home
last modified time | relevance | path

Searched refs:authorizations (Results 1 – 11 of 11) sorted by relevance

/hardware/interfaces/security/keymint/aidl/android/hardware/security/keymint/
DKeyCharacteristics.aidl36 KeyParameter[] authorizations;
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/1/android/hardware/security/keymint/
DKeyCharacteristics.aidl39 android.hardware.security.keymint.KeyParameter[] authorizations;
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/
DKeyCharacteristics.aidl39 android.hardware.security.keymint.KeyParameter[] authorizations;
/hardware/interfaces/security/keymint/aidl/vts/functional/
DDeviceUniqueAttestationTest.cpp159 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
212 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
280 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
DKeyMintAidlTestBase.cpp80 if (entry.authorizations.empty()) return false; in KeyCharacteristicsBasicallyValid()
174 allAuths.push_back(AuthorizationSet(entry.authorizations)); in boot_patch_level()
340 allAuths.push_back(AuthorizationSet(entry.authorizations)); in ImportWrappedKey()
1189 return (found == key_characteristics.end()) ? kEmptyAuthList : found->authorizations; in SecLevelAuthorizations()
1197 return (found == key_characteristics.end()) ? kEmptyAuthList : found->authorizations; in SecLevelAuthorizations()
1484 authList.push_back(AuthorizationSet(entry.authorizations)); in HwEnforcedAuthorizations()
1495 authList.push_back(AuthorizationSet(entry.authorizations)); in SwEnforcedAuthorizations()
DKeyMintTest.cpp56 AuthorizationSet a_auths(a.authorizations); in operator ()()
57 AuthorizationSet b_auths(b.authorizations); in operator ()()
505 auths.push_back(AuthorizationSet(entry.authorizations)); in CheckCommonParams()
1053 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
1240 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
1296 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
1880 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
2067 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
2261 auto authorizations = AuthorizationSetBuilder() in TEST_P() local
2270 ASSERT_EQ(ErrorCode::OK, GenerateKey(authorizations)); in TEST_P()
[all …]
/hardware/interfaces/security/keymint/support/include/keymint_support/
Dkey_param_output.h87 for (auto& entry : value.authorizations) {
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal124 * caller-provided authorizations into two lists, those it enforces in hardware and those it does
126 * the KeyCharacteristics struct. The IKeymasterDevice must also add the following authorizations
334 * Verify authorizations for another IKeymasterDevice instance.
337 * to ask the TEE IKeymasterDevice to verify authorizations for a key hosted in StrongBox.
342 * authorizations it can and return those it validated in the VerificationToken. If it cannot
351 * @param parametersToVerify Set of authorizations to verify. The caller may provide an empty
388 * of a key in any way inconsistent with the authorizations specified at generation time. With
903 * the key authorizations. If the specified purpose does not match, begin() must return
967 * digest and padding, which means that the key authorizations need to contain the specified
1025 * Tag::MIN_MAC_LENGTH in the key authorizations. For MAC lengths greater than 128 or
[all …]
Dtypes.hal1275 * VerificationToken enables one Keymaster instance to validate authorizations for another. See
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal41 * authorizations.
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp1656 auto authorizations = AuthorizationSetBuilder() in TEST_P() local
1664 ASSERT_EQ(ErrorCode::OK, GenerateKey(authorizations)); in TEST_P()