Searched refs:GetTagValue (Results 1 – 7 of 7) sorted by relevance
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | DeviceUniqueAttestationTest.cpp | 161 auto vendor_pl = auths.GetTagValue(TAG_VENDOR_PATCHLEVEL); in TEST_P() 165 auto boot_pl = auths.GetTagValue(TAG_BOOT_PATCHLEVEL); in TEST_P() 214 auto vendor_pl = auths.GetTagValue(TAG_VENDOR_PATCHLEVEL); in TEST_P() 218 auto boot_pl = auths.GetTagValue(TAG_BOOT_PATCHLEVEL); in TEST_P() 282 auto vendor_pl = auths.GetTagValue(TAG_VENDOR_PATCHLEVEL); in TEST_P() 286 auto boot_pl = auths.GetTagValue(TAG_BOOT_PATCHLEVEL); in TEST_P()
|
D | KeyMintAidlTestBase.cpp | 176 auto patchlevel = allAuths.GetTagValue(TAG_BOOT_PATCHLEVEL); in boot_patch_level() 245 auto algorithm = key_desc.GetTagValue(TAG_ALGORITHM); in GenerateKey() 294 auto algorithm = key_desc.GetTagValue(TAG_ALGORITHM); in ImportKey() 342 auto algorithm = allAuths.GetTagValue(TAG_ALGORITHM); in ImportWrappedKey() 703 Digest digest = params.GetTagValue(TAG_DIGEST).value(); in LocalVerifyMessage() 705 auto tag = params.GetTagValue(TAG_PADDING); in LocalVerifyMessage() 814 auto digest_tag = params.GetTagValue(TAG_DIGEST); in LocalRsaEncryptMessage() 816 auto pad_tag = params.GetTagValue(TAG_PADDING); in LocalRsaEncryptMessage() 818 auto mgf_tag = params.GetTagValue(TAG_RSA_OAEP_MGF_DIGEST); in LocalRsaEncryptMessage() 929 auto ivVal = out_params.GetTagValue(TAG_NONCE); in EncryptMessage()
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | authorization_set.h | 184 inline NullOr<const typename TypedTag2ValueType<T>::type&> GetTagValue(T tag) const { in GetTagValue() function
|
/hardware/interfaces/security/keymint/support/include/keymint_support/ |
D | authorization_set.h | 181 inline auto GetTagValue(T tag) const -> decltype(authorizationValue(tag, KeyParameter())) {
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 1064 << "User ID should be 7, was " << auths.GetTagValue(TAG_USER_ID); in CheckBaseParams() 1082 << auths.GetTagValue(TAG_OS_VERSION); in CheckBaseParams() 1085 << auths.GetTagValue(TAG_OS_PATCHLEVEL); in CheckBaseParams() 3003 auto iv = set.GetTagValue(TAG_NONCE); in CopyIv() 3120 auto iv = output_params.GetTagValue(TAG_NONCE); in TEST_P() 3310 EXPECT_EQ(16U, out_params.GetTagValue(TAG_NONCE).value().size()); in TEST_P() 3312 params.push_back(TAG_NONCE, out_params.GetTagValue(TAG_NONCE).value()); in TEST_P() 3358 EXPECT_EQ(16U, out_params.GetTagValue(TAG_NONCE).value().size()); in TEST_P() 3360 params.push_back(TAG_NONCE, out_params.GetTagValue(TAG_NONCE).value()); in TEST_P() 3468 ASSERT_TRUE(begin_out_params.GetTagValue(TAG_NONCE).isOk()); in TEST_P()
|
D | authorization_set.h | 180 inline NullOr<const typename TypedTag2ValueType<T>::type&> GetTagValue(T tag) const { in GetTagValue() function
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 585 << auths.GetTagValue(TAG_OS_VERSION); in CheckBaseParams() 596 << ", which is less than key reported " << auths.GetTagValue(TAG_OS_PATCHLEVEL); in CheckBaseParams() 603 << auths.GetTagValue(TAG_OS_PATCHLEVEL); in CheckBaseParams() 2864 auto iv = set.GetTagValue(TAG_NONCE); in CopyIv() 2983 auto iv = output_params.GetTagValue(TAG_NONCE); in TEST_P() 3176 EXPECT_EQ(16U, out_params.GetTagValue(TAG_NONCE).value().size()); in TEST_P() 3178 params.push_back(TAG_NONCE, out_params.GetTagValue(TAG_NONCE).value()); in TEST_P() 3224 EXPECT_EQ(16U, out_params.GetTagValue(TAG_NONCE).value().size()); in TEST_P() 3226 params.push_back(TAG_NONCE, out_params.GetTagValue(TAG_NONCE).value()); in TEST_P() 3422 ASSERT_TRUE(begin_out_params.GetTagValue(TAG_NONCE).isOk()); in TEST_P()
|