Home
last modified time | relevance | path

Searched refs:authorizations (Results 1 – 15 of 15) sorted by relevance

/hardware/interfaces/security/keymint/aidl/android/hardware/security/keymint/
DKeyCharacteristics.aidl47 KeyParameter[] authorizations;
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/3/android/hardware/security/keymint/
DKeyCharacteristics.aidl39 android.hardware.security.keymint.KeyParameter[] authorizations;
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/
DKeyCharacteristics.aidl39 android.hardware.security.keymint.KeyParameter[] authorizations;
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/2/android/hardware/security/keymint/
DKeyCharacteristics.aidl39 android.hardware.security.keymint.KeyParameter[] authorizations;
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/1/android/hardware/security/keymint/
DKeyCharacteristics.aidl39 android.hardware.security.keymint.KeyParameter[] authorizations;
/hardware/nxp/keymint/KM200/
DCborConverter.cpp120 if (!getKeyParameters(arrayItem, 0, sbEnf.authorizations) || in getKeyCharacteristics()
121 !getKeyParameters(arrayItem, 1, teeEnf.authorizations) || in getKeyCharacteristics()
122 !getKeyParameters(arrayItem, 2, swEnf.authorizations)) { in getKeyCharacteristics()
126 if (!sbEnf.authorizations.empty()) keyCharacteristics.push_back(std::move(sbEnf)); in getKeyCharacteristics()
127 if (!teeEnf.authorizations.empty()) keyCharacteristics.push_back(std::move(teeEnf)); in getKeyCharacteristics()
128 if (!swEnf.authorizations.empty()) keyCharacteristics.push_back(std::move(swEnf)); in getKeyCharacteristics()
/hardware/interfaces/security/keymint/aidl/vts/functional/
DDeviceUniqueAttestationTest.cpp173 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
229 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
326 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
DKeyMintAidlTestBase.cpp86 size_t count_tag_invalid_entries(const std::vector<KeyParameter>& authorizations) { in count_tag_invalid_entries() argument
87 return std::count_if(authorizations.begin(), authorizations.end(), in count_tag_invalid_entries()
100 if (entry.authorizations.empty()) { in KeyCharacteristicsBasicallyValid()
109 EXPECT_EQ(count_tag_invalid_entries(entry.authorizations), 0); in KeyCharacteristicsBasicallyValid()
221 allAuths.push_back(AuthorizationSet(entry.authorizations)); in boot_patch_level()
453 allAuths.push_back(AuthorizationSet(entry.authorizations)); in ImportWrappedKey()
1544 return (found == key_characteristics.end()) ? kEmptyAuthList : found->authorizations; in SecLevelAuthorizations()
1552 return (found == key_characteristics.end()) ? kEmptyAuthList : found->authorizations; in SecLevelAuthorizations()
1990 authList.push_back(AuthorizationSet(entry.authorizations)); in HwEnforcedAuthorizations()
2001 authList.push_back(AuthorizationSet(entry.authorizations)); in SwEnforcedAuthorizations()
[all …]
DKeyMintTest.cpp61 AuthorizationSet a_auths(a.authorizations); in operator ()()
62 AuthorizationSet b_auths(b.authorizations); in operator ()()
639 auths.push_back(AuthorizationSet(entry.authorizations)); in CheckCommonParams()
1369 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
1557 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
1614 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
2512 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
2732 auths.push_back(AuthorizationSet(entry.authorizations)); in TEST_P()
2932 auto authorizations = AuthorizationSetBuilder() in TEST_P() local
2941 ASSERT_EQ(ErrorCode::OK, GenerateKey(authorizations)); in TEST_P()
[all …]
/hardware/nxp/keymint/KM300/
DCborConverter.cpp185 sbEnf.authorizations = std::move(optSbEnf.value()); in getKeyCharacteristics()
190 teeEnf.authorizations = std::move(optTeeEnf.value()); in getKeyCharacteristics()
195 swEnf.authorizations = std::move(optSwEnf.value()); in getKeyCharacteristics()
197 if (!sbEnf.authorizations.empty()) keyCharacteristics.push_back(std::move(sbEnf)); in getKeyCharacteristics()
198 if (!teeEnf.authorizations.empty()) keyCharacteristics.push_back(std::move(teeEnf)); in getKeyCharacteristics()
199 if (!swEnf.authorizations.empty()) keyCharacteristics.push_back(std::move(swEnf)); in getKeyCharacteristics()
/hardware/interfaces/security/keymint/support/include/keymint_support/
Dkey_param_output.h87 for (auto& entry : value.authorizations) {
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal124 * caller-provided authorizations into two lists, those it enforces in hardware and those it does
126 * the KeyCharacteristics struct. The IKeymasterDevice must also add the following authorizations
334 * Verify authorizations for another IKeymasterDevice instance.
337 * to ask the TEE IKeymasterDevice to verify authorizations for a key hosted in StrongBox.
342 * authorizations it can and return those it validated in the VerificationToken. If it cannot
351 * @param parametersToVerify Set of authorizations to verify. The caller may provide an empty
388 * of a key in any way inconsistent with the authorizations specified at generation time. With
903 * the key authorizations. If the specified purpose does not match, begin() must return
967 * digest and padding, which means that the key authorizations need to contain the specified
1025 * Tag::MIN_MAC_LENGTH in the key authorizations. For MAC lengths greater than 128 or
[all …]
Dtypes.hal1275 * VerificationToken enables one Keymaster instance to validate authorizations for another. See
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal41 * authorizations.
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp1662 auto authorizations = AuthorizationSetBuilder() in TEST_P() local
1670 ASSERT_EQ(ErrorCode::OK, GenerateKey(authorizations)); in TEST_P()