/system/keymaster/ |
google_keymaster_test.cpp | 207 EXPECT_GT(rsp.unenforced.SerializedSize(), 12U); 209 // Check specified tags are all present in unenforced characteristics 210 EXPECT_TRUE(contains(rsp.unenforced, TAG_PURPOSE, KM_PURPOSE_SIGN)); 211 EXPECT_TRUE(contains(rsp.unenforced, TAG_PURPOSE, KM_PURPOSE_VERIFY)); 213 EXPECT_TRUE(contains(rsp.unenforced, TAG_ALGORITHM, KM_ALGORITHM_RSA)); 215 EXPECT_TRUE(contains(rsp.unenforced, TAG_USER_ID, 7)); 216 EXPECT_TRUE(contains(rsp.unenforced, TAG_USER_AUTH_ID, 8)); 217 EXPECT_TRUE(contains(rsp.unenforced, TAG_KEY_SIZE, 256)); 218 EXPECT_TRUE(contains(rsp.unenforced, TAG_AUTH_TIMEOUT, 300)); 221 EXPECT_FALSE(contains(rsp.unenforced, TAG_ROOT_OF_TRUST)) [all...] |
google_keymaster.cpp | 171 &response->unenforced); 186 response->unenforced.Reinitialize(blob->unenforced()); 296 &response->enforced, &response->unenforced); 302 AuthorizationSet* unenforced) { 305 error = SetAuthorizations(key->authorizations(), origin, enforced, unenforced); 325 new KeyBlob(*enforced, *unenforced, hidden_auths, key_data, MasterKey(), nonce)); 383 AuthorizationSet* unenforced) { 402 AddAuthorization(key_description[i], enforced, unenforced); 408 unenforced); local 409 AddAuthorization(Authorization(TAG_ORIGIN, origin), enforced, unenforced); local [all...] |
google_keymaster_messages.cpp | 68 enforced.SerializedSize() + unenforced.SerializedSize(); 74 return unenforced.Serialize(buf, end); 83 !enforced.Deserialize(buf_ptr, end) || !unenforced.Deserialize(buf_ptr, end)) 122 return enforced.SerializedSize() + unenforced.SerializedSize(); 127 return unenforced.Serialize(buf, end); 132 return enforced.Deserialize(buf_ptr, end) && unenforced.Deserialize(buf_ptr, end); 264 enforced.SerializedSize() + unenforced.SerializedSize(); 270 return unenforced.Serialize(buf, end); 279 !enforced.Deserialize(buf_ptr, end) || !unenforced.Deserialize(buf_ptr, end))
|
google_keymaster_messages_test.cpp | 132 EXPECT_EQ(deserialized->unenforced, rsp.unenforced); 145 EXPECT_EQ(0U, deserialized->unenforced.size()); 164 msg.unenforced.Reinitialize(params, array_length(params)); 168 EXPECT_EQ(msg.unenforced, deserialized->unenforced); 265 msg.unenforced.Reinitialize(params, array_length(params)); 273 EXPECT_EQ(msg.unenforced, deserialized->unenforced);
|
key.cpp | 33 authorizations_.push_back(blob.unenforced());
|
key_blob.cpp | 46 KeyBlob::KeyBlob(const AuthorizationSet& enforced, const AuthorizationSet& unenforced, 50 enforced_(enforced), unenforced_(unenforced), hidden_(hidden) {
|
/system/keymaster/include/keymaster/ |
key_blob.h | 57 KeyBlob(const AuthorizationSet& enforced, const AuthorizationSet& unenforced, 75 * Create a KeyBlob, extracting the enforced and unenforced sets, but not decrypting the key, or 116 inline const AuthorizationSet& unenforced() const { return unenforced_; } function in class:keymaster::KeyBlob
|
google_keymaster.h | 91 AuthorizationSet* unenforced); 99 AuthorizationSet* unenforced); 104 AuthorizationSet* unenforced);
|
google_keymaster_messages.h | 132 AuthorizationSet unenforced; member in struct:keymaster::GenerateKeyResponse 158 AuthorizationSet unenforced; member in struct:keymaster::GetKeyCharacteristicsResponse 260 AuthorizationSet unenforced; member in struct:keymaster::ImportKeyResponse
|
keymaster_defs.h | 291 keymaster_key_param_t* unenforced; /* NULL if unenforced_length == 0 */ member in struct:__anon81498
|