HomeSort by relevance Sort by last modified time
    Searched refs:KM_ERROR_OK (Results 1 - 25 of 58) sorted by null

1 2 3

  /system/keymaster/
ecdsa_operation.cpp 50 *error = KM_ERROR_OK;
71 return KM_ERROR_OK;
76 return KM_ERROR_OK;
79 return KM_ERROR_OK;
82 return KM_ERROR_OK;
85 return KM_ERROR_OK;
88 return KM_ERROR_OK;
106 return KM_ERROR_OK;
112 if (error != KM_ERROR_OK)
116 return KM_ERROR_OK;
    [all...]
key_blob_test.cpp 100 ASSERT_EQ(KM_ERROR_OK, Encrypt());
101 ASSERT_EQ(KM_ERROR_OK, Serialize());
115 ASSERT_EQ(KM_ERROR_OK, DeserializeAuthEncryptedBlob(serialized_blob_, &ciphertext_, &hw2, &sw2,
128 ASSERT_EQ(KM_ERROR_OK, Encrypt());
129 ASSERT_EQ(KM_ERROR_OK, Serialize());
138 ASSERT_EQ(KM_ERROR_OK, Encrypt());
139 ASSERT_EQ(KM_ERROR_OK, Serialize());
150 ASSERT_EQ(KM_ERROR_OK, Deserialize());
155 ASSERT_EQ(KM_ERROR_OK, Encrypt());
156 ASSERT_EQ(KM_ERROR_OK, Serialize())
    [all...]
key.cpp 32 *error = KM_ERROR_OK;
rsa_operation.cpp 172 return KM_ERROR_OK;
178 if (error != KM_ERROR_OK)
192 return KM_ERROR_OK;
199 return KM_ERROR_OK;
204 return KM_ERROR_OK;
207 return KM_ERROR_OK;
210 return KM_ERROR_OK;
213 return KM_ERROR_OK;
216 return KM_ERROR_OK;
219 return KM_ERROR_OK;
    [all...]
keymaster_enforcement_test.cpp 103 ASSERT_EQ(KM_ERROR_OK, kmer);
118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
129 ASSERT_EQ(KM_ERROR_OK, kmer_valid_time);
143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
156 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination);
169 ASSERT_EQ(KM_ERROR_OK, kmer_valid_origination);
198 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination);
211 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination);
224 ASSERT_EQ(KM_ERROR_OK, kmer_valid_usage);
237 ASSERT_EQ(KM_ERROR_OK, kmer1)
    [all...]
symmetric_key.cpp 47 if (error != KM_ERROR_OK)
56 if (error != KM_ERROR_OK) {
84 if (error != KM_ERROR_OK)
114 if (*error != KM_ERROR_OK)
121 *error = KM_ERROR_OK;
138 return KM_ERROR_OK;
ecdsa_keymaster1_operation.h 67 if (error != KM_ERROR_OK)
76 if (error != KM_ERROR_OK)
79 if (wrapped_operation_.GetError(super::ecdsa_key_) != KM_ERROR_OK)
81 if (error == KM_ERROR_OK)
88 if (error != KM_ERROR_OK)
rsa_keymaster1_operation.h 67 if (error != KM_ERROR_OK)
76 if (error != KM_ERROR_OK)
79 if (wrapped_operation_.GetError(super::rsa_key_) != KM_ERROR_OK)
81 if (error == KM_ERROR_OK)
88 if (error != KM_ERROR_OK)
android_keymaster_test.cpp 255 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder()
282 EXPECT_EQ(KM_ERROR_OK, DeleteKey());
299 ASSERT_EQ(KM_ERROR_OK,
353 EXPECT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest(
363 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder()
426 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder()
432 ASSERT_EQ(KM_ERROR_OK, GetCharacteristics());
443 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder()
456 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder()
470 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder(
    [all...]
hmac_operation.cpp 77 if (*error != KM_ERROR_OK)
94 : Operation(purpose), error_(KM_ERROR_OK), mac_length_(mac_length),
156 return KM_ERROR_OK;
160 return KM_ERROR_OK;
167 if (error != KM_ERROR_OK)
181 return KM_ERROR_OK;
190 return KM_ERROR_OK;
ec_key_factory.cpp 54 if (error != KM_ERROR_OK) {
59 if (error != KM_ERROR_OK) {
71 return KM_ERROR_OK;
86 if (error != KM_ERROR_OK) {
120 if (error != KM_ERROR_OK)
140 if (error != KM_ERROR_OK)
158 if (error != KM_ERROR_OK)
169 if (error != KM_ERROR_OK)
184 return KM_ERROR_OK;
ec_keymaster0_key.cpp 49 if (error != KM_ERROR_OK) {
83 if (error != KM_ERROR_OK)
118 if (error != KM_ERROR_OK)
121 return KM_ERROR_OK;
operation.cpp 109 *error = KM_ERROR_OK;
133 *error = KM_ERROR_OK;
145 if (error != KM_ERROR_OK)
152 return KM_ERROR_OK;
android_keymaster.cpp 63 return KM_ERROR_OK;
101 rsp->error = KM_ERROR_OK;
109 response->error = KM_ERROR_OK;
203 if (response->error == KM_ERROR_OK)
217 if (response->error != KM_ERROR_OK)
233 *error = KM_ERROR_OK;
249 if (response->error != KM_ERROR_OK)
276 if (response->error != KM_ERROR_OK)
282 if (response->error != KM_ERROR_OK)
303 if (response->error != KM_ERROR_OK) {
    [all...]
aes_key.cpp 64 keymaster_error_t error = KM_ERROR_OK;
91 return KM_ERROR_OK;
android_keymaster_utils.cpp 67 return KM_ERROR_OK;
92 return KM_ERROR_OK;
soft_keymaster_device.cpp 92 if (error != KM_ERROR_OK) {
99 return KM_ERROR_OK;
111 if (error != KM_ERROR_OK)
120 if (error != KM_ERROR_OK)
124 return KM_ERROR_OK;
156 if (error != KM_ERROR_OK)
173 return KM_ERROR_OK;
184 if (error != KM_ERROR_OK)
188 if (error != KM_ERROR_OK)
205 return KM_ERROR_OK;
    [all...]
aes_operation.cpp 75 return KM_ERROR_OK;
81 *error = KM_ERROR_OK;
112 if (*error != KM_ERROR_OK) {
206 return KM_ERROR_OK;
238 return KM_ERROR_OK;
344 return KM_ERROR_OK;
367 return KM_ERROR_OK;
474 if (*error != KM_ERROR_OK)
491 keymaster_error_t error = KM_ERROR_OK;
499 if (error == KM_ERROR_OK)
    [all...]
ocb_utils.cpp 65 return KM_ERROR_OK;
77 if (error != KM_ERROR_OK)
115 return KM_ERROR_OK;
134 if (error != KM_ERROR_OK)
151 return KM_ERROR_OK;
170 if (error != KM_ERROR_OK)
191 return KM_ERROR_OK;
attestation_record_test.cpp 94 return KM_ERROR_OK;
112 EXPECT_EQ(KM_ERROR_OK, build_attestation_record(attest_params, sw_set, hw_set, TestContext(),
130 EXPECT_EQ(KM_ERROR_OK,
auth_encrypted_key_blob.cpp 54 return KM_ERROR_OK;
79 return KM_ERROR_OK;
134 return KM_ERROR_OK;
nist_curve_key_exchange.cpp 64 if (error != KM_ERROR_OK) {
74 if (error != KM_ERROR_OK)
85 return KM_ERROR_OK;
openssl_utils.cpp 42 return KM_ERROR_OK;
103 return KM_ERROR_OK;
128 return KM_ERROR_OK;
rsa_keymaster0_key.cpp 83 if (error != KM_ERROR_OK)
122 if (error != KM_ERROR_OK)
125 return KM_ERROR_OK;
  /system/keymaster/include/keymaster/
keymaster_context.h 135 return KM_ERROR_OK;
141 virtual keymaster_error_t DeleteAllKeys() const { return KM_ERROR_OK; }

Completed in 800 milliseconds

1 2 3