/system/keymaster/ |
ecdsa_operation.cpp | 50 *error = KM_ERROR_OK; 71 return KM_ERROR_OK; 76 return KM_ERROR_OK; 79 return KM_ERROR_OK; 82 return KM_ERROR_OK; 85 return KM_ERROR_OK; 88 return KM_ERROR_OK; 106 return KM_ERROR_OK; 112 if (error != KM_ERROR_OK) 116 return KM_ERROR_OK; [all...] |
key_blob_test.cpp | 100 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 101 ASSERT_EQ(KM_ERROR_OK, Serialize()); 115 ASSERT_EQ(KM_ERROR_OK, DeserializeAuthEncryptedBlob(serialized_blob_, &ciphertext_, &hw2, &sw2, 128 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 129 ASSERT_EQ(KM_ERROR_OK, Serialize()); 138 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 139 ASSERT_EQ(KM_ERROR_OK, Serialize()); 150 ASSERT_EQ(KM_ERROR_OK, Deserialize()); 155 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 156 ASSERT_EQ(KM_ERROR_OK, Serialize()) [all...] |
key.cpp | 32 *error = KM_ERROR_OK;
|
rsa_operation.cpp | 172 return KM_ERROR_OK; 178 if (error != KM_ERROR_OK) 192 return KM_ERROR_OK; 199 return KM_ERROR_OK; 204 return KM_ERROR_OK; 207 return KM_ERROR_OK; 210 return KM_ERROR_OK; 213 return KM_ERROR_OK; 216 return KM_ERROR_OK; 219 return KM_ERROR_OK; [all...] |
keymaster_enforcement_test.cpp | 103 ASSERT_EQ(KM_ERROR_OK, kmer); 118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 129 ASSERT_EQ(KM_ERROR_OK, kmer_valid_time); 143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 156 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination); 169 ASSERT_EQ(KM_ERROR_OK, kmer_valid_origination); 198 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination); 211 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination); 224 ASSERT_EQ(KM_ERROR_OK, kmer_valid_usage); 237 ASSERT_EQ(KM_ERROR_OK, kmer1) [all...] |
symmetric_key.cpp | 47 if (error != KM_ERROR_OK) 56 if (error != KM_ERROR_OK) { 84 if (error != KM_ERROR_OK) 114 if (*error != KM_ERROR_OK) 121 *error = KM_ERROR_OK; 138 return KM_ERROR_OK;
|
ecdsa_keymaster1_operation.h | 67 if (error != KM_ERROR_OK) 76 if (error != KM_ERROR_OK) 79 if (wrapped_operation_.GetError(super::ecdsa_key_) != KM_ERROR_OK) 81 if (error == KM_ERROR_OK) 88 if (error != KM_ERROR_OK)
|
rsa_keymaster1_operation.h | 67 if (error != KM_ERROR_OK) 76 if (error != KM_ERROR_OK) 79 if (wrapped_operation_.GetError(super::rsa_key_) != KM_ERROR_OK) 81 if (error == KM_ERROR_OK) 88 if (error != KM_ERROR_OK)
|
android_keymaster_test.cpp | 255 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 282 EXPECT_EQ(KM_ERROR_OK, DeleteKey()); 299 ASSERT_EQ(KM_ERROR_OK, 353 EXPECT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest( 363 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 426 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 432 ASSERT_EQ(KM_ERROR_OK, GetCharacteristics()); 443 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 456 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 470 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder( [all...] |
hmac_operation.cpp | 77 if (*error != KM_ERROR_OK) 94 : Operation(purpose), error_(KM_ERROR_OK), mac_length_(mac_length), 156 return KM_ERROR_OK; 160 return KM_ERROR_OK; 167 if (error != KM_ERROR_OK) 181 return KM_ERROR_OK; 190 return KM_ERROR_OK;
|
ec_key_factory.cpp | 54 if (error != KM_ERROR_OK) { 59 if (error != KM_ERROR_OK) { 71 return KM_ERROR_OK; 86 if (error != KM_ERROR_OK) { 120 if (error != KM_ERROR_OK) 140 if (error != KM_ERROR_OK) 158 if (error != KM_ERROR_OK) 169 if (error != KM_ERROR_OK) 184 return KM_ERROR_OK;
|
ec_keymaster0_key.cpp | 49 if (error != KM_ERROR_OK) { 83 if (error != KM_ERROR_OK) 118 if (error != KM_ERROR_OK) 121 return KM_ERROR_OK;
|
operation.cpp | 109 *error = KM_ERROR_OK; 133 *error = KM_ERROR_OK; 145 if (error != KM_ERROR_OK) 152 return KM_ERROR_OK;
|
android_keymaster.cpp | 63 return KM_ERROR_OK; 101 rsp->error = KM_ERROR_OK; 109 response->error = KM_ERROR_OK; 203 if (response->error == KM_ERROR_OK) 217 if (response->error != KM_ERROR_OK) 233 *error = KM_ERROR_OK; 249 if (response->error != KM_ERROR_OK) 276 if (response->error != KM_ERROR_OK) 282 if (response->error != KM_ERROR_OK) 303 if (response->error != KM_ERROR_OK) { [all...] |
aes_key.cpp | 64 keymaster_error_t error = KM_ERROR_OK; 91 return KM_ERROR_OK;
|
android_keymaster_utils.cpp | 67 return KM_ERROR_OK; 92 return KM_ERROR_OK;
|
soft_keymaster_device.cpp | 92 if (error != KM_ERROR_OK) { 99 return KM_ERROR_OK; 111 if (error != KM_ERROR_OK) 120 if (error != KM_ERROR_OK) 124 return KM_ERROR_OK; 156 if (error != KM_ERROR_OK) 173 return KM_ERROR_OK; 184 if (error != KM_ERROR_OK) 188 if (error != KM_ERROR_OK) 205 return KM_ERROR_OK; [all...] |
aes_operation.cpp | 75 return KM_ERROR_OK; 81 *error = KM_ERROR_OK; 112 if (*error != KM_ERROR_OK) { 206 return KM_ERROR_OK; 238 return KM_ERROR_OK; 344 return KM_ERROR_OK; 367 return KM_ERROR_OK; 474 if (*error != KM_ERROR_OK) 491 keymaster_error_t error = KM_ERROR_OK; 499 if (error == KM_ERROR_OK) [all...] |
ocb_utils.cpp | 65 return KM_ERROR_OK; 77 if (error != KM_ERROR_OK) 115 return KM_ERROR_OK; 134 if (error != KM_ERROR_OK) 151 return KM_ERROR_OK; 170 if (error != KM_ERROR_OK) 191 return KM_ERROR_OK;
|
attestation_record_test.cpp | 94 return KM_ERROR_OK; 112 EXPECT_EQ(KM_ERROR_OK, build_attestation_record(attest_params, sw_set, hw_set, TestContext(), 130 EXPECT_EQ(KM_ERROR_OK,
|
auth_encrypted_key_blob.cpp | 54 return KM_ERROR_OK; 79 return KM_ERROR_OK; 134 return KM_ERROR_OK;
|
nist_curve_key_exchange.cpp | 64 if (error != KM_ERROR_OK) { 74 if (error != KM_ERROR_OK) 85 return KM_ERROR_OK;
|
openssl_utils.cpp | 42 return KM_ERROR_OK; 103 return KM_ERROR_OK; 128 return KM_ERROR_OK;
|
rsa_keymaster0_key.cpp | 83 if (error != KM_ERROR_OK) 122 if (error != KM_ERROR_OK) 125 return KM_ERROR_OK;
|
/system/keymaster/include/keymaster/ |
keymaster_context.h | 135 return KM_ERROR_OK; 141 virtual keymaster_error_t DeleteAllKeys() const { return KM_ERROR_OK; }
|