HomeSort by relevance Sort by last modified time
    Searched refs:GetTagValue (Results 1 - 24 of 24) sorted by null

  /system/keymaster/
hmac_key.cpp 51 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) &&
52 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) {
67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits))
71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) {
aes_key.cpp 56 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) &&
57 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) {
75 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length))
rsa_key_factory.cpp 62 if (!authorizations.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) {
68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
144 if (!updated_description->GetTagValue(TAG_RSA_PUBLIC_EXPONENT, public_exponent))
153 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size))
162 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm))
ecies_kem.cpp 27 if (!authorizations.GetTagValue(TAG_EC_CURVE, &curve_)) {
46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) {
65 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bytes_to_generate_)) {
71 single_hash_mode_ = authorizations.GetTagValue(TAG_ECIES_SINGLE_HASH_MODE);
ec_key_factory.cpp 47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) {
49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) {
63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) &&
173 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size_bits))
179 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm))
hmac_operation.cpp 40 if (!key.authorizations().GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) {
47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) {
61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) {
authorization_set_test.cpp 89 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &int_val));
93 EXPECT_TRUE(set.GetTagValue(TAG_APPLICATION_ID, &blob_val));
430 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &val));
434 EXPECT_FALSE(set.GetTagValue(TAG_KEY_SIZE, &val));
450 EXPECT_TRUE(set1.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val));
454 EXPECT_FALSE(set2.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val));
472 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 0, &val));
474 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 1, &val));
478 EXPECT_FALSE(set2.GetTagValue(TAG_USER_SECURE_ID, &val));
492 EXPECT_TRUE(set.GetTagValue(TAG_ALGORITHM, &val))
    [all...]
operation.cpp 92 if (!begin_params.GetTagValue(TAG_PADDING, padding)) {
117 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) {
rsa_keymaster0_key.cpp 44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) {
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
symmetric_key.cpp 42 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) ||
77 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size_bits)) {
asymmetric_key.cpp 270 if ((!sw_enforced.GetTagValue(TAG_ALGORITHM, &sign_algorithm) &&
271 !tee_enforced.GetTagValue(TAG_ALGORITHM, &sign_algorithm)))
312 authorizations().GetTagValue(TAG_ACTIVE_DATETIME, &activeDateTime);
319 authorizations().GetTagValue(TAG_USAGE_EXPIRE_DATETIME, &usageExpireDateTime);
android_keymaster.cpp 55 if (tee_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel) ||
56 sw_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel)) {
194 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
228 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, algorithm) &&
229 !sw_enforced.GetTagValue(TAG_ALGORITHM, algorithm))
254 if (!key->authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm))
428 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
aes_operation.cpp 55 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) {
60 if (!key_params.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length_bits)) {
95 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) {
127 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE);
349 if (!input_params.GetTagValue(TAG_NONCE, &iv_blob)) {
383 if (input_params.GetTagValue(TAG_ASSOCIATED_DATA, &aad)) {
attestation_record.cpp 409 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) {
478 if (!attestation_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge))
494 if (tee_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) {
498 if (!sw_enforced.GetTagValue(TAG_CREATION_DATETIME, &creation_datetime)) {
504 sw_enforced.GetTagValue(TAG_APPLICATION_ID, &application_id);
509 attestation_params.GetTagValue(TAG_RESET_SINCE_ID_ROTATION), &unique_id);
keymaster1_engine.cpp 369 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id))
371 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data))
keymaster_enforcement.cpp 80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) &&
441 if (!operation_params.GetTagValue(TAG_AUTH_TOKEN, &auth_token_blob)) {
soft_keymaster_device.cpp 355 if (in_params.GetTagValue(TAG_APPLICATION_ID, &client_id))
357 if (in_params.GetTagValue(TAG_APPLICATION_DATA, &app_data))
610 if (!params_copy.GetTagValue(TAG_OS_VERSION, &os_version) ||
611 !params_copy.GetTagValue(TAG_OS_PATCHLEVEL, &os_patchlevel)) {
714 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) {
    [all...]
android_keymaster_test_utils.cpp 479 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob));
510 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob));
529 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob));
    [all...]
soft_keymaster_context.cpp     [all...]
android_keymaster_test.cpp     [all...]
  /system/security/keystore/
keystore_client_impl.cpp 103 if (!output_params.GetTagValue(keymaster::TAG_NONCE, &init_vector_blob)) {
477 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) &&
478 !software_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm)) ||
484 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size) &&
485 !software_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size)) ||
491 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_BLOCK_MODE, &block_mode) &&
492 !software_enforced_characteristics.GetTagValue(keymaster::TAG_BLOCK_MODE, &block_mode)) ||
498 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_PADDING, &padding_mode) &&
499 !software_enforced_characteristics.GetTagValue(keymaster::TAG_PADDING, &padding_mode)) ||
522 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) &
    [all...]
auth_token_table.cpp 74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type);
136 key_info.GetTagValue(TAG_AUTH_TIMEOUT, &timeout);
  /system/keymaster/include/keymaster/
authorization_set.h 246 inline bool GetTagValue(TypedTag<KM_UINT, T> tag, uint32_t* val) const {
256 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, uint32_t* val) const {
265 inline bool GetTagValue(TypedTag<KM_ULONG, T> tag, uint64_t* val) const {
275 bool GetTagValue(TypedTag<KM_ULONG_REP, Tag> tag, size_t instance, uint64_t* val) const {
284 bool GetTagValue(TypedEnumTag<KM_ENUM, Tag, T> tag, T* val) const {
294 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, size_t instance, T* val) const {
304 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T* val) const {
315 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance,
325 bool GetTagValue(TypedTag<KM_BYTES, Tag> tag, keymaster_blob_t* val) const {
334 bool GetTagValue(TypedTag<KM_BIGNUM, Tag> tag, keymaster_blob_t* val) const
    [all...]
  /system/vold/
KeyStorage.cpp 147 if (!outParams.GetTagValue(keymaster::TAG_NONCE, &nonceBlob)) {

Completed in 400 milliseconds