OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:KeymasterEnforcement
(Results
1 - 11
of
11
) sorted by null
/system/security/keystore/
keystore_keymaster_enforcement.h
26
* This is a specialization of the
KeymasterEnforcement
class to be used by Keystore to enforce
29
class KeystoreKeymasterEnforcement : public
KeymasterEnforcement
{
31
KeystoreKeymasterEnforcement() :
KeymasterEnforcement
(64, 64) {}
keymaster_enforcement.h
39
class
KeymasterEnforcement
{
42
* Construct a
KeymasterEnforcement
.
44
KeymasterEnforcement
(uint32_t max_access_time_map_size, uint32_t max_access_count_map_size);
45
virtual ~
KeymasterEnforcement
();
keymaster_enforcement.cpp
105
KeymasterEnforcement
::
KeymasterEnforcement
(uint32_t max_access_time_map_size,
110
KeymasterEnforcement
::~
KeymasterEnforcement
() {
115
ErrorCode
KeymasterEnforcement
::AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid,
143
ErrorCode
KeymasterEnforcement
::AuthorizeUpdateOrFinish(const AuthorizationSet& auth_set,
189
ErrorCode
KeymasterEnforcement
::AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid,
406
bool
KeymasterEnforcement
::CreateKeyId(const hidl_vec<uint8_t>& key_blob, km_id_t* keyid) {
422
bool
KeymasterEnforcement
::MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid) {
430
bool
KeymasterEnforcement
::MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses)
[
all
...]
/system/keymaster/include/keymaster/
keymaster_enforcement.h
39
class
KeymasterEnforcement
{
42
* Construct a
KeymasterEnforcement
.
44
KeymasterEnforcement
(uint32_t max_access_time_map_size, uint32_t max_access_count_map_size);
45
virtual ~
KeymasterEnforcement
();
keymaster_context.h
160
virtual
KeymasterEnforcement
* enforcement_policy() = 0;
soft_keymaster_context.h
91
KeymasterEnforcement
* enforcement_policy() override {
/system/keymaster/
keymaster_enforcement.cpp
108
KeymasterEnforcement
::
KeymasterEnforcement
(uint32_t max_access_time_map_size,
113
KeymasterEnforcement
::~
KeymasterEnforcement
() {
118
keymaster_error_t
KeymasterEnforcement
::AuthorizeOperation(const keymaster_purpose_t purpose,
147
KeymasterEnforcement
::AuthorizeUpdateOrFinish(const AuthorizationSet& auth_set,
192
keymaster_error_t
KeymasterEnforcement
::AuthorizeBegin(const keymaster_purpose_t purpose,
404
bool
KeymasterEnforcement
::CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid) {
420
bool
KeymasterEnforcement
::MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid) {
430
bool
KeymasterEnforcement
::MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses)
[
all
...]
attestation_record_test.cpp
80
KeymasterEnforcement
* enforcement_policy() { return nullptr; }
keymaster_enforcement_test.cpp
30
class TestKeymasterEnforcement : public
KeymasterEnforcement
{
33
:
KeymasterEnforcement
(3, 3), current_time_(10000), report_token_valid_(true) {}
38
return
KeymasterEnforcement
::AuthorizeOperation(
41
using
KeymasterEnforcement
::AuthorizeOperation;
[
all
...]
android_keymaster_test.cpp
64
*
KeymasterEnforcement
class for use in testing. It's permissive in the sense that it doesn't
68
class TestKeymasterEnforcement : public
KeymasterEnforcement
{
70
TestKeymasterEnforcement() :
KeymasterEnforcement
(3, 3) {}
91
KeymasterEnforcement
* enforcement_policy() override { return &test_policy_; }
[
all
...]
/hardware/interfaces/keymaster/3.0/default/
KeymasterDevice.cpp
36
class SoftwareOnlyHidlKeymasterEnforcement : public ::keymaster::
KeymasterEnforcement
{
38
SoftwareOnlyHidlKeymasterEnforcement() :
KeymasterEnforcement
(64, 64) {}
57
::keymaster::
KeymasterEnforcement
* enforcement_policy() override { return enforcement_.get(); }
60
std::unique_ptr<::keymaster::
KeymasterEnforcement
> enforcement_;
Completed in 158 milliseconds