HomeSort by relevance Sort by last modified time
    Searched defs:tee_enforced (Results 1 - 3 of 3) sorted by null

  /hardware/interfaces/keymaster/3.0/vts/functional/
attestation_record.cpp 126 KM_AUTH_LIST* tee_enforced; member in struct:android::hardware::keymaster::V3_0::km_key_description
138 ASN1_SIMPLE(KM_KEY_DESCRIPTION, tee_enforced, KM_AUTH_LIST),
256 // attestation_challenge, software_enforced, tee_enforced and unique_id.
264 AuthorizationSet* tee_enforced, //
287 return extract_auth_list(record->tee_enforced, tee_enforced);
  /system/keymaster/
attestation_record.cpp 153 KM_AUTH_LIST* tee_enforced; member in struct:keymaster::km_key_description
165 ASN1_SIMPLE(KM_KEY_DESCRIPTION, tee_enforced, KM_AUTH_LIST),
476 // tee_enforced.
479 AuthorizationSet tee_enforced,
491 if (tee_enforced.empty()) {
502 KM_AUTH_LIST* tee_record = key_desc->tee_enforced;
523 // have the purpose in the tee_enforced list. It's possible that a key could be created
527 keymaster_version = tee_enforced.Contains(TAG_PURPOSE) ? 1 : 0;
554 keymaster_security_level == KM_SECURITY_LEVEL_SOFTWARE ? &sw_enforced : &tee_enforced);
571 error = build_auth_list(tee_enforced, key_desc->tee_enforced)
    [all...]
soft_keymaster_context.cpp 470 AuthorizationSet tee_enforced; local
473 ParseKeyBlob(key_to_upgrade, upgrade_params, &key_material, &tee_enforced, &sw_enforced);
489 if (km1_dev_ && tee_enforced.Contains(TAG_PURPOSE) && !tee_enforced.Contains(TAG_OS_PATCHLEVEL))
522 return SerializeIntegrityAssuredBlob(key_material, hidden, tee_enforced, sw_enforced,
    [all...]

Completed in 439 milliseconds