/system/keymaster/ |
ecdsa_operation.cpp | 50 *error = KM_ERROR_OK; 71 return KM_ERROR_OK; 76 return KM_ERROR_OK; 79 return KM_ERROR_OK; 82 return KM_ERROR_OK; 85 return KM_ERROR_OK; 88 return KM_ERROR_OK; 106 return KM_ERROR_OK; 112 if (error != KM_ERROR_OK) 116 return KM_ERROR_OK; [all...] |
key_blob_test.cpp | 100 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 101 ASSERT_EQ(KM_ERROR_OK, Serialize()); 115 ASSERT_EQ(KM_ERROR_OK, DeserializeAuthEncryptedBlob(serialized_blob_, &ciphertext_, &hw2, &sw2, 128 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 129 ASSERT_EQ(KM_ERROR_OK, Serialize()); 138 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 139 ASSERT_EQ(KM_ERROR_OK, Serialize()); 150 ASSERT_EQ(KM_ERROR_OK, Deserialize()); 155 ASSERT_EQ(KM_ERROR_OK, Encrypt()); 156 ASSERT_EQ(KM_ERROR_OK, Serialize()) [all...] |
key.cpp | 32 *error = KM_ERROR_OK;
|
rsa_operation.cpp | 172 return KM_ERROR_OK; 178 if (error != KM_ERROR_OK) 192 return KM_ERROR_OK; 199 return KM_ERROR_OK; 204 return KM_ERROR_OK; 207 return KM_ERROR_OK; 210 return KM_ERROR_OK; 213 return KM_ERROR_OK; 216 return KM_ERROR_OK; 219 return KM_ERROR_OK; [all...] |
keymaster_enforcement_test.cpp | 103 ASSERT_EQ(KM_ERROR_OK, kmer); 118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 129 ASSERT_EQ(KM_ERROR_OK, kmer_valid_time); 143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 156 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination); 169 ASSERT_EQ(KM_ERROR_OK, kmer_valid_origination); 198 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination); 211 ASSERT_EQ(KM_ERROR_OK, kmer_invalid_origination); 224 ASSERT_EQ(KM_ERROR_OK, kmer_valid_usage); 237 ASSERT_EQ(KM_ERROR_OK, kmer1) [all...] |
ecdsa_keymaster1_operation.h | 69 if (error != KM_ERROR_OK) 78 if (error != KM_ERROR_OK) 81 if (wrapped_operation_.GetError(super::ecdsa_key_) != KM_ERROR_OK) 83 if (error == KM_ERROR_OK) 90 if (error != KM_ERROR_OK) 98 return KM_ERROR_OK;
|
rsa_keymaster1_operation.h | 69 if (error != KM_ERROR_OK) 78 if (error != KM_ERROR_OK) 81 if (wrapped_operation_.GetError(super::rsa_key_) != KM_ERROR_OK) 83 if (error == KM_ERROR_OK) 90 if (error != KM_ERROR_OK) 98 return KM_ERROR_OK;
|
symmetric_key.cpp | 47 if (error != KM_ERROR_OK) 56 if (error != KM_ERROR_OK) { 84 if (error != KM_ERROR_OK) 114 if (*error != KM_ERROR_OK) 121 *error = KM_ERROR_OK; 138 return KM_ERROR_OK;
|
hmac_operation.cpp | 77 if (*error != KM_ERROR_OK) 94 : Operation(purpose), error_(KM_ERROR_OK), mac_length_(mac_length), 156 return KM_ERROR_OK; 160 return KM_ERROR_OK; 167 if (error != KM_ERROR_OK) 181 return KM_ERROR_OK; 190 return KM_ERROR_OK;
|
android_keymaster_test.cpp | 299 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 326 EXPECT_EQ(KM_ERROR_OK, DeleteKey()); 343 ASSERT_EQ(KM_ERROR_OK, 397 EXPECT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest( 407 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 426 EXPECT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 490 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 496 ASSERT_EQ(KM_ERROR_OK, GetCharacteristics()); 507 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder() 520 ASSERT_EQ(KM_ERROR_OK, GenerateKey(AuthorizationSetBuilder( [all...] |
ec_key_factory.cpp | 54 if (error != KM_ERROR_OK) { 59 if (error != KM_ERROR_OK) { 71 return KM_ERROR_OK; 86 if (error != KM_ERROR_OK) { 120 if (error != KM_ERROR_OK) 140 if (error != KM_ERROR_OK) 158 if (error != KM_ERROR_OK) 169 if (error != KM_ERROR_OK) 181 if (error != KM_ERROR_OK) 197 return KM_ERROR_OK; [all...] |
ec_keymaster0_key.cpp | 49 if (error != KM_ERROR_OK) { 83 if (error != KM_ERROR_OK) 118 if (error != KM_ERROR_OK) 121 return KM_ERROR_OK;
|
operation.cpp | 110 *error = KM_ERROR_OK; 134 *error = KM_ERROR_OK; 151 if (error != KM_ERROR_OK) 158 return KM_ERROR_OK;
|
android_keymaster.cpp | 63 return KM_ERROR_OK; 101 rsp->error = KM_ERROR_OK; 109 response->error = KM_ERROR_OK; 203 if (response->error == KM_ERROR_OK) 217 if (response->error != KM_ERROR_OK) 233 *error = KM_ERROR_OK; 249 if (response->error != KM_ERROR_OK) 276 if (response->error != KM_ERROR_OK) 282 if (response->error != KM_ERROR_OK) 303 if (response->error != KM_ERROR_OK) { [all...] |
aes_key.cpp | 64 keymaster_error_t error = KM_ERROR_OK; 91 return KM_ERROR_OK;
|
android_keymaster_utils.cpp | 67 return KM_ERROR_OK; 92 return KM_ERROR_OK;
|
operation_table.cpp | 44 if (error != KM_ERROR_OK) 56 return KM_ERROR_OK;
|
soft_keymaster_device.cpp | 117 if (error != KM_ERROR_OK) { 141 if (error != KM_ERROR_OK) 153 if (error != KM_ERROR_OK) 158 return KM_ERROR_OK; 191 if (error != KM_ERROR_OK) 208 return KM_ERROR_OK; 220 if (error != KM_ERROR_OK) 224 if (error != KM_ERROR_OK) 241 return KM_ERROR_OK; 426 if (response.error != KM_ERROR_OK) { [all...] |
keymaster1_engine.cpp | 89 if (error != KM_ERROR_OK) 114 if (error != KM_ERROR_OK) 126 return KM_ERROR_OK; 132 return KM_ERROR_OK; 156 if (*error != KM_ERROR_OK) 172 *error = KM_ERROR_OK; 196 if (*error != KM_ERROR_OK) 211 *error = KM_ERROR_OK; 277 if (error != KM_ERROR_OK) 300 if (key_data->error != KM_ERROR_OK) [all...] |
aes_operation.cpp | 75 return KM_ERROR_OK; 81 *error = KM_ERROR_OK; 112 if (*error != KM_ERROR_OK) { 206 return KM_ERROR_OK; 238 return KM_ERROR_OK; 344 return KM_ERROR_OK; 367 return KM_ERROR_OK; 474 if (*error != KM_ERROR_OK) 491 keymaster_error_t error = KM_ERROR_OK; 499 if (error == KM_ERROR_OK) [all...] |
ocb_utils.cpp | 65 return KM_ERROR_OK; 77 if (error != KM_ERROR_OK) 115 return KM_ERROR_OK; 134 if (error != KM_ERROR_OK) 151 return KM_ERROR_OK; 170 if (error != KM_ERROR_OK) 191 return KM_ERROR_OK;
|
attestation_record_test.cpp | 94 return KM_ERROR_OK; 114 EXPECT_EQ(KM_ERROR_OK, build_attestation_record(attest_params, sw_set, hw_set, TestContext(), 132 EXPECT_EQ(KM_ERROR_OK,
|
auth_encrypted_key_blob.cpp | 54 return KM_ERROR_OK; 79 return KM_ERROR_OK; 134 return KM_ERROR_OK;
|
/system/core/trusty/keymaster/ |
trusty_keymaster_device.cpp | 50 return KM_ERROR_OK; 171 if (error_ != KM_ERROR_OK) { 188 if (err != KM_ERROR_OK) { 192 return KM_ERROR_OK; 198 if (error_ != KM_ERROR_OK) { 213 if (error_ != KM_ERROR_OK) { 229 if (err != KM_ERROR_OK) { 245 return KM_ERROR_OK; 253 if (error_ != KM_ERROR_OK) { 269 if (err != KM_ERROR_OK) { [all...] |
/device/generic/goldfish/keymaster/ |
trusty_keymaster_device.cpp | 51 return KM_ERROR_OK; 165 if (error_ != KM_ERROR_OK) { 188 if (error_ != KM_ERROR_OK) { 203 if (error_ != KM_ERROR_OK) { 219 if (err != KM_ERROR_OK) { 236 return KM_ERROR_OK; 244 if (error_ != KM_ERROR_OK) { 260 if (err != KM_ERROR_OK) { 267 return KM_ERROR_OK; 276 if (error_ != KM_ERROR_OK) { [all...] |