/system/keymaster/tests/ |
authorization_set_test.cpp | 30 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY), 31 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), Authorization(TAG_USER_ID, 7), 32 Authorization(TAG_USER_AUTH_TYPE, HW_AUTH_PASSWORD), 33 Authorization(TAG_APPLICATION_ID, "my_app", 6), Authorization(TAG_KEY_SIZE, 256), 34 Authorization(TAG_AUTH_TIMEOUT, 300), 42 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY) [all...] |
keymaster_enforcement_test.cpp | 81 sign_param = Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN); 110 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), 111 Authorization(TAG_NO_AUTH_REQUIRED), Authorization(TAG_ACTIVE_DATETIME, future_time), 126 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), Authorization(TAG_ACTIVE_DATETIME, past_time), 138 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), 139 Authorization(TAG_ORIGINATION_EXPIRE_DATETIME, past_time) [all...] |
attestation_record_test.cpp | 48 .Authorization(TAG_OS_VERSION, 60000) 49 .Authorization(TAG_OS_PATCHLEVEL, 201512) 50 .Authorization(TAG_APPLICATION_ID, "bar", 3)); 51 AuthorizationSet sw_set(AuthorizationSetBuilder().Authorization(TAG_ACTIVE_DATETIME, 10)); 57 .Authorization(TAG_ATTESTATION_CHALLENGE, "hello", 5) 58 .Authorization(TAG_ATTESTATION_APPLICATION_ID, "hello again", 11));
|
ecies_kem_test.cpp | 46 .Authorization(TAG_EC_CURVE, curve) 47 .Authorization(TAG_KDF, KM_KDF_RFC5869_SHA256) 48 .Authorization(TAG_ECIES_SINGLE_HASH_MODE) 49 .Authorization(TAG_KEY_SIZE, kKeyLen));
|
android_keymaster_test.cpp | 120 .Authorization(TAG_OS_VERSION, kOsVersion) 121 .Authorization(TAG_OS_PATCHLEVEL, kOsPatchLevel)); 154 .Authorization(TAG_OS_VERSION, kOsVersion) 155 .Authorization(TAG_OS_PATCHLEVEL, kOsPatchLevel)); 189 .Authorization(TAG_OS_VERSION, kOsVersion) 190 .Authorization(TAG_OS_PATCHLEVEL, kOsPatchLevel)); 286 .Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA) 287 .Authorization(TAG_RSA_PUBLIC_EXPONENT, 3) 324 .Authorization(TAG_ALGORITHM, KM_ALGORITHM_EC) 341 .Authorization(TAG_EC_CURVE, KM_EC_CURVE_P_256 [all...] |
nist_curve_key_exchange_test.cpp | 44 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve)); 82 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve)); 114 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve));
|
android_keymaster_messages_test.cpp | 120 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), 121 Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY), 122 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), 123 Authorization(TAG_USER_ID, 7), 124 Authorization(TAG_USER_AUTH_TYPE, HW_AUTH_PASSWORD), 125 Authorization(TAG_APPLICATION_ID, "app_id", 6), 126 Authorization(TAG_AUTH_TIMEOUT, 300), 216 msg.output_params.push_back(Authorization(TAG_NONCE, "foo", 3));
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthorizationList.java | 42 public class AuthorizationList extends SIPHeaderList<Authorization> { 60 super(Authorization.class, Authorization.NAME);
|
Authorization.java | 36 * Authorization SIP header. 45 public class Authorization 56 public Authorization() {
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
AuthorizationParser.java | 32 * Parser for authorization headers. 45 * @param authorization Authorization message to parse 47 public AuthorizationParser(String authorization) { 48 super(authorization); 61 * @return SIPHeader (Authorization object) 67 headerName(TokenTypes.AUTHORIZATION); 68 Authorization auth = new Authorization();
|
/system/keymaster/ng/include/ |
authorization_set.h | 76 * Clear existing authorization set data 192 * In this case "val" is omitted. This condition is checked at compile time by Authorization() 196 push_back(Authorization(tag, std::forward<Value>(val)...)); 225 AuthorizationSetBuilder& Authorization(TagType ttag, ValueType&&... value) { 231 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const uint8_t* data, 240 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const char* data, 242 return Authorization(ttag, reinterpret_cast<const uint8_t*>(data), data_length); 261 return Authorization(TAG_DIGEST, digest); 265 return Authorization(TAG_PADDING, padding); 271 Authorization(TAG_ALGORITHM, Algorithm::RSA) [all...] |
/hardware/interfaces/keymaster/3.0/vts/functional/ |
authorization_set.h | 80 * Clear existing authorization set data 210 * In this case "val" is omitted. This condition is checked at compile time by Authorization() 213 push_back(Authorization(tag, std::forward<Value>(val)...)); 245 AuthorizationSetBuilder& Authorization(TagType ttag, ValueType&&... value) { 251 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const uint8_t* data, 260 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const char* data, 262 return Authorization(ttag, reinterpret_cast<const uint8_t*>(data), data_length); 316 Authorization(TAG_ALGORITHM, Algorithm::RSA); 317 Authorization(TAG_KEY_SIZE, key_size); 318 Authorization(TAG_RSA_PUBLIC_EXPONENT, public_exponent) [all...] |
keymaster_hidl_hal_test.cpp | 359 // Attestations don't contain everything in key authorization lists, so we need to filter 470 AuthorizationSet UserAuths() { return AuthorizationSetBuilder().Authorization(TAG_USER_ID, 7); } 779 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); 787 .Authorization(TAG_NO_AUTH_REQUIRED) 789 .Authorization(TAG_MIN_MAC_LENGTH, expected_mac.size() * 8) 801 .Authorization(TAG_NO_AUTH_REQUIRED) 804 .Authorization(TAG_CALLER_NONCE) 809 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) [all...] |
/system/keymaster/include/keymaster/ |
authorization_set.h | 107 * Clear existing authorization set data 388 return push_back(Authorization(tag, val)); 395 return push_back(Authorization(tag)); 427 return push_back(Authorization(tag, val)); 432 return push_back(Authorization(tag, bytes, bytes_len)); 483 AuthorizationSetBuilder& Authorization(TagType tag, ValueType value) { 489 AuthorizationSetBuilder& Authorization(TypedTag<KM_BOOL, Tag> tag) { 495 AuthorizationSetBuilder& Authorization(TypedTag<KM_INVALID, Tag> tag) { 503 AuthorizationSetBuilder& Authorization(TypedTag<KM_BYTES, Tag> tag, const uint8_t* data, 510 AuthorizationSetBuilder& Authorization(TypedTag<KM_BYTES, Tag> tag, const char* data [all...] |
keymaster_tags.h | 42 * very useful example is the overloaded "Authorization" function defined below, which takes tag and 199 // Overloaded function "Authorization" to create keymaster_key_param_t objects for all of tags. 203 inline keymaster_key_param_t Authorization(TypedTag<KM_BOOL, Tag> tag) { 208 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT, Tag> tag, uint32_t value) { 213 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT_REP, Tag> tag, uint32_t value) { 218 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG, Tag> tag, uint64_t value) { 223 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG_REP, Tag> tag, uint64_t value) { 228 inline keymaster_key_param_t Authorization(TypedTag<KM_DATE, Tag> tag, uint64_t value) { 233 inline keymaster_key_param_t Authorization(TypedTag<KM_BYTES, Tag> tag, const void* bytes, 239 inline keymaster_key_param_t Authorization(TypedTag<KM_BYTES, Tag> tag [all...] |
/hardware/interfaces/keymaster/4.0/vts/functional/ |
keymaster_hidl_hal_test.cpp | 246 // Attestations don't contain everything in key authorization lists, so we need to filter 433 .Authorization(TAG_ALGORITHM, Algorithm::RSA) 434 .Authorization(TAG_RSA_PUBLIC_EXPONENT, 3U) 479 .Authorization(TAG_ALGORITHM, Algorithm::EC) 515 .Authorization(TAG_EC_CURVE, EcCurve::P_256) 564 GenerateKey(AuthorizationSetBuilder().HmacKey(key_size).Digest(digest).Authorization( 604 .Authorization(TAG_MIN_MAC_LENGTH, 256))) 611 .Authorization(TAG_MIN_MAC_LENGTH, 256))) 637 .Authorization(TAG_MIN_MAC_LENGTH, min_mac_length))) 645 .Authorization(TAG_MIN_MAC_LENGTH, min_mac_length)) [all...] |
KeymasterHidlTest.cpp | 426 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); 434 .Authorization(TAG_NO_AUTH_REQUIRED) 436 .Authorization(TAG_MIN_MAC_LENGTH, expected_mac.size() * 8) 451 .Authorization(TAG_NO_AUTH_REQUIRED) 454 .Authorization(TAG_CALLER_NONCE) 459 .Authorization(TAG_NONCE, nonce.data(), nonce.size()) 474 .Authorization(TAG_NO_AUTH_REQUIRED) 476 if (iv.size()) authset.Authorization(TAG_CALLER_NONCE); 479 if (iv.size()) begin_params.Authorization(TAG_NONCE, iv.data(), iv.size()); 566 .Authorization(TAG_NONCE, iv_in) [all...] |
/hardware/interfaces/keymaster/4.0/support/ |
authorization_set.cpp | 421 Authorization(TAG_ALGORITHM, Algorithm::RSA); 422 Authorization(TAG_KEY_SIZE, key_size); 423 Authorization(TAG_RSA_PUBLIC_EXPONENT, public_exponent); 428 Authorization(TAG_ALGORITHM, Algorithm::EC); 429 Authorization(TAG_KEY_SIZE, key_size); 434 Authorization(TAG_ALGORITHM, Algorithm::EC); 435 Authorization(TAG_EC_CURVE, curve); 440 Authorization(TAG_ALGORITHM, Algorithm::AES); 441 return Authorization(TAG_KEY_SIZE, key_size); 445 Authorization(TAG_ALGORITHM, Algorithm::TRIPLE_DES) [all...] |
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
authorization_set.h | 79 * Clear existing authorization set data 197 * In this case "val" is omitted. This condition is checked at compile time by Authorization() 201 push_back(Authorization(tag, std::forward<Value>(val)...)); 230 AuthorizationSetBuilder& Authorization(TagType ttag, ValueType&&... value) { 236 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const uint8_t* data, 245 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const char* data, 247 return Authorization(ttag, reinterpret_cast<const uint8_t*>(data), data_length);
|
/system/security/keystore/ |
keystore_cli_v2.cpp | 143 .Authorization(TAG_NO_AUTH_REQUIRED); 155 .Authorization(TAG_NO_AUTH_REQUIRED); 163 .Authorization(TAG_NO_AUTH_REQUIRED); 172 parameters.AesEncryptionKey(key_size).Authorization(TAG_NO_AUTH_REQUIRED); 174 parameters.Authorization(TAG_BLOCK_MODE, BlockMode::GCM) 175 .Authorization(TAG_MIN_MAC_LENGTH, 128); 177 parameters.Authorization(TAG_BLOCK_MODE, BlockMode::ECB); 178 parameters.Authorization(TAG_BLOCK_MODE, BlockMode::CBC); 179 parameters.Authorization(TAG_BLOCK_MODE, BlockMode::CTR); 189 .Authorization(TAG_MIN_MAC_LENGTH, 224 [all...] |
keystore_client_impl.cpp | 80 encrypt_params.Authorization(TAG_BLOCK_MODE, BlockMode::CBC); 98 authenticate_params.Authorization(TAG_MAC_LENGTH, kHMACOutputSize); 139 encrypt_params.Authorization(TAG_BLOCK_MODE, BlockMode::CBC); 140 encrypt_params.Authorization(TAG_NONCE, protobuf.init_vector().data(), 410 .Authorization(TAG_BLOCK_MODE, BlockMode::CBC) 411 .Authorization(TAG_NO_AUTH_REQUIRED); 449 .Authorization(TAG_MIN_MAC_LENGTH, kHMACOutputSize) 450 .Authorization(TAG_NO_AUTH_REQUIRED);
|
/system/keymaster/android_keymaster/ |
keymaster_configuration.cpp | 67 .Authorization(keymaster::TAG_OS_VERSION, os_version) 68 .Authorization(keymaster::TAG_OS_PATCHLEVEL, os_patchlevel));
|
/system/keymaster/contexts/ |
pure_soft_keymaster_context.cpp | 286 .Authorization(TAG_PURPOSE, KM_PURPOSE_WRAP) 332 .Authorization(TAG_BLOCK_MODE, KM_MODE_GCM) 333 .Authorization(TAG_NONCE, iv) 334 .Authorization(TAG_MIN_MAC_LENGTH, 128) 341 .Authorization(TAG_BLOCK_MODE, KM_MODE_GCM) 342 .Authorization(TAG_NONCE, iv) 343 .Authorization(TAG_MAC_LENGTH, 128) 384 .Authorization(TAG_ASSOCIATED_DATA, wrapped_key_description.data,
|
/system/vold/ |
KeyStorage.cpp | 110 .Authorization(km::TAG_APPLICATION_ID, km::support::blob2hidlVec(appId)); 113 paramBuilder.Authorization(km::TAG_NO_AUTH_REQUIRED); 122 paramBuilder.Authorization(km::TAG_USER_SECURE_ID, at->user_id); 123 paramBuilder.Authorization(km::TAG_USER_AUTH_TYPE, km::HardwareAuthenticatorType::PASSWORD); 124 paramBuilder.Authorization(km::TAG_AUTH_TIMEOUT, AUTH_TIMEOUT); 133 .Authorization(km::TAG_APPLICATION_ID, km::support::blob2hidlVec(appId)); 268 auto opParams = km::AuthorizationSetBuilder().Authorization(km::TAG_NONCE,
|
Keymaster.cpp | 245 .Authorization(km::TAG_BLOB_USAGE_REQUIREMENTS, km::KeyBlobUsageRequirements::STANDALONE) 246 .Authorization(km::TAG_NO_AUTH_REQUIRED) 247 .Authorization(km::TAG_MIN_SECONDS_BETWEEN_OPS, ratelimit);
|