HomeSort by relevance Sort by last modified time
    Searched refs:Authorization (Results 1 - 25 of 79) sorted by null

1 2 3 4

  /system/keymaster/tests/
authorization_set_test.cpp 30 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY),
31 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), Authorization(TAG_USER_ID, 7),
32 Authorization(TAG_USER_AUTH_TYPE, HW_AUTH_PASSWORD),
33 Authorization(TAG_APPLICATION_ID, "my_app", 6), Authorization(TAG_KEY_SIZE, 256),
34 Authorization(TAG_AUTH_TIMEOUT, 300),
42 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY)
    [all...]
keymaster_enforcement_test.cpp 81 sign_param = Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN);
110 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN),
111 Authorization(TAG_NO_AUTH_REQUIRED), Authorization(TAG_ACTIVE_DATETIME, future_time),
126 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), Authorization(TAG_ACTIVE_DATETIME, past_time),
138 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN),
139 Authorization(TAG_ORIGINATION_EXPIRE_DATETIME, past_time)
    [all...]
attestation_record_test.cpp 48 .Authorization(TAG_OS_VERSION, 60000)
49 .Authorization(TAG_OS_PATCHLEVEL, 201512)
50 .Authorization(TAG_APPLICATION_ID, "bar", 3));
51 AuthorizationSet sw_set(AuthorizationSetBuilder().Authorization(TAG_ACTIVE_DATETIME, 10));
57 .Authorization(TAG_ATTESTATION_CHALLENGE, "hello", 5)
58 .Authorization(TAG_ATTESTATION_APPLICATION_ID, "hello again", 11));
ecies_kem_test.cpp 46 .Authorization(TAG_EC_CURVE, curve)
47 .Authorization(TAG_KDF, KM_KDF_RFC5869_SHA256)
48 .Authorization(TAG_ECIES_SINGLE_HASH_MODE)
49 .Authorization(TAG_KEY_SIZE, kKeyLen));
android_keymaster_test.cpp 120 .Authorization(TAG_OS_VERSION, kOsVersion)
121 .Authorization(TAG_OS_PATCHLEVEL, kOsPatchLevel));
154 .Authorization(TAG_OS_VERSION, kOsVersion)
155 .Authorization(TAG_OS_PATCHLEVEL, kOsPatchLevel));
189 .Authorization(TAG_OS_VERSION, kOsVersion)
190 .Authorization(TAG_OS_PATCHLEVEL, kOsPatchLevel));
286 .Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA)
287 .Authorization(TAG_RSA_PUBLIC_EXPONENT, 3)
324 .Authorization(TAG_ALGORITHM, KM_ALGORITHM_EC)
341 .Authorization(TAG_EC_CURVE, KM_EC_CURVE_P_256
    [all...]
nist_curve_key_exchange_test.cpp 44 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve));
82 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve));
114 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve));
android_keymaster_messages_test.cpp 120 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN),
121 Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY),
122 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA),
123 Authorization(TAG_USER_ID, 7),
124 Authorization(TAG_USER_AUTH_TYPE, HW_AUTH_PASSWORD),
125 Authorization(TAG_APPLICATION_ID, "app_id", 6),
126 Authorization(TAG_AUTH_TIMEOUT, 300),
216 msg.output_params.push_back(Authorization(TAG_NONCE, "foo", 3));
  /external/nist-sip/java/gov/nist/javax/sip/header/
AuthorizationList.java 42 public class AuthorizationList extends SIPHeaderList<Authorization> {
60 super(Authorization.class, Authorization.NAME);
Authorization.java 36 * Authorization SIP header.
45 public class Authorization
56 public Authorization() {
  /external/nist-sip/java/gov/nist/javax/sip/parser/
AuthorizationParser.java 32 * Parser for authorization headers.
45 * @param authorization Authorization message to parse
47 public AuthorizationParser(String authorization) {
48 super(authorization);
61 * @return SIPHeader (Authorization object)
67 headerName(TokenTypes.AUTHORIZATION);
68 Authorization auth = new Authorization();
  /system/keymaster/ng/include/
authorization_set.h 76 * Clear existing authorization set data
192 * In this case "val" is omitted. This condition is checked at compile time by Authorization()
196 push_back(Authorization(tag, std::forward<Value>(val)...));
225 AuthorizationSetBuilder& Authorization(TagType ttag, ValueType&&... value) {
231 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const uint8_t* data,
240 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const char* data,
242 return Authorization(ttag, reinterpret_cast<const uint8_t*>(data), data_length);
261 return Authorization(TAG_DIGEST, digest);
265 return Authorization(TAG_PADDING, padding);
271 Authorization(TAG_ALGORITHM, Algorithm::RSA)
    [all...]
  /hardware/interfaces/keymaster/3.0/vts/functional/
authorization_set.h 80 * Clear existing authorization set data
210 * In this case "val" is omitted. This condition is checked at compile time by Authorization()
213 push_back(Authorization(tag, std::forward<Value>(val)...));
245 AuthorizationSetBuilder& Authorization(TagType ttag, ValueType&&... value) {
251 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const uint8_t* data,
260 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const char* data,
262 return Authorization(ttag, reinterpret_cast<const uint8_t*>(data), data_length);
316 Authorization(TAG_ALGORITHM, Algorithm::RSA);
317 Authorization(TAG_KEY_SIZE, key_size);
318 Authorization(TAG_RSA_PUBLIC_EXPONENT, public_exponent)
    [all...]
keymaster_hidl_hal_test.cpp 359 // Attestations don't contain everything in key authorization lists, so we need to filter
470 AuthorizationSet UserAuths() { return AuthorizationSetBuilder().Authorization(TAG_USER_ID, 7); }
779 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length));
787 .Authorization(TAG_NO_AUTH_REQUIRED)
789 .Authorization(TAG_MIN_MAC_LENGTH, expected_mac.size() * 8)
801 .Authorization(TAG_NO_AUTH_REQUIRED)
804 .Authorization(TAG_CALLER_NONCE)
809 .Authorization(TAG_NONCE, nonce.data(), nonce.size())
    [all...]
  /system/keymaster/include/keymaster/
authorization_set.h 107 * Clear existing authorization set data
388 return push_back(Authorization(tag, val));
395 return push_back(Authorization(tag));
427 return push_back(Authorization(tag, val));
432 return push_back(Authorization(tag, bytes, bytes_len));
483 AuthorizationSetBuilder& Authorization(TagType tag, ValueType value) {
489 AuthorizationSetBuilder& Authorization(TypedTag<KM_BOOL, Tag> tag) {
495 AuthorizationSetBuilder& Authorization(TypedTag<KM_INVALID, Tag> tag) {
503 AuthorizationSetBuilder& Authorization(TypedTag<KM_BYTES, Tag> tag, const uint8_t* data,
510 AuthorizationSetBuilder& Authorization(TypedTag<KM_BYTES, Tag> tag, const char* data
    [all...]
keymaster_tags.h 42 * very useful example is the overloaded "Authorization" function defined below, which takes tag and
199 // Overloaded function "Authorization" to create keymaster_key_param_t objects for all of tags.
203 inline keymaster_key_param_t Authorization(TypedTag<KM_BOOL, Tag> tag) {
208 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT, Tag> tag, uint32_t value) {
213 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT_REP, Tag> tag, uint32_t value) {
218 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG, Tag> tag, uint64_t value) {
223 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG_REP, Tag> tag, uint64_t value) {
228 inline keymaster_key_param_t Authorization(TypedTag<KM_DATE, Tag> tag, uint64_t value) {
233 inline keymaster_key_param_t Authorization(TypedTag<KM_BYTES, Tag> tag, const void* bytes,
239 inline keymaster_key_param_t Authorization(TypedTag<KM_BYTES, Tag> tag
    [all...]
  /hardware/interfaces/keymaster/4.0/vts/functional/
keymaster_hidl_hal_test.cpp 246 // Attestations don't contain everything in key authorization lists, so we need to filter
433 .Authorization(TAG_ALGORITHM, Algorithm::RSA)
434 .Authorization(TAG_RSA_PUBLIC_EXPONENT, 3U)
479 .Authorization(TAG_ALGORITHM, Algorithm::EC)
515 .Authorization(TAG_EC_CURVE, EcCurve::P_256)
564 GenerateKey(AuthorizationSetBuilder().HmacKey(key_size).Digest(digest).Authorization(
604 .Authorization(TAG_MIN_MAC_LENGTH, 256)))
611 .Authorization(TAG_MIN_MAC_LENGTH, 256)))
637 .Authorization(TAG_MIN_MAC_LENGTH, min_mac_length)))
645 .Authorization(TAG_MIN_MAC_LENGTH, min_mac_length))
    [all...]
KeymasterHidlTest.cpp 426 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length));
434 .Authorization(TAG_NO_AUTH_REQUIRED)
436 .Authorization(TAG_MIN_MAC_LENGTH, expected_mac.size() * 8)
451 .Authorization(TAG_NO_AUTH_REQUIRED)
454 .Authorization(TAG_CALLER_NONCE)
459 .Authorization(TAG_NONCE, nonce.data(), nonce.size())
474 .Authorization(TAG_NO_AUTH_REQUIRED)
476 if (iv.size()) authset.Authorization(TAG_CALLER_NONCE);
479 if (iv.size()) begin_params.Authorization(TAG_NONCE, iv.data(), iv.size());
566 .Authorization(TAG_NONCE, iv_in)
    [all...]
  /hardware/interfaces/keymaster/4.0/support/
authorization_set.cpp 421 Authorization(TAG_ALGORITHM, Algorithm::RSA);
422 Authorization(TAG_KEY_SIZE, key_size);
423 Authorization(TAG_RSA_PUBLIC_EXPONENT, public_exponent);
428 Authorization(TAG_ALGORITHM, Algorithm::EC);
429 Authorization(TAG_KEY_SIZE, key_size);
434 Authorization(TAG_ALGORITHM, Algorithm::EC);
435 Authorization(TAG_EC_CURVE, curve);
440 Authorization(TAG_ALGORITHM, Algorithm::AES);
441 return Authorization(TAG_KEY_SIZE, key_size);
445 Authorization(TAG_ALGORITHM, Algorithm::TRIPLE_DES)
    [all...]
  /hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
authorization_set.h 79 * Clear existing authorization set data
197 * In this case "val" is omitted. This condition is checked at compile time by Authorization()
201 push_back(Authorization(tag, std::forward<Value>(val)...));
230 AuthorizationSetBuilder& Authorization(TagType ttag, ValueType&&... value) {
236 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const uint8_t* data,
245 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const char* data,
247 return Authorization(ttag, reinterpret_cast<const uint8_t*>(data), data_length);
  /system/security/keystore/
keystore_cli_v2.cpp 143 .Authorization(TAG_NO_AUTH_REQUIRED);
155 .Authorization(TAG_NO_AUTH_REQUIRED);
163 .Authorization(TAG_NO_AUTH_REQUIRED);
172 parameters.AesEncryptionKey(key_size).Authorization(TAG_NO_AUTH_REQUIRED);
174 parameters.Authorization(TAG_BLOCK_MODE, BlockMode::GCM)
175 .Authorization(TAG_MIN_MAC_LENGTH, 128);
177 parameters.Authorization(TAG_BLOCK_MODE, BlockMode::ECB);
178 parameters.Authorization(TAG_BLOCK_MODE, BlockMode::CBC);
179 parameters.Authorization(TAG_BLOCK_MODE, BlockMode::CTR);
189 .Authorization(TAG_MIN_MAC_LENGTH, 224
    [all...]
keystore_client_impl.cpp 80 encrypt_params.Authorization(TAG_BLOCK_MODE, BlockMode::CBC);
98 authenticate_params.Authorization(TAG_MAC_LENGTH, kHMACOutputSize);
139 encrypt_params.Authorization(TAG_BLOCK_MODE, BlockMode::CBC);
140 encrypt_params.Authorization(TAG_NONCE, protobuf.init_vector().data(),
410 .Authorization(TAG_BLOCK_MODE, BlockMode::CBC)
411 .Authorization(TAG_NO_AUTH_REQUIRED);
449 .Authorization(TAG_MIN_MAC_LENGTH, kHMACOutputSize)
450 .Authorization(TAG_NO_AUTH_REQUIRED);
  /system/keymaster/android_keymaster/
keymaster_configuration.cpp 67 .Authorization(keymaster::TAG_OS_VERSION, os_version)
68 .Authorization(keymaster::TAG_OS_PATCHLEVEL, os_patchlevel));
  /system/keymaster/contexts/
pure_soft_keymaster_context.cpp 286 .Authorization(TAG_PURPOSE, KM_PURPOSE_WRAP)
332 .Authorization(TAG_BLOCK_MODE, KM_MODE_GCM)
333 .Authorization(TAG_NONCE, iv)
334 .Authorization(TAG_MIN_MAC_LENGTH, 128)
341 .Authorization(TAG_BLOCK_MODE, KM_MODE_GCM)
342 .Authorization(TAG_NONCE, iv)
343 .Authorization(TAG_MAC_LENGTH, 128)
384 .Authorization(TAG_ASSOCIATED_DATA, wrapped_key_description.data,
  /system/vold/
KeyStorage.cpp 110 .Authorization(km::TAG_APPLICATION_ID, km::support::blob2hidlVec(appId));
113 paramBuilder.Authorization(km::TAG_NO_AUTH_REQUIRED);
122 paramBuilder.Authorization(km::TAG_USER_SECURE_ID, at->user_id);
123 paramBuilder.Authorization(km::TAG_USER_AUTH_TYPE, km::HardwareAuthenticatorType::PASSWORD);
124 paramBuilder.Authorization(km::TAG_AUTH_TIMEOUT, AUTH_TIMEOUT);
133 .Authorization(km::TAG_APPLICATION_ID, km::support::blob2hidlVec(appId));
268 auto opParams = km::AuthorizationSetBuilder().Authorization(km::TAG_NONCE,
Keymaster.cpp 245 .Authorization(km::TAG_BLOB_USAGE_REQUIREMENTS, km::KeyBlobUsageRequirements::STANDALONE)
246 .Authorization(km::TAG_NO_AUTH_REQUIRED)
247 .Authorization(km::TAG_MIN_SECONDS_BETWEEN_OPS, ratelimit);

Completed in 435 milliseconds

1 2 3 4