HomeSort by relevance Sort by last modified time
    Searched refs:GetTagValue (Results 1 - 25 of 40) sorted by null

1 2

  /system/keymaster/km_openssl/
hmac_key.cpp 51 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) &&
52 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) {
67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits))
71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) {
aes_key.cpp 56 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) &&
57 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) {
76 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length))
ecies_kem.cpp 27 if (!authorizations.GetTagValue(TAG_EC_CURVE, &curve_)) {
46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) {
65 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bytes_to_generate_)) {
71 single_hash_mode_ = authorizations.GetTagValue(TAG_ECIES_SINGLE_HASH_MODE);
ec_key_factory.cpp 47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) {
49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) {
63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) &&
173 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size_bits)) {
184 if (!updated_description->GetTagValue(TAG_EC_CURVE, &curve)) {
191 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) {
rsa_key_factory.cpp 62 if (!authorizations.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) {
72 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
148 if (!updated_description->GetTagValue(TAG_RSA_PUBLIC_EXPONENT, public_exponent))
157 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size))
166 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm))
hmac_operation.cpp 40 if (!key.authorizations().GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) {
47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) {
61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) {
symmetric_key.cpp 41 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) ||
76 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bits)) {
attestation_record.cpp 342 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) {
429 if (!attestation_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge))
440 if (!attestation_params.GetTagValue(TAG_ATTESTATION_APPLICATION_ID, &attestation_app_id))
468 if (tee_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) {
472 if (!sw_enforced.GetTagValue(TAG_CREATION_DATETIME, &creation_datetime)) {
478 sw_enforced.GetTagValue(TAG_APPLICATION_ID, &application_id);
483 attestation_params.GetTagValue(TAG_RESET_SINCE_ID_ROTATION), &unique_id);
block_cipher_operation.cpp 56 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) {
61 if (!key_params.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length_bits)) {
84 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) {
116 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE);
258 if (!input_params.GetTagValue(TAG_NONCE, &iv_blob)) {
293 if (input_params.GetTagValue(TAG_ASSOCIATED_DATA, &aad)) {
attestation_utils.cpp 308 if ((!key.sw_enforced().GetTagValue(TAG_ALGORITHM, &sign_algorithm) &&
309 !key.hw_enforced().GetTagValue(TAG_ALGORITHM, &sign_algorithm)))
338 key.authorizations().GetTagValue(TAG_ACTIVE_DATETIME, &activeDateTime);
345 key.authorizations().GetTagValue(TAG_USAGE_EXPIRE_DATETIME, &usageExpireDateTime);
  /system/keymaster/legacy_support/
keymaster_passthrough_key.cpp 62 if (additional_parameters_.GetTagValue(TAG_APPLICATION_DATA, &km_app_data)) {
68 if (additional_parameters_.GetTagValue(TAG_APPLICATION_ID, &km_client_id)) {
rsa_keymaster0_key.cpp 44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) {
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
keymaster1_legacy_support.cpp 163 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) {
184 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) {
213 if (key_description.GetTagValue(TAG_EC_CURVE, &curve)) {
222 if (key_description.GetTagValue(TAG_KEY_SIZE, &key_size_from_desc)) {
  /system/security/keystore/
keystore_client_impl.cpp 89 auto init_vector_blob = output_params.GetTagValue(TAG_NONCE);
478 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM),
479 software_enforced_characteristics.GetTagValue(TAG_ALGORITHM));
484 auto key_size = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_KEY_SIZE),
485 software_enforced_characteristics.GetTagValue(TAG_KEY_SIZE));
490 auto block_mode = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_BLOCK_MODE),
491 software_enforced_characteristics.GetTagValue(TAG_BLOCK_MODE));
496 auto padding_mode = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_PADDING),
497 software_enforced_characteristics.GetTagValue(TAG_PADDING));
519 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM)
    [all...]
auth_token_table.cpp 103 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES);
109 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES);
119 defaultOr(key_info.GetTagValue(TAG_USER_AUTH_TYPE), HardwareAuthenticatorType::NONE);
158 auto timeout = defaultOr(key_info.GetTagValue(TAG_AUTH_TIMEOUT), 0);
164 if (key_info.GetTagValue(TAG_ALLOW_WHILE_ON_BODY).isOk()) {
  /system/keymaster/contexts/
keymaster2_passthrough_context.cpp 76 if (!additional_params.GetTagValue(TAG_APPLICATION_ID, clientIdPtr)) {
79 if (!additional_params.GetTagValue(TAG_APPLICATION_DATA, applicationDataPtr)) {
98 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) &&
99 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) {
keymaster1_passthrough_context.cpp 120 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id))
122 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data))
166 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) &&
167 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) {
236 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) {
soft_keymaster_context.cpp 288 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) &&
289 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) {
405 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id))
407 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data))
451 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) {
pure_soft_keymaster_context.cpp 172 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) &&
173 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) {
229 if (!key.authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) {
  /system/keymaster/include/keymaster/
authorization_set.h 259 inline bool GetTagValue(TypedTag<KM_UINT, T> tag, uint32_t* val) const {
269 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, uint32_t* val) const {
278 inline bool GetTagValue(TypedTag<KM_ULONG, T> tag, uint64_t* val) const {
288 bool GetTagValue(TypedTag<KM_ULONG_REP, Tag> tag, size_t instance, uint64_t* val) const {
297 bool GetTagValue(TypedEnumTag<KM_ENUM, Tag, T> tag, T* val) const {
307 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, size_t instance, T* val) const {
317 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T* val) const {
328 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance,
338 bool GetTagValue(TypedTag<KM_BYTES, Tag> tag, keymaster_blob_t* val) const {
347 bool GetTagValue(TypedTag<KM_BIGNUM, Tag> tag, keymaster_blob_t* val) const
    [all...]
  /system/keymaster/android_keymaster/
operation.cpp 93 if (!begin_params.GetTagValue(TAG_PADDING, padding)) {
118 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) {
android_keymaster.cpp 50 if (tee_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel) ||
51 sw_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel)) {
224 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
271 if (!key->authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm))
402 if (request.attest_params.GetTagValue(TAG_ATTESTATION_APPLICATION_ID,
437 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
518 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
  /system/keymaster/tests/
authorization_set_test.cpp 89 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &int_val));
93 EXPECT_TRUE(set.GetTagValue(TAG_APPLICATION_ID, &blob_val));
439 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &val));
443 EXPECT_FALSE(set.GetTagValue(TAG_KEY_SIZE, &val));
459 EXPECT_TRUE(set1.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val));
463 EXPECT_FALSE(set2.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val));
481 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 0, &val));
483 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 1, &val));
487 EXPECT_FALSE(set2.GetTagValue(TAG_USER_SECURE_ID, &val));
501 EXPECT_TRUE(set.GetTagValue(TAG_ALGORITHM, &val))
    [all...]
wrapped_key_test.cpp 95 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size);
99 auth_list.GetTagValue(TAG_ALGORITHM, &algorithm);
  /system/keymaster/key_blob_utils/
software_keyblobs.cpp 84 if (input_set.GetTagValue(TAG_APPLICATION_ID, &entry))
86 if (input_set.GetTagValue(TAG_APPLICATION_DATA, &entry))

Completed in 700 milliseconds

1 2