HomeSort by relevance Sort by last modified time
    Searched refs:KeymasterEnforcement (Results 1 - 16 of 16) sorted by null

  /system/keymaster/include/keymaster/km_openssl/
soft_keymaster_enforcement.h 26 class SoftKeymasterEnforcement : public KeymasterEnforcement {
29 : KeymasterEnforcement(max_access_time_map_size, max_access_count_map_size) {}
  /system/keymaster/include/keymaster/
keymaster_enforcement.h 42 class KeymasterEnforcement {
45 * Construct a KeymasterEnforcement.
47 KeymasterEnforcement(uint32_t max_access_time_map_size, uint32_t max_access_count_map_size);
48 virtual ~KeymasterEnforcement();
keymaster_context.h 135 virtual KeymasterEnforcement* enforcement_policy() = 0;
  /system/security/keystore/
keymaster_enforcement.h 39 class KeymasterEnforcement {
42 * Construct a KeymasterEnforcement.
44 KeymasterEnforcement(uint32_t max_access_time_map_size, uint32_t max_access_count_map_size);
45 virtual ~KeymasterEnforcement();
keystore_keymaster_enforcement.h 26 * This is a specialization of the KeymasterEnforcement class to be used by Keystore to enforce
29 class KeystoreKeymasterEnforcement : public KeymasterEnforcement {
31 KeystoreKeymasterEnforcement() : KeymasterEnforcement(64, 64) {}
keymaster_enforcement.cpp 107 KeymasterEnforcement::KeymasterEnforcement(uint32_t max_access_time_map_size,
112 KeymasterEnforcement::~KeymasterEnforcement() {
117 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid,
146 ErrorCode KeymasterEnforcement::AuthorizeUpdateOrFinish(const AuthorizationSet& auth_set,
192 ErrorCode KeymasterEnforcement::AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid,
430 bool KeymasterEnforcement::CreateKeyId(const hidl_vec<uint8_t>& key_blob, km_id_t* keyid) {
446 bool KeymasterEnforcement::MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid) {
454 bool KeymasterEnforcement::MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses)
    [all...]
  /system/keymaster/android_keymaster/
keymaster_enforcement.cpp 106 KeymasterEnforcement::KeymasterEnforcement(uint32_t max_access_time_map_size,
111 KeymasterEnforcement::~KeymasterEnforcement() {
116 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose,
146 KeymasterEnforcement::AuthorizeUpdateOrFinish(const AuthProxy& auth_set,
192 keymaster_error_t KeymasterEnforcement::AuthorizeBegin(const keymaster_purpose_t purpose,
397 bool KeymasterEnforcement::MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid) {
407 bool KeymasterEnforcement::MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses) {
417 bool KeymasterEnforcement::AuthTokenMatches(const AuthProxy& auth_set
    [all...]
android_keymaster.cpp 175 KeymasterEnforcement* policy = context_->enforcement_policy();
188 KeymasterEnforcement* policy = context_->enforcement_policy();
200 KeymasterEnforcement* policy = context_->enforcement_policy();
  /system/keymaster/include/keymaster/contexts/
keymaster2_passthrough_context.h 100 KeymasterEnforcement* enforcement_policy() override;
keymaster1_passthrough_context.h 107 KeymasterEnforcement* enforcement_policy() override;
pure_soft_keymaster_context.h 74 KeymasterEnforcement* enforcement_policy() override {
soft_keymaster_context.h 93 KeymasterEnforcement* enforcement_policy() override {
  /system/keymaster/contexts/
keymaster2_passthrough_context.cpp 123 KeymasterEnforcement* Keymaster2PassthroughContext::enforcement_policy() {
keymaster1_passthrough_context.cpp 209 KeymasterEnforcement* Keymaster1PassthroughContext::enforcement_policy() {
  /system/keymaster/tests/
keymaster_enforcement_test.cpp 38 return KeymasterEnforcement::AuthorizeOperation(
41 using KeymasterEnforcement::AuthorizeOperation;
    [all...]
android_keymaster_test.cpp 77 * KeymasterEnforcement class for use in testing. It's permissive in the sense that it doesn't
104 KeymasterEnforcement* enforcement_policy() override { return &test_policy_; }
    [all...]

Completed in 664 milliseconds