/hardware/interfaces/keymaster/3.0/vts/functional/ |
attestation_record.h | 45 SecurityLevel* attestation_security_level, 47 SecurityLevel* keymaster_security_level,
|
/device/generic/goldfish/keymaster/strongbox/ |
service.cpp | 28 using android::hardware::keymaster::V4_0::SecurityLevel; 35 auto keymaster = CreateKeymasterDevice(SecurityLevel::TRUSTED_ENVIRONMENT); 41 auto strongbox = CreateKeymasterDevice(SecurityLevel::STRONGBOX);
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
attestation_record.h | 47 SecurityLevel* attestation_security_level, 49 SecurityLevel* keymaster_security_level,
|
Keymaster.h | 50 SecurityLevel securityLevel; 54 auto lhs = std::tie(securityLevel, majorVersion, supportsEc); 55 auto rhs = std::tie(other.securityLevel, other.majorVersion, other.supportsEc);
|
/external/nos/host/android/hals/keymaster/test/ |
test.cpp | 34 using ::android::hardware::keymaster::V4_0::SecurityLevel; 44 hal.getHardwareInfo([&](SecurityLevel securityLevel, 47 EXPECT_EQ(securityLevel, SecurityLevel::STRONGBOX);
|
/hardware/interfaces/keymaster/4.0/default/ |
service.cpp | 24 using android::hardware::keymaster::V4_0::SecurityLevel; 28 auto keymaster = ::keymaster::V4_0::ng::CreateKeymasterDevice(SecurityLevel::SOFTWARE);
|
/system/security/keystore/ |
keystore_main.cpp | 53 using ::android::hardware::keymaster::V4_0::SecurityLevel; 77 SecurityLevel securityLevel = halVersion.securityLevel; 80 << toString(securityLevel); 81 CHECK(static_cast<uint32_t>(securityLevel) < result.size()) 84 auto& deviceSlot = result[securityLevel]; 90 << "\" and security level: " << toString(securityLevel) 115 auto softKeymaster = result[SecurityLevel::SOFTWARE]; 116 if (!result[SecurityLevel::TRUSTED_ENVIRONMENT]) [all...] |
KeyStore.h | 37 sp<Keymaster>& operator[](SecurityLevel secLevel); 38 sp<Keymaster> operator[](SecurityLevel secLevel) const; 44 SecurityLevel minimalAllowedSecurityLevelForNewKeys); 47 sp<Keymaster> getDevice(SecurityLevel securityLevel) const { return mKmDevices[securityLevel]; } 49 std::pair<sp<Keymaster>, SecurityLevel> getMostSecureDevice() const { 50 SecurityLevel level = SecurityLevel::STRONGBOX; 55 level = static_cast<SecurityLevel>(static_cast<uint32_t>(level) - 1) [all...] |
keystore_utils.cpp | 115 SecurityLevel flagsToSecurityLevel(int32_t flags) { 120 return SecurityLevel::SOFTWARE; 122 return SecurityLevel::STRONGBOX; 124 return SecurityLevel::TRUSTED_ENVIRONMENT; 128 uint32_t securityLevelToFlags(SecurityLevel secLevel) { 130 case SecurityLevel::SOFTWARE: 132 case SecurityLevel::STRONGBOX:
|
keystore_utils.h | 72 SecurityLevel flagsToSecurityLevel(int32_t flags); 73 uint32_t securityLevelToFlags(SecurityLevel secLevel);
|
blob.h | 121 keystore::SecurityLevel getSecurityLevel() const; 122 void setSecurityLevel(keystore::SecurityLevel);
|
KeyStore.cpp | 50 sp<Keymaster>& KeymasterDevices::operator[](SecurityLevel secLevel) { 51 static_assert(uint32_t(SecurityLevel::SOFTWARE) == 0 && 52 uint32_t(SecurityLevel::TRUSTED_ENVIRONMENT) == 1 && 53 uint32_t(SecurityLevel::STRONGBOX) == 2, 58 sp<Keymaster> KeymasterDevices::operator[](SecurityLevel secLevel) const { 59 if (static_cast<uint32_t>(secLevel) > static_cast<uint32_t>(SecurityLevel::STRONGBOX)) { 67 SecurityLevel minimalAllowedSecurityLevelForNewKeys) 69 mAllowNewFallback(minimalAllowedSecurityLevelForNewKeys == SecurityLevel::SOFTWARE) { 569 SecurityLevel securityLevel = flagsToSecurityLevel(flags) [all...] |
/hardware/interfaces/drm/1.1/ |
IDrmPlugin.hal | 28 import @1.1::SecurityLevel; 47 * drm@1.0 openSession is called, which has no securityLevel parameter, the 62 openSession_1_1(SecurityLevel securityLevel) generates (Status status, 178 SecurityLevel level);
|
types.hal | 177 enum SecurityLevel : uint32_t {
|
/hardware/interfaces/keymaster/4.0/support/ |
Keymaster4.cpp | 32 dev_->getHardwareInfo([&](SecurityLevel securityLevel, const hidl_string& keymasterName, 34 version_ = {keymasterName, authorName, 4 /* major version */, securityLevel,
|
/system/keymaster/include/keymaster/km_openssl/ |
soft_keymaster_enforcement.h | 38 keymaster_security_level_t SecurityLevel() const override { return KM_SECURITY_LEVEL_SOFTWARE; }
|
/system/keymaster/ng/include/ |
AndroidKeymaster4Device.h | 45 using ::android::hardware::keymaster::V4_0::SecurityLevel; 51 AndroidKeymaster4Device(SecurityLevel securityLevel); 103 SecurityLevel securityLevel_; 106 IKeymasterDevice* CreateKeymasterDevice(SecurityLevel securityLevel);
|
/system/security/keystore/include/keystore/ |
keymaster_types.h | 38 using keymaster::SecurityLevel; 57 using keymaster::SecurityLevel;
|
/external/nos/host/generic/nugget/proto/nugget/app/keymaster/ |
keymaster_types.proto | 75 SecurityLevel security_level = 4;
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/ |
DrmPlugin.cpp | 108 Status status = setSecurityLevel(sessionId, SecurityLevel::SW_SECURE_CRYPTO); 114 Return<void> DrmPlugin::openSession_1_1(SecurityLevel securityLevel, 119 Status status = setSecurityLevel(sessionId, securityLevel); 371 _hidl_cb(Status::BAD_VALUE, SecurityLevel::UNKNOWN); 378 _hidl_cb(Status::ERROR_DRM_SESSION_NOT_OPENED, SecurityLevel::UNKNOWN); 382 std::map<std::vector<uint8_t>, SecurityLevel>::iterator itr = 386 _hidl_cb(Status::ERROR_DRM_INVALID_STATE, SecurityLevel::UNKNOWN); 395 SecurityLevel level) { 401 if (level > SecurityLevel::SW_SECURE_CRYPTO) [all...] |
/hardware/interfaces/keymaster/4.0/ |
types.hal | [all...] |
/hardware/interfaces/keymaster/4.0/vts/functional/ |
KeymasterHidlTest.cpp | 47 SecurityLevel KeymasterHidlTest::securityLevel_; 57 ->getHardwareInfo([&](SecurityLevel securityLevel, const hidl_string& name, 59 securityLevel_ = securityLevel; 609 case SecurityLevel::TRUSTED_ENVIRONMENT: 611 case SecurityLevel::STRONGBOX: 620 case SecurityLevel::TRUSTED_ENVIRONMENT: 622 case SecurityLevel::STRONGBOX: 647 if (SecLevel() == SecurityLevel::TRUSTED_ENVIRONMENT) return {}; 648 CHECK(SecLevel() == SecurityLevel::STRONGBOX) [all...] |
/external/nos/host/android/hals/keymaster/ |
proto_utils.h | 37 using ::android::hardware::keymaster::V4_0::SecurityLevel;
|
/system/keymaster/include/keymaster/ |
keymaster_enforcement.h | 148 virtual keymaster_security_level_t SecurityLevel() const = 0;
|
/hardware/interfaces/drm/1.1/vts/functional/ |
drm_hal_clearkey_test.cpp | 64 using ::android::hardware::drm::V1_1::SecurityLevel; 65 using ::android::hardware::drm::V1_1::SecurityLevel; 168 SessionId openSession(SecurityLevel level); 289 SessionId DrmHalClearkeyTest::openSession(SecurityLevel level) { 375 auto res = drmPlugin->openSession_1_1(SecurityLevel::HW_SECURE_ALL, 510 SecurityLevel defaultLevel; 512 [&](Status status, SecurityLevel level) { 521 [&](Status status, SecurityLevel level) { 534 SessionId session = openSession(SecurityLevel::SW_SECURE_CRYPTO); 536 [&](Status status, SecurityLevel level) [all...] |