/frameworks/av/drm/libmediadrm/ |
DrmHal.cpp | 50 using drm::V1_1::SecurityLevel; 125 static DrmPlugin::SecurityLevel toSecurityLevel(SecurityLevel level) { 127 case SecurityLevel::SW_SECURE_CRYPTO: 129 case SecurityLevel::SW_SECURE_DECODE: 131 case SecurityLevel::HW_SECURE_CRYPTO: 133 case SecurityLevel::HW_SECURE_DECODE: 135 case SecurityLevel::HW_SECURE_ALL: 552 status_t DrmHal::openSession(DrmPlugin::SecurityLevel level, 557 SecurityLevel hSecurityLevel [all...] |
IDrm.cpp | 123 virtual status_t openSession(DrmPlugin::SecurityLevel securityLevel, 127 data.writeInt32(securityLevel); 433 DrmPlugin::SecurityLevel *level) const { 448 *level = static_cast<DrmPlugin::SecurityLevel>(reply.readInt32()); 746 DrmPlugin::SecurityLevel level = 747 static_cast<DrmPlugin::SecurityLevel>(data.readInt32()); 976 DrmPlugin::SecurityLevel level = DrmPlugin::kSecurityLevelUnknown; [all...] |
/hardware/interfaces/keymaster/4.0/vts/functional/ |
KeymasterHidlTest.h | 208 static bool IsSecure() { return securityLevel_ != SecurityLevel::SOFTWARE; } 209 static SecurityLevel SecLevel() { return securityLevel_; } 230 static SecurityLevel securityLevel_;
|
VerificationTokenTest.cpp | 84 if (SecLevel() == SecurityLevel::STRONGBOX) { 92 EXPECT_EQ(SecLevel(), result1.token.securityLevel); 106 EXPECT_EQ(SecLevel(), result2.token.securityLevel);
|
keymaster_hidl_hal_test.cpp | 288 SecurityLevel att_attestation_security_level; 289 SecurityLevel att_keymaster_security_level; 310 EXPECT_EQ(KeymasterHidlTest::IsSecure() ? SecurityLevel::TRUSTED_ENVIRONMENT 311 : SecurityLevel::SOFTWARE, 313 EXPECT_EQ(KeymasterHidlTest::IsSecure() ? SecurityLevel::TRUSTED_ENVIRONMENT 314 : SecurityLevel::SOFTWARE, 510 if (SecLevel() == SecurityLevel::STRONGBOX) return; 659 if (SecLevel() == SecurityLevel::STRONGBOX) return; [all...] |
/hardware/interfaces/keymaster/3.0/vts/functional/ |
attestation_record.cpp | 259 SecurityLevel* attestation_security_level, 261 SecurityLevel* keymaster_security_level, 272 static_cast<SecurityLevel>(ASN1_ENUMERATED_get(record->attestation_security_level)); 275 static_cast<SecurityLevel>(ASN1_ENUMERATED_get(record->keymaster_security_level));
|
keymaster_hidl_hal_test.cpp | [all...] |
/hardware/interfaces/keymaster/4.0/support/ |
attestation_record.cpp | 255 SecurityLevel* attestation_security_level, 257 SecurityLevel* keymaster_security_level, 268 static_cast<SecurityLevel>(ASN1_ENUMERATED_get(record->attestation_security_level)); 271 static_cast<SecurityLevel>(ASN1_ENUMERATED_get(record->keymaster_security_level));
|
Keymaster3.cpp | 114 isSecure ? SecurityLevel::TRUSTED_ENVIRONMENT : SecurityLevel::SOFTWARE, 123 if (version_.securityLevel == SecurityLevel::SOFTWARE) { 136 _hidl_cb(version_.securityLevel,
|
/frameworks/av/drm/mediadrm/plugins/clearkey/default/include/ |
DrmPlugin.h | 152 SecurityLevel *level) const { 159 const SecurityLevel& level) {
|
/frameworks/av/media/libmedia/include/media/ |
DrmHal.h | 67 virtual status_t openSession(DrmPlugin::SecurityLevel level, 114 DrmPlugin::SecurityLevel *level) const;
|
IDrm.h | 44 virtual status_t openSession(DrmPlugin::SecurityLevel securityLevel, 92 DrmPlugin::SecurityLevel *level) const = 0;
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/include/ |
DrmPlugin.h | 59 Return<void> openSession_1_1(SecurityLevel securityLevel, 306 SecurityLevel level); 326 std::map<std::vector<uint8_t>, SecurityLevel> mSecurityLevel;
|
/system/vold/ |
Keymaster.cpp | 28 using ::android::hardware::keymaster::V4_0::SecurityLevel; 108 if (dev->halVersion().securityLevel != SecurityLevel::STRONGBOX) { 116 << " for encryption. Security level: " << toString(version.securityLevel) 207 return mDevice->halVersion().securityLevel != km::SecurityLevel::SOFTWARE;
|
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 671 public native byte[] openSession(@SecurityLevel int level) throws [all...] |
/external/nos/host/generic/nugget/proto/nugget/app/keymaster/ |
keymaster_defs.proto | 257 enum SecurityLevel {
|
/hardware/interfaces/keymaster/4.0/ |
IKeymasterDevice.hal | 58 * are identified by the SecurityLevel TRUSTED_ENVIRONMENT. 62 * units (SPU). StrongBox environments are identified by the SecurityLevel STRONGBOX. To 212 generates (SecurityLevel securityLevel, string keymasterName, string keymasterAuthorName); [all...] |
/hardware/interfaces/keymaster/3.0/ |
types.hal | 421 enum SecurityLevel : uint32_t {
|
/system/security/keystore/ |
blob.cpp | 331 keystore::SecurityLevel Blob::getSecurityLevel() const { 335 void Blob::setSecurityLevel(keystore::SecurityLevel secLevel) {
|
key_store_service.cpp | 779 SecurityLevel securityLevel = flagsToSecurityLevel(flags); 780 auto dev = mKeyStore->getDevice(securityLevel); 810 keyBlob.setSecurityLevel(securityLevel); [all...] |
/frameworks/native/headers/media_plugin/media/drm/ |
DrmAPI.h | 146 // SecurityLevel indicates the level of robustness of the DRM 148 enum SecurityLevel {
|
/system/keymaster/km_openssl/ |
soft_keymaster_enforcement.cpp | 190 response.token.security_level = SecurityLevel();
|
/system/keymaster/ng/ |
AndroidKeymaster4Device.cpp | 57 inline SecurityLevel legacy_enum_conversion(const keymaster_security_level_t value) { 58 return static_cast<SecurityLevel>(value); 212 AndroidKeymaster4Device::AndroidKeymaster4Device(SecurityLevel securityLevel) 219 kOperationTableSize)), securityLevel_(securityLevel) {} 287 token.securityLevel = legacy_enum_conversion(response.token.security_level); 563 IKeymasterDevice* CreateKeymasterDevice(SecurityLevel securityLevel) { 564 return new AndroidKeymaster4Device(securityLevel);
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
tdi.h | 206 ULONG SecurityLevel;
|
/external/nos/host/android/hals/keymaster/ |
KeymasterDevice.cpp | 134 using ::android::hardware::keymaster::V4_0::SecurityLevel; 265 _hidl_cb(SecurityLevel::STRONGBOX, [all...] |