Home
last modified time | relevance | path

Searched refs:Contains (Results 1 – 25 of 28) sorted by relevance

12

/system/keymaster/android_keymaster/
Doperation.cpp103 !key.authorizations().Contains(TAG_PADDING, *padding) && in GetAndValidatePadding()
104 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) { in GetAndValidatePadding()
119 if (key.authorizations().Contains(TAG_DIGEST, KM_DIGEST_NONE)) { in GetAndValidateDigest()
133 !key.authorizations().Contains(TAG_DIGEST, *digest) && in GetAndValidateDigest()
134 !key.authorizations().Contains(TAG_DIGEST_OLD, *digest)) { in GetAndValidateDigest()
Dkeymaster_enforcement.cpp89 if (auth_set.Contains(TAG_PURPOSE, purpose)) in authorized_purpose()
/system/keymaster/km_openssl/
Daes_key.cpp53 if (hw_enforced.Contains(TAG_BLOCK_MODE, KM_MODE_GCM) || in LoadKey()
54 sw_enforced.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { in LoadKey()
74 if (key_description.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { in validate_algorithm_specific_new_key_params()
Dattestation_utils.cpp212 if (tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN) || in add_key_usage_extension()
213 tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_VERIFY) || in add_key_usage_extension()
214 sw_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN) || in add_key_usage_extension()
215 sw_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_VERIFY)) { in add_key_usage_extension()
221 if (tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_ENCRYPT) || in add_key_usage_extension()
222 tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_DECRYPT) || in add_key_usage_extension()
223 sw_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_ENCRYPT) || in add_key_usage_extension()
224 sw_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_DECRYPT)) { in add_key_usage_extension()
Dtriple_des_key.cpp60 if (key_description.Contains(TAG_MIN_MAC_LENGTH)) return KM_ERROR_INVALID_TAG; in validate_algorithm_specific_new_key_params()
Dec_key_factory.cpp88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey()
90 } else if (!authorizations.Contains(TAG_EC_CURVE, ec_curve)) { in GenerateKey()
Dattestation_record.cpp343 if (auth_list.Contains(TAG_ALGORITHM, KM_ALGORITHM_EC) && // in build_auth_list()
344 !auth_list.Contains(TAG_EC_CURVE) && // in build_auth_list()
417 keymaster_version = tee_enforced.Contains(TAG_PURPOSE) ? 1 : 0; in build_attestation_record()
Dblock_cipher_operation.cpp92 } else if (!key.authorizations().Contains(TAG_BLOCK_MODE, block_mode)) { in CreateOperation()
/system/apex/apexd/
Dapex_database_test.cpp91 bool Contains(const MountedApexDatabase& db, const std::string& package, in Contains() function
132 Contains(db, kPackage, kLoopName, kPath, kMountPoint, kDeviceName)); in TEST()
138 Contains(db, kPackage, kLoopName, kPath, kMountPoint, kDeviceName)); in TEST()
161 ASSERT_TRUE(Contains(db, kPackage[i], kLoopName[i], kPath[i], in TEST()
168 EXPECT_FALSE(Contains(db, kPackage[0], kLoopName[0], kPath[0], kMountPoint[0], in TEST()
172 EXPECT_TRUE(Contains(db, kPackage[1], kLoopName[1], kPath[1], kMountPoint[1], in TEST()
176 EXPECT_TRUE(Contains(db, kPackage[2], kLoopName[2], kPath[2], kMountPoint[2], in TEST()
180 EXPECT_TRUE(Contains(db, kPackage[3], kLoopName[3], kPath[3], kMountPoint[3], in TEST()
/system/bt/stack/test/
Dble_advertiser_test.cc28 using ::testing::Contains;
264 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F()
282 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F()
403 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F()
415 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F()
492 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F()
712 Contains(Field(&SetEnableData::max_extended_advertising_events, in TEST_F()
757 Contains(Field(&SetEnableData::max_extended_advertising_events, in TEST_F()
774 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F()
862 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F()
[all …]
/system/nvram/hal/tests/
Dnvram_hal_test.cc47 bool Contains(T value, const std::vector<T>& target) { in Contains() function
56 [target](T value) { return Contains(value, target); }); in ContainsAll()
67 CHECK(!Contains(NV_CONTROL_PERSISTENT_WRITE_LOCK, control_list)) in CreateSpace()
69 CHECK(!Contains(NV_CONTROL_BOOT_WRITE_LOCK, control_list) || in CreateSpace()
70 !Contains(NV_CONTROL_WRITE_AUTHORIZATION, control_list) || in CreateSpace()
184 while (Contains(*index, space_index_list)) { in GetNextBurnSpace()
251 EXPECT_TRUE(Contains(kTestIndex1, space_index_list2)); in TEST()
259 EXPECT_FALSE(Contains(kTestIndex1, space_index_list3)); in TEST()
/system/keymaster/include/keymaster/
Dauthorization_set.h221 bool Contains(keymaster_tag_t tag) const { in Contains() function
234 bool Contains(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T val) const { in Contains() function
242 bool Contains(TypedEnumTag<KM_ENUM, Tag, T> tag, T val) const { in Contains() function
250 bool Contains(TypedTag<KM_UINT, Tag> tag, uint32_t val) const { in Contains() function
694 template <typename... ARGS> bool Contains(ARGS&&... args) const { in Contains() function
695 return hw_enforced_.Contains(forward<ARGS>(args)...) || in Contains()
696 sw_enforced_.Contains(forward<ARGS>(args)...); in Contains()
/system/keymaster/contexts/
Dkeymaster1_passthrough_context.cpp102 if (key->hw_enforced().Contains(TAG_PURPOSE) && in UpgradeKeyBlob()
103 !key->hw_enforced().Contains(TAG_OS_PATCHLEVEL)) { in UpgradeKeyBlob()
Dpure_soft_keymaster_context.cpp292 if (!key->hw_enforced().Contains(TAG_PURPOSE, KM_PURPOSE_WRAP) && in UnwrapKey()
293 !key->sw_enforced().Contains(TAG_PURPOSE, KM_PURPOSE_WRAP)) { in UnwrapKey()
Dsoft_keymaster_context.cpp235 if (km1_dev_ && key->hw_enforced().Contains(TAG_PURPOSE) && in UpgradeKeyBlob()
236 !key->hw_enforced().Contains(TAG_OS_PATCHLEVEL)) in UpgradeKeyBlob()
/system/keymaster/legacy_support/
Dec_keymaster1_key.cpp76 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey()
/system/keymaster/ng/include/
Dauthorization_set.h156 bool Contains(Tag tag) const { in Contains() function
161 bool Contains(TypedTag<tag_type, tag> ttag, const ValueT& value) const { in Contains() function
/system/chre/
DREADME.md85 - Contains the system interface that all plaforms must implement, along with
89 - Contains code that will apply to multiple platforms, but not
100 - Contains data structures used throughout CHRE and common utility code.
102 - Contains the CHRE variant for the simulator. This is a good example to
/system/timezone/
DREADME.android12 - Contains files that provide inputs to the time zone rules update process.
17 - Contains some derived files from the time zone rules update process and
22 - Contains tools and scripts related to testing time zone update code. See
/system/core/trusty/keymaster/
DTrustyKeymaster.cpp113 if (!request.key_description.Contains(TAG_CREATION_DATETIME)) { in GenerateKey()
/system/security/keystore/
Dkeymaster_enforcement.cpp49 if (auth_set.Contains(TAG_PURPOSE, purpose)) return ErrorCode::OK; in authorized_purpose()
343 operation_params.Contains(Tag::NONCE)) in AuthorizeBegin()
Dkeymaster_worker.cpp662 if (key_auths.Contains(Tag::TRUSTED_CONFIRMATION_REQUIRED)) { in finish()
797 if (!sw_enforced.Contains(Tag::USER_ID)) { in generateKey()
902 if (!sw_enforced.Contains(Tag::USER_ID)) { in importKey()
983 if (!sw_enforced.Contains(Tag::USER_ID)) { in importWrappedKey()
/system/nvram/
DREADME.md15 Contains a simple command-line application to interact with the NVRAM HAL
/system/update_engine/
Dboot_control_android_unittest.cc38 using testing::Contains;
339 EXPECT_THAT(mapped_devices_, Contains(Key(Eq(partition)))) in ExpectDevicesAreMapped()
/system/keymaster/tests/
Dandroid_keymaster_test.cpp237 EXPECT_FALSE(auths.Contains(TAG_OS_VERSION)); in CheckBaseParams()
238 EXPECT_FALSE(auths.Contains(TAG_OS_PATCHLEVEL)); in CheckBaseParams()
1955 ASSERT_EQ(response.unenforced.Contains(TAG_ALGORITHM), true); in TEST_F()
1956 ASSERT_EQ(response.unenforced.Contains(TAG_KEY_SIZE), true); in TEST_F()
1957 ASSERT_EQ(response.unenforced.Contains(TAG_PURPOSE), true); in TEST_F()
1958 ASSERT_EQ(response.unenforced.Contains(TAG_BLOCK_MODE), true); in TEST_F()

12