/system/keymaster/android_keymaster/ |
D | operation.cpp | 103 !key.authorizations().Contains(TAG_PADDING, *padding) && in GetAndValidatePadding() 104 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) { in GetAndValidatePadding() 119 if (key.authorizations().Contains(TAG_DIGEST, KM_DIGEST_NONE)) { in GetAndValidateDigest() 133 !key.authorizations().Contains(TAG_DIGEST, *digest) && in GetAndValidateDigest() 134 !key.authorizations().Contains(TAG_DIGEST_OLD, *digest)) { in GetAndValidateDigest()
|
D | keymaster_enforcement.cpp | 89 if (auth_set.Contains(TAG_PURPOSE, purpose)) in authorized_purpose()
|
/system/keymaster/km_openssl/ |
D | aes_key.cpp | 53 if (hw_enforced.Contains(TAG_BLOCK_MODE, KM_MODE_GCM) || in LoadKey() 54 sw_enforced.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { in LoadKey() 74 if (key_description.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { in validate_algorithm_specific_new_key_params()
|
D | attestation_utils.cpp | 212 if (tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN) || in add_key_usage_extension() 213 tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_VERIFY) || in add_key_usage_extension() 214 sw_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN) || in add_key_usage_extension() 215 sw_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_VERIFY)) { in add_key_usage_extension() 221 if (tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_ENCRYPT) || in add_key_usage_extension() 222 tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_DECRYPT) || in add_key_usage_extension() 223 sw_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_ENCRYPT) || in add_key_usage_extension() 224 sw_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_DECRYPT)) { in add_key_usage_extension()
|
D | triple_des_key.cpp | 60 if (key_description.Contains(TAG_MIN_MAC_LENGTH)) return KM_ERROR_INVALID_TAG; in validate_algorithm_specific_new_key_params()
|
D | ec_key_factory.cpp | 88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey() 90 } else if (!authorizations.Contains(TAG_EC_CURVE, ec_curve)) { in GenerateKey()
|
D | attestation_record.cpp | 343 if (auth_list.Contains(TAG_ALGORITHM, KM_ALGORITHM_EC) && // in build_auth_list() 344 !auth_list.Contains(TAG_EC_CURVE) && // in build_auth_list() 417 keymaster_version = tee_enforced.Contains(TAG_PURPOSE) ? 1 : 0; in build_attestation_record()
|
D | block_cipher_operation.cpp | 92 } else if (!key.authorizations().Contains(TAG_BLOCK_MODE, block_mode)) { in CreateOperation()
|
/system/apex/apexd/ |
D | apex_database_test.cpp | 91 bool Contains(const MountedApexDatabase& db, const std::string& package, in Contains() function 132 Contains(db, kPackage, kLoopName, kPath, kMountPoint, kDeviceName)); in TEST() 138 Contains(db, kPackage, kLoopName, kPath, kMountPoint, kDeviceName)); in TEST() 161 ASSERT_TRUE(Contains(db, kPackage[i], kLoopName[i], kPath[i], in TEST() 168 EXPECT_FALSE(Contains(db, kPackage[0], kLoopName[0], kPath[0], kMountPoint[0], in TEST() 172 EXPECT_TRUE(Contains(db, kPackage[1], kLoopName[1], kPath[1], kMountPoint[1], in TEST() 176 EXPECT_TRUE(Contains(db, kPackage[2], kLoopName[2], kPath[2], kMountPoint[2], in TEST() 180 EXPECT_TRUE(Contains(db, kPackage[3], kLoopName[3], kPath[3], kMountPoint[3], in TEST()
|
/system/bt/stack/test/ |
D | ble_advertiser_test.cc | 28 using ::testing::Contains; 264 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 282 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 403 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 415 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 492 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 712 Contains(Field(&SetEnableData::max_extended_advertising_events, in TEST_F() 757 Contains(Field(&SetEnableData::max_extended_advertising_events, in TEST_F() 774 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() 862 AllOf(SizeIs(1), Contains(Field(&SetEnableData::handle, in TEST_F() [all …]
|
/system/nvram/hal/tests/ |
D | nvram_hal_test.cc | 47 bool Contains(T value, const std::vector<T>& target) { in Contains() function 56 [target](T value) { return Contains(value, target); }); in ContainsAll() 67 CHECK(!Contains(NV_CONTROL_PERSISTENT_WRITE_LOCK, control_list)) in CreateSpace() 69 CHECK(!Contains(NV_CONTROL_BOOT_WRITE_LOCK, control_list) || in CreateSpace() 70 !Contains(NV_CONTROL_WRITE_AUTHORIZATION, control_list) || in CreateSpace() 184 while (Contains(*index, space_index_list)) { in GetNextBurnSpace() 251 EXPECT_TRUE(Contains(kTestIndex1, space_index_list2)); in TEST() 259 EXPECT_FALSE(Contains(kTestIndex1, space_index_list3)); in TEST()
|
/system/keymaster/include/keymaster/ |
D | authorization_set.h | 221 bool Contains(keymaster_tag_t tag) const { in Contains() function 234 bool Contains(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T val) const { in Contains() function 242 bool Contains(TypedEnumTag<KM_ENUM, Tag, T> tag, T val) const { in Contains() function 250 bool Contains(TypedTag<KM_UINT, Tag> tag, uint32_t val) const { in Contains() function 694 template <typename... ARGS> bool Contains(ARGS&&... args) const { in Contains() function 695 return hw_enforced_.Contains(forward<ARGS>(args)...) || in Contains() 696 sw_enforced_.Contains(forward<ARGS>(args)...); in Contains()
|
/system/keymaster/contexts/ |
D | keymaster1_passthrough_context.cpp | 102 if (key->hw_enforced().Contains(TAG_PURPOSE) && in UpgradeKeyBlob() 103 !key->hw_enforced().Contains(TAG_OS_PATCHLEVEL)) { in UpgradeKeyBlob()
|
D | pure_soft_keymaster_context.cpp | 292 if (!key->hw_enforced().Contains(TAG_PURPOSE, KM_PURPOSE_WRAP) && in UnwrapKey() 293 !key->sw_enforced().Contains(TAG_PURPOSE, KM_PURPOSE_WRAP)) { in UnwrapKey()
|
D | soft_keymaster_context.cpp | 235 if (km1_dev_ && key->hw_enforced().Contains(TAG_PURPOSE) && in UpgradeKeyBlob() 236 !key->hw_enforced().Contains(TAG_OS_PATCHLEVEL)) in UpgradeKeyBlob()
|
/system/keymaster/legacy_support/ |
D | ec_keymaster1_key.cpp | 76 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey()
|
/system/keymaster/ng/include/ |
D | authorization_set.h | 156 bool Contains(Tag tag) const { in Contains() function 161 bool Contains(TypedTag<tag_type, tag> ttag, const ValueT& value) const { in Contains() function
|
/system/chre/ |
D | README.md | 85 - Contains the system interface that all plaforms must implement, along with 89 - Contains code that will apply to multiple platforms, but not 100 - Contains data structures used throughout CHRE and common utility code. 102 - Contains the CHRE variant for the simulator. This is a good example to
|
/system/timezone/ |
D | README.android | 12 - Contains files that provide inputs to the time zone rules update process. 17 - Contains some derived files from the time zone rules update process and 22 - Contains tools and scripts related to testing time zone update code. See
|
/system/core/trusty/keymaster/ |
D | TrustyKeymaster.cpp | 113 if (!request.key_description.Contains(TAG_CREATION_DATETIME)) { in GenerateKey()
|
/system/security/keystore/ |
D | keymaster_enforcement.cpp | 49 if (auth_set.Contains(TAG_PURPOSE, purpose)) return ErrorCode::OK; in authorized_purpose() 343 operation_params.Contains(Tag::NONCE)) in AuthorizeBegin()
|
D | keymaster_worker.cpp | 662 if (key_auths.Contains(Tag::TRUSTED_CONFIRMATION_REQUIRED)) { in finish() 797 if (!sw_enforced.Contains(Tag::USER_ID)) { in generateKey() 902 if (!sw_enforced.Contains(Tag::USER_ID)) { in importKey() 983 if (!sw_enforced.Contains(Tag::USER_ID)) { in importWrappedKey()
|
/system/nvram/ |
D | README.md | 15 Contains a simple command-line application to interact with the NVRAM HAL
|
/system/update_engine/ |
D | boot_control_android_unittest.cc | 38 using testing::Contains; 339 EXPECT_THAT(mapped_devices_, Contains(Key(Eq(partition)))) in ExpectDevicesAreMapped()
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 237 EXPECT_FALSE(auths.Contains(TAG_OS_VERSION)); in CheckBaseParams() 238 EXPECT_FALSE(auths.Contains(TAG_OS_PATCHLEVEL)); in CheckBaseParams() 1955 ASSERT_EQ(response.unenforced.Contains(TAG_ALGORITHM), true); in TEST_F() 1956 ASSERT_EQ(response.unenforced.Contains(TAG_KEY_SIZE), true); in TEST_F() 1957 ASSERT_EQ(response.unenforced.Contains(TAG_PURPOSE), true); in TEST_F() 1958 ASSERT_EQ(response.unenforced.Contains(TAG_BLOCK_MODE), true); in TEST_F()
|