| /system/keymaster/ng/ |
| D | KeyMintUtils.cpp | 32 static_cast<KeyPurpose>(param.enumerated))}; in kmEnumParam2Aidl() 35 static_cast<Algorithm>(param.enumerated))}; in kmEnumParam2Aidl() 38 static_cast<BlockMode>(param.enumerated))}; in kmEnumParam2Aidl() 41 static_cast<Digest>(param.enumerated))}; in kmEnumParam2Aidl() 46 static_cast<Digest>(param.enumerated))}; in kmEnumParam2Aidl() 50 static_cast<PaddingMode>(param.enumerated))}; in kmEnumParam2Aidl() 53 static_cast<EcCurve>(param.enumerated))}; in kmEnumParam2Aidl() 57 static_cast<HardwareAuthenticatorType>(param.enumerated))}; in kmEnumParam2Aidl() 60 static_cast<KeyOrigin>(param.enumerated))}; in kmEnumParam2Aidl() 71 KeyParameterValue::make<KeyParameterValue::integer>(param.enumerated)}; in kmEnumParam2Aidl()
|
| D | KeyMintAidlUtils.cpp | 41 result[i].integer = params[i].enumerated; in kmParamSet2Aidl()
|
| D | AndroidKeymaster3Device.cpp | 178 result[i].f.integer = params[i].enumerated; in kmParamSet2Hidl()
|
| D | AndroidKeymaster4Device.cpp | 131 result[i].f.integer = params[i].enumerated; in kmParamSet2Hidl()
|
| /system/keymaster/legacy_support/ |
| D | rsa_keymaster1_key.cpp | 54 if (entry.enumerated == KM_DIGEST_NONE) { in UpdateToWorkAroundUnsupportedDigests() 56 } else if (!is_supported(entry.enumerated)) { in UpdateToWorkAroundUnsupportedDigests() 57 LOG_D("Found request for unsupported digest %u", entry.enumerated); in UpdateToWorkAroundUnsupportedDigests() 63 switch (entry.enumerated) { in UpdateToWorkAroundUnsupportedDigests()
|
| D | ec_keymaster1_key.cpp | 51 if (entry.enumerated == KM_DIGEST_NONE) { in UpdateToWorkAroundUnsupportedDigests() 53 } else if (!is_supported(entry.enumerated)) { in UpdateToWorkAroundUnsupportedDigests() 54 LOG_D("Found request for unsupported digest %u", entry.enumerated); in UpdateToWorkAroundUnsupportedDigests()
|
| D | rsa_keymaster1_operation.cpp | 55 begin_params[pos].enumerated = KM_DIGEST_NONE; in Begin() 60 switch (begin_params[pos].enumerated) { in Begin() 65 begin_params[pos].enumerated = KM_PAD_NONE; in Begin()
|
| D | keymaster1_legacy_support.cpp | 133 if (!contains(supported_digests->second, entry.enumerated)) { in findUnsupportedDigest() 134 LOG(WARNING) << "Digest " << entry.enumerated in findUnsupportedDigest() 179 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); in RequiresSoftwareDigesting() 203 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); in RequiresSoftwareDigesting()
|
| D | ecdsa_keymaster1_operation.cpp | 51 begin_params[pos].enumerated = KM_DIGEST_NONE; in Begin()
|
| /system/media/audio_route/ |
| D | audio_route.c | 42 int *enumerated; member 156 ALOGE(" id=%d value=%d", j, path->setting[i].value.enumerated[j]); 352 path->setting[path_index].value.enumerated[0] = mixer_value->value; in path_add_value() 367 path->setting[path_index].value.enumerated[i] = mixer_value->value; in path_add_value() 377 path->setting[path_index].value.enumerated[mixer_value->index] = mixer_value->value; in path_add_value() 602 ar->mixer_state[ctl_index].new_value.enumerated[id] = value; in start_tag() 616 ar->mixer_state[ctl_index].new_value.enumerated[i] = value; in start_tag() 685 ar->mixer_state[i].old_value.enumerated[0] = mixer_ctl_get_value(ctl, 0); in alloc_mixer_state() 744 if (ar->mixer_state[i].old_value.enumerated[j] in audio_route_update_mixer() 745 != ar->mixer_state[i].new_value.enumerated[j]) { in audio_route_update_mixer() [all …]
|
| /system/keymaster/tests/ |
| D | android_keymaster_test_utils.cpp | 55 os << " Enum: " << param.enumerated; in operator <<() 103 return a.enumerated == b.enumerated; in operator ==()
|
| D | android_keymaster_test_utils.h | 45 return pos != -1 && static_cast<KeymasterEnum>(set[pos].enumerated) == val; in contains() 53 if (static_cast<KeymasterEnum>(set[pos].enumerated) == val) return true; in contains()
|
| D | authorization_set_test.cpp | 90 EXPECT_EQ(KM_ALGORITHM_RSA, set[pos].enumerated); in TEST() 121 EXPECT_EQ(KM_PURPOSE_SIGN, set[pos].enumerated); in TEST() 125 EXPECT_EQ(KM_PURPOSE_VERIFY, set[pos].enumerated); in TEST() 147 EXPECT_EQ(KM_PURPOSE_SIGN, set[0].enumerated); in TEST()
|
| /system/keymaster/android_keymaster/ |
| D | authorization_set.cpp | 316 buf = append_uint32_to_buf(buf, end, param.enumerated); in serialize() 351 return copy_uint32_from_buf(buf_ptr, end, ¶m->enumerated); in deserialize() 558 *val = elems_[pos].enumerated; in GetTagValueEnum() 573 *val = elems_[pos].enumerated; in GetTagValueEnumRep() 654 if (entry.tag == tag && entry.enumerated == value) return true; in ContainsEnumValue()
|
| /system/keymaster/contexts/ |
| D | soft_keymaster_device.cpp | 345 *value = static_cast<KeymasterEnum>(params.params[i].enumerated); in FindTagValue() 627 if (!contains(supported_digests->second, entry.enumerated)) { in FindUnsupportedDigest() 628 LOG_I("Digest %d requested but not supported by module %s", entry.enumerated, in FindUnsupportedDigest() 630 *unsupported = static_cast<keymaster_digest_t>(entry.enumerated); in FindUnsupportedDigest() 675 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); in KeyRequiresSoftwareDigesting()
|
| /system/keymaster/km_openssl/ |
| D | attestation_record.cpp | 91 return param.enumerated; in get_uint32_value() 151 dest_map->add(private_eat_tag, param.enumerated); in insert_unknown_tag() 154 add_repeating_enum(private_eat_tag, param.enumerated, fields_map); in insert_unknown_tag()
|
| /system/core/trusty/keymaster/3.0/ |
| D | TrustyKeymaster3Device.cpp | 168 result[i].f.integer = params[i].enumerated; in kmParamSet2Hidl()
|
| /system/core/trusty/keymaster/4.0/ |
| D | TrustyKeymaster4Device.cpp | 220 result[i].f.integer = params[i].enumerated; in kmParamSet2Hidl()
|