Home
last modified time | relevance | path

Searched refs:enumerated (Results 1 – 20 of 20) sorted by relevance

/system/keymaster/ng/
DKeyMintUtils.cpp32 static_cast<KeyPurpose>(param.enumerated))}; in kmEnumParam2Aidl()
35 static_cast<Algorithm>(param.enumerated))}; in kmEnumParam2Aidl()
38 static_cast<BlockMode>(param.enumerated))}; in kmEnumParam2Aidl()
41 static_cast<Digest>(param.enumerated))}; in kmEnumParam2Aidl()
46 static_cast<Digest>(param.enumerated))}; in kmEnumParam2Aidl()
50 static_cast<PaddingMode>(param.enumerated))}; in kmEnumParam2Aidl()
53 static_cast<EcCurve>(param.enumerated))}; in kmEnumParam2Aidl()
57 static_cast<HardwareAuthenticatorType>(param.enumerated))}; in kmEnumParam2Aidl()
60 static_cast<KeyOrigin>(param.enumerated))}; in kmEnumParam2Aidl()
71 KeyParameterValue::make<KeyParameterValue::integer>(param.enumerated)}; in kmEnumParam2Aidl()
DKeyMintAidlUtils.cpp41 result[i].integer = params[i].enumerated; in kmParamSet2Aidl()
DAndroidKeymaster3Device.cpp178 result[i].f.integer = params[i].enumerated; in kmParamSet2Hidl()
DAndroidKeymaster4Device.cpp131 result[i].f.integer = params[i].enumerated; in kmParamSet2Hidl()
/system/keymaster/legacy_support/
Drsa_keymaster1_key.cpp54 if (entry.enumerated == KM_DIGEST_NONE) { in UpdateToWorkAroundUnsupportedDigests()
56 } else if (!is_supported(entry.enumerated)) { in UpdateToWorkAroundUnsupportedDigests()
57 LOG_D("Found request for unsupported digest %u", entry.enumerated); in UpdateToWorkAroundUnsupportedDigests()
63 switch (entry.enumerated) { in UpdateToWorkAroundUnsupportedDigests()
Dec_keymaster1_key.cpp51 if (entry.enumerated == KM_DIGEST_NONE) { in UpdateToWorkAroundUnsupportedDigests()
53 } else if (!is_supported(entry.enumerated)) { in UpdateToWorkAroundUnsupportedDigests()
54 LOG_D("Found request for unsupported digest %u", entry.enumerated); in UpdateToWorkAroundUnsupportedDigests()
Drsa_keymaster1_operation.cpp55 begin_params[pos].enumerated = KM_DIGEST_NONE; in Begin()
60 switch (begin_params[pos].enumerated) { in Begin()
65 begin_params[pos].enumerated = KM_PAD_NONE; in Begin()
Dkeymaster1_legacy_support.cpp133 if (!contains(supported_digests->second, entry.enumerated)) { in findUnsupportedDigest()
134 LOG(WARNING) << "Digest " << entry.enumerated in findUnsupportedDigest()
179 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); in RequiresSoftwareDigesting()
203 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); in RequiresSoftwareDigesting()
Decdsa_keymaster1_operation.cpp51 begin_params[pos].enumerated = KM_DIGEST_NONE; in Begin()
/system/keymaster/tests/
Dandroid_keymaster_test_utils.cpp55 os << " Enum: " << param.enumerated; in operator <<()
103 return a.enumerated == b.enumerated; in operator ==()
Dandroid_keymaster_test_utils.h45 return pos != -1 && static_cast<KeymasterEnum>(set[pos].enumerated) == val; in contains()
53 if (static_cast<KeymasterEnum>(set[pos].enumerated) == val) return true; in contains()
Dauthorization_set_test.cpp90 EXPECT_EQ(KM_ALGORITHM_RSA, set[pos].enumerated); in TEST()
121 EXPECT_EQ(KM_PURPOSE_SIGN, set[pos].enumerated); in TEST()
125 EXPECT_EQ(KM_PURPOSE_VERIFY, set[pos].enumerated); in TEST()
147 EXPECT_EQ(KM_PURPOSE_SIGN, set[0].enumerated); in TEST()
/system/media/audio_route/
Daudio_route.c64 int *enumerated; member
216 ALOGE(" id=%d value=%d", j, path->setting[i].value.enumerated[j]);
418 path->setting[path_index].value.enumerated[0] = mixer_value->value; in path_add_value()
435 path->setting[path_index].value.enumerated[i] = mixer_value->value; in path_add_value()
445 path->setting[path_index].value.enumerated[mixer_value->index] = mixer_value->value; in path_add_value()
769 ar->mixer_state[ctl_index].new_value.enumerated[id] = value; in start_tag()
789 ar->mixer_state[ctl_index].new_value.enumerated[i] = value; in start_tag()
863 ar->mixer_state[i].old_value.enumerated[0] = mixer_ctl_get_value(ctl, 0); in alloc_mixer_state()
914 if (ms->old_value.enumerated[i] != ms->new_value.enumerated[i]) { in mixer_set_value_if_changed()
915 mixer_ctl_set_value(ctl, 0, ms->new_value.enumerated[0]); in mixer_set_value_if_changed()
/system/keymaster/android_keymaster/
Dauthorization_set.cpp320 buf = append_uint32_to_buf(buf, end, param.enumerated); in serialize()
355 return copy_uint32_from_buf(buf_ptr, end, &param->enumerated); in deserialize()
562 *val = elems_[pos].enumerated; in GetTagValueEnum()
577 *val = elems_[pos].enumerated; in GetTagValueEnumRep()
658 if (entry.tag == tag && entry.enumerated == value) return true; in ContainsEnumValue()
/system/keymaster/contexts/
Dsoft_keymaster_device.cpp345 *value = static_cast<KeymasterEnum>(params.params[i].enumerated); in FindTagValue()
627 if (!contains(supported_digests->second, entry.enumerated)) { in FindUnsupportedDigest()
628 LOG_I("Digest %d requested but not supported by module %s", entry.enumerated, in FindUnsupportedDigest()
630 *unsupported = static_cast<keymaster_digest_t>(entry.enumerated); in FindUnsupportedDigest()
675 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); in KeyRequiresSoftwareDigesting()
/system/keymaster/km_openssl/
Dattestation_record.cpp91 return param.enumerated; in get_uint32_value()
151 dest_map->add(private_eat_tag, param.enumerated); in insert_unknown_tag()
154 add_repeating_enum(private_eat_tag, param.enumerated, fields_map); in insert_unknown_tag()
/system/core/trusty/keymaster/3.0/
DTrustyKeymaster3Device.cpp168 result[i].f.integer = params[i].enumerated; in kmParamSet2Hidl()
/system/core/trusty/keymaster/4.0/
DTrustyKeymaster4Device.cpp220 result[i].f.integer = params[i].enumerated; in kmParamSet2Hidl()
/system/bpf/include/vmlinux/android15_6.6/x86_64/
Dvmlinux.h103661 } enumerated; member
103689 } enumerated; member
124277 } enumerated; member
/system/bpf/include/vmlinux/android15_6.6/arm64/
Dvmlinux.h93965 } enumerated; member
93993 } enumerated; member
117857 } enumerated; member