Home
last modified time | relevance | path

Searched refs:tee_enforced (Results 1 – 6 of 6) sorted by relevance

/system/keymaster/
Dasymmetric_key.cpp43 static keymaster_error_t add_key_usage_extension(const AuthorizationSet& tee_enforced, in add_key_usage_extension() argument
55 if (tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_SIGN) || in add_key_usage_extension()
56 tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_VERIFY) || in add_key_usage_extension()
64 if (tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_ENCRYPT) || in add_key_usage_extension()
65 tee_enforced.Contains(TAG_PURPOSE, KM_PURPOSE_DECRYPT) || in add_key_usage_extension()
146 const AuthorizationSet& tee_enforced, in build_attestation_extension() argument
157 keymaster_error_t error = build_attestation_record(attest_params, sw_enforced, tee_enforced, in build_attestation_extension()
184 const AuthorizationSet& tee_enforced, in add_attestation_extension() argument
189 *error = build_attestation_extension(attest_params, tee_enforced, sw_enforced, context, in add_attestation_extension()
265 const AuthorizationSet& tee_enforced, in GenerateAttestation() argument
[all …]
Dattestation_record.h46 const AuthorizationSet& tee_enforced,
58 AuthorizationSet* tee_enforced,
Dattestation_record.cpp145 KM_AUTH_LIST* tee_enforced; member
157 ASN1_SIMPLE(KM_KEY_DESCRIPTION, tee_enforced, KM_AUTH_LIST),
433 const AuthorizationSet& tee_enforced, in build_attestation_record() argument
445 if (tee_enforced.empty()) { in build_attestation_record()
463 keymaster_version = tee_enforced.Contains(TAG_PURPOSE) ? 1 : 0; in build_attestation_record()
488 error = build_auth_list(tee_enforced, key_desc->tee_enforced); in build_attestation_record()
494 if (tee_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) { in build_attestation_record()
681 AuthorizationSet* tee_enforced, in parse_attestation_record() argument
707 return extract_auth_list(record->tee_enforced, tee_enforced); in parse_attestation_record()
Dasymmetric_key.h38 const AuthorizationSet& tee_enforced,
Dandroid_keymaster.cpp47 keymaster_error_t CheckVersionInfo(const AuthorizationSet& tee_enforced, in CheckVersionInfo() argument
55 if (tee_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel) || in CheckVersionInfo()
396 AuthorizationSet tee_enforced; in AttestKey() local
400 response->error = LoadKey(request.key_blob, request.attest_params, &tee_enforced, &sw_enforced, in AttestKey()
405 response->error = key->GenerateAttestation(*context_, request.attest_params, tee_enforced, in AttestKey()
Dsoft_keymaster_context.cpp472 AuthorizationSet tee_enforced; in UpgradeKeyBlob() local
475 ParseKeyBlob(key_to_upgrade, upgrade_params, &key_material, &tee_enforced, &sw_enforced); in UpgradeKeyBlob()
491 if (km1_dev_ && tee_enforced.Contains(TAG_PURPOSE) && !tee_enforced.Contains(TAG_OS_PATCHLEVEL)) in UpgradeKeyBlob()
509 return SerializeIntegrityAssuredBlob(key_material, hidden, tee_enforced, sw_enforced, in UpgradeKeyBlob()