Home
last modified time | relevance | path

Searched refs:enforced (Results 1 – 13 of 13) sorted by relevance

/system/keymaster/
Dandroid_keymaster_messages.cpp80 return key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize()
85 buf = enforced.Serialize(buf, end); in NonErrorSerialize()
90 return deserialize_key_blob(&key_blob, buf_ptr, end) && enforced.Deserialize(buf_ptr, end) && in NonErrorDeserialize()
117 return enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize()
121 buf = enforced.Serialize(buf, end); in NonErrorSerialize()
127 return enforced.Deserialize(buf_ptr, end) && unenforced.Deserialize(buf_ptr, end); in NonErrorDeserialize()
341 return key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize()
346 buf = enforced.Serialize(buf, end); in NonErrorSerialize()
351 return deserialize_key_blob(&key_blob, buf_ptr, end) && enforced.Deserialize(buf_ptr, end) && in NonErrorDeserialize()
Dandroid_keymaster_messages_test.cpp145 rsp.enforced.Reinitialize(params, array_length(params)); in TEST()
149 EXPECT_EQ(deserialized->enforced, rsp.enforced); in TEST()
160 rsp.enforced.Reinitialize(params, array_length(params)); in TEST()
164 EXPECT_EQ(0U, deserialized->enforced.size()); in TEST()
187 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
191 EXPECT_EQ(msg.enforced, deserialized->enforced); in TEST()
404 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
412 EXPECT_EQ(msg.enforced, deserialized->enforced); in TEST()
Dandroid_keymaster.cpp199 response->enforced.Clear(); in GenerateKey()
202 &response->enforced, &response->unenforced); in GenerateKey()
216 &key_material, &response->enforced, &response->unenforced); in GetKeyCharacteristics()
220 response->error = CheckVersionInfo(response->enforced, response->unenforced, *context_); in GetKeyCharacteristics()
436 &response->enforced, &response->unenforced); in ImportKey()
Dsoft_keymaster_device.cpp762 response.enforced.erase(response.enforced.find(TAG_OS_VERSION)); in generate_key()
763 response.enforced.erase(response.enforced.find(TAG_OS_PATCHLEVEL)); in generate_key()
767 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in generate_key()
823 response.enforced.CopyToParamSet(&characteristics->hw_enforced); in generate_key()
857 response.enforced.erase(response.enforced.find(TAG_OS_VERSION)); in get_key_characteristics()
858 response.enforced.erase(response.enforced.find(TAG_OS_PATCHLEVEL)); in get_key_characteristics()
862 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in get_key_characteristics()
906 response.enforced.CopyToParamSet(&characteristics->hw_enforced); in get_key_characteristics()
952 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in import_key()
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h284 AuthorizationSet enforced; member
316 AuthorizationSet enforced; member
482 AuthorizationSet enforced; member
/system/sepolicy/
Dpriv_app.te130 # enforced via levelFrom=user in seapp_contexts and the mls
Duntrusted_app.te140 # enforced via levelFrom=user in seapp_contexts and the mls
/system/sepolicy/tools/sepolicy-analyze/
DREADME52 denials are logged but not enforced for these domains. While
/system/connectivity/shill/doc/
Dservice-api.txt1650 of the SSID. Since the Name property is enforced
/system/media/audio_utils/
DDoxyfile.orig2125 # is enforced. So when you set the threshold to 10, up to 15 fields may appear,
DDoxyfile2125 # is enforced. So when you set the threshold to 10, up to 15 fields may appear,
/system/tpm/trunks/generator/
Draw_commands_fixed.txt10678 be TPM_ALG_NULL. These restrictions are enforced by TPM2_Create() and TPM2_CreatePrimary(),
Draw_commands.txt10667 be TPM_ALG_NULL. These restrictions are enforced by TPM2_Create() and TPM2_CreatePrimary(),