Searched refs:softwareEnforced (Results 1 – 9 of 9) sorted by relevance
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | KeymasterHidlTest.cpp | 87 EXPECT_EQ(0U, (key_characteristics->softwareEnforced.size() + in GenerateKey() 113 EXPECT_EQ(0U, (key_characteristics->softwareEnforced.size() + in ImportKey() 201 EXPECT_GT(key_characteristics->softwareEnforced.size(), 0); in CheckGetCharacteristics() 206 EXPECT_EQ(key_characteristics->softwareEnforced.size(), 0); in CheckGetCharacteristics() 211 EXPECT_EQ(key_characteristics->softwareEnforced.size(), 0); in CheckGetCharacteristics() 216 EXPECT_EQ(key_characteristics->softwareEnforced.size(), 0); in CheckGetCharacteristics()
|
D | keymaster_hidl_hal_test.cpp | 63 AuthorizationSet a_sw(a.softwareEnforced); in operator ==() 64 AuthorizationSet b_sw(b.softwareEnforced); in operator ==() 493 auths.push_back(AuthorizationSet(keyCharacteristics.softwareEnforced)); in CheckBaseParams() 552 crypto_params = key_characteristics.softwareEnforced; in TEST_P() 617 crypto_params = key_characteristics.softwareEnforced; in TEST_P() 736 AuthorizationSet softwareEnforced = key_characteristics.softwareEnforced; in TEST_P() local 742 EXPECT_TRUE(softwareEnforced.Contains(TAG_ALGORITHM, Algorithm::HMAC)); in TEST_P() 743 EXPECT_TRUE(softwareEnforced.Contains(TAG_KEY_SIZE, key_size)) in TEST_P() 1853 EXPECT_FALSE(contains(key_characteristics_.softwareEnforced, ttag)) in CheckCryptoParam() 1856 EXPECT_TRUE(contains(key_characteristics_.softwareEnforced, ttag, expected)) in CheckCryptoParam() [all …]
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | key_param_output.h | 74 return os << "SW: " << value.softwareEnforced << ::std::endl
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 162 AuthorizationSet a_sw(a.softwareEnforced); in operator ==() 163 AuthorizationSet b_sw(b.softwareEnforced); in operator ==() 473 EXPECT_EQ(0U, (key_characteristics->softwareEnforced.size() + in GenerateKey() 499 EXPECT_EQ(0U, (key_characteristics->softwareEnforced.size() + in ImportKey() 863 EXPECT_FALSE(contains(key_characteristics_.softwareEnforced, ttag)); in CheckKm0CryptoParam() 865 EXPECT_TRUE(contains(key_characteristics_.softwareEnforced, ttag, expected)); in CheckKm0CryptoParam() 875 EXPECT_FALSE(contains(key_characteristics_.softwareEnforced, ttag)); in CheckKm1CryptoParam() 877 EXPECT_TRUE(contains(key_characteristics_.softwareEnforced, ttag, expected)); in CheckKm1CryptoParam() 887 EXPECT_FALSE(contains(key_characteristics_.softwareEnforced, ttag)); in CheckKm2CryptoParam() 889 EXPECT_TRUE(contains(key_characteristics_.softwareEnforced, ttag, expected)); in CheckKm2CryptoParam() [all …]
|
D | key_param_output.cpp | 124 return os << "SW: " << chars.softwareEnforced << ::std::endl in operator <<()
|
/hardware/interfaces/keymaster/4.1/support/ |
D | Keymaster3.cpp | 96 converted.softwareEnforced = convert(chars.softwareEnforced); in convert()
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 125 * not. These two lists are returned as the "hardwareEnforced" and "softwareEnforced" elements of 137 * The IKeymasterDevice must accept arbitrary, unknown tags and return them in the softwareEnforced 140 * All authorization tags and their values, both hardwareEnforced and softwareEnforced, including 149 * the softwareEnforced list. For example, Tag::ORIGINATION_EXPIRE_DATETIME provides the date and 157 * It is recommended that IKeymasterDevices not enforce any tags they place in the softwareEnforced 691 * softwareEnforced AuthorizationList, # See below
|
D | types.hal | 1167 * restrictions. It consits of two vectors of KeyParameters, one for "softwareEnforced" attributes 1174 * All others should be in the softwareEnforced vector. See the definitions of individual Tag enums 1179 vec<KeyParameter> softwareEnforced;
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 401 vec<KeyParameter> softwareEnforced;
|