Lines Matching refs:sw_enforced
94 AuthorizationSet* sw_enforced) { in FakeKeyAuthorizations() argument
96 sw_enforced->Clear(); in FakeKeyAuthorizations()
114 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_SIGN); in FakeKeyAuthorizations()
115 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_VERIFY); in FakeKeyAuthorizations()
116 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_ENCRYPT); in FakeKeyAuthorizations()
117 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_DECRYPT); in FakeKeyAuthorizations()
138 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_SIGN); in FakeKeyAuthorizations()
139 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_VERIFY); in FakeKeyAuthorizations()
155 sw_enforced->push_back(TAG_ALL_USERS); in FakeKeyAuthorizations()
156 sw_enforced->push_back(TAG_NO_AUTH_REQUIRED); in FakeKeyAuthorizations()
168 AuthorizationSet* sw_enforced) { in ParseOldSoftkeymasterBlob() argument
224 keymaster_error_t error = FakeKeyAuthorizations(pkey.get(), sw_enforced, sw_enforced); in ParseOldSoftkeymasterBlob()
240 AuthorizationSet* sw_enforced) { in ParseAuthEncryptedBlob() argument
247 *sw_enforced = move(key.sw_enforced); in ParseAuthEncryptedBlob()
254 AuthorizationSet* sw_enforced) { in SetKeyBlobAuthorizations() argument
255 sw_enforced->Clear(); in SetKeyBlobAuthorizations()
365 if (hw_enforced->GetTagCount(entry.tag) == 0) sw_enforced->push_back(entry); in SetKeyBlobAuthorizations()
371 AuthorizationSet* pseudo_hw_enforced = (hw_enforced->empty()) ? sw_enforced : hw_enforced; in SetKeyBlobAuthorizations()
377 if (!sw_enforced->Contains(TAG_CREATION_DATETIME)) { in SetKeyBlobAuthorizations()
378 sw_enforced->push_back(TAG_CREATION_DATETIME, java_time(time(nullptr))); in SetKeyBlobAuthorizations()
381 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetKeyBlobAuthorizations()
385 AuthorizationSet* sw_enforced, in ExtendKeyBlobAuthorizations() argument
389 AuthorizationSet* pseudo_hw_enforced = (hw_enforced->empty()) ? sw_enforced : hw_enforced; in ExtendKeyBlobAuthorizations()
396 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in ExtendKeyBlobAuthorizations()
421 int key_os_version_pos = key->sw_enforced().find(TAG_OS_VERSION); in FullUpgradeSoftKeyBlob()
423 uint32_t key_os_version = key->sw_enforced()[key_os_version_pos].integer; in FullUpgradeSoftKeyBlob()
425 key->sw_enforced()[key_os_version_pos].integer = os_version; in FullUpgradeSoftKeyBlob()
431 if (!UpgradeIntegerTag(TAG_OS_VERSION, os_version, &key->sw_enforced(), &set_changed) || in FullUpgradeSoftKeyBlob()
432 !UpgradeIntegerTag(TAG_OS_PATCHLEVEL, os_patchlevel, &key->sw_enforced(), &set_changed) || in FullUpgradeSoftKeyBlob()
434 !UpgradeIntegerTag(TAG_VENDOR_PATCHLEVEL, vendor_patchlevel.value(), &key->sw_enforced(), in FullUpgradeSoftKeyBlob()
437 !UpgradeIntegerTag(TAG_BOOT_PATCHLEVEL, boot_patchlevel.value(), &key->sw_enforced(), in FullUpgradeSoftKeyBlob()
452 key->sw_enforced(), upgraded_key); in FullUpgradeSoftKeyBlob()