Home
last modified time | relevance | path

Searched refs:enforced (Results 1 – 25 of 95) sorted by relevance

1234

/aosp12/hardware/interfaces/keymaster/4.0/
H A Dtypes.hal72 * Must be hardware-enforced.
81 * Must be hardware-enforced.
93 * Must be hardware-enforced.
106 * Must be hardware-enforced.
120 * Must be hardware-enforced.
148 * Must be hardware-enforced.
161 * Must be hardware-enforced.
174 * Must be hardware-enforced.
185 * Must be hardware-enforced.
199 * Must be hardware-enforced.
[all …]
H A DIKeymasterDevice.hal129 * o Tag::OS_VERSION, must be hardware-enforced.
130 * o Tag::OS_PATCHLEVEL, must be hardware-enforced.
131 * o Tag::VENDOR_PATCHLEVEL, must be hardware-enforced.
132 * o Tag::BOOT_PATCHLEVEL, must be hardware-enforced.
135 * o Tag::ORIGIN, must be hardware-enforced.
393 * in the hardware-enforced and software-enforced lists. See getKeyCharacteristics for more
601 * belongs in the hardware-enforced or software-enforced list is that if the meaning of the tag
602 * is fully assured by secure hardware, it is hardware enforced. Otherwise, it's software
603 * enforced.
914 * o Tag::USAGE_EXPIRE_DATETIME can only be enforced if a trusted UTC time source is
[all …]
/aosp12/system/keymaster/android_keymaster/
H A Dandroid_keymaster_messages.cpp208 key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize()
215 buf = enforced.Serialize(buf, end); in NonErrorSerialize()
223 !enforced.Deserialize(buf_ptr, end) || // in NonErrorDeserialize()
336 return enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize()
340 buf = enforced.Serialize(buf, end); in NonErrorSerialize()
346 return enforced.Deserialize(buf_ptr, end) && unenforced.Deserialize(buf_ptr, end); in NonErrorDeserialize()
554 key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize()
561 buf = enforced.Serialize(buf, end); in NonErrorSerialize()
569 !enforced.Deserialize(buf_ptr, end) || // in NonErrorDeserialize()
837 buf = enforced.Serialize(buf, end); in NonErrorSerialize()
[all …]
H A Dandroid_keymaster.cpp334 response->enforced.Clear(); in GenerateKey()
340 &response->enforced, in GenerateKey()
531 response->enforced = move(key->hw_enforced()); in GetKeyCharacteristics()
534 response->error = CheckVersionInfo(response->enforced, response->unenforced, *context_); in GetKeyCharacteristics()
790 &response->enforced, // in ImportKey()
889 &response->enforced, // in ImportWrappedKey()
/aosp12/art/test/674-hiddenapi/
H A Dinfo.txt1 Test whether hidden API access flags are being enforced. The test is composed of
9 is the child's class loader's parent. Access flags should not be enforced as
/aosp12/system/keymaster/tests/
H A Dandroid_keymaster_messages_test.cpp109 rsp.enforced.Reinitialize(params, array_length(params)); in TEST()
124 EXPECT_EQ(deserialized->enforced, rsp.enforced); in TEST()
149 rsp.enforced.Reinitialize(params, array_length(params)); in TEST()
153 EXPECT_EQ(0U, deserialized->enforced.size()); in TEST()
269 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
273 EXPECT_EQ(msg.enforced, deserialized->enforced); in TEST()
509 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
528 EXPECT_EQ(msg.enforced, deserialized->enforced); in TEST()
/aosp12/system/keymaster/contexts/
H A Dsoft_keymaster_device.cpp710 response.enforced.erase(response.enforced.find(TAG_OS_VERSION)); in generate_key()
711 response.enforced.erase(response.enforced.find(TAG_OS_PATCHLEVEL)); in generate_key()
715 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in generate_key()
785 response.enforced.CopyToParamSet(&characteristics->hw_enforced); in generate_key()
822 response.enforced.erase(response.enforced.find(TAG_OS_VERSION)); in get_key_characteristics()
823 response.enforced.erase(response.enforced.find(TAG_OS_PATCHLEVEL)); in get_key_characteristics()
827 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in get_key_characteristics()
855 response.enforced.CopyToParamSet(&characteristics->hw_enforced); in get_key_characteristics()
897 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in import_key()
/aosp12/hardware/interfaces/keymaster/3.0/
H A Dtypes.hal37 * Tags that must be semantically enforced by hardware and software implementations.
61 /** Other hardware-enforced. */
66 * Tags that should be semantically enforced by hardware if possible and will otherwise be
67 * enforced by software (keystore).
227 * either the hardware-enforced or software-enforced list for a key, indicating whether the key is
228 * hardware or software-based. Specifically, a key with GENERATED in the hardware-enforced list is
/aosp12/system/core/trusty/keymaster/keymint/
H A DTrustyKeyMintDevice.cpp138 convertKeyCharacteristics(response.unenforced, response.enforced); in generateKey()
157 *characteristics = convertKeyCharacteristics(response.unenforced, response.enforced, in getKeyCharacteristics()
187 convertKeyCharacteristics(response.unenforced, response.enforced); in importKey()
217 convertKeyCharacteristics(response.unenforced, response.enforced); in importWrappedKey()
/aosp12/system/keymaster/ng/
H A DAndroidKeyMintDevice.cpp284 securityLevel_, request.key_description, response.unenforced, response.enforced); in generateKey()
315 securityLevel_, request.key_description, response.unenforced, response.enforced); in importKey()
346 securityLevel_, request.additional_params, response.unenforced, response.enforced); in importWrappedKey()
462 convertKeyCharacteristics(securityLevel_, emptySet, response.unenforced, response.enforced, in getKeyCharacteristics()
H A DAndroidKeymaster4Device.cpp328 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in generateKey()
348 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in getKeyCharacteristics()
371 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in importKey()
398 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in importWrappedKey()
H A DAndroidKeymaster3Device.cpp289 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in generateKey()
309 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in getKeyCharacteristics()
332 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in importKey()
/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Duntrusted_app_27.te19 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
H A Duntrusted_app_25.te30 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
/aosp12/system/core/trusty/keymaster/3.0/
H A DTrustyKeymaster3Device.cpp245 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in generateKey()
265 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in getKeyCharacteristics()
288 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in importKey()
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Duntrusted_app_27.te19 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
H A Duntrusted_app_25.te30 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Duntrusted_app_27.te19 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
H A Duntrusted_app_25.te30 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
/aosp12/system/sepolicy/private/
H A Duntrusted_app_27.te19 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
H A Duntrusted_app_25.te30 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
/aosp12/system/core/trusty/keymaster/4.0/
H A DTrustyKeymaster4Device.cpp360 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in generateKey()
380 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in getKeyCharacteristics()
403 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in importKey()
429 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in importWrappedKey()
/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Duntrusted_app_27.te31 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
H A Duntrusted_app_25.te46 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
/aosp12/system/chre/doc/
H A Dframework_build.md27 of concerns between targets (this is not enforced by any Make language
38 enforced for all builds, then by definition this target would not compatible

1234