/aosp12/hardware/interfaces/keymaster/4.0/ |
H A D | types.hal | 72 * Must be hardware-enforced. 81 * Must be hardware-enforced. 93 * Must be hardware-enforced. 106 * Must be hardware-enforced. 120 * Must be hardware-enforced. 148 * Must be hardware-enforced. 161 * Must be hardware-enforced. 174 * Must be hardware-enforced. 185 * Must be hardware-enforced. 199 * Must be hardware-enforced. [all …]
|
H A D | IKeymasterDevice.hal | 129 * o Tag::OS_VERSION, must be hardware-enforced. 130 * o Tag::OS_PATCHLEVEL, must be hardware-enforced. 131 * o Tag::VENDOR_PATCHLEVEL, must be hardware-enforced. 132 * o Tag::BOOT_PATCHLEVEL, must be hardware-enforced. 135 * o Tag::ORIGIN, must be hardware-enforced. 393 * in the hardware-enforced and software-enforced lists. See getKeyCharacteristics for more 601 * belongs in the hardware-enforced or software-enforced list is that if the meaning of the tag 602 * is fully assured by secure hardware, it is hardware enforced. Otherwise, it's software 603 * enforced. 914 * o Tag::USAGE_EXPIRE_DATETIME can only be enforced if a trusted UTC time source is [all …]
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | android_keymaster_messages.cpp | 208 key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize() 215 buf = enforced.Serialize(buf, end); in NonErrorSerialize() 223 !enforced.Deserialize(buf_ptr, end) || // in NonErrorDeserialize() 336 return enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize() 340 buf = enforced.Serialize(buf, end); in NonErrorSerialize() 346 return enforced.Deserialize(buf_ptr, end) && unenforced.Deserialize(buf_ptr, end); in NonErrorDeserialize() 554 key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize(); in NonErrorSerializedSize() 561 buf = enforced.Serialize(buf, end); in NonErrorSerialize() 569 !enforced.Deserialize(buf_ptr, end) || // in NonErrorDeserialize() 837 buf = enforced.Serialize(buf, end); in NonErrorSerialize() [all …]
|
H A D | android_keymaster.cpp | 334 response->enforced.Clear(); in GenerateKey() 340 &response->enforced, in GenerateKey() 531 response->enforced = move(key->hw_enforced()); in GetKeyCharacteristics() 534 response->error = CheckVersionInfo(response->enforced, response->unenforced, *context_); in GetKeyCharacteristics() 790 &response->enforced, // in ImportKey() 889 &response->enforced, // in ImportWrappedKey()
|
/aosp12/art/test/674-hiddenapi/ |
H A D | info.txt | 1 Test whether hidden API access flags are being enforced. The test is composed of 9 is the child's class loader's parent. Access flags should not be enforced as
|
/aosp12/system/keymaster/tests/ |
H A D | android_keymaster_messages_test.cpp | 109 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 124 EXPECT_EQ(deserialized->enforced, rsp.enforced); in TEST() 149 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 153 EXPECT_EQ(0U, deserialized->enforced.size()); in TEST() 269 msg.enforced.Reinitialize(params, array_length(params)); in TEST() 273 EXPECT_EQ(msg.enforced, deserialized->enforced); in TEST() 509 msg.enforced.Reinitialize(params, array_length(params)); in TEST() 528 EXPECT_EQ(msg.enforced, deserialized->enforced); in TEST()
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_keymaster_device.cpp | 710 response.enforced.erase(response.enforced.find(TAG_OS_VERSION)); in generate_key() 711 response.enforced.erase(response.enforced.find(TAG_OS_PATCHLEVEL)); in generate_key() 715 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in generate_key() 785 response.enforced.CopyToParamSet(&characteristics->hw_enforced); in generate_key() 822 response.enforced.erase(response.enforced.find(TAG_OS_VERSION)); in get_key_characteristics() 823 response.enforced.erase(response.enforced.find(TAG_OS_PATCHLEVEL)); in get_key_characteristics() 827 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in get_key_characteristics() 855 response.enforced.CopyToParamSet(&characteristics->hw_enforced); in get_key_characteristics() 897 *characteristics = BuildCharacteristics(response.enforced, response.unenforced); in import_key()
|
/aosp12/hardware/interfaces/keymaster/3.0/ |
H A D | types.hal | 37 * Tags that must be semantically enforced by hardware and software implementations. 61 /** Other hardware-enforced. */ 66 * Tags that should be semantically enforced by hardware if possible and will otherwise be 67 * enforced by software (keystore). 227 * either the hardware-enforced or software-enforced list for a key, indicating whether the key is 228 * hardware or software-based. Specifically, a key with GENERATED in the hardware-enforced list is
|
/aosp12/system/core/trusty/keymaster/keymint/ |
H A D | TrustyKeyMintDevice.cpp | 138 convertKeyCharacteristics(response.unenforced, response.enforced); in generateKey() 157 *characteristics = convertKeyCharacteristics(response.unenforced, response.enforced, in getKeyCharacteristics() 187 convertKeyCharacteristics(response.unenforced, response.enforced); in importKey() 217 convertKeyCharacteristics(response.unenforced, response.enforced); in importWrappedKey()
|
/aosp12/system/keymaster/ng/ |
H A D | AndroidKeyMintDevice.cpp | 284 securityLevel_, request.key_description, response.unenforced, response.enforced); in generateKey() 315 securityLevel_, request.key_description, response.unenforced, response.enforced); in importKey() 346 securityLevel_, request.additional_params, response.unenforced, response.enforced); in importWrappedKey() 462 convertKeyCharacteristics(securityLevel_, emptySet, response.unenforced, response.enforced, in getKeyCharacteristics()
|
H A D | AndroidKeymaster4Device.cpp | 328 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in generateKey() 348 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in getKeyCharacteristics() 371 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in importKey() 398 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in importWrappedKey()
|
H A D | AndroidKeymaster3Device.cpp | 289 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in generateKey() 309 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in getKeyCharacteristics() 332 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in importKey()
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | untrusted_app_27.te | 19 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
H A D | untrusted_app_25.te | 30 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
/aosp12/system/core/trusty/keymaster/3.0/ |
H A D | TrustyKeymaster3Device.cpp | 245 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in generateKey() 265 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in getKeyCharacteristics() 288 resultCharacteristics.teeEnforced = kmParamSet2Hidl(response.enforced); in importKey()
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | untrusted_app_27.te | 19 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
H A D | untrusted_app_25.te | 30 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | untrusted_app_27.te | 19 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
H A D | untrusted_app_25.te | 30 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
/aosp12/system/sepolicy/private/ |
H A D | untrusted_app_27.te | 19 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
H A D | untrusted_app_25.te | 30 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
/aosp12/system/core/trusty/keymaster/4.0/ |
H A D | TrustyKeymaster4Device.cpp | 360 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in generateKey() 380 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in getKeyCharacteristics() 403 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in importKey() 429 resultCharacteristics.hardwareEnforced = kmParamSet2Hidl(response.enforced); in importWrappedKey()
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | untrusted_app_27.te | 31 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
H A D | untrusted_app_25.te | 46 …rm/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
|
/aosp12/system/chre/doc/ |
H A D | framework_build.md | 27 of concerns between targets (this is not enforced by any Make language 38 enforced for all builds, then by definition this target would not compatible
|