Lines Matching refs:sw_enforced

94                                         AuthorizationSet* sw_enforced) {  in FakeKeyAuthorizations()  argument
96 sw_enforced->Clear(); in FakeKeyAuthorizations()
114 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_SIGN); in FakeKeyAuthorizations()
115 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_VERIFY); in FakeKeyAuthorizations()
116 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_ENCRYPT); in FakeKeyAuthorizations()
117 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_DECRYPT); in FakeKeyAuthorizations()
138 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_SIGN); in FakeKeyAuthorizations()
139 sw_enforced->push_back(TAG_PURPOSE, KM_PURPOSE_VERIFY); in FakeKeyAuthorizations()
155 sw_enforced->push_back(TAG_ALL_USERS); in FakeKeyAuthorizations()
156 sw_enforced->push_back(TAG_NO_AUTH_REQUIRED); in FakeKeyAuthorizations()
168 AuthorizationSet* sw_enforced) { in ParseOldSoftkeymasterBlob() argument
224 keymaster_error_t error = FakeKeyAuthorizations(pkey.get(), sw_enforced, sw_enforced); in ParseOldSoftkeymasterBlob()
240 AuthorizationSet* sw_enforced) { in ParseAuthEncryptedBlob() argument
250 *sw_enforced = std::move(key->sw_enforced); in ParseAuthEncryptedBlob()
258 AuthorizationSet* sw_enforced, KmVersion version) { in SetKeyBlobAuthorizations() argument
259 sw_enforced->Clear(); in SetKeyBlobAuthorizations()
370 if (hw_enforced->GetTagCount(entry.tag) == 0) sw_enforced->push_back(entry); in SetKeyBlobAuthorizations()
376 AuthorizationSet* pseudo_hw_enforced = (hw_enforced->empty()) ? sw_enforced : hw_enforced; in SetKeyBlobAuthorizations()
383 if (version < KmVersion::KEYMINT_1 && !sw_enforced->Contains(TAG_CREATION_DATETIME)) { in SetKeyBlobAuthorizations()
384 sw_enforced->push_back(TAG_CREATION_DATETIME, java_time(time(nullptr))); in SetKeyBlobAuthorizations()
387 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in SetKeyBlobAuthorizations()
391 AuthorizationSet* sw_enforced, in ExtendKeyBlobAuthorizations() argument
395 AuthorizationSet* pseudo_hw_enforced = (hw_enforced->empty()) ? sw_enforced : hw_enforced; in ExtendKeyBlobAuthorizations()
402 return TranslateAuthorizationSetError(sw_enforced->is_valid()); in ExtendKeyBlobAuthorizations()
427 int key_os_version_pos = key->sw_enforced().find(TAG_OS_VERSION); in FullUpgradeSoftKeyBlob()
429 uint32_t key_os_version = key->sw_enforced()[key_os_version_pos].integer; in FullUpgradeSoftKeyBlob()
431 key->sw_enforced()[key_os_version_pos].integer = os_version; in FullUpgradeSoftKeyBlob()
437 if (!UpgradeIntegerTag(TAG_OS_VERSION, os_version, &key->sw_enforced(), &set_changed) || in FullUpgradeSoftKeyBlob()
438 !UpgradeIntegerTag(TAG_OS_PATCHLEVEL, os_patchlevel, &key->sw_enforced(), &set_changed) || in FullUpgradeSoftKeyBlob()
440 !UpgradeIntegerTag(TAG_VENDOR_PATCHLEVEL, vendor_patchlevel.value(), &key->sw_enforced(), in FullUpgradeSoftKeyBlob()
443 !UpgradeIntegerTag(TAG_BOOT_PATCHLEVEL, boot_patchlevel.value(), &key->sw_enforced(), in FullUpgradeSoftKeyBlob()
458 key->sw_enforced(), upgraded_key); in FullUpgradeSoftKeyBlob()