/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | UnlockedDeviceRequiredTest.cpp | 38 CreateTestKeys(TAG_UNLOCKED_DEVICE_REQUIRED, ErrorCode::OK); in TEST_P() 40 EXPECT_EQ(ErrorCode::OK, UseAesKey(aesKeyData.blob)); in TEST_P() 41 EXPECT_EQ(ErrorCode::OK, UseHmacKey(hmacKeyData.blob)); in TEST_P() 42 EXPECT_EQ(ErrorCode::OK, UseRsaKey(rsaKeyData.blob)); in TEST_P() 43 EXPECT_EQ(ErrorCode::OK, UseEcdsaKey(ecdsaKeyData.blob)); in TEST_P() 45 Return<ErrorCode> rc = in TEST_P() 48 ASSERT_EQ(ErrorCode::OK, static_cast<ErrorCode>(rc)); in TEST_P() 50 EXPECT_EQ(ErrorCode::DEVICE_LOCKED, UseAesKey(aesKeyData.blob)); in TEST_P() 51 EXPECT_EQ(ErrorCode::DEVICE_LOCKED, UseHmacKey(hmacKeyData.blob)); in TEST_P() 52 EXPECT_EQ(ErrorCode::DEVICE_LOCKED, UseRsaKey(rsaKeyData.blob)); in TEST_P() [all …]
|
D | EarlyBootKeyTest.cpp | 34 CreateTestKeys(TAG_EARLY_BOOT_ONLY, ErrorCode::EARLY_BOOT_ENDED); in TEST_P() 49 CreateTestKeys(TAG_EARLY_BOOT_ONLY, ErrorCode::OK); in TEST_P() 58 EXPECT_EQ(ErrorCode::OK, UseAesKey(aesKeyData.blob)); in TEST_P() 59 EXPECT_EQ(ErrorCode::OK, UseHmacKey(hmacKeyData.blob)); in TEST_P() 60 EXPECT_EQ(ErrorCode::OK, UseRsaKey(rsaKeyData.blob)); in TEST_P() 61 EXPECT_EQ(ErrorCode::OK, UseEcdsaKey(ecdsaKeyData.blob)); in TEST_P() 64 Return<ErrorCode> earlyBootResult = keymaster().earlyBootEnded(); in TEST_P() 66 EXPECT_EQ(earlyBootResult, ErrorCode::OK); in TEST_P() 69 EXPECT_EQ(ErrorCode::EARLY_BOOT_ENDED, UseAesKey(aesKeyData.blob)); in TEST_P() 70 EXPECT_EQ(ErrorCode::EARLY_BOOT_ENDED, UseHmacKey(hmacKeyData.blob)); in TEST_P() [all …]
|
D | Keymaster4_1HidlTest.h | 34 ErrorCode convert(V4_0::ErrorCode error_code) { return static_cast<ErrorCode>(error_code); } in convert() 45 std::tuple<ErrorCode, KeyData> GenerateKeyData(const AuthorizationSet& keyDescription) { in GenerateKeyData() 47 ErrorCode errorCode = convert( in GenerateKeyData() 57 CreateTestKeys(TagType tagToTest, ErrorCode expectedReturn) { in CreateTestKeys() 58 ErrorCode errorCode; in CreateTestKeys() 106 std::tuple<ErrorCode, std::string /* processedMessage */, AuthorizationSet /* out_params */> 110 ErrorCode UseAesKey(const HidlBuf& aesKeyBlob) { in UseAesKey() 117 ErrorCode UseHmacKey(const HidlBuf& hmacKeyBlob) { in UseHmacKey() 126 ErrorCode UseRsaKey(const HidlBuf& rsaKeyBlob) { in UseRsaKey() 134 ErrorCode UseEcdsaKey(const HidlBuf& ecdsaKeyBlob) { in UseEcdsaKey()
|
D | DeviceUniqueAttestationTest.cpp | 224 ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder() in TEST_P() 232 EXPECT_EQ(ErrorCode::UNIMPLEMENTED, in TEST_P() 241 ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder() in TEST_P() 247 EXPECT_EQ(ErrorCode::UNIMPLEMENTED, in TEST_P() 259 ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder() in TEST_P() 269 ErrorCode result = in TEST_P() 277 if (result == ErrorCode::CANNOT_ATTEST_IDS) return; in TEST_P() 279 EXPECT_EQ(ErrorCode::OK, result); in TEST_P() 286 ASSERT_EQ(ErrorCode::OK, err); in TEST_P() 307 ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder() in TEST_P() [all …]
|
D | Keymaster4_1HidlTest.cpp | 30 -> std::tuple<ErrorCode, string, AuthorizationSet /* out_params */> { in ProcessMessage() 32 V4_0::ErrorCode result = Begin(operation, key_blob, in_params, &begin_out_params, &op_handle_); in ProcessMessage() 34 if (result != V4_0::ErrorCode::OK) { in ProcessMessage() 44 if (result != V4_0::ErrorCode::OK) { in ProcessMessage()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 429 EXPECT_EQ(ErrorCode::OK, error); in verify_attestation_record() 430 if (error != ErrorCode::OK) return false; in verify_attestation_record() 503 EXPECT_EQ(ErrorCode::OK, error); in verify_attestation_record() 616 ASSERT_EQ(ErrorCode::OK, GetCharacteristics(key_blob, &retrieved_chars)); in CheckCharacteristics() 631 ASSERT_EQ(ErrorCode::OK, GenerateKey(AuthorizationSetBuilder() in TEST_P() 666 ASSERT_EQ(ErrorCode::UNSUPPORTED_KEY_SIZE, in TEST_P() 681 ASSERT_EQ(ErrorCode::UNSUPPORTED_KEY_SIZE, in TEST_P() 699 ErrorCode::OK, in TEST_P() 727 ASSERT_EQ(ErrorCode::UNSUPPORTED_KEY_SIZE, in TEST_P() 744 ErrorCode::UNSUPPORTED_KEY_SIZE, in TEST_P() [all …]
|
D | KeymasterHidlTest.cpp | 67 ErrorCode KeymasterHidlTest::GenerateKey(const AuthorizationSet& key_desc, HidlBuf* key_blob, in GenerateKey() 74 ErrorCode error; in GenerateKey() 77 [&](ErrorCode hidl_error, const HidlBuf& hidl_key_blob, in GenerateKey() 85 if (error != ErrorCode::OK) { in GenerateKey() 93 ErrorCode KeymasterHidlTest::GenerateKey(const AuthorizationSet& key_desc) { in GenerateKey() 97 ErrorCode KeymasterHidlTest::ImportKey(const AuthorizationSet& key_desc, KeyFormat format, in ImportKey() 100 ErrorCode error; in ImportKey() 103 [&](ErrorCode hidl_error, const HidlBuf& hidl_key_blob, in ImportKey() 111 if (error != ErrorCode::OK) { in ImportKey() 119 ErrorCode KeymasterHidlTest::ImportKey(const AuthorizationSet& key_desc, KeyFormat format, in ImportKey() [all …]
|
D | KeymasterHidlTest.h | 101 ErrorCode GenerateKey(const AuthorizationSet& key_desc, HidlBuf* key_blob, 103 ErrorCode GenerateKey(const AuthorizationSet& key_desc); 105 ErrorCode ImportKey(const AuthorizationSet& key_desc, KeyFormat format, 108 ErrorCode ImportKey(const AuthorizationSet& key_desc, KeyFormat format, 111 ErrorCode ImportWrappedKey(string wrapped_key, string wrapping_key, 115 ErrorCode ExportKey(KeyFormat format, const HidlBuf& key_blob, const HidlBuf& client_id, 117 ErrorCode ExportKey(KeyFormat format, HidlBuf* key_material); 119 ErrorCode DeleteKey(HidlBuf* key_blob, bool keep_key_blob = false); 120 ErrorCode DeleteKey(bool keep_key_blob = false); 122 ErrorCode DeleteAllKeys(); [all …]
|
D | HmacKeySharingTest.cpp | 42 ErrorCode error; 48 ErrorCode error; 71 EXPECT_EQ(ErrorCode::OK, result.error); in getHmacSharingParameters() 72 if (result.error == ErrorCode::OK) paramsVec.push_back(std::move(result.params)); in getHmacSharingParameters() 108 EXPECT_EQ(ErrorCode::OK, response.error); in verifyResponses() 121 EXPECT_EQ(ErrorCode::OK, result1.error); in TEST_P() 124 EXPECT_EQ(ErrorCode::OK, result2.error); in TEST_P() 203 EXPECT_EQ(ErrorCode::INVALID_ARGUMENT, responses[i].error) in TEST_P() 206 EXPECT_EQ(ErrorCode::OK, responses[i].error) << "Others should succeed"; in TEST_P() 246 EXPECT_EQ(ErrorCode::INVALID_ARGUMENT, responses[i].error) in TEST_P() [all …]
|
D | VerificationTokenTest.cpp | 29 ErrorCode error; 86 EXPECT_EQ(ErrorCode::UNIMPLEMENTED, result1.error); in TEST_P() 90 EXPECT_EQ(ErrorCode::OK, result1.error); in TEST_P() 104 EXPECT_EQ(ErrorCode::OK, result2.error); in TEST_P() 146 EXPECT_EQ(ErrorCode::UNIMPLEMENTED, result1.error); in TEST_P() 150 EXPECT_EQ(ErrorCode::OK, result1.error); in TEST_P() 165 EXPECT_EQ(ErrorCode::OK, result2.error); in TEST_P()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 454 ErrorCode GenerateKey(const AuthorizationSet& key_desc, HidlBuf* key_blob, in GenerateKey() 460 ErrorCode error; in GenerateKey() 463 [&](ErrorCode hidl_error, const HidlBuf& hidl_key_blob, in GenerateKey() 471 if (error != ErrorCode::OK) { in GenerateKey() 479 ErrorCode GenerateKey(const AuthorizationSet& key_desc) { in GenerateKey() 483 ErrorCode ImportKey(const AuthorizationSet& key_desc, KeyFormat format, in ImportKey() 486 ErrorCode error; in ImportKey() 489 [&](ErrorCode hidl_error, const HidlBuf& hidl_key_blob, in ImportKey() 497 if (error != ErrorCode::OK) { in ImportKey() 505 ErrorCode ImportKey(const AuthorizationSet& key_desc, KeyFormat format, in ImportKey() [all …]
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintTest.cpp | 698 ASSERT_EQ(ErrorCode::OK, GenerateKey(builder, &key_blob, &key_characteristics)); in TEST_P() 737 EXPECT_EQ(ErrorCode::UNSUPPORTED_KEY_SIZE, in TEST_P() 757 EXPECT_EQ(ErrorCode::UNSUPPORTED_KEY_SIZE, in TEST_P() 786 if (result == ErrorCode::OK) { in TEST_P() 794 EXPECT_TRUE(result == ErrorCode::INCOMPATIBLE_PADDING_MODE || in TEST_P() 795 result == ErrorCode::INVALID_KEY_BLOB) in TEST_P() 800 EXPECT_EQ(ErrorCode::INCOMPATIBLE_PADDING_MODE, result); in TEST_P() 827 EXPECT_EQ(ErrorCode::MISSING_MIN_MAC_LENGTH, in TEST_P() 854 EXPECT_EQ(ErrorCode::UNSUPPORTED_MIN_MAC_LENGTH, in TEST_P() 875 ASSERT_EQ(ErrorCode::OK, GenerateKey(AuthorizationSetBuilder() in TEST_P() [all …]
|
D | KeyMintAidlTestBase.h | 111 ErrorCode GenerateKey(const AuthorizationSet& key_desc); 113 ErrorCode GenerateKey(const AuthorizationSet& key_desc, vector<uint8_t>* key_blob, 116 ErrorCode GenerateKey(const AuthorizationSet& key_desc, 121 ErrorCode ImportKey(const AuthorizationSet& key_desc, KeyFormat format, 124 ErrorCode ImportKey(const AuthorizationSet& key_desc, KeyFormat format, 127 ErrorCode ImportWrappedKey(string wrapped_key, string wrapping_key, 131 ErrorCode ImportWrappedKey(string wrapped_key, string wrapping_key, in ImportWrappedKey() 138 ErrorCode GetCharacteristics(const vector<uint8_t>& key_blob, const vector<uint8_t>& app_id, 141 ErrorCode GetCharacteristics(const vector<uint8_t>& key_blob, 150 ErrorCode DeleteKey(vector<uint8_t>* key_blob, bool keep_key_blob = false); [all …]
|
D | AuthTest.cpp | 246 ErrorCode result = Begin(operation, key_blob, in_params, out_params, hat); in ProcessMessage() 247 EXPECT_EQ(ErrorCode::OK, result); in ProcessMessage() 248 if (result != ErrorCode::OK) { in ProcessMessage() 256 EXPECT_EQ(ErrorCode::OK, in ProcessMessage() 262 EXPECT_EQ(ErrorCode::OK, Finish(message, {} /* signature */, &output, hat, time_token)); in ProcessMessage() 323 ASSERT_EQ(ErrorCode::OK, in TEST_P() 330 EXPECT_EQ(ErrorCode::KEY_USER_NOT_AUTHENTICATED, in TEST_P() 348 EXPECT_EQ(ErrorCode::KEY_USER_NOT_AUTHENTICATED, in TEST_P() 355 if (begin_result == ErrorCode::OK) { in TEST_P() 362 EXPECT_EQ(ErrorCode::OK, in TEST_P() [all …]
|
D | KeyMintAidlTestBase.cpp | 211 ErrorCode rc = GetReturnErrorCode(result); in ~KeyBlobDeleter() 212 EXPECT_TRUE(rc == ErrorCode::OK || rc == ErrorCode::UNIMPLEMENTED) << result << "\n"; in ~KeyBlobDeleter() 310 ErrorCode KeyMintAidlTestBase::GenerateKey(const AuthorizationSet& key_desc) { in GenerateKey() 314 ErrorCode KeyMintAidlTestBase::GenerateKey(const AuthorizationSet& key_desc, in GenerateKey() 329 EXPECT_EQ(error, ErrorCode::OK); in GenerateKey() 334 ErrorCode error = in GenerateKey() 337 if (error == ErrorCode::OK && attest_cert_chain.size() > 0) { in GenerateKey() 344 ErrorCode KeyMintAidlTestBase::GenerateKey(const AuthorizationSet& key_desc, in GenerateKey() 384 ErrorCode KeyMintAidlTestBase::ImportKey(const AuthorizationSet& key_desc, KeyFormat format, in ImportKey() 422 ErrorCode KeyMintAidlTestBase::ImportKey(const AuthorizationSet& key_desc, KeyFormat format, in ImportKey() [all …]
|
D | AttestKeyTest.cpp | 61 ASSERT_EQ(ErrorCode::OK, in TEST_P() 81 ASSERT_EQ(ErrorCode::OK, in TEST_P() 113 ASSERT_EQ(ErrorCode::OK, in TEST_P() 148 ASSERT_EQ(ErrorCode::OK, in TEST_P() 210 ASSERT_EQ(ErrorCode::INCOMPATIBLE_PURPOSE, in TEST_P() 254 if (isRkpOnly() && result == ErrorCode::ATTESTATION_KEYS_NOT_PROVISIONED) { in TEST_P() 257 ASSERT_EQ(ErrorCode::OK, result); in TEST_P() 284 ASSERT_EQ(ErrorCode::OK, in TEST_P() 363 ASSERT_EQ(ErrorCode::OK, result); in TEST_P() 440 ASSERT_EQ(ErrorCode::OK, result); in TEST_P() [all …]
|
D | SecureElementProvisioningTest.cpp | 213 ASSERT_EQ(static_cast<ErrorCode>(result.getServiceSpecificError()), ErrorCode::UNIMPLEMENTED); in TEST_F() 218 ASSERT_EQ(static_cast<ErrorCode>(result.getServiceSpecificError()), ErrorCode::UNIMPLEMENTED); in TEST_F() 236 ASSERT_EQ(static_cast<ErrorCode>(result.getServiceSpecificError()), ErrorCode::UNIMPLEMENTED); in TEST_F() 265 ASSERT_EQ(static_cast<ErrorCode>(result.getServiceSpecificError()), in TEST_F() 266 ErrorCode::UNIMPLEMENTED); in TEST_F() 270 ASSERT_EQ(static_cast<ErrorCode>(result.getServiceSpecificError()), in TEST_F() 271 ErrorCode::UNIMPLEMENTED); in TEST_F() 367 ASSERT_EQ(static_cast<ErrorCode>(result.getServiceSpecificError()), in TEST_F() 368 ErrorCode::VERIFICATION_FAILED); in TEST_F() 381 ASSERT_EQ(static_cast<ErrorCode>(result.getServiceSpecificError()), in TEST_F() [all …]
|
D | DeviceUniqueAttestationTest.cpp | 90 ASSERT_TRUE(result == ErrorCode::INVALID_ARGUMENT || result == ErrorCode::UNSUPPORTED_TAG) in TEST_P() 122 ASSERT_TRUE(result == ErrorCode::INVALID_ARGUMENT || result == ErrorCode::UNSUPPORTED_TAG) in TEST_P() 155 if (result == ErrorCode::CANNOT_ATTEST_IDS) return; in TEST_P() 157 ASSERT_EQ(ErrorCode::OK, result); in TEST_P() 214 if (result == ErrorCode::CANNOT_ATTEST_IDS) return; in TEST_P() 215 ASSERT_EQ(ErrorCode::OK, result); in TEST_P() 309 if (result == ErrorCode::CANNOT_ATTEST_IDS) return; in TEST_P() 310 ASSERT_EQ(ErrorCode::OK, result); in TEST_P()
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | Keymaster3.h | 52 _hidl_cb(V4_0::ErrorCode::UNIMPLEMENTED, {}); in getHmacSharingParameters() 58 _hidl_cb(V4_0::ErrorCode::UNIMPLEMENTED, {}); in computeSharedHmac() 65 _hidl_cb(V4_0::ErrorCode::UNIMPLEMENTED, {}); in verifyAuthorization() 69 Return<V4_0::ErrorCode> addRngEntropy(const hidl_vec<uint8_t>& data) override; 85 _hidl_cb(V4_0::ErrorCode::UNIMPLEMENTED, {}, {}); in importWrappedKey() 98 Return<V4_0::ErrorCode> deleteKey(const hidl_vec<uint8_t>& keyBlob) override; 99 Return<V4_0::ErrorCode> deleteAllKeys() override; 100 Return<V4_0::ErrorCode> destroyAttestationIds() override; 111 Return<V4_0::ErrorCode> abort(uint64_t operationHandle) override; 117 Return<ErrorCode> deviceLocked(bool /* passwordOnly */, in deviceLocked() [all …]
|
D | Keymaster4.h | 68 Return<V4_0::ErrorCode> addRngEntropy(const hidl_vec<uint8_t>& data) override { in addRngEntropy() 117 Return<V4_0::ErrorCode> deleteKey(const hidl_vec<uint8_t>& keyBlob) override { in deleteKey() 121 Return<V4_0::ErrorCode> deleteAllKeys() override { return km4_0_dev_->deleteAllKeys(); } in deleteAllKeys() 123 Return<V4_0::ErrorCode> destroyAttestationIds() override { in destroyAttestationIds() 148 Return<V4_0::ErrorCode> abort(uint64_t operationHandle) override { in abort() 156 Return<ErrorCode> deviceLocked(bool passwordOnly, in deviceLocked() 159 return ErrorCode::UNIMPLEMENTED; in deviceLocked() 162 Return<ErrorCode> earlyBootEnded() override { in earlyBootEnded() 164 return ErrorCode::UNIMPLEMENTED; in earlyBootEnded()
|
/hardware/interfaces/keymaster/4.1/support/ |
D | Keymaster3.cpp | 29 V4_0::ErrorCode convert(V3_0::ErrorCode error) { in convert() 30 return static_cast<V4_0::ErrorCode>(error); in convert() 141 Return<V4_0::ErrorCode> Keymaster3::addRngEntropy(const hidl_vec<uint8_t>& data) { in addRngEntropy() 144 return StatusOf<V3_0::ErrorCode, V4_0::ErrorCode>(rc); in addRngEntropy() 151 auto cb = [&](V3_0::ErrorCode error, const hidl_vec<uint8_t>& keyBlob, in generateKey() 164 auto cb = [&](V3_0::ErrorCode error, const V3_0::KeyCharacteristics& chars) { in getKeyCharacteristics() 175 auto cb = [&](V3_0::ErrorCode error, const hidl_vec<uint8_t>& keyBlob, in importKey() 187 auto cb = [&](V3_0::ErrorCode error, const hidl_vec<uint8_t>& keyMaterial) { in exportKey() 198 auto cb = [&](V3_0::ErrorCode error, const hidl_vec<hidl_vec<uint8_t>>& certChain) { in attestKey() 209 auto cb = [&](V3_0::ErrorCode error, const hidl_vec<uint8_t>& upgradedKeyBlob) { in upgradeKey() [all …]
|
/hardware/interfaces/security/sharedsecret/aidl/vts/functional/ |
D | SharedSecretAidlTest.cpp | 28 using ::aidl::android::hardware::security::keymint::ErrorCode; 36 ErrorCode error; 42 ErrorCode error; 50 EXPECT_EQ(ErrorCode::OK, error); in getSharedSecretParameters() 63 EXPECT_EQ(ErrorCode::OK, result.error); in getAllSharedSecretParameters() 64 if (result.error == ErrorCode::OK) paramsVec.push_back(std::move(result.params)); in getAllSharedSecretParameters() 96 EXPECT_EQ(ErrorCode::OK, response.error); in verifyResponses() 101 ErrorCode GetReturnErrorCode(const Status& result) { in GetReturnErrorCode() 102 if (result.isOk()) return ErrorCode::OK; in GetReturnErrorCode() 104 return static_cast<ErrorCode>(result.getServiceSpecificError()); in GetReturnErrorCode() [all …]
|
/hardware/interfaces/keymaster/4.0/support/fuzzer/ |
D | keymaster4_attestation_fuzzer.cpp | 32 ErrorCode generateKey(const AuthorizationSet& keyDesc, hidl_vec<uint8_t>* keyBlob, 34 ErrorCode attestKey(hidl_vec<uint8_t>& keyBlob, const AuthorizationSet& attestParams, 45 ErrorCode KeyMaster4AttestationFuzzer::generateKey(const AuthorizationSet& key_desc, in generateKey() 48 ErrorCode error; in generateKey() 50 [&](ErrorCode hidlError, const hidl_vec<uint8_t>& hidlKeyBlob, in generateKey() 59 ErrorCode KeyMaster4AttestationFuzzer::attestKey(hidl_vec<uint8_t>& keyBlob, in attestKey() 62 ErrorCode error; in attestKey() 65 [&](ErrorCode hidlError, const hidl_vec<hidl_vec<uint8_t>>& hidlCertificateChain) { in attestKey() 71 return ErrorCode::UNKNOWN_ERROR; in attestKey() 131 if (error != ErrorCode::OK) { in verifyAttestationRecord()
|
/hardware/interfaces/security/secureclock/aidl/vts/functional/ |
D | SecureClockAidlTest.cpp | 30 using ::aidl::android::hardware::security::keymint::ErrorCode; 38 ErrorCode error; 69 ErrorCode GetReturnErrorCode(const Status& result) { in GetReturnErrorCode() 70 if (result.isOk()) return ErrorCode::OK; in GetReturnErrorCode() 73 return static_cast<ErrorCode>(result.getServiceSpecificError()); in GetReturnErrorCode() 76 return ErrorCode::UNKNOWN_ERROR; in GetReturnErrorCode() 114 EXPECT_EQ(ErrorCode::OK, result1.error); in TEST_P() 124 EXPECT_EQ(ErrorCode::OK, result2.error); in TEST_P() 155 EXPECT_EQ(ErrorCode::OK, result1.error); in TEST_P() 165 EXPECT_EQ(ErrorCode::OK, result2.error); in TEST_P()
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 71 * @return error See the ErrorCode enum in types.hal. 73 addRngEntropy(vec<uint8_t> data) generates(ErrorCode error); 81 * @return error See the ErrorCode enum in types.hal. 90 generates(ErrorCode error, vec<uint8_t> keyBlob, KeyCharacteristics keyCharacteristics); 102 * @return error See the ErrorCode enum. 110 * @return error See the ErrorCode enum. 113 generates(ErrorCode error, vec<uint8_t> keyBlob, KeyCharacteristics keyCharacteristics); 131 * @return error See the ErrorCode enum in types.hal. 137 generates(ErrorCode error, KeyCharacteristics keyCharacteristics); 157 * @return error See the ErrorCode enum in types.hal. [all …]
|