Home
last modified time | relevance | path

Searched refs:security_level (Results 1 – 25 of 32) sorted by relevance

12

/system/security/keystore2/src/
Dglobals.rs187 fn connect_keymint(security_level: &SecurityLevel) -> Result<(Asp, KeyMintHardwareInfo)> { in connect_keymint()
191 let service_name = match *security_level { in connect_keymint()
226 map_binder_status(keystore_compat_service.getKeyMintDevice(*security_level)) in connect_keymint()
261 security_level: &SecurityLevel, in get_keymint_device()
264 if let Some((dev, hw_info, uuid)) = devices_map.dev_by_sec_level(&security_level) { in get_keymint_device()
267 let (dev, hw_info) = connect_keymint(security_level).context("In get_keymint_device.")?; in get_keymint_device()
268 devices_map.insert(*security_level, dev, hw_info); in get_keymint_device()
270 Ok(devices_map.dev_by_sec_level(security_level).unwrap()) in get_keymint_device()
347 fn connect_remotely_provisioned_component(security_level: &SecurityLevel) -> Result<Asp> { in connect_remotely_provisioned_component()
351 let service_name = match *security_level { in connect_remotely_provisioned_component()
[all …]
Draw_device.rs52 security_level: SecurityLevel, field
64 pub fn get(security_level: SecurityLevel) -> Result<KeyMintDevice> { in get()
65 let (asp, hw_info, km_uuid) = get_keymint_device(&security_level) in get()
72 security_level: hw_info.securityLevel, in get()
78 pub fn get_or_none(security_level: SecurityLevel) -> Result<Option<KeyMintDevice>> { in get_or_none()
79 KeyMintDevice::get(security_level).map(Some).or_else(|e| { in get_or_none()
95 pub fn security_level(&self) -> SecurityLevel { in security_level() method
96 self.security_level in security_level()
Dkey_parameter.rs987 security_level: SecurityLevel, field
992 pub fn new(value: KeyParameterValue, security_level: SecurityLevel) -> Self { in new()
993 KeyParameter { value, security_level } in new()
1009 security_level: security_level_val, in new_from_sql()
1024 pub fn security_level(&self) -> &SecurityLevel { in security_level() method
1025 &self.security_level in security_level()
1032 Authorization { securityLevel: self.security_level, keyParameter: self.value.into() } in into_authorization()
1130 assert_eq!(*key_parameter.security_level(), SecurityLevel::STRONGBOX); in test_key_parameter()
1165 assert_eq!(*key_param.security_level(), SecurityLevel::STRONGBOX); in test_new_from_sql_enum_i32()
1251 assert_eq!(kp.security_level(), key_param.security_level()); in test_to_sql_enum_i32()
[all …]
Dlib.rs40 pub mod security_level; module
Dsecurity_level.rs63 security_level: SecurityLevel, field
85 security_level: SecurityLevel, in new_native_binder()
88 let (dev, hw_info, km_uuid) = get_keymint_device(&security_level) in new_native_binder()
92 security_level, in new_native_binder()
97 rem_prov_state: RemProvState::new(security_level, km_uuid), in new_native_binder()
106 let sec_level = self.security_level; in watch_millis()
198 keySecurityLevel: self.security_level, in store_new_key()
359 LoggingInfo::new(self.security_level, purpose, op_params, upgraded_blob.is_some()), in create_operation()
984 log_key_creation_event_stats(self.security_level, params, &result); in generateKey()
998 log_key_creation_event_stats(self.security_level, params, &result); in importKey()
[all …]
Dservice.rs22 use crate::security_level::KeystoreSecurityLevel;
360 security_level: SecurityLevel, in getSecurityLevel()
363 format!("security_level: {}", security_level.0) in getSecurityLevel()
365 map_or_log_err(self.get_security_level(security_level), Ok) in getSecurityLevel()
Dremote_provisioning.rs54 security_level: SecurityLevel, field
61 pub fn new(security_level: SecurityLevel, km_uuid: Uuid) -> Self { in new()
62 Self { security_level, km_uuid, is_hal_present: AtomicBool::new(true) } in new()
71 || get_remotely_provisioned_component(&self.security_level).is_err() in check_rem_prov_enabled()
Dmetrics_store.rs200 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_creation_event_stats()
213 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats()
349 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_operation_event_stats()
360 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats()
572 security_level: process_security_level(*sec_level), in pull_attestation_pool_stats()
Dboot_level_keys.rs76 if kc.securityLevel == km_dev.security_level() { in get_level_zero_key()
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp187 response.token.security_level = SecurityLevel(); in VerifyAuthorization()
192 toBlob(response.token.security_level), in VerifyAuthorization()
202 token->security_level = SecurityLevel(); in GenerateTimestampToken()
207 toBlob(token->security_level), in GenerateTimestampToken()
/system/security/keystore2/aidl/android/security/metrics/
DRkpPoolStats.aidl27 SecurityLevel security_level;
DKeyCreationWithAuthInfo.aidl34 SecurityLevel security_level;
DKeyOperationWithGeneralInfo.aidl31 SecurityLevel security_level;
/system/bt/gd/security/record/
Dsecurity_record_storage.cc71 penc_keys[26] = record->security_level; in SetLeData()
87 *(psrk_keys.data() + 20) = record->security_level; in SetLeData()
166 record->security_level = peer_encryption_keys->data()[26]; in LoadSecurityRecords()
176 record->security_level = peer_signature_resolving_keys->data()[20]; in LoadSecurityRecords()
Dsecurity_record.h131 uint8_t security_level; variable
Dsecurity_record_storage_test.cc97 record->security_level = 2; in TEST_F()
/system/keymaster/ng/
DAndroidKeymaster41Device.cpp49 serializableToken.security_level = in deviceLocked()
/system/bt/gd/cert/
Dpy_l2cap.py236 def register_coc(self, cert_address, psm=0x33, security_level=SecurityLevel.NO_SECURITY): argument
238 …_le_facade_pb2.SetEnableDynamicChannelRequest(psm=psm, enable=True, security_level=security_level))
/system/bt/gd/security/
Dinitial_informations.h61 uint8_t security_level; member
/system/bt/gd/l2cap/le/
Dfacade.proto58 SecurityLevel security_level = 3; field
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h917 security_level = other.security_level; in VerificationToken()
928 keymaster_security_level_t security_level{};
1053 security_level = other.security_level; in TimestampToken()
1057 return sizeof(challenge) + sizeof(timestamp) + sizeof(security_level) + in SerializedSize()
1063 buf = append_uint32_to_buf(buf, end, security_level); in Serialize()
1069 copy_uint32_from_buf(buf_ptr, end, &security_level) && mac.Deserialize(buf_ptr, end); in Deserialize()
1073 keymaster_security_level_t security_level{};
/system/keymaster/contexts/
Dpure_soft_keymaster_context.cpp54 keymaster_security_level_t security_level) in PureSoftKeymasterContext() argument
63 security_level_(security_level) { in PureSoftKeymasterContext()
66 if (security_level != KM_SECURITY_LEVEL_SOFTWARE) { in PureSoftKeymasterContext()
/system/keymaster/include/keymaster/contexts/
Dpure_soft_keymaster_context.h50 KmVersion version, keymaster_security_level_t security_level = KM_SECURITY_LEVEL_SOFTWARE);
/system/keymaster/android_keymaster/
Dandroid_keymaster_messages.cpp879 sizeof(security_level) + blob_size(mac); in SerializedSize()
886 buf = append_uint32_to_buf(buf, end, security_level); in Serialize()
894 copy_uint32_from_buf(buf_ptr, end, &security_level) && in Deserialize()
/system/keymaster/include/keymaster/km_openssl/
Dattestation_record.h369 EatSecurityLevel security_level, cppbor::Map* submod);

12