/system/security/keystore2/src/ |
D | globals.rs | 187 fn connect_keymint(security_level: &SecurityLevel) -> Result<(Asp, KeyMintHardwareInfo)> { in connect_keymint() 191 let service_name = match *security_level { in connect_keymint() 226 map_binder_status(keystore_compat_service.getKeyMintDevice(*security_level)) in connect_keymint() 261 security_level: &SecurityLevel, in get_keymint_device() 264 if let Some((dev, hw_info, uuid)) = devices_map.dev_by_sec_level(&security_level) { in get_keymint_device() 267 let (dev, hw_info) = connect_keymint(security_level).context("In get_keymint_device.")?; in get_keymint_device() 268 devices_map.insert(*security_level, dev, hw_info); in get_keymint_device() 270 Ok(devices_map.dev_by_sec_level(security_level).unwrap()) in get_keymint_device() 347 fn connect_remotely_provisioned_component(security_level: &SecurityLevel) -> Result<Asp> { in connect_remotely_provisioned_component() 351 let service_name = match *security_level { in connect_remotely_provisioned_component() [all …]
|
D | raw_device.rs | 52 security_level: SecurityLevel, field 64 pub fn get(security_level: SecurityLevel) -> Result<KeyMintDevice> { in get() 65 let (asp, hw_info, km_uuid) = get_keymint_device(&security_level) in get() 72 security_level: hw_info.securityLevel, in get() 78 pub fn get_or_none(security_level: SecurityLevel) -> Result<Option<KeyMintDevice>> { in get_or_none() 79 KeyMintDevice::get(security_level).map(Some).or_else(|e| { in get_or_none() 95 pub fn security_level(&self) -> SecurityLevel { in security_level() method 96 self.security_level in security_level()
|
D | key_parameter.rs | 987 security_level: SecurityLevel, field 992 pub fn new(value: KeyParameterValue, security_level: SecurityLevel) -> Self { in new() 993 KeyParameter { value, security_level } in new() 1009 security_level: security_level_val, in new_from_sql() 1024 pub fn security_level(&self) -> &SecurityLevel { in security_level() method 1025 &self.security_level in security_level() 1032 Authorization { securityLevel: self.security_level, keyParameter: self.value.into() } in into_authorization() 1130 assert_eq!(*key_parameter.security_level(), SecurityLevel::STRONGBOX); in test_key_parameter() 1165 assert_eq!(*key_param.security_level(), SecurityLevel::STRONGBOX); in test_new_from_sql_enum_i32() 1251 assert_eq!(kp.security_level(), key_param.security_level()); in test_to_sql_enum_i32() [all …]
|
D | lib.rs | 40 pub mod security_level; module
|
D | security_level.rs | 63 security_level: SecurityLevel, field 85 security_level: SecurityLevel, in new_native_binder() 88 let (dev, hw_info, km_uuid) = get_keymint_device(&security_level) in new_native_binder() 92 security_level, in new_native_binder() 97 rem_prov_state: RemProvState::new(security_level, km_uuid), in new_native_binder() 106 let sec_level = self.security_level; in watch_millis() 198 keySecurityLevel: self.security_level, in store_new_key() 359 LoggingInfo::new(self.security_level, purpose, op_params, upgraded_blob.is_some()), in create_operation() 984 log_key_creation_event_stats(self.security_level, params, &result); in generateKey() 998 log_key_creation_event_stats(self.security_level, params, &result); in importKey() [all …]
|
D | service.rs | 22 use crate::security_level::KeystoreSecurityLevel; 360 security_level: SecurityLevel, in getSecurityLevel() 363 format!("security_level: {}", security_level.0) in getSecurityLevel() 365 map_or_log_err(self.get_security_level(security_level), Ok) in getSecurityLevel()
|
D | remote_provisioning.rs | 54 security_level: SecurityLevel, field 61 pub fn new(security_level: SecurityLevel, km_uuid: Uuid) -> Self { in new() 62 Self { security_level, km_uuid, is_hal_present: AtomicBool::new(true) } in new() 71 || get_remotely_provisioned_component(&self.security_level).is_err() in check_rem_prov_enabled()
|
D | metrics_store.rs | 200 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_creation_event_stats() 213 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats() 349 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_operation_event_stats() 360 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats() 572 security_level: process_security_level(*sec_level), in pull_attestation_pool_stats()
|
D | boot_level_keys.rs | 76 if kc.securityLevel == km_dev.security_level() { in get_level_zero_key()
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 187 response.token.security_level = SecurityLevel(); in VerifyAuthorization() 192 toBlob(response.token.security_level), in VerifyAuthorization() 202 token->security_level = SecurityLevel(); in GenerateTimestampToken() 207 toBlob(token->security_level), in GenerateTimestampToken()
|
/system/security/keystore2/aidl/android/security/metrics/ |
D | RkpPoolStats.aidl | 27 SecurityLevel security_level;
|
D | KeyCreationWithAuthInfo.aidl | 34 SecurityLevel security_level;
|
D | KeyOperationWithGeneralInfo.aidl | 31 SecurityLevel security_level;
|
/system/bt/gd/security/record/ |
D | security_record_storage.cc | 71 penc_keys[26] = record->security_level; in SetLeData() 87 *(psrk_keys.data() + 20) = record->security_level; in SetLeData() 166 record->security_level = peer_encryption_keys->data()[26]; in LoadSecurityRecords() 176 record->security_level = peer_signature_resolving_keys->data()[20]; in LoadSecurityRecords()
|
D | security_record.h | 131 uint8_t security_level; variable
|
D | security_record_storage_test.cc | 97 record->security_level = 2; in TEST_F()
|
/system/keymaster/ng/ |
D | AndroidKeymaster41Device.cpp | 49 serializableToken.security_level = in deviceLocked()
|
/system/bt/gd/cert/ |
D | py_l2cap.py | 236 def register_coc(self, cert_address, psm=0x33, security_level=SecurityLevel.NO_SECURITY): argument 238 …_le_facade_pb2.SetEnableDynamicChannelRequest(psm=psm, enable=True, security_level=security_level))
|
/system/bt/gd/security/ |
D | initial_informations.h | 61 uint8_t security_level; member
|
/system/bt/gd/l2cap/le/ |
D | facade.proto | 58 SecurityLevel security_level = 3; field
|
/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 917 security_level = other.security_level; in VerificationToken() 928 keymaster_security_level_t security_level{}; 1053 security_level = other.security_level; in TimestampToken() 1057 return sizeof(challenge) + sizeof(timestamp) + sizeof(security_level) + in SerializedSize() 1063 buf = append_uint32_to_buf(buf, end, security_level); in Serialize() 1069 copy_uint32_from_buf(buf_ptr, end, &security_level) && mac.Deserialize(buf_ptr, end); in Deserialize() 1073 keymaster_security_level_t security_level{};
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 54 keymaster_security_level_t security_level) in PureSoftKeymasterContext() argument 63 security_level_(security_level) { in PureSoftKeymasterContext() 66 if (security_level != KM_SECURITY_LEVEL_SOFTWARE) { in PureSoftKeymasterContext()
|
/system/keymaster/include/keymaster/contexts/ |
D | pure_soft_keymaster_context.h | 50 KmVersion version, keymaster_security_level_t security_level = KM_SECURITY_LEVEL_SOFTWARE);
|
/system/keymaster/android_keymaster/ |
D | android_keymaster_messages.cpp | 879 sizeof(security_level) + blob_size(mac); in SerializedSize() 886 buf = append_uint32_to_buf(buf, end, security_level); in Serialize() 894 copy_uint32_from_buf(buf_ptr, end, &security_level) && in Deserialize()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | attestation_record.h | 369 EatSecurityLevel security_level, cppbor::Map* submod);
|