Searched refs:kp (Results 1 – 12 of 12) sorted by relevance
/system/security/keystore2/src/km_compat/ |
D | km_compat_type_conversion.h | 444 static V4_0::KeyParameter convertKeyParameterToLegacy(const KMV1::KeyParameter& kp) { in convertKeyParameterToLegacy() argument 445 switch (kp.tag) { in convertKeyParameterToLegacy() 449 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in convertKeyParameterToLegacy() 457 if (auto v = KMV1::authorizationValue(KMV1::TAG_ALGORITHM, kp)) { in convertKeyParameterToLegacy() 462 if (auto v = KMV1::authorizationValue(KMV1::TAG_KEY_SIZE, kp)) { in convertKeyParameterToLegacy() 467 if (auto v = KMV1::authorizationValue(KMV1::TAG_BLOCK_MODE, kp)) { in convertKeyParameterToLegacy() 472 if (auto v = KMV1::authorizationValue(KMV1::TAG_DIGEST, kp)) { in convertKeyParameterToLegacy() 477 if (auto v = KMV1::authorizationValue(KMV1::TAG_PADDING, kp)) { in convertKeyParameterToLegacy() 482 if (auto v = KMV1::authorizationValue(KMV1::TAG_CALLER_NONCE, kp)) { in convertKeyParameterToLegacy() 487 if (auto v = KMV1::authorizationValue(KMV1::TAG_MIN_MAC_LENGTH, kp)) { in convertKeyParameterToLegacy() [all …]
|
D | lib.rs | 396 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 397 kp, in test_get_key_characteristics() 403 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 404 kp, in test_get_key_characteristics() 407 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 408 kp, in test_get_key_characteristics() 414 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 415 kp, in test_get_key_characteristics() 421 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 422 kp, in test_get_key_characteristics() [all …]
|
D | km_compat.cpp | 288 for (const auto& kp : kps) { in convertKeyParametersToLegacy() local 289 auto p = convertKeyParameterToLegacy(kp); in convertKeyParametersToLegacy() 930 for (const KeyParameter& kp : keyParams) { in getMaximum() local 931 if (auto value = authorizationValue(tag, kp)) { in getMaximum() 1187 std::find_if(keyParams.begin(), keyParams.end(), [&](const KeyParameter& kp) { in getCertificate() argument 1188 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in getCertificate()
|
/system/security/keystore2/src/ |
D | key_parameter.rs | 565 fn from(kp: KmKeyParameter) -> Self { 566 match kp { 978 fn from(kp: &KmKeyParameter) -> Self { in from() 979 kp.clone().into() in from() 1077 for kp in list_o_parameters.iter() { in check_field_matches_tag_type() 1078 match (&kp.value, get_field_by_tag_type(kp.tag)) { in check_field_matches_tag_type() 1099 kp.tag, actual, expected in check_field_matches_tag_type() 1243 let kp = KeyParameter::new( in test_to_sql_enum_i32() localVariable 1247 store_keyparameter(&db, 1, &kp)?; in test_to_sql_enum_i32() 1249 assert_eq!(kp.get_tag(), key_param.get_tag()); in test_to_sql_enum_i32() [all …]
|
D | security_level.rs | 281 |kp| match kp.value { in create_operation() 397 if params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE) { in add_certificate_parameters() 417 if params.iter().any(|kp| kp.tag == Tag::INCLUDE_UNIQUE_ID) { in add_certificate_parameters() 434 if params.iter().any(|kp| is_device_id_attestation_tag(kp.tag)) { in add_certificate_parameters() 443 match params.iter().find(|kp| kp.tag == Tag::ALGORITHM) { in add_certificate_parameters() 446 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_BEFORE) { in add_certificate_parameters() 452 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_AFTER) { in add_certificate_parameters()
|
D | attestation_key_utils.rs | 60 let challenge_present = params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE); in get_attest_key_info()
|
D | enforcements.rs | 439 for kp in key_params.iter() { in authorize_create() 440 if kp.get_tag() == Tag::ALGORITHM in authorize_create() 441 && *kp.key_parameter_value() != KeyParameterValue::Algorithm(Algorithm::EC) in authorize_create() 452 for kp in key_params.iter() { in authorize_create() 453 match *kp.key_parameter_value() { in authorize_create() 591 && op_params.iter().any(|kp| kp.tag == Tag::NONCE) in authorize_create() 780 for kp in key_parameters { in super_encryption_required() 781 let t = match kp.key_parameter_value() { in super_encryption_required()
|
D | remote_provisioning.rs | 151 params.iter().any(|kp| { in is_asymmetric_key() 153 kp, in is_asymmetric_key()
|
D | legacy_migrator.rs | 646 params.iter().any(|kp| { in bulk_delete() 647 KeyParameterValue::RollbackResistance == *kp.key_parameter_value() in bulk_delete()
|
/system/keymaster/key_blob_utils/ |
D | ocb.c | 452 kp[idx] = _mm_castps_si128(_mm_shuffle_ps(_mm_castsi128_ps(tmp), _mm_castsi128_ps(x0), 68)); \ 453 kp[idx + 1] = \ 458 kp[idx + 2] = x0; \ 463 __m128i* kp = (__m128i*)key; in AES_128_Key_Expansion() local 464 kp[0] = x0 = _mm_loadu_si128((__m128i*)userkey); in AES_128_Key_Expansion() 467 kp[1] = x0; in AES_128_Key_Expansion() 469 kp[2] = x0; in AES_128_Key_Expansion() 471 kp[3] = x0; in AES_128_Key_Expansion() 473 kp[4] = x0; in AES_128_Key_Expansion() 475 kp[5] = x0; in AES_128_Key_Expansion() [all …]
|
/system/timezone/output_data/android/ |
D | tzids.prototxt | 1032 isoCode: "kp"
|
/system/timezone/input_data/android/ |
D | countryzones.txt | 1824 isoCode:"kp"
|