Home
last modified time | relevance | path

Searched refs:kp (Results 1 – 12 of 12) sorted by relevance

/system/security/keystore2/src/km_compat/
Dkm_compat_type_conversion.h444 static V4_0::KeyParameter convertKeyParameterToLegacy(const KMV1::KeyParameter& kp) { in convertKeyParameterToLegacy() argument
445 switch (kp.tag) { in convertKeyParameterToLegacy()
449 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in convertKeyParameterToLegacy()
457 if (auto v = KMV1::authorizationValue(KMV1::TAG_ALGORITHM, kp)) { in convertKeyParameterToLegacy()
462 if (auto v = KMV1::authorizationValue(KMV1::TAG_KEY_SIZE, kp)) { in convertKeyParameterToLegacy()
467 if (auto v = KMV1::authorizationValue(KMV1::TAG_BLOCK_MODE, kp)) { in convertKeyParameterToLegacy()
472 if (auto v = KMV1::authorizationValue(KMV1::TAG_DIGEST, kp)) { in convertKeyParameterToLegacy()
477 if (auto v = KMV1::authorizationValue(KMV1::TAG_PADDING, kp)) { in convertKeyParameterToLegacy()
482 if (auto v = KMV1::authorizationValue(KMV1::TAG_CALLER_NONCE, kp)) { in convertKeyParameterToLegacy()
487 if (auto v = KMV1::authorizationValue(KMV1::TAG_MIN_MAC_LENGTH, kp)) { in convertKeyParameterToLegacy()
[all …]
Dlib.rs396 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
397 kp, in test_get_key_characteristics()
403 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
404 kp, in test_get_key_characteristics()
407 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
408 kp, in test_get_key_characteristics()
414 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
415 kp, in test_get_key_characteristics()
421 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
422 kp, in test_get_key_characteristics()
[all …]
Dkm_compat.cpp288 for (const auto& kp : kps) { in convertKeyParametersToLegacy() local
289 auto p = convertKeyParameterToLegacy(kp); in convertKeyParametersToLegacy()
930 for (const KeyParameter& kp : keyParams) { in getMaximum() local
931 if (auto value = authorizationValue(tag, kp)) { in getMaximum()
1187 std::find_if(keyParams.begin(), keyParams.end(), [&](const KeyParameter& kp) { in getCertificate() argument
1188 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in getCertificate()
/system/security/keystore2/src/
Dkey_parameter.rs565 fn from(kp: KmKeyParameter) -> Self {
566 match kp {
978 fn from(kp: &KmKeyParameter) -> Self { in from()
979 kp.clone().into() in from()
1077 for kp in list_o_parameters.iter() { in check_field_matches_tag_type()
1078 match (&kp.value, get_field_by_tag_type(kp.tag)) { in check_field_matches_tag_type()
1099 kp.tag, actual, expected in check_field_matches_tag_type()
1243 let kp = KeyParameter::new( in test_to_sql_enum_i32() localVariable
1247 store_keyparameter(&db, 1, &kp)?; in test_to_sql_enum_i32()
1249 assert_eq!(kp.get_tag(), key_param.get_tag()); in test_to_sql_enum_i32()
[all …]
Dsecurity_level.rs281 |kp| match kp.value { in create_operation()
397 if params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE) { in add_certificate_parameters()
417 if params.iter().any(|kp| kp.tag == Tag::INCLUDE_UNIQUE_ID) { in add_certificate_parameters()
434 if params.iter().any(|kp| is_device_id_attestation_tag(kp.tag)) { in add_certificate_parameters()
443 match params.iter().find(|kp| kp.tag == Tag::ALGORITHM) { in add_certificate_parameters()
446 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_BEFORE) { in add_certificate_parameters()
452 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_AFTER) { in add_certificate_parameters()
Dattestation_key_utils.rs60 let challenge_present = params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE); in get_attest_key_info()
Denforcements.rs439 for kp in key_params.iter() { in authorize_create()
440 if kp.get_tag() == Tag::ALGORITHM in authorize_create()
441 && *kp.key_parameter_value() != KeyParameterValue::Algorithm(Algorithm::EC) in authorize_create()
452 for kp in key_params.iter() { in authorize_create()
453 match *kp.key_parameter_value() { in authorize_create()
591 && op_params.iter().any(|kp| kp.tag == Tag::NONCE) in authorize_create()
780 for kp in key_parameters { in super_encryption_required()
781 let t = match kp.key_parameter_value() { in super_encryption_required()
Dremote_provisioning.rs151 params.iter().any(|kp| { in is_asymmetric_key()
153 kp, in is_asymmetric_key()
Dlegacy_migrator.rs646 params.iter().any(|kp| { in bulk_delete()
647 KeyParameterValue::RollbackResistance == *kp.key_parameter_value() in bulk_delete()
/system/keymaster/key_blob_utils/
Docb.c452 kp[idx] = _mm_castps_si128(_mm_shuffle_ps(_mm_castsi128_ps(tmp), _mm_castsi128_ps(x0), 68)); \
453 kp[idx + 1] = \
458 kp[idx + 2] = x0; \
463 __m128i* kp = (__m128i*)key; in AES_128_Key_Expansion() local
464 kp[0] = x0 = _mm_loadu_si128((__m128i*)userkey); in AES_128_Key_Expansion()
467 kp[1] = x0; in AES_128_Key_Expansion()
469 kp[2] = x0; in AES_128_Key_Expansion()
471 kp[3] = x0; in AES_128_Key_Expansion()
473 kp[4] = x0; in AES_128_Key_Expansion()
475 kp[5] = x0; in AES_128_Key_Expansion()
[all …]
/system/timezone/output_data/android/
Dtzids.prototxt1032 isoCode: "kp"
/system/timezone/input_data/android/
Dcountryzones.txt1824 isoCode:"kp"