/system/keymint/hal/src/hal/ |
D | tests.rs | 47 (Value::Integer(0.into()), "expected arr"), in test_cbor_parse_fail() 51 Value::Integer(0.into()), in test_cbor_parse_fail() 52 Value::Integer(0.into()), in test_cbor_parse_fail() 53 Value::Integer(0.into()), in test_cbor_parse_fail() 54 Value::Integer(0.into()), in test_cbor_parse_fail() 60 Value::Integer(0.into()), in test_cbor_parse_fail() 61 Value::Array(vec![Value::Integer(0.into())]), in test_cbor_parse_fail() 62 Value::Integer(0.into()), in test_cbor_parse_fail() 68 Value::Integer(0.into()), in test_cbor_parse_fail() 69 Value::Array(vec![Value::Integer(0.into()), Value::Integer(0.into())]), in test_cbor_parse_fail() [all …]
|
/system/keymint/common/src/ |
D | crypto.rs | 216 Ok(Self::Aes(OpaqueKeyMaterial(raw_key).into())) in from_cbor_value() 219 Ok(k) => Ok(Self::Aes(k.into())), in from_cbor_value() 227 Ok(Self::TripleDes(OpaqueKeyMaterial(raw_key).into())) in from_cbor_value() 235 .into(), in from_cbor_value() 242 Ok(Self::Hmac(OpaqueKeyMaterial(raw_key).into())) in from_cbor_value() 244 Ok(Self::Hmac(hmac::Key(raw_key).into())) in from_cbor_value() 250 Ok(Self::Rsa(OpaqueKeyMaterial(raw_key).into())) in from_cbor_value() 252 Ok(Self::Rsa(rsa::Key(raw_key).into())) in from_cbor_value() 265 Ok(Self::Ec(curve, curve_type, OpaqueKeyMaterial(raw_key).into())) in from_cbor_value() 291 Ok(Self::Ec(curve, curve_type, key.into())) in from_cbor_value() [all …]
|
/system/keymint/tests/src/bin/ |
D | auth-keyblob-parse.rs | 102 Algorithm::Aes => KeyMaterial::Aes(aes::Key::new(keyblob.key_material).unwrap().into()), in process() 104 des::Key(raw_key.try_into().expect("Incorrect length for 3DES key")).into(), in process() 106 Algorithm::Hmac => KeyMaterial::Hmac(hmac::Key(raw_key).into()), in process() 113 ec::Key::P224(ec::NistKey(raw_key)).into(), in process() 118 ec::Key::P256(ec::NistKey(raw_key)).into(), in process() 123 ec::Key::P384(ec::NistKey(raw_key)).into(), in process() 128 ec::Key::P521(ec::NistKey(raw_key)).into(), in process() 136 ec::Key::X25519(ec::X25519Key(key)).into(), in process() 142 ec::Key::Ed25519(ec::Ed25519Key(key)).into(), in process() 148 Algorithm::Rsa => KeyMaterial::Rsa(rsa::Key(raw_key).into()), in process()
|
/system/sepolicy/private/ |
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the odrefresh command into its domain. 19 # Put the perfetto command into its domain so it is the same on user, userdebug and eng. 22 # Put the virtmgr command into its domain.
|
D | apexd_derive_classpath.te | 1 # Exclusive domain for apexd calling into derive_classpath binary 4 # Allow the binary to write into output file at location /apex/derive_classpath_temp
|
D | cppreopts.te | 4 # partition. This domain ensures that we are only copying into specific 15 # Allow cppreopts copy files into the dalvik-cache 26 # write into dalvik-cache
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the odrefresh command into its domain. 19 # Put the perfetto command into its domain so it is the same on user, userdebug and eng. 22 # Put the virtmgr command into its domain.
|
D | apexd_derive_classpath.te | 1 # Exclusive domain for apexd calling into derive_classpath binary 4 # Allow the binary to write into output file at location /apex/derive_classpath_temp
|
D | cppreopts.te | 4 # partition. This domain ensures that we are only copying into specific 15 # Allow cppreopts copy files into the dalvik-cache 26 # write into dalvik-cache
|
/system/security/keystore2/src/ |
D | boot_level_keys.rs | 125 .into(); in get_level_zero_key() 127 KeyParameterValue::Algorithm(Algorithm::HMAC).into(), in get_level_zero_key() 128 KeyParameterValue::Digest(Digest::SHA_2_256).into(), in get_level_zero_key() 129 KeyParameterValue::KeySize(256).into(), in get_level_zero_key() 130 KeyParameterValue::MinMacLength(256).into(), in get_level_zero_key() 131 KeyParameterValue::KeyPurpose(KeyPurpose::SIGN).into(), in get_level_zero_key() 132 KeyParameterValue::NoAuthRequired.into(), in get_level_zero_key() 161 KeyParameterValue::MacLength(256).into(), in get_level_zero_key() 162 KeyParameterValue::Digest(Digest::SHA_2_256).into(), in get_level_zero_key()
|
D | key_parameter.rs | 256 let primitive: Primitive = v.to_primitive().into(); in serialize_primitive() 301 let p: Primitive = v.into(); 600 @into 605 implement_try_from_to_km_parameter!{@into $enum_name, [$($out)* 613 @into 618 implement_try_from_to_km_parameter!{@into $enum_name, [$($out)* 625 (@into $enum_name:ident, [$($out:tt)*], []) => { 643 @into $enum_name, 1035 kp.clone().into() in from() 1090 Authorization { securityLevel: self.security_level, keyParameter: self.value.into() } in into_authorization() [all …]
|
/system/tools/aidl/tests/rust/ |
D | test_client.rs | 191 "typical string".into(), in test_repeat_string() 193 "\0\0".into(), in test_repeat_string() 198 ITestService::STRING_TEST_CONSTANT.into(), in test_repeat_string() 199 ITestService::STRING_TEST_CONSTANT2.into(), in test_repeat_string() 242 vec!["f".into(), "a".into(), "b".into()] 272 vec!["f".into(), "a".into(), "b".into()] 278 "a".into(), 282 .into(), 297 let names = vec!["Fizz".into(), "Buzz".into()]; in test_binder_array_exchange() 306 let names = vec![Some("Fizz".into()), None, Some("Buzz".into())]; in test_binder_nullable_array_exchange() [all …]
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the odrefresh command into its domain. 19 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
D | cppreopts.te | 4 # partition. This domain ensures that we are only copying into specific 15 # Allow cppreopts copy files into the dalvik-cache 26 # write into dalvik-cache
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the odrefresh command into its domain. 19 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
D | cppreopts.te | 4 # partition. This domain ensures that we are only copying into specific 15 # Allow cppreopts copy files into the dalvik-cache 26 # write into dalvik-cache
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the odrefresh command into its domain. 19 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
D | apexd_derive_classpath.te | 1 # Exclusive domain for apexd calling into derive_classpath binary 4 # Allow the binary to write into output file at location /apex/derive_classpath_temp
|
D | cppreopts.te | 4 # partition. This domain ensures that we are only copying into specific 15 # Allow cppreopts copy files into the dalvik-cache 26 # write into dalvik-cache
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | cppreopts.te | 4 # partition. This domain ensures that we are only copying into specific 15 # Allow cppreopts copy files into the dalvik-cache 26 # write into dalvik-cache
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | cppreopts.te | 4 # partition. This domain ensures that we are only copying into specific 15 # Allow cppreopts copy files into the dalvik-cache 26 # write into dalvik-cache
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/sepolicy/microdroid/system/private/ |
D | kexec.te | 1 # kexec loads a crashdump kernel into memory using the kexec_file_load syscall. 5 # allow kexec to write into /dev/kmsg for logging
|
/system/keymint/tests/src/ |
D | lib.rs | 316 let mut op = hmac.begin(hmac::Key(test.key.to_vec()).into(), test.digest).unwrap(); in test_hmac() 346 let mut op = cmac.begin(key.clone().into()).unwrap(); in test_aes_cmac() 364 let result = kdf.ckdf(&key.into(), label, &[&v0, &v1, &v2, &v3], 32).unwrap(); in test_ckdf() 412 aes_key.into(), in test_aes_gcm() 425 aes_key.into(), in test_aes_gcm() 438 aes_key.into(), in test_aes_gcm() 453 aes_key.into(), in test_aes_gcm() 494 .begin(des_key.clone().into(), des::Mode::EcbNoPadding, SymmetricOperation::Encrypt) in test_des() 501 .begin(des_key.into(), des::Mode::EcbNoPadding, SymmetricOperation::Decrypt) in test_des()
|