Home
last modified time | relevance | path

Searched refs:kp (Results 1 – 12 of 12) sorted by relevance

/system/security/keystore2/src/km_compat/
Dkm_compat_type_conversion.h451 static V4_0::KeyParameter convertKeyParameterToLegacy(const KMV1::KeyParameter& kp) { in convertKeyParameterToLegacy() argument
452 switch (kp.tag) { in convertKeyParameterToLegacy()
456 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in convertKeyParameterToLegacy()
464 if (auto v = KMV1::authorizationValue(KMV1::TAG_ALGORITHM, kp)) { in convertKeyParameterToLegacy()
469 if (auto v = KMV1::authorizationValue(KMV1::TAG_KEY_SIZE, kp)) { in convertKeyParameterToLegacy()
474 if (auto v = KMV1::authorizationValue(KMV1::TAG_BLOCK_MODE, kp)) { in convertKeyParameterToLegacy()
479 if (auto v = KMV1::authorizationValue(KMV1::TAG_DIGEST, kp)) { in convertKeyParameterToLegacy()
484 if (auto v = KMV1::authorizationValue(KMV1::TAG_PADDING, kp)) { in convertKeyParameterToLegacy()
489 if (auto v = KMV1::authorizationValue(KMV1::TAG_CALLER_NONCE, kp)) { in convertKeyParameterToLegacy()
494 if (auto v = KMV1::authorizationValue(KMV1::TAG_MIN_MAC_LENGTH, kp)) { in convertKeyParameterToLegacy()
[all …]
Dlib.rs396 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
397 kp, in test_get_key_characteristics()
403 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
404 kp, in test_get_key_characteristics()
407 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
408 kp, in test_get_key_characteristics()
414 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
415 kp, in test_get_key_characteristics()
421 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
422 kp, in test_get_key_characteristics()
[all …]
Dkm_compat.cpp287 for (const auto& kp : kps) { in convertKeyParametersToLegacy() local
288 auto p = convertKeyParameterToLegacy(kp); in convertKeyParametersToLegacy()
1039 for (const KeyParameter& kp : keyParams) { in getMaximum() local
1040 if (auto value = authorizationValue(tag, kp)) { in getMaximum()
1296 std::find_if(keyParams.begin(), keyParams.end(), [&](const KeyParameter& kp) { in getCertificate() argument
1297 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in getCertificate()
/system/security/keystore2/src/
Dkey_parameter.rs589 fn from(kp: KmKeyParameter) -> Self {
590 match kp {
1034 fn from(kp: &KmKeyParameter) -> Self { in from()
1035 kp.clone().into() in from()
1136 for kp in list_o_parameters.iter() { in check_field_matches_tag_type()
1137 match (&kp.value, get_field_by_tag_type(kp.tag)) { in check_field_matches_tag_type()
1158 kp.tag, actual, expected in check_field_matches_tag_type()
1314 let kp = KeyParameter::new( in test_to_sql_enum_i32() localVariable
1318 store_keyparameter(&db, 1, &kp)?; in test_to_sql_enum_i32()
1320 assert_eq!(kp.get_tag(), key_param.get_tag()); in test_to_sql_enum_i32()
[all …]
Dattestation_key_utils.rs61 let challenge_present = params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE); in get_attest_key_info()
63 params.iter().any(|kp| kp.tag == Tag::DEVICE_UNIQUE_ATTESTATION); in get_attest_key_info()
Dsecurity_level.rs290 |kp| match kp.value { in create_operation()
410 if params.iter().any(|kp| kp.tag == Tag::CREATION_DATETIME) { in add_required_parameters()
439 if params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE) { in add_required_parameters()
455 if params.iter().any(|kp| kp.tag == Tag::INCLUDE_UNIQUE_ID) { in add_required_parameters()
477 if params.iter().any(|kp| is_device_id_attestation_tag(kp.tag)) { in add_required_parameters()
485 match params.iter().find(|kp| kp.tag == Tag::ALGORITHM) { in add_required_parameters()
488 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_BEFORE) { in add_required_parameters()
494 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_AFTER) { in add_required_parameters()
Dremote_provisioning.rs72 params.iter().any(|kp| { in is_asymmetric_key()
74 kp, in is_asymmetric_key()
Denforcements.rs433 for kp in key_params.iter() { in authorize_create()
434 if kp.get_tag() == Tag::ALGORITHM in authorize_create()
435 && *kp.key_parameter_value() != KeyParameterValue::Algorithm(Algorithm::EC) in authorize_create()
445 for kp in key_params.iter() { in authorize_create()
446 match *kp.key_parameter_value() { in authorize_create()
580 && op_params.iter().any(|kp| kp.tag == Tag::NONCE) in authorize_create()
766 for kp in key_parameters { in super_encryption_required()
767 let t = match kp.key_parameter_value() { in super_encryption_required()
Dlegacy_importer.rs792 params.iter().any(|kp| { in bulk_delete()
793 KeyParameterValue::RollbackResistance == *kp.key_parameter_value() in bulk_delete()
/system/keymaster/key_blob_utils/
Docb.c452 kp[idx] = _mm_castps_si128(_mm_shuffle_ps(_mm_castsi128_ps(tmp), _mm_castsi128_ps(x0), 68)); \
453 kp[idx + 1] = \
458 kp[idx + 2] = x0; \
463 __m128i* kp = (__m128i*)key; in AES_128_Key_Expansion() local
464 kp[0] = x0 = _mm_loadu_si128((__m128i*)userkey); in AES_128_Key_Expansion()
467 kp[1] = x0; in AES_128_Key_Expansion()
469 kp[2] = x0; in AES_128_Key_Expansion()
471 kp[3] = x0; in AES_128_Key_Expansion()
473 kp[4] = x0; in AES_128_Key_Expansion()
475 kp[5] = x0; in AES_128_Key_Expansion()
[all …]
/system/timezone/output_data/android/
Dtzids.prototxt1027 isoCode: "kp"
/system/timezone/input_data/android/
Dcountryzones.txt1898 isoCode:"kp"