Searched refs:kp (Results 1 – 12 of 12) sorted by relevance
/system/security/keystore2/src/km_compat/ |
D | km_compat_type_conversion.h | 451 static V4_0::KeyParameter convertKeyParameterToLegacy(const KMV1::KeyParameter& kp) { in convertKeyParameterToLegacy() argument 452 switch (kp.tag) { in convertKeyParameterToLegacy() 456 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in convertKeyParameterToLegacy() 464 if (auto v = KMV1::authorizationValue(KMV1::TAG_ALGORITHM, kp)) { in convertKeyParameterToLegacy() 469 if (auto v = KMV1::authorizationValue(KMV1::TAG_KEY_SIZE, kp)) { in convertKeyParameterToLegacy() 474 if (auto v = KMV1::authorizationValue(KMV1::TAG_BLOCK_MODE, kp)) { in convertKeyParameterToLegacy() 479 if (auto v = KMV1::authorizationValue(KMV1::TAG_DIGEST, kp)) { in convertKeyParameterToLegacy() 484 if (auto v = KMV1::authorizationValue(KMV1::TAG_PADDING, kp)) { in convertKeyParameterToLegacy() 489 if (auto v = KMV1::authorizationValue(KMV1::TAG_CALLER_NONCE, kp)) { in convertKeyParameterToLegacy() 494 if (auto v = KMV1::authorizationValue(KMV1::TAG_MIN_MAC_LENGTH, kp)) { in convertKeyParameterToLegacy() [all …]
|
D | lib.rs | 396 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 397 kp, in test_get_key_characteristics() 403 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 404 kp, in test_get_key_characteristics() 407 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 408 kp, in test_get_key_characteristics() 414 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 415 kp, in test_get_key_characteristics() 421 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 422 kp, in test_get_key_characteristics() [all …]
|
D | km_compat.cpp | 287 for (const auto& kp : kps) { in convertKeyParametersToLegacy() local 288 auto p = convertKeyParameterToLegacy(kp); in convertKeyParametersToLegacy() 1039 for (const KeyParameter& kp : keyParams) { in getMaximum() local 1040 if (auto value = authorizationValue(tag, kp)) { in getMaximum() 1296 std::find_if(keyParams.begin(), keyParams.end(), [&](const KeyParameter& kp) { in getCertificate() argument 1297 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in getCertificate()
|
/system/security/keystore2/src/ |
D | key_parameter.rs | 589 fn from(kp: KmKeyParameter) -> Self { 590 match kp { 1034 fn from(kp: &KmKeyParameter) -> Self { in from() 1035 kp.clone().into() in from() 1136 for kp in list_o_parameters.iter() { in check_field_matches_tag_type() 1137 match (&kp.value, get_field_by_tag_type(kp.tag)) { in check_field_matches_tag_type() 1158 kp.tag, actual, expected in check_field_matches_tag_type() 1314 let kp = KeyParameter::new( in test_to_sql_enum_i32() localVariable 1318 store_keyparameter(&db, 1, &kp)?; in test_to_sql_enum_i32() 1320 assert_eq!(kp.get_tag(), key_param.get_tag()); in test_to_sql_enum_i32() [all …]
|
D | attestation_key_utils.rs | 61 let challenge_present = params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE); in get_attest_key_info() 63 params.iter().any(|kp| kp.tag == Tag::DEVICE_UNIQUE_ATTESTATION); in get_attest_key_info()
|
D | security_level.rs | 290 |kp| match kp.value { in create_operation() 410 if params.iter().any(|kp| kp.tag == Tag::CREATION_DATETIME) { in add_required_parameters() 439 if params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE) { in add_required_parameters() 455 if params.iter().any(|kp| kp.tag == Tag::INCLUDE_UNIQUE_ID) { in add_required_parameters() 477 if params.iter().any(|kp| is_device_id_attestation_tag(kp.tag)) { in add_required_parameters() 485 match params.iter().find(|kp| kp.tag == Tag::ALGORITHM) { in add_required_parameters() 488 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_BEFORE) { in add_required_parameters() 494 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_AFTER) { in add_required_parameters()
|
D | remote_provisioning.rs | 72 params.iter().any(|kp| { in is_asymmetric_key() 74 kp, in is_asymmetric_key()
|
D | enforcements.rs | 433 for kp in key_params.iter() { in authorize_create() 434 if kp.get_tag() == Tag::ALGORITHM in authorize_create() 435 && *kp.key_parameter_value() != KeyParameterValue::Algorithm(Algorithm::EC) in authorize_create() 445 for kp in key_params.iter() { in authorize_create() 446 match *kp.key_parameter_value() { in authorize_create() 580 && op_params.iter().any(|kp| kp.tag == Tag::NONCE) in authorize_create() 766 for kp in key_parameters { in super_encryption_required() 767 let t = match kp.key_parameter_value() { in super_encryption_required()
|
D | legacy_importer.rs | 792 params.iter().any(|kp| { in bulk_delete() 793 KeyParameterValue::RollbackResistance == *kp.key_parameter_value() in bulk_delete()
|
/system/keymaster/key_blob_utils/ |
D | ocb.c | 452 kp[idx] = _mm_castps_si128(_mm_shuffle_ps(_mm_castsi128_ps(tmp), _mm_castsi128_ps(x0), 68)); \ 453 kp[idx + 1] = \ 458 kp[idx + 2] = x0; \ 463 __m128i* kp = (__m128i*)key; in AES_128_Key_Expansion() local 464 kp[0] = x0 = _mm_loadu_si128((__m128i*)userkey); in AES_128_Key_Expansion() 467 kp[1] = x0; in AES_128_Key_Expansion() 469 kp[2] = x0; in AES_128_Key_Expansion() 471 kp[3] = x0; in AES_128_Key_Expansion() 473 kp[4] = x0; in AES_128_Key_Expansion() 475 kp[5] = x0; in AES_128_Key_Expansion() [all …]
|
/system/timezone/output_data/android/ |
D | tzids.prototxt | 1027 isoCode: "kp"
|
/system/timezone/input_data/android/ |
D | countryzones.txt | 1898 isoCode:"kp"
|