/system/security/keystore2/tests/ |
D | keystore2_client_import_keys_tests.rs | 44 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in import_rsa_sign_key_and_perform_sample_operation() 51 key_generations::import_rsa_2048_key(sec_level, domain, nspace, alias, import_params) in import_rsa_sign_key_and_perform_sample_operation() 55 sec_level, in import_rsa_sign_key_and_perform_sample_operation() 63 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sym_key_encrypt_decrypt_op() 67 sec_level, in perform_sym_key_encrypt_decrypt_op() 79 sec_level, in perform_sym_key_encrypt_decrypt_op() 94 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in build_secure_key_wrapper() 104 key_generations::import_transport_key(sec_level, Some(transport_key_alias), transport_key) in build_secure_key_wrapper() 107 sec_level, in build_secure_key_wrapper() 137 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_rsa_import_key_success() localVariable [all …]
|
D | keystore2_client_aes_key_tests.rs | 34 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_aes_key_and_operation() 45 sec_level, in create_aes_key_and_operation() 55 sec_level, in create_aes_key_and_operation() 66 sec_level, in create_aes_key_and_operation() 91 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ecb_cbc_generate_key() localVariable 98 &sec_level, in keystore2_aes_ecb_cbc_generate_key() 122 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ctr_gcm_generate_key_success() localVariable 127 &sec_level, in keystore2_aes_ctr_gcm_generate_key_success() 152 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() localVariable 157 &sec_level, in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() [all …]
|
D | keystore2_client_3des_key_tests.rs | 34 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_3des_key_and_operation() 42 sec_level, in create_3des_key_and_operation() 53 sec_level, in create_3des_key_and_operation() 63 sec_level, in create_3des_key_and_operation() 87 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_ecb_cbc_generate_key_success() localVariable 92 create_3des_key_and_operation(&sec_level, padding_mode, block_mode, &mut None) in keystore2_3des_ecb_cbc_generate_key_success() 103 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_key_fails_unsupported_key_size() localVariable 108 &sec_level, in keystore2_3des_key_fails_unsupported_key_size() 126 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_key_fails_missing_padding() localVariable 137 let key_metadata = sec_level in keystore2_3des_key_fails_missing_padding() [all …]
|
D | keystore2_client_hmac_key_tests.rs | 31 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_hmac_key_and_operation() 39 key_generations::generate_hmac_key(sec_level, alias, key_size, min_mac_len, digest)?; in create_hmac_key_and_operation() 41 let op_response = sec_level.createOperation( in create_hmac_key_and_operation() 73 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_key_op_success() localVariable 81 &sec_level, in keystore2_hmac_key_op_success() 100 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() localVariable 105 &sec_level, in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() 132 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length() localVariable 137 &sec_level, in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length() 163 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_key_multi_digests_fails_expect_unsupported_digest() localVariable [all …]
|
D | keystore2_client_delete_key_tests.rs | 31 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_success() localVariable 35 &sec_level, in keystore2_delete_key_success() 74 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_with_blob_domain_fail() localVariable 78 &sec_level, in keystore2_delete_key_with_blob_domain_fail() 96 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_blob_success() localVariable 100 &sec_level, in keystore2_delete_key_blob_success() 108 let result = sec_level.deleteKey(&key_metadata.key); in keystore2_delete_key_blob_success() 117 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_fails_with_missing_key_blob() localVariable 119 let result = key_generations::map_ks_error(sec_level.deleteKey(&KeyDescriptor { in keystore2_delete_key_fails_with_missing_key_blob() 135 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_blob_fail() localVariable [all …]
|
D | keystore2_client_ec_key_tests.rs | 60 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_ec_key_and_operation() 68 key_generations::generate_ec_key(sec_level, domain, nspace, alias, ec_curve, digest)?; in create_ec_key_and_operation() 70 sec_level.createOperation( in create_ec_key_and_operation() 79 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_sign_key_op_success() localVariable 82 &sec_level, in perform_ec_sign_key_op_success() 104 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_sign_key_op_with_none_or_md5_digest() localVariable 107 &sec_level, in perform_ec_sign_key_op_with_none_or_md5_digest() 203 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_get_key_entry_blob_fail() localVariable 207 &sec_level, in keystore2_get_key_entry_blob_fail() 221 sec_level.deleteKey(&key_metadata.key).unwrap(); in keystore2_get_key_entry_blob_fail() [all …]
|
D | keystore2_client_attest_key_tests.rs | 44 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_signing_key_success() localVariable 50 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_rsa_signing_key_success() 60 &sec_level, in keystore2_attest_rsa_signing_key_success() 92 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_encrypt_key_success() localVariable 98 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_rsa_encrypt_key_success() 108 &sec_level, in keystore2_attest_rsa_encrypt_key_success() 141 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_ec_key_success() localVariable 147 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_ec_key_success() 157 &sec_level, in keystore2_attest_ec_key_success() 181 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() localVariable [all …]
|
D | keystore2_client_key_id_domain_tests.rs | 37 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_generate_key_with_key_id_domain_expect_sys_error() localVariable 40 &sec_level, in keystore2_generate_key_with_key_id_domain_expect_sys_error() 57 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_find_key_with_key_id_as_domain() localVariable 61 &sec_level, in keystore2_find_key_with_key_id_as_domain() 88 let op_response = sec_level in keystore2_find_key_with_key_id_as_domain() 114 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_key_id_alias_rebind_verify_by_alias() localVariable 118 &sec_level, in keystore2_key_id_alias_rebind_verify_by_alias() 130 &sec_level, in keystore2_key_id_alias_rebind_verify_by_alias() 145 let result = key_generations::map_ks_error(sec_level.createOperation( in keystore2_key_id_alias_rebind_verify_by_alias() 155 let op_response = sec_level in keystore2_key_id_alias_rebind_verify_by_alias() [all …]
|
D | keystore2_client_key_agreement_tests.rs | 56 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in check_agreement() 63 let key_agree_op = sec_level.createOperation(keymint_key, &authorizations, false).unwrap(); in check_agreement() 93 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_key_agreement() localVariable 98 &sec_level, in perform_ec_key_agreement() 114 check_agreement(&sec_level, &keymint_key.key, &keymint_pub_key, &local_key, &local_pub_key); in perform_ec_key_agreement() 127 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ec_25519_agree_key_success() localVariable 131 &sec_level, in keystore2_ec_25519_agree_key_success() 145 check_agreement(&sec_level, &keymint_key.key, &keymint_pub_key, &local_key, &local_pub_key); in keystore2_ec_25519_agree_key_success() 153 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ec_agree_key_with_different_curves_fail() localVariable 157 &sec_level, in keystore2_ec_agree_key_with_different_curves_fail() [all …]
|
D | keystore2_client_grant_key_tests.rs | 41 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in generate_ec_key_and_grant_to_user() localVariable 45 &sec_level, in generate_ec_key_and_grant_to_user() 58 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in load_grant_key_and_perform_sign_operation() 69 let op_response = sec_level.createOperation( in load_grant_key_and_perform_sign_operation() 195 let sec_level = in keystore2_grant_get_info_use_key_perm() localVariable 209 let op_response = sec_level in keystore2_grant_get_info_use_key_perm() 257 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_grant_delete_key_success() localVariable 261 &sec_level, in keystore2_grant_delete_key_success() 331 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_grant_key_fails_with_permission_denied() localVariable 336 &sec_level, in keystore2_grant_key_fails_with_permission_denied() [all …]
|
D | keystore2_client_test_utils.rs | 97 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key_and_grant_to_users() 103 key_generations::generate_ec_p256_signing_key(sec_level, Domain::APP, -1, alias, None)?; in generate_ec_key_and_grant_to_users() 127 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in create_signing_operation() localVariable 130 key_generations::generate_ec_p256_signing_key(&sec_level, domain, nspace, alias, None) in create_signing_operation() 133 sec_level.createOperation( in create_signing_operation() 152 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sample_hmac_sign_verify_op() 155 let sign_op = sec_level in perform_sample_hmac_sign_verify_op() 173 let verify_op = sec_level in perform_sample_hmac_sign_verify_op() 215 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sample_asym_sign_verify_op() 228 let sign_op = sec_level.createOperation(&key_metadata.key, &authorizations, false).unwrap(); in perform_sample_asym_sign_verify_op() [all …]
|
D | keystore2_client_list_entries_tests.rs | 66 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_success() localVariable 90 &sec_level, in keystore2_list_entries_success() 123 let sec_level = in keystore2_list_entries_success() localVariable 128 &sec_level, in keystore2_list_entries_success() 204 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_with_long_aliases_success() localVariable 223 key_generations::import_aes_key(&sec_level, Domain::APP, -1, Some(alias)); in keystore2_list_entries_with_long_aliases_success()
|
D | keystore2_client_rsa_key_tests.rs | 80 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_rsa_key_and_operation() 89 key_generations::generate_rsa_key(sec_level, domain, nspace, alias, key_params, None)?; in create_rsa_key_and_operation() 106 sec_level.createOperation(&key_metadata.key, &op_params, forced_op.0) in create_rsa_key_and_operation() 117 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_rsa_sign_key_op_success() localVariable 120 &sec_level, in perform_rsa_sign_key_op_success() 153 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_rsa_sign_key_op_failure() localVariable 156 &sec_level, in perform_rsa_sign_key_op_failure() 191 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in create_rsa_encrypt_decrypt_key_op_success() localVariable 194 &sec_level, in create_rsa_encrypt_decrypt_key_op_success() 1537 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_rsa_generate_signing_key_padding_pss_fail() localVariable [all …]
|
D | keystore2_client_update_subcomponent_tests.rs | 35 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_update_subcomponent_success() localVariable 38 &sec_level, in keystore2_update_subcomponent_success() 173 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_update_subcomponent_fails_permission_denied() localVariable 178 &sec_level, in keystore2_update_subcomponent_fails_permission_denied()
|
D | keystore2_client_operation_tests.rs | 301 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ops_prune_test() localVariable 304 &sec_level, in keystore2_ops_prune_test() 315 sec_level.createOperation( in keystore2_ops_prune_test() 341 sec_level.createOperation( in keystore2_ops_prune_test()
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 334 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_p256_signing_key() 354 match sec_level.generateKey( in generate_ec_p256_signing_key() 378 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key() 393 let key_metadata = sec_level.generateKey( in generate_ec_key() 417 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_rsa_key() 449 let key_metadata = sec_level.generateKey( in generate_rsa_key() 478 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_sym_key() 499 let key_metadata = sec_level.generateKey( in generate_sym_key() 522 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_hmac_key() 537 let key_metadata = sec_level.generateKey( in generate_hmac_key() [all …]
|
/system/keymint/common/src/ |
D | tag.rs | 209 sec_level: SecurityLevel, in characteristics_at() 213 if chars.security_level != sec_level { in characteristics_at() 219 return Err(km_err!(InvalidKeyBlob, "multiple key characteristics at {:?}", sec_level)); in characteristics_at() 223 km_err!(InvalidKeyBlob, "no parameters at security level {:?} found", sec_level) in characteristics_at() 257 sec_level: SecurityLevel, in extract_key_gen_characteristics() 260 Algorithm::Rsa => check_rsa_gen_params(params, sec_level), in extract_key_gen_characteristics() 261 Algorithm::Ec => check_ec_gen_params(params, sec_level), in extract_key_gen_characteristics() 262 Algorithm::Aes => check_aes_gen_params(params, sec_level), in extract_key_gen_characteristics() 264 Algorithm::Hmac => check_hmac_gen_params(params, sec_level), in extract_key_gen_characteristics() 266 Ok((extract_key_characteristics(secure_storage, params, &[], sec_level)?, keygen_info)) in extract_key_gen_characteristics() [all …]
|
D | keyblob.rs | 151 sec_level: SecurityLevel, in convert_legacy_key() 298 pub fn characteristics_at(&self, sec_level: SecurityLevel) -> Result<&[KeyParam], Error> { in characteristics_at() 299 tag::characteristics_at(&self.characteristics, sec_level) in characteristics_at() 303 pub fn suitable_for(&self, purpose: KeyPurpose, sec_level: SecurityLevel) -> Result<(), Error> { in suitable_for() 304 if contains_tag_value!(self.characteristics_at(sec_level)?, Purpose, purpose) { in suitable_for() 316 sec_level: SecurityLevel, in encrypt() 330 .characteristics_at(sec_level)? in encrypt()
|
/system/security/keystore2/src/ |
D | metrics_store.rs | 146 sec_level: SecurityLevel, in log_key_creation_event_stats() 154 ) = process_key_creation_event_stats(sec_level, key_params, result); in log_key_creation_event_stats() 169 sec_level: SecurityLevel, in process_key_creation_event_stats() 206 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats() 309 sec_level: SecurityLevel, in log_key_operation_event_stats() 317 sec_level, in log_key_operation_event_stats() 334 sec_level: SecurityLevel, in process_key_operation_event_stats() 354 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats() 412 fn process_security_level(sec_level: SecurityLevel) -> MetricsSecurityLevel { in process_security_level() 413 match sec_level { in process_security_level() [all …]
|
D | km_compat.rs | 320 sec_level: SecurityLevel, field 324 pub fn new(sec_level: SecurityLevel) -> Self { in new() 325 Self { sec_level } in new() 333 if self.sec_level == SecurityLevel::STRONGBOX { in emulation_required() 366 pub fn new(sec_level: SecurityLevel) -> Self { in new() 367 Self { v1: KeyMintV1::new(sec_level) } in new() 492 for (sec_level, params, want) in tests { in test_keymintv1_emulation_required() 493 let v1 = KeyMintV1::new(sec_level); in test_keymintv1_emulation_required() 582 for (sec_level, params, want) in tests { in test_keymaster_emulation_required() 583 let v0 = Keymaster::new(sec_level); in test_keymaster_emulation_required()
|
D | maintenance.rs | 162 fn call_with_watchdog<F>(sec_level: SecurityLevel, name: &'static str, op: &F) -> Result<()> in call_with_watchdog() 167 get_keymint_device(&sec_level).context(ks_err!("getting keymint device"))?; in call_with_watchdog() 170 format!("Seclevel: {:?} Op: {}", sec_level, name) in call_with_watchdog() 184 sec_levels.iter().fold(Ok(()), move |result, (sec_level, sec_level_string)| { in call_on_all_security_levels() 185 let curr_result = Maintenance::call_with_watchdog(*sec_level, name, &op); in call_on_all_security_levels()
|
D | globals.rs | 100 sec_level: &SecurityLevel, in dev_by_sec_level() 102 self.uuid_by_sec_level.get(sec_level).and_then(|uuid| self.dev_by_uuid(uuid)) in dev_by_sec_level() 118 fn insert(&mut self, sec_level: SecurityLevel, dev: Strong<T>, hw_info: KeyMintHardwareInfo) { in insert() 121 let uuid: Uuid = sec_level.into(); in insert() 123 self.uuid_by_sec_level.insert(sec_level, uuid); in insert()
|
D | rkpd_client.rs | 608 let sec_level = SecurityLevel::TRUSTED_ENVIRONMENT; in test_get_rkpd_attestation_key_same_caller() localVariable 612 let first_key = get_rkpd_attestation_key(&sec_level, key_id).unwrap(); in test_get_rkpd_attestation_key_same_caller() 613 let second_key = get_rkpd_attestation_key(&sec_level, key_id).unwrap(); in test_get_rkpd_attestation_key_same_caller() 622 let sec_level = SecurityLevel::TRUSTED_ENVIRONMENT; in test_get_rkpd_attestation_key_different_caller() localVariable 627 let first_key = get_rkpd_attestation_key(&sec_level, first_key_id).unwrap(); in test_get_rkpd_attestation_key_different_caller() 628 let second_key = get_rkpd_attestation_key(&sec_level, second_key_id).unwrap(); in test_get_rkpd_attestation_key_different_caller() 642 let sec_level = SecurityLevel::TRUSTED_ENVIRONMENT; in test_store_rkpd_attestation_key() localVariable 647 assert!(store_rkpd_attestation_key(&sec_level, &key.keyBlob, &new_blob).is_ok()); in test_store_rkpd_attestation_key() 653 assert!(store_rkpd_attestation_key(&sec_level, &new_blob, &key.keyBlob).is_ok()); in test_store_rkpd_attestation_key()
|
/system/security/keystore2/tests/legacy_blobs/ |
D | keystore2_legacy_blob_tests.rs | 163 let sec_level = keystore2 in keystore2_encrypted_characteristics() localVariable 169 &sec_level, in keystore2_encrypted_characteristics() 420 let sec_level = keystore2 in keystore2_encrypted_certificates() localVariable 426 &sec_level, in keystore2_encrypted_certificates()
|
/system/security/keystore/ |
D | keystore_cli_v2.cpp | 123 std::shared_ptr<ks2::IKeystoreSecurityLevel> sec_level; in GetSecurityLevelInterface() local 124 auto rc = keystore->getSecurityLevel(securitylevel, &sec_level); in GetSecurityLevelInterface() 125 if (rc.isOk()) return sec_level; in GetSecurityLevelInterface() 257 auto sec_level = GetSecurityLevelInterface(keystore, securityLevel); in loadOrCreateAndVerifyEncryptionKey() local 266 rc = sec_level->generateKey(keyDescriptor(name), {} /* attestationKey */, in loadOrCreateAndVerifyEncryptionKey() 310 auto sec_level = GetSecurityLevelInterface(keystore, securityLevel); in loadOrCreateAndVerifyAuthenticationKey() local 319 rc = sec_level->generateKey(keyDescriptor(name), {} /* attestationKey */, in loadOrCreateAndVerifyAuthenticationKey() 554 auto sec_level = in TestKey() local 566 auto rc = sec_level->generateKey(keyDescriptor, {} /* attestationKey */, parameters, in TestKey() 761 auto sec_level = GetSecurityLevelInterface(keystore, securityLevel); in GenerateKey() local [all …]
|