Home
last modified time | relevance | path

Searched refs:sec_level (Results 1 – 25 of 34) sorted by relevance

12

/system/security/keystore2/tests/
Dkeystore2_client_import_keys_tests.rs44 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in import_rsa_sign_key_and_perform_sample_operation()
51 key_generations::import_rsa_2048_key(sec_level, domain, nspace, alias, import_params) in import_rsa_sign_key_and_perform_sample_operation()
55 sec_level, in import_rsa_sign_key_and_perform_sample_operation()
63 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sym_key_encrypt_decrypt_op()
67 sec_level, in perform_sym_key_encrypt_decrypt_op()
79 sec_level, in perform_sym_key_encrypt_decrypt_op()
94 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in build_secure_key_wrapper()
104 key_generations::import_transport_key(sec_level, Some(transport_key_alias), transport_key) in build_secure_key_wrapper()
107 sec_level, in build_secure_key_wrapper()
137 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_rsa_import_key_success() localVariable
[all …]
Dkeystore2_client_aes_key_tests.rs34 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_aes_key_and_operation()
45 sec_level, in create_aes_key_and_operation()
55 sec_level, in create_aes_key_and_operation()
66 sec_level, in create_aes_key_and_operation()
91 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ecb_cbc_generate_key() localVariable
98 &sec_level, in keystore2_aes_ecb_cbc_generate_key()
122 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ctr_gcm_generate_key_success() localVariable
127 &sec_level, in keystore2_aes_ctr_gcm_generate_key_success()
152 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() localVariable
157 &sec_level, in keystore2_aes_ctr_gcm_generate_key_fails_incompatible()
[all …]
Dkeystore2_client_3des_key_tests.rs34 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_3des_key_and_operation()
42 sec_level, in create_3des_key_and_operation()
53 sec_level, in create_3des_key_and_operation()
63 sec_level, in create_3des_key_and_operation()
87 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_ecb_cbc_generate_key_success() localVariable
92 create_3des_key_and_operation(&sec_level, padding_mode, block_mode, &mut None) in keystore2_3des_ecb_cbc_generate_key_success()
103 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_key_fails_unsupported_key_size() localVariable
108 &sec_level, in keystore2_3des_key_fails_unsupported_key_size()
126 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_key_fails_missing_padding() localVariable
137 let key_metadata = sec_level in keystore2_3des_key_fails_missing_padding()
[all …]
Dkeystore2_client_hmac_key_tests.rs31 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_hmac_key_and_operation()
39 key_generations::generate_hmac_key(sec_level, alias, key_size, min_mac_len, digest)?; in create_hmac_key_and_operation()
41 let op_response = sec_level.createOperation( in create_hmac_key_and_operation()
73 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_key_op_success() localVariable
81 &sec_level, in keystore2_hmac_key_op_success()
100 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() localVariable
105 &sec_level, in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size()
132 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length() localVariable
137 &sec_level, in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length()
163 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_key_multi_digests_fails_expect_unsupported_digest() localVariable
[all …]
Dkeystore2_client_delete_key_tests.rs31 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_success() localVariable
35 &sec_level, in keystore2_delete_key_success()
74 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_with_blob_domain_fail() localVariable
78 &sec_level, in keystore2_delete_key_with_blob_domain_fail()
96 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_blob_success() localVariable
100 &sec_level, in keystore2_delete_key_blob_success()
108 let result = sec_level.deleteKey(&key_metadata.key); in keystore2_delete_key_blob_success()
117 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_fails_with_missing_key_blob() localVariable
119 let result = key_generations::map_ks_error(sec_level.deleteKey(&KeyDescriptor { in keystore2_delete_key_fails_with_missing_key_blob()
135 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_blob_fail() localVariable
[all …]
Dkeystore2_client_ec_key_tests.rs60 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_ec_key_and_operation()
68 key_generations::generate_ec_key(sec_level, domain, nspace, alias, ec_curve, digest)?; in create_ec_key_and_operation()
70 sec_level.createOperation( in create_ec_key_and_operation()
79 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_sign_key_op_success() localVariable
82 &sec_level, in perform_ec_sign_key_op_success()
104 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_sign_key_op_with_none_or_md5_digest() localVariable
107 &sec_level, in perform_ec_sign_key_op_with_none_or_md5_digest()
203 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_get_key_entry_blob_fail() localVariable
207 &sec_level, in keystore2_get_key_entry_blob_fail()
221 sec_level.deleteKey(&key_metadata.key).unwrap(); in keystore2_get_key_entry_blob_fail()
[all …]
Dkeystore2_client_attest_key_tests.rs44 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_signing_key_success() localVariable
50 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_rsa_signing_key_success()
60 &sec_level, in keystore2_attest_rsa_signing_key_success()
92 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_encrypt_key_success() localVariable
98 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_rsa_encrypt_key_success()
108 &sec_level, in keystore2_attest_rsa_encrypt_key_success()
141 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_ec_key_success() localVariable
147 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_ec_key_success()
157 &sec_level, in keystore2_attest_ec_key_success()
181 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() localVariable
[all …]
Dkeystore2_client_key_id_domain_tests.rs37 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_generate_key_with_key_id_domain_expect_sys_error() localVariable
40 &sec_level, in keystore2_generate_key_with_key_id_domain_expect_sys_error()
57 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_find_key_with_key_id_as_domain() localVariable
61 &sec_level, in keystore2_find_key_with_key_id_as_domain()
88 let op_response = sec_level in keystore2_find_key_with_key_id_as_domain()
114 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_key_id_alias_rebind_verify_by_alias() localVariable
118 &sec_level, in keystore2_key_id_alias_rebind_verify_by_alias()
130 &sec_level, in keystore2_key_id_alias_rebind_verify_by_alias()
145 let result = key_generations::map_ks_error(sec_level.createOperation( in keystore2_key_id_alias_rebind_verify_by_alias()
155 let op_response = sec_level in keystore2_key_id_alias_rebind_verify_by_alias()
[all …]
Dkeystore2_client_key_agreement_tests.rs56 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in check_agreement()
63 let key_agree_op = sec_level.createOperation(keymint_key, &authorizations, false).unwrap(); in check_agreement()
93 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_key_agreement() localVariable
98 &sec_level, in perform_ec_key_agreement()
114 check_agreement(&sec_level, &keymint_key.key, &keymint_pub_key, &local_key, &local_pub_key); in perform_ec_key_agreement()
127 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ec_25519_agree_key_success() localVariable
131 &sec_level, in keystore2_ec_25519_agree_key_success()
145 check_agreement(&sec_level, &keymint_key.key, &keymint_pub_key, &local_key, &local_pub_key); in keystore2_ec_25519_agree_key_success()
153 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ec_agree_key_with_different_curves_fail() localVariable
157 &sec_level, in keystore2_ec_agree_key_with_different_curves_fail()
[all …]
Dkeystore2_client_grant_key_tests.rs41 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in generate_ec_key_and_grant_to_user() localVariable
45 &sec_level, in generate_ec_key_and_grant_to_user()
58 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in load_grant_key_and_perform_sign_operation()
69 let op_response = sec_level.createOperation( in load_grant_key_and_perform_sign_operation()
195 let sec_level = in keystore2_grant_get_info_use_key_perm() localVariable
209 let op_response = sec_level in keystore2_grant_get_info_use_key_perm()
257 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_grant_delete_key_success() localVariable
261 &sec_level, in keystore2_grant_delete_key_success()
331 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_grant_key_fails_with_permission_denied() localVariable
336 &sec_level, in keystore2_grant_key_fails_with_permission_denied()
[all …]
Dkeystore2_client_test_utils.rs97 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key_and_grant_to_users()
103 key_generations::generate_ec_p256_signing_key(sec_level, Domain::APP, -1, alias, None)?; in generate_ec_key_and_grant_to_users()
127 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in create_signing_operation() localVariable
130 key_generations::generate_ec_p256_signing_key(&sec_level, domain, nspace, alias, None) in create_signing_operation()
133 sec_level.createOperation( in create_signing_operation()
152 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sample_hmac_sign_verify_op()
155 let sign_op = sec_level in perform_sample_hmac_sign_verify_op()
173 let verify_op = sec_level in perform_sample_hmac_sign_verify_op()
215 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sample_asym_sign_verify_op()
228 let sign_op = sec_level.createOperation(&key_metadata.key, &authorizations, false).unwrap(); in perform_sample_asym_sign_verify_op()
[all …]
Dkeystore2_client_list_entries_tests.rs66 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_success() localVariable
90 &sec_level, in keystore2_list_entries_success()
123 let sec_level = in keystore2_list_entries_success() localVariable
128 &sec_level, in keystore2_list_entries_success()
204 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_with_long_aliases_success() localVariable
223 key_generations::import_aes_key(&sec_level, Domain::APP, -1, Some(alias)); in keystore2_list_entries_with_long_aliases_success()
Dkeystore2_client_rsa_key_tests.rs80 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_rsa_key_and_operation()
89 key_generations::generate_rsa_key(sec_level, domain, nspace, alias, key_params, None)?; in create_rsa_key_and_operation()
106 sec_level.createOperation(&key_metadata.key, &op_params, forced_op.0) in create_rsa_key_and_operation()
117 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_rsa_sign_key_op_success() localVariable
120 &sec_level, in perform_rsa_sign_key_op_success()
153 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_rsa_sign_key_op_failure() localVariable
156 &sec_level, in perform_rsa_sign_key_op_failure()
191 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in create_rsa_encrypt_decrypt_key_op_success() localVariable
194 &sec_level, in create_rsa_encrypt_decrypt_key_op_success()
1537 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_rsa_generate_signing_key_padding_pss_fail() localVariable
[all …]
Dkeystore2_client_update_subcomponent_tests.rs35 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_update_subcomponent_success() localVariable
38 &sec_level, in keystore2_update_subcomponent_success()
173 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_update_subcomponent_fails_permission_denied() localVariable
178 &sec_level, in keystore2_update_subcomponent_fails_permission_denied()
Dkeystore2_client_operation_tests.rs301 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ops_prune_test() localVariable
304 &sec_level, in keystore2_ops_prune_test()
315 sec_level.createOperation( in keystore2_ops_prune_test()
341 sec_level.createOperation( in keystore2_ops_prune_test()
/system/security/keystore2/test_utils/
Dkey_generations.rs334 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_p256_signing_key()
354 match sec_level.generateKey( in generate_ec_p256_signing_key()
378 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key()
393 let key_metadata = sec_level.generateKey( in generate_ec_key()
417 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_rsa_key()
449 let key_metadata = sec_level.generateKey( in generate_rsa_key()
478 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_sym_key()
499 let key_metadata = sec_level.generateKey( in generate_sym_key()
522 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_hmac_key()
537 let key_metadata = sec_level.generateKey( in generate_hmac_key()
[all …]
/system/keymint/common/src/
Dtag.rs209 sec_level: SecurityLevel, in characteristics_at()
213 if chars.security_level != sec_level { in characteristics_at()
219 return Err(km_err!(InvalidKeyBlob, "multiple key characteristics at {:?}", sec_level)); in characteristics_at()
223 km_err!(InvalidKeyBlob, "no parameters at security level {:?} found", sec_level) in characteristics_at()
257 sec_level: SecurityLevel, in extract_key_gen_characteristics()
260 Algorithm::Rsa => check_rsa_gen_params(params, sec_level), in extract_key_gen_characteristics()
261 Algorithm::Ec => check_ec_gen_params(params, sec_level), in extract_key_gen_characteristics()
262 Algorithm::Aes => check_aes_gen_params(params, sec_level), in extract_key_gen_characteristics()
264 Algorithm::Hmac => check_hmac_gen_params(params, sec_level), in extract_key_gen_characteristics()
266 Ok((extract_key_characteristics(secure_storage, params, &[], sec_level)?, keygen_info)) in extract_key_gen_characteristics()
[all …]
Dkeyblob.rs151 sec_level: SecurityLevel, in convert_legacy_key()
298 pub fn characteristics_at(&self, sec_level: SecurityLevel) -> Result<&[KeyParam], Error> { in characteristics_at()
299 tag::characteristics_at(&self.characteristics, sec_level) in characteristics_at()
303 pub fn suitable_for(&self, purpose: KeyPurpose, sec_level: SecurityLevel) -> Result<(), Error> { in suitable_for()
304 if contains_tag_value!(self.characteristics_at(sec_level)?, Purpose, purpose) { in suitable_for()
316 sec_level: SecurityLevel, in encrypt()
330 .characteristics_at(sec_level)? in encrypt()
/system/security/keystore2/src/
Dmetrics_store.rs146 sec_level: SecurityLevel, in log_key_creation_event_stats()
154 ) = process_key_creation_event_stats(sec_level, key_params, result); in log_key_creation_event_stats()
169 sec_level: SecurityLevel, in process_key_creation_event_stats()
206 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats()
309 sec_level: SecurityLevel, in log_key_operation_event_stats()
317 sec_level, in log_key_operation_event_stats()
334 sec_level: SecurityLevel, in process_key_operation_event_stats()
354 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats()
412 fn process_security_level(sec_level: SecurityLevel) -> MetricsSecurityLevel { in process_security_level()
413 match sec_level { in process_security_level()
[all …]
Dkm_compat.rs320 sec_level: SecurityLevel, field
324 pub fn new(sec_level: SecurityLevel) -> Self { in new()
325 Self { sec_level } in new()
333 if self.sec_level == SecurityLevel::STRONGBOX { in emulation_required()
366 pub fn new(sec_level: SecurityLevel) -> Self { in new()
367 Self { v1: KeyMintV1::new(sec_level) } in new()
492 for (sec_level, params, want) in tests { in test_keymintv1_emulation_required()
493 let v1 = KeyMintV1::new(sec_level); in test_keymintv1_emulation_required()
582 for (sec_level, params, want) in tests { in test_keymaster_emulation_required()
583 let v0 = Keymaster::new(sec_level); in test_keymaster_emulation_required()
Dmaintenance.rs162 fn call_with_watchdog<F>(sec_level: SecurityLevel, name: &'static str, op: &F) -> Result<()> in call_with_watchdog()
167 get_keymint_device(&sec_level).context(ks_err!("getting keymint device"))?; in call_with_watchdog()
170 format!("Seclevel: {:?} Op: {}", sec_level, name) in call_with_watchdog()
184 sec_levels.iter().fold(Ok(()), move |result, (sec_level, sec_level_string)| { in call_on_all_security_levels()
185 let curr_result = Maintenance::call_with_watchdog(*sec_level, name, &op); in call_on_all_security_levels()
Dglobals.rs100 sec_level: &SecurityLevel, in dev_by_sec_level()
102 self.uuid_by_sec_level.get(sec_level).and_then(|uuid| self.dev_by_uuid(uuid)) in dev_by_sec_level()
118 fn insert(&mut self, sec_level: SecurityLevel, dev: Strong<T>, hw_info: KeyMintHardwareInfo) { in insert()
121 let uuid: Uuid = sec_level.into(); in insert()
123 self.uuid_by_sec_level.insert(sec_level, uuid); in insert()
Drkpd_client.rs608 let sec_level = SecurityLevel::TRUSTED_ENVIRONMENT; in test_get_rkpd_attestation_key_same_caller() localVariable
612 let first_key = get_rkpd_attestation_key(&sec_level, key_id).unwrap(); in test_get_rkpd_attestation_key_same_caller()
613 let second_key = get_rkpd_attestation_key(&sec_level, key_id).unwrap(); in test_get_rkpd_attestation_key_same_caller()
622 let sec_level = SecurityLevel::TRUSTED_ENVIRONMENT; in test_get_rkpd_attestation_key_different_caller() localVariable
627 let first_key = get_rkpd_attestation_key(&sec_level, first_key_id).unwrap(); in test_get_rkpd_attestation_key_different_caller()
628 let second_key = get_rkpd_attestation_key(&sec_level, second_key_id).unwrap(); in test_get_rkpd_attestation_key_different_caller()
642 let sec_level = SecurityLevel::TRUSTED_ENVIRONMENT; in test_store_rkpd_attestation_key() localVariable
647 assert!(store_rkpd_attestation_key(&sec_level, &key.keyBlob, &new_blob).is_ok()); in test_store_rkpd_attestation_key()
653 assert!(store_rkpd_attestation_key(&sec_level, &new_blob, &key.keyBlob).is_ok()); in test_store_rkpd_attestation_key()
/system/security/keystore2/tests/legacy_blobs/
Dkeystore2_legacy_blob_tests.rs163 let sec_level = keystore2 in keystore2_encrypted_characteristics() localVariable
169 &sec_level, in keystore2_encrypted_characteristics()
420 let sec_level = keystore2 in keystore2_encrypted_certificates() localVariable
426 &sec_level, in keystore2_encrypted_certificates()
/system/security/keystore/
Dkeystore_cli_v2.cpp123 std::shared_ptr<ks2::IKeystoreSecurityLevel> sec_level; in GetSecurityLevelInterface() local
124 auto rc = keystore->getSecurityLevel(securitylevel, &sec_level); in GetSecurityLevelInterface()
125 if (rc.isOk()) return sec_level; in GetSecurityLevelInterface()
257 auto sec_level = GetSecurityLevelInterface(keystore, securityLevel); in loadOrCreateAndVerifyEncryptionKey() local
266 rc = sec_level->generateKey(keyDescriptor(name), {} /* attestationKey */, in loadOrCreateAndVerifyEncryptionKey()
310 auto sec_level = GetSecurityLevelInterface(keystore, securityLevel); in loadOrCreateAndVerifyAuthenticationKey() local
319 rc = sec_level->generateKey(keyDescriptor(name), {} /* attestationKey */, in loadOrCreateAndVerifyAuthenticationKey()
554 auto sec_level = in TestKey() local
566 auto rc = sec_level->generateKey(keyDescriptor, {} /* attestationKey */, parameters, in TestKey()
761 auto sec_level = GetSecurityLevelInterface(keystore, securityLevel); in GenerateKey() local
[all …]

12