/system/security/keystore2/src/ |
D | globals.rs | 179 fn keymint_service_name(security_level: &SecurityLevel) -> Result<Option<String>> { in keymint_service_name() 183 let service_name = match *security_level { in keymint_service_name() 201 security_level in keymint_service_name() 213 security_level: &SecurityLevel, in connect_keymint() 218 let service_name = keymint_service_name(security_level).context(ks_err!("Get service name"))?; in connect_keymint() 239 map_binder_status(keystore_compat_service.getKeyMintDevice(*security_level)) in connect_keymint() 259 security_level in connect_keymint() 268 security_level in connect_keymint() 277 security_level in connect_keymint() 279 BacklevelKeyMintWrapper::wrap(KeyMintV1::new(*security_level), keymint) in connect_keymint() [all …]
|
D | remote_provisioning.rs | 43 security_level: SecurityLevel, field 49 pub fn new(security_level: SecurityLevel, km_uuid: Uuid) -> Self { in new() 50 Self { security_level, km_uuid } in new() 61 let property_name = match self.security_level { in is_rkp_only() 96 match get_rkpd_attestation_key(&self.security_level, caller_uid) { in get_rkpd_attestation_key_and_certs() 105 &self.security_level, in get_rkpd_attestation_key_and_certs()
|
D | raw_device.rs | 54 security_level: SecurityLevel, field 70 pub fn get(security_level: SecurityLevel) -> Result<KeyMintDevice> { in get() 72 get_keymint_device(&security_level).context(ks_err!("get_keymint_device failed"))?; in get() 78 security_level: hw_info.securityLevel, in get() 84 pub fn get_or_none(security_level: SecurityLevel) -> Result<Option<KeyMintDevice>> { in get_or_none() 85 KeyMintDevice::get(security_level).map(Some).or_else(|e| { in get_or_none() 101 pub fn security_level(&self) -> SecurityLevel { in security_level() method 102 self.security_level in security_level()
|
D | key_parameter.rs | 795 security_level: SecurityLevel(100), 1045 security_level: SecurityLevel, field 1050 pub fn new(value: KeyParameterValue, security_level: SecurityLevel) -> Self { in new() 1051 KeyParameter { value, security_level } in new() 1067 security_level: security_level_val, in new_from_sql() 1082 pub fn security_level(&self) -> &SecurityLevel { in security_level() method 1083 &self.security_level in security_level() 1090 Authorization { securityLevel: self.security_level, keyParameter: self.value.into() } in into_authorization() 1201 assert_eq!(*key_parameter.security_level(), SecurityLevel::STRONGBOX); in test_key_parameter() 1236 assert_eq!(*key_param.security_level(), SecurityLevel::STRONGBOX); in test_new_from_sql_enum_i32() [all …]
|
D | rkpd_client.rs | 113 security_level: &SecurityLevel, in get_rkpd_registration() 119 let rpc_name = get_remotely_provisioned_component_name(security_level) in get_rkpd_registration() 221 security_level: &SecurityLevel, in get_rkpd_attestation_key_async() 224 let registration = get_rkpd_registration(security_level) in get_rkpd_attestation_key_async() 283 security_level: &SecurityLevel, in store_rkpd_attestation_key_async() 287 let registration = get_rkpd_registration(security_level) in store_rkpd_attestation_key_async() 295 security_level: &SecurityLevel, in get_rkpd_attestation_key() 299 tokio_rt().block_on(get_rkpd_attestation_key_async(security_level, caller_uid)) in get_rkpd_attestation_key() 304 security_level: &SecurityLevel, in store_rkpd_attestation_key() 309 tokio_rt().block_on(store_rkpd_attestation_key_async(security_level, key_blob, upgraded_blob)) in store_rkpd_attestation_key() [all …]
|
D | security_level.rs | 68 security_level: SecurityLevel, field 90 security_level: SecurityLevel, in new_native_binder() 93 let (dev, hw_info, km_uuid) = get_keymint_device(&security_level) in new_native_binder() 97 security_level, in new_native_binder() 102 rem_prov_state: RemProvState::new(security_level, km_uuid), in new_native_binder() 111 let sec_level = self.security_level; in watch_millis() 204 keySecurityLevel: self.security_level, in store_new_key() 370 LoggingInfo::new(self.security_level, purpose, op_params, upgraded_blob.is_some()), in create_operation() 897 store_rkpd_attestation_key(&self.security_level, key_blob, upgraded_blob) in upgrade_rkpd_keyblob_if_required_with() 1012 log_key_creation_event_stats(self.security_level, params, &result); in generateKey() [all …]
|
D | lib.rs | 42 pub mod security_level; module
|
D | metrics_store.rs | 193 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_creation_event_stats() 206 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats() 343 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_operation_event_stats() 354 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats() 558 security_level: process_security_level(*sec_level), in log_rkp_error_stats()
|
D | service.rs | 23 use crate::security_level::KeystoreSecurityLevel; 374 security_level: SecurityLevel, in getSecurityLevel() 377 format!("security_level: {}", security_level.0) in getSecurityLevel() 379 map_or_log_err(self.get_security_level(security_level), Ok) in getSecurityLevel()
|
D | boot_level_keys.rs | 117 km_dev.security_level(), in get_level_zero_key() 120 let required_security_level = km_dev.security_level(); in get_level_zero_key()
|
/system/keymint/ta/src/ |
D | keys.rs | 147 self.hw_info.security_level, in generate_cert() 167 tag::characteristics_at(chars, self.hw_info.security_level)?, in generate_cert() 253 self.hw_info.security_level, in generate_key_material() 298 self.hw_info.security_level, in import_key() 334 .filter(|c| c.security_level != SecurityLevel::Keystore) in finish_keyblob_creation() 376 .suitable_for(KeyPurpose::AttestKey, self.hw_info.security_level)?; in finish_keyblob_creation() 461 self.hw_info.security_level, in finish_keyblob_creation() 509 tag::characteristics_at(&characteristics, self.hw_info.security_level)?, in import_wrapped_key() 669 self.hw_info.security_level, in upgrade_key() 699 if chars.security_level != self.hw_info.security_level { in upgrade_key() [all …]
|
D | lib.rs | 196 pub security_level: SecurityLevel, field 269 let max_operations = if hw_info.security_level == SecurityLevel::Strongbox { in new() 309 self.hw_info.security_level == SecurityLevel::Strongbox in is_strongbox() 397 let key_chars = keyblob.characteristics_at(self.hw_info.security_level)?; in keyblob_parse_decrypt() 945 security_level: self.hw_info.security_level, in get_hardware_info() 1066 let chars = keyblob.characteristics_at(self.hw_info.security_level)?; in convert_storage_key_to_ephemeral() 1134 if kc.security_level == self.hw_info.security_level { in add_keymint_tags() 1153 self.hw_info.security_level in add_keymint_tags()
|
D | rkp.rs | 80 let security_level = match self.hw_info.security_level { in rpc_device_info_cbor() localVariable 105 "security_level" => security_level, in rpc_device_info_cbor()
|
D | cert.rs | 272 security_level: keymint::SecurityLevel, in attestation_extension() 282 match characteristic.security_level { in attestation_extension() 286 l if l == security_level => hw_chars = &characteristic.authorizations, in attestation_extension() 296 let (sw_params, hw_params): (&[KeyParam], &[KeyParam]) = match security_level { in attestation_extension() 309 let sec_level = SecurityLevel::try_from(security_level as u32) in attestation_extension() 310 .map_err(|_| km_err!(UnknownError, "invalid security level {:?}", security_level))?; in attestation_extension()
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 195 response.token.security_level = SecurityLevel(); in VerifyAuthorization() 200 toBlob(response.token.security_level), in VerifyAuthorization() 210 token->security_level = SecurityLevel(); in GenerateTimestampToken() 215 toBlob(token->security_level), in GenerateTimestampToken()
|
/system/security/keystore2/aidl/android/security/metrics/ |
D | RkpErrorStats.aidl | 28 SecurityLevel security_level;
|
D | KeyCreationWithAuthInfo.aidl | 34 SecurityLevel security_level;
|
D | KeyOperationWithGeneralInfo.aidl | 31 SecurityLevel security_level;
|
/system/keymaster/contexts/ |
D | pure_soft_remote_provisioning_context.cpp | 54 keymaster_security_level_t security_level) in PureSoftRemoteProvisioningContext() argument 55 : security_level_(security_level) {} in PureSoftRemoteProvisioningContext() 113 const char* security_level = in CreateDeviceInfo() local 115 result->add(cppbor::Tstr("security_level"), cppbor::Tstr(security_level)); in CreateDeviceInfo()
|
D | pure_soft_keymaster_context.cpp | 55 keymaster_security_level_t security_level) in PureSoftKeymasterContext() argument 67 security_level_(security_level) { in PureSoftKeymasterContext() 70 if (security_level != KM_SECURITY_LEVEL_SOFTWARE) { in PureSoftKeymasterContext()
|
/system/keymaster/ng/ |
D | AndroidKeymaster41Device.cpp | 49 serializableToken.security_level = in deviceLocked()
|
/system/keymint/tests/src/bin/ |
D | auth-keyblob-parse.rs | 185 security_level: SecurityLevel::TrustedEnvironment, in process() 189 security_level: SecurityLevel::Software, in process()
|
/system/keymaster/include/keymaster/contexts/ |
D | pure_soft_remote_provisioning_context.h | 37 explicit PureSoftRemoteProvisioningContext(keymaster_security_level_t security_level);
|
D | pure_soft_keymaster_context.h | 51 KmVersion version, keymaster_security_level_t security_level = KM_SECURITY_LEVEL_SOFTWARE);
|
/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 958 security_level = other.security_level; in VerificationToken() 969 keymaster_security_level_t security_level{}; 1094 security_level = other.security_level; in TimestampToken() 1098 return sizeof(challenge) + sizeof(timestamp) + sizeof(security_level) + in SerializedSize() 1104 buf = append_uint32_to_buf(buf, end, security_level); in Serialize() 1110 copy_uint32_from_buf(buf_ptr, end, &security_level) && mac.Deserialize(buf_ptr, end); in Deserialize() 1114 keymaster_security_level_t security_level{};
|