Home
last modified time | relevance | path

Searched refs:security_level (Results 1 – 25 of 41) sorted by relevance

12

/system/security/keystore2/src/
Dglobals.rs179 fn keymint_service_name(security_level: &SecurityLevel) -> Result<Option<String>> { in keymint_service_name()
183 let service_name = match *security_level { in keymint_service_name()
201 security_level in keymint_service_name()
213 security_level: &SecurityLevel, in connect_keymint()
218 let service_name = keymint_service_name(security_level).context(ks_err!("Get service name"))?; in connect_keymint()
239 map_binder_status(keystore_compat_service.getKeyMintDevice(*security_level)) in connect_keymint()
259 security_level in connect_keymint()
268 security_level in connect_keymint()
277 security_level in connect_keymint()
279 BacklevelKeyMintWrapper::wrap(KeyMintV1::new(*security_level), keymint) in connect_keymint()
[all …]
Dremote_provisioning.rs43 security_level: SecurityLevel, field
49 pub fn new(security_level: SecurityLevel, km_uuid: Uuid) -> Self { in new()
50 Self { security_level, km_uuid } in new()
61 let property_name = match self.security_level { in is_rkp_only()
96 match get_rkpd_attestation_key(&self.security_level, caller_uid) { in get_rkpd_attestation_key_and_certs()
105 &self.security_level, in get_rkpd_attestation_key_and_certs()
Draw_device.rs54 security_level: SecurityLevel, field
70 pub fn get(security_level: SecurityLevel) -> Result<KeyMintDevice> { in get()
72 get_keymint_device(&security_level).context(ks_err!("get_keymint_device failed"))?; in get()
78 security_level: hw_info.securityLevel, in get()
84 pub fn get_or_none(security_level: SecurityLevel) -> Result<Option<KeyMintDevice>> { in get_or_none()
85 KeyMintDevice::get(security_level).map(Some).or_else(|e| { in get_or_none()
101 pub fn security_level(&self) -> SecurityLevel { in security_level() method
102 self.security_level in security_level()
Dkey_parameter.rs795 security_level: SecurityLevel(100),
1045 security_level: SecurityLevel, field
1050 pub fn new(value: KeyParameterValue, security_level: SecurityLevel) -> Self { in new()
1051 KeyParameter { value, security_level } in new()
1067 security_level: security_level_val, in new_from_sql()
1082 pub fn security_level(&self) -> &SecurityLevel { in security_level() method
1083 &self.security_level in security_level()
1090 Authorization { securityLevel: self.security_level, keyParameter: self.value.into() } in into_authorization()
1201 assert_eq!(*key_parameter.security_level(), SecurityLevel::STRONGBOX); in test_key_parameter()
1236 assert_eq!(*key_param.security_level(), SecurityLevel::STRONGBOX); in test_new_from_sql_enum_i32()
[all …]
Drkpd_client.rs113 security_level: &SecurityLevel, in get_rkpd_registration()
119 let rpc_name = get_remotely_provisioned_component_name(security_level) in get_rkpd_registration()
221 security_level: &SecurityLevel, in get_rkpd_attestation_key_async()
224 let registration = get_rkpd_registration(security_level) in get_rkpd_attestation_key_async()
283 security_level: &SecurityLevel, in store_rkpd_attestation_key_async()
287 let registration = get_rkpd_registration(security_level) in store_rkpd_attestation_key_async()
295 security_level: &SecurityLevel, in get_rkpd_attestation_key()
299 tokio_rt().block_on(get_rkpd_attestation_key_async(security_level, caller_uid)) in get_rkpd_attestation_key()
304 security_level: &SecurityLevel, in store_rkpd_attestation_key()
309 tokio_rt().block_on(store_rkpd_attestation_key_async(security_level, key_blob, upgraded_blob)) in store_rkpd_attestation_key()
[all …]
Dsecurity_level.rs68 security_level: SecurityLevel, field
90 security_level: SecurityLevel, in new_native_binder()
93 let (dev, hw_info, km_uuid) = get_keymint_device(&security_level) in new_native_binder()
97 security_level, in new_native_binder()
102 rem_prov_state: RemProvState::new(security_level, km_uuid), in new_native_binder()
111 let sec_level = self.security_level; in watch_millis()
204 keySecurityLevel: self.security_level, in store_new_key()
370 LoggingInfo::new(self.security_level, purpose, op_params, upgraded_blob.is_some()), in create_operation()
897 store_rkpd_attestation_key(&self.security_level, key_blob, upgraded_blob) in upgrade_rkpd_keyblob_if_required_with()
1012 log_key_creation_event_stats(self.security_level, params, &result); in generateKey()
[all …]
Dlib.rs42 pub mod security_level; module
Dmetrics_store.rs193 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_creation_event_stats()
206 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats()
343 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_operation_event_stats()
354 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats()
558 security_level: process_security_level(*sec_level), in log_rkp_error_stats()
Dservice.rs23 use crate::security_level::KeystoreSecurityLevel;
374 security_level: SecurityLevel, in getSecurityLevel()
377 format!("security_level: {}", security_level.0) in getSecurityLevel()
379 map_or_log_err(self.get_security_level(security_level), Ok) in getSecurityLevel()
Dboot_level_keys.rs117 km_dev.security_level(), in get_level_zero_key()
120 let required_security_level = km_dev.security_level(); in get_level_zero_key()
/system/keymint/ta/src/
Dkeys.rs147 self.hw_info.security_level, in generate_cert()
167 tag::characteristics_at(chars, self.hw_info.security_level)?, in generate_cert()
253 self.hw_info.security_level, in generate_key_material()
298 self.hw_info.security_level, in import_key()
334 .filter(|c| c.security_level != SecurityLevel::Keystore) in finish_keyblob_creation()
376 .suitable_for(KeyPurpose::AttestKey, self.hw_info.security_level)?; in finish_keyblob_creation()
461 self.hw_info.security_level, in finish_keyblob_creation()
509 tag::characteristics_at(&characteristics, self.hw_info.security_level)?, in import_wrapped_key()
669 self.hw_info.security_level, in upgrade_key()
699 if chars.security_level != self.hw_info.security_level { in upgrade_key()
[all …]
Dlib.rs196 pub security_level: SecurityLevel, field
269 let max_operations = if hw_info.security_level == SecurityLevel::Strongbox { in new()
309 self.hw_info.security_level == SecurityLevel::Strongbox in is_strongbox()
397 let key_chars = keyblob.characteristics_at(self.hw_info.security_level)?; in keyblob_parse_decrypt()
945 security_level: self.hw_info.security_level, in get_hardware_info()
1066 let chars = keyblob.characteristics_at(self.hw_info.security_level)?; in convert_storage_key_to_ephemeral()
1134 if kc.security_level == self.hw_info.security_level { in add_keymint_tags()
1153 self.hw_info.security_level in add_keymint_tags()
Drkp.rs80 let security_level = match self.hw_info.security_level { in rpc_device_info_cbor() localVariable
105 "security_level" => security_level, in rpc_device_info_cbor()
Dcert.rs272 security_level: keymint::SecurityLevel, in attestation_extension()
282 match characteristic.security_level { in attestation_extension()
286 l if l == security_level => hw_chars = &characteristic.authorizations, in attestation_extension()
296 let (sw_params, hw_params): (&[KeyParam], &[KeyParam]) = match security_level { in attestation_extension()
309 let sec_level = SecurityLevel::try_from(security_level as u32) in attestation_extension()
310 .map_err(|_| km_err!(UnknownError, "invalid security level {:?}", security_level))?; in attestation_extension()
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp195 response.token.security_level = SecurityLevel(); in VerifyAuthorization()
200 toBlob(response.token.security_level), in VerifyAuthorization()
210 token->security_level = SecurityLevel(); in GenerateTimestampToken()
215 toBlob(token->security_level), in GenerateTimestampToken()
/system/security/keystore2/aidl/android/security/metrics/
DRkpErrorStats.aidl28 SecurityLevel security_level;
DKeyCreationWithAuthInfo.aidl34 SecurityLevel security_level;
DKeyOperationWithGeneralInfo.aidl31 SecurityLevel security_level;
/system/keymaster/contexts/
Dpure_soft_remote_provisioning_context.cpp54 keymaster_security_level_t security_level) in PureSoftRemoteProvisioningContext() argument
55 : security_level_(security_level) {} in PureSoftRemoteProvisioningContext()
113 const char* security_level = in CreateDeviceInfo() local
115 result->add(cppbor::Tstr("security_level"), cppbor::Tstr(security_level)); in CreateDeviceInfo()
Dpure_soft_keymaster_context.cpp55 keymaster_security_level_t security_level) in PureSoftKeymasterContext() argument
67 security_level_(security_level) { in PureSoftKeymasterContext()
70 if (security_level != KM_SECURITY_LEVEL_SOFTWARE) { in PureSoftKeymasterContext()
/system/keymaster/ng/
DAndroidKeymaster41Device.cpp49 serializableToken.security_level = in deviceLocked()
/system/keymint/tests/src/bin/
Dauth-keyblob-parse.rs185 security_level: SecurityLevel::TrustedEnvironment, in process()
189 security_level: SecurityLevel::Software, in process()
/system/keymaster/include/keymaster/contexts/
Dpure_soft_remote_provisioning_context.h37 explicit PureSoftRemoteProvisioningContext(keymaster_security_level_t security_level);
Dpure_soft_keymaster_context.h51 KmVersion version, keymaster_security_level_t security_level = KM_SECURITY_LEVEL_SOFTWARE);
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h958 security_level = other.security_level; in VerificationToken()
969 keymaster_security_level_t security_level{};
1094 security_level = other.security_level; in TimestampToken()
1098 return sizeof(challenge) + sizeof(timestamp) + sizeof(security_level) + in SerializedSize()
1104 buf = append_uint32_to_buf(buf, end, security_level); in Serialize()
1110 copy_uint32_from_buf(buf_ptr, end, &security_level) && mac.Deserialize(buf_ptr, end); in Deserialize()
1114 keymaster_security_level_t security_level{};

12