Searched refs:key_param (Results 1 – 7 of 7) sorted by relevance
/system/security/keystore2/src/ |
D | key_parameter.rs | 685 #[key_param(tag = $tag_name:ident, field = $field_name:ident)] 815 #[key_param(tag = INVALID, field = Invalid)] 820 #[key_param(tag = PURPOSE, field = KeyPurpose)] 825 #[key_param(tag = ALGORITHM, field = Algorithm)] 828 #[key_param(tag = KEY_SIZE, field = Integer)] 833 #[key_param(tag = BLOCK_MODE, field = BlockMode)] 838 #[key_param(tag = DIGEST, field = Digest)] 843 #[key_param(tag = RSA_OAEP_MGF_DIGEST, field = Digest)] 848 #[key_param(tag = PADDING, field = PaddingMode)] 851 #[key_param(tag = CALLER_NONCE, field = BoolValue)] [all …]
|
D | metrics_store.rs | 209 for key_param in key_params.iter().map(KsKeyParamValue::from) { in process_key_creation_event_stats() 210 match key_param { in process_key_creation_event_stats() 381 for key_param in op_params.iter().map(KsKeyParamValue::from) { in process_key_operation_event_stats() 382 match key_param { in process_key_operation_event_stats()
|
D | enforcements.rs | 486 for key_param in key_params.iter() { in authorize_create() 487 match key_param.key_parameter_value() { in authorize_create()
|
/system/security/keystore2/tests/legacy_blobs/ |
D | keystore2_legacy_blob_tests.rs | 245 let key_param = KsKeyparameter::new(param.keyParameter.into(), param.securityLevel); in keystore2_encrypted_characteristics() localVariable 246 key_params.push(key_param); in keystore2_encrypted_characteristics() 293 let key_param = in keystore2_encrypted_characteristics() localVariable 295 key_params.push(key_param); in keystore2_encrypted_characteristics() 499 let key_param = KsKeyparameter::new(param.keyParameter.into(), param.securityLevel); in keystore2_encrypted_certificates() localVariable 500 key_params.push(key_param); in keystore2_encrypted_certificates() 541 let key_param = in keystore2_encrypted_certificates() localVariable 543 key_params.push(key_param); in keystore2_encrypted_certificates()
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 401 pub fn check_key_param(authorizations: &[Authorization], key_param: &KeyParameter) -> bool { in check_key_param() 402 authorizations.iter().any(|auth| &auth.keyParameter == key_param) in check_key_param() 427 expected_params.iter().all(|key_param| { in check_key_authorizations() 430 if key_param.tag == Tag::INCLUDE_UNIQUE_ID in check_key_authorizations() 431 && !authorizations.iter().any(|auth| auth.keyParameter.tag == key_param.tag) in check_key_authorizations() 440 if matches!(key_param.tag, Tag::RSA_OAEP_MGF_DIGEST | Tag::USAGE_COUNT_LIMIT) { in check_key_authorizations() 443 if key_param.tag == Tag::PURPOSE in check_key_authorizations() 444 && key_param.value == KeyParameterValue::KeyPurpose(KeyPurpose::ATTEST_KEY) in check_key_authorizations() 450 if ALLOWED_TAGS_IN_KEY_AUTHS.contains(&key_param.tag) { in check_key_authorizations() 452 check_key_param(authorizations, key_param), in check_key_authorizations() [all …]
|
/system/keymint/ta/src/ |
D | keys.rs | 654 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key() 660 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key() 666 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key()
|
/system/security/keystore2/tests/ |
D | keystore2_client_test_utils.rs | 350 for key_param in ¶meters.keyParameter { in get_op_nonce() 351 if key_param.tag == Tag::NONCE { in get_op_nonce() 352 if let KeyParameterValue::Blob(val) = &key_param.value { in get_op_nonce()
|