Home
last modified time | relevance | path

Searched refs:key_param (Results 1 – 7 of 7) sorted by relevance

/system/security/keystore2/src/
Dkey_parameter.rs685 #[key_param(tag = $tag_name:ident, field = $field_name:ident)]
815 #[key_param(tag = INVALID, field = Invalid)]
820 #[key_param(tag = PURPOSE, field = KeyPurpose)]
825 #[key_param(tag = ALGORITHM, field = Algorithm)]
828 #[key_param(tag = KEY_SIZE, field = Integer)]
833 #[key_param(tag = BLOCK_MODE, field = BlockMode)]
838 #[key_param(tag = DIGEST, field = Digest)]
843 #[key_param(tag = RSA_OAEP_MGF_DIGEST, field = Digest)]
848 #[key_param(tag = PADDING, field = PaddingMode)]
851 #[key_param(tag = CALLER_NONCE, field = BoolValue)]
[all …]
Dmetrics_store.rs209 for key_param in key_params.iter().map(KsKeyParamValue::from) { in process_key_creation_event_stats()
210 match key_param { in process_key_creation_event_stats()
381 for key_param in op_params.iter().map(KsKeyParamValue::from) { in process_key_operation_event_stats()
382 match key_param { in process_key_operation_event_stats()
Denforcements.rs486 for key_param in key_params.iter() { in authorize_create()
487 match key_param.key_parameter_value() { in authorize_create()
/system/security/keystore2/tests/legacy_blobs/
Dkeystore2_legacy_blob_tests.rs245 let key_param = KsKeyparameter::new(param.keyParameter.into(), param.securityLevel); in keystore2_encrypted_characteristics() localVariable
246 key_params.push(key_param); in keystore2_encrypted_characteristics()
293 let key_param = in keystore2_encrypted_characteristics() localVariable
295 key_params.push(key_param); in keystore2_encrypted_characteristics()
499 let key_param = KsKeyparameter::new(param.keyParameter.into(), param.securityLevel); in keystore2_encrypted_certificates() localVariable
500 key_params.push(key_param); in keystore2_encrypted_certificates()
541 let key_param = in keystore2_encrypted_certificates() localVariable
543 key_params.push(key_param); in keystore2_encrypted_certificates()
/system/security/keystore2/test_utils/
Dkey_generations.rs401 pub fn check_key_param(authorizations: &[Authorization], key_param: &KeyParameter) -> bool { in check_key_param()
402 authorizations.iter().any(|auth| &auth.keyParameter == key_param) in check_key_param()
427 expected_params.iter().all(|key_param| { in check_key_authorizations()
430 if key_param.tag == Tag::INCLUDE_UNIQUE_ID in check_key_authorizations()
431 && !authorizations.iter().any(|auth| auth.keyParameter.tag == key_param.tag) in check_key_authorizations()
440 if matches!(key_param.tag, Tag::RSA_OAEP_MGF_DIGEST | Tag::USAGE_COUNT_LIMIT) { in check_key_authorizations()
443 if key_param.tag == Tag::PURPOSE in check_key_authorizations()
444 && key_param.value == KeyParameterValue::KeyPurpose(KeyPurpose::ATTEST_KEY) in check_key_authorizations()
450 if ALLOWED_TAGS_IN_KEY_AUTHS.contains(&key_param.tag) { in check_key_authorizations()
452 check_key_param(authorizations, key_param), in check_key_authorizations()
[all …]
/system/keymint/ta/src/
Dkeys.rs654 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key()
660 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key()
666 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key()
/system/security/keystore2/tests/
Dkeystore2_client_test_utils.rs350 for key_param in &parameters.keyParameter { in get_op_nonce()
351 if key_param.tag == Tag::NONCE { in get_op_nonce()
352 if let KeyParameterValue::Blob(val) = &key_param.value { in get_op_nonce()