/system/security/keystore2/tests/ |
D | keystore2_client_import_keys_tests.rs | 46 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in import_rsa_sign_key_and_perform_sample_operation() 53 key_generations::import_rsa_2048_key(sec_level, domain, nspace, alias, import_params) in import_rsa_sign_key_and_perform_sample_operation() 57 sec_level, in import_rsa_sign_key_and_perform_sample_operation() 65 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sym_key_encrypt_decrypt_op() 69 sec_level, in perform_sym_key_encrypt_decrypt_op() 81 sec_level, in perform_sym_key_encrypt_decrypt_op() 96 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in build_secure_key_wrapper() 106 key_generations::import_transport_key(sec_level, Some(transport_key_alias), transport_key) in build_secure_key_wrapper() 109 sec_level, in build_secure_key_wrapper() 139 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_rsa_import_key_success() localVariable [all …]
|
D | keystore2_client_aes_key_tests.rs | 34 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_aes_key_and_operation() 45 sec_level, in create_aes_key_and_operation() 55 sec_level, in create_aes_key_and_operation() 66 sec_level, in create_aes_key_and_operation() 91 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ecb_cbc_generate_key() localVariable 98 &sec_level, in keystore2_aes_ecb_cbc_generate_key() 122 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ctr_gcm_generate_key_success() localVariable 127 &sec_level, in keystore2_aes_ctr_gcm_generate_key_success() 152 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() localVariable 157 &sec_level, in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() [all …]
|
D | keystore2_client_3des_key_tests.rs | 34 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_3des_key_and_operation() 42 sec_level, in create_3des_key_and_operation() 53 sec_level, in create_3des_key_and_operation() 63 sec_level, in create_3des_key_and_operation() 87 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_ecb_cbc_generate_key_success() localVariable 92 create_3des_key_and_operation(&sec_level, padding_mode, block_mode, &mut None) in keystore2_3des_ecb_cbc_generate_key_success() 103 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_key_fails_unsupported_key_size() localVariable 108 &sec_level, in keystore2_3des_key_fails_unsupported_key_size() 126 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_key_fails_missing_padding() localVariable 137 let key_metadata = sec_level in keystore2_3des_key_fails_missing_padding() [all …]
|
D | keystore2_client_hmac_key_tests.rs | 31 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_hmac_key_and_operation() 39 key_generations::generate_hmac_key(sec_level, alias, key_size, min_mac_len, digest)?; in create_hmac_key_and_operation() 41 let op_response = sec_level.createOperation( in create_hmac_key_and_operation() 73 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_key_op_success() localVariable 81 &sec_level, in keystore2_hmac_key_op_success() 100 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() localVariable 105 &sec_level, in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() 132 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length() localVariable 137 &sec_level, in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length() 163 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_key_multi_digests_fails_expect_unsupported_digest() localVariable [all …]
|
D | keystore2_client_authorizations_tests.rs | 55 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in gen_key_including_unique_id() 68 let key_metadata = key_generations::generate_key(sec_level, &gen_params, alias).unwrap(); in gen_key_including_unique_id() 81 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_key_and_perform_sign_verify_op_max_times() 86 let key_metadata = key_generations::generate_key(sec_level, gen_params, alias)?; in generate_key_and_perform_sign_verify_op_max_times() 90 perform_sample_asym_sign_verify_op(sec_level, &key_metadata, None, Some(Digest::SHA_2_256)); in generate_key_and_perform_sign_verify_op_max_times() 101 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_key_and_perform_op_with_max_usage_limit() 109 sec_level, in generate_key_and_perform_op_with_max_usage_limit() 145 let result = key_generations::map_ks_error(sec_level.createOperation( in generate_key_and_perform_op_with_max_usage_limit() 160 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_gen_key_auth_active_datetime_test_success() localVariable 176 &sec_level, in keystore2_gen_key_auth_active_datetime_test_success() [all …]
|
D | keystore2_client_delete_key_tests.rs | 31 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_success() localVariable 35 &sec_level, in keystore2_delete_key_success() 74 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_with_blob_domain_fail() localVariable 78 &sec_level, in keystore2_delete_key_with_blob_domain_fail() 96 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_blob_success() localVariable 100 &sec_level, in keystore2_delete_key_blob_success() 108 let result = sec_level.deleteKey(&key_metadata.key); in keystore2_delete_key_blob_success() 117 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_fails_with_missing_key_blob() localVariable 119 let result = key_generations::map_ks_error(sec_level.deleteKey(&KeyDescriptor { in keystore2_delete_key_fails_with_missing_key_blob() 135 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_blob_fail() localVariable [all …]
|
D | keystore2_client_attest_key_tests.rs | 50 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_signing_key_success() localVariable 56 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_rsa_signing_key_success() 66 &sec_level, in keystore2_attest_rsa_signing_key_success() 98 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_encrypt_key_success() localVariable 104 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_rsa_encrypt_key_success() 114 &sec_level, in keystore2_attest_rsa_encrypt_key_success() 147 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_ec_key_success() localVariable 153 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_ec_key_success() 163 &sec_level, in keystore2_attest_ec_key_success() 187 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() localVariable [all …]
|
D | keystore2_client_ec_key_tests.rs | 60 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_ec_key_and_operation() 68 key_generations::generate_ec_key(sec_level, domain, nspace, alias, ec_curve, digest)?; in create_ec_key_and_operation() 70 sec_level.createOperation( in create_ec_key_and_operation() 79 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_sign_key_op_success() localVariable 82 &sec_level, in perform_ec_sign_key_op_success() 104 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_sign_key_op_with_none_or_md5_digest() localVariable 107 &sec_level, in perform_ec_sign_key_op_with_none_or_md5_digest() 203 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_get_key_entry_blob_fail() localVariable 207 &sec_level, in keystore2_get_key_entry_blob_fail() 221 sec_level.deleteKey(&key_metadata.key).unwrap(); in keystore2_get_key_entry_blob_fail() [all …]
|
D | keystore2_client_key_id_domain_tests.rs | 37 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_generate_key_with_key_id_domain_expect_sys_error() localVariable 40 &sec_level, in keystore2_generate_key_with_key_id_domain_expect_sys_error() 57 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_find_key_with_key_id_as_domain() localVariable 61 &sec_level, in keystore2_find_key_with_key_id_as_domain() 88 let op_response = sec_level in keystore2_find_key_with_key_id_as_domain() 114 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_key_id_alias_rebind_verify_by_alias() localVariable 118 &sec_level, in keystore2_key_id_alias_rebind_verify_by_alias() 130 &sec_level, in keystore2_key_id_alias_rebind_verify_by_alias() 145 let result = key_generations::map_ks_error(sec_level.createOperation( in keystore2_key_id_alias_rebind_verify_by_alias() 155 let op_response = sec_level in keystore2_key_id_alias_rebind_verify_by_alias() [all …]
|
D | keystore2_client_key_agreement_tests.rs | 56 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in check_agreement() 63 let key_agree_op = sec_level.createOperation(keymint_key, &authorizations, false).unwrap(); in check_agreement() 93 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_key_agreement() localVariable 98 &sec_level, in perform_ec_key_agreement() 114 check_agreement(&sec_level, &keymint_key.key, &keymint_pub_key, &local_key, &local_pub_key); in perform_ec_key_agreement() 127 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ec_25519_agree_key_success() localVariable 131 &sec_level, in keystore2_ec_25519_agree_key_success() 145 check_agreement(&sec_level, &keymint_key.key, &keymint_pub_key, &local_key, &local_pub_key); in keystore2_ec_25519_agree_key_success() 153 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ec_agree_key_with_different_curves_fail() localVariable 157 &sec_level, in keystore2_ec_agree_key_with_different_curves_fail() [all …]
|
D | keystore2_client_keystore_engine_tests.rs | 35 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_rsa_key_and_grant_to_user() 50 let key_metadata = sec_level in generate_rsa_key_and_grant_to_user() 72 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key_and_grant_to_user() 85 let key_metadata = sec_level in generate_ec_key_and_grant_to_user() 107 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_key_and_grant_to_user() 119 sec_level, in generate_key_and_grant_to_user() 127 sec_level, in generate_key_and_grant_to_user() 174 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_perofrm_crypto_op_using_keystore2_engine_rsa_key_success() localVariable 178 &sec_level, in keystore2_perofrm_crypto_op_using_keystore2_engine_rsa_key_success() 217 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_perofrm_crypto_op_using_keystore2_engine_ec_key_success() localVariable [all …]
|
D | keystore2_client_grant_key_tests.rs | 41 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in generate_ec_key_and_grant_to_user() localVariable 45 &sec_level, in generate_ec_key_and_grant_to_user() 58 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in load_grant_key_and_perform_sign_operation() 69 let op_response = sec_level.createOperation( in load_grant_key_and_perform_sign_operation() 199 let sec_level = in keystore2_grant_get_info_use_key_perm() localVariable 213 let op_response = sec_level in keystore2_grant_get_info_use_key_perm() 262 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_grant_delete_key_success() localVariable 266 &sec_level, in keystore2_grant_delete_key_success() 339 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_grant_key_fails_with_permission_denied() localVariable 344 &sec_level, in keystore2_grant_key_fails_with_permission_denied() [all …]
|
D | keystore2_client_device_unique_attestation_tests.rs | 123 let sec_level = result.unwrap(); in generate_device_unique_attested_key_with_device_attest_ids() localVariable 138 &sec_level, in generate_device_unique_attested_key_with_device_attest_ids() 165 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_gen_key_device_unique_attest_with_default_sec_level_unimplemented() localVariable 179 &sec_level, in keystore2_gen_key_device_unique_attest_with_default_sec_level_unimplemented() 203 let sec_level = result.unwrap(); in keystore2_gen_ec_key_device_unique_attest_with_strongbox_sec_level_test_success() localVariable 216 &sec_level, in keystore2_gen_ec_key_device_unique_attest_with_strongbox_sec_level_test_success() 222 &sec_level, in keystore2_gen_ec_key_device_unique_attest_with_strongbox_sec_level_test_success() 248 let sec_level = result.unwrap(); in keystore2_gen_rsa_key_device_unique_attest_with_strongbox_sec_level_test_success() localVariable 263 &sec_level, in keystore2_gen_rsa_key_device_unique_attest_with_strongbox_sec_level_test_success() 269 &sec_level, in keystore2_gen_rsa_key_device_unique_attest_with_strongbox_sec_level_test_success() [all …]
|
D | keystore2_client_list_entries_tests.rs | 67 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_success() localVariable 91 &sec_level, in keystore2_list_entries_success() 125 let sec_level = in keystore2_list_entries_success() localVariable 130 &sec_level, in keystore2_list_entries_success() 208 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_with_long_aliases_success() localVariable 227 key_generations::import_aes_key(&sec_level, Domain::APP, -1, Some(alias)); in keystore2_list_entries_with_long_aliases_success() 275 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_batched_with_long_aliases_success() localVariable 282 key_generations::import_aes_keys(&sec_level, "X".repeat(6000), 1..101).unwrap(); in keystore2_list_entries_batched_with_long_aliases_success() 343 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_batched_with_multi_procs_success() localVariable 351 key_generations::import_aes_keys(&sec_level, ALIAS_PREFIX.to_string(), 1..4) in keystore2_list_entries_batched_with_multi_procs_success() [all …]
|
D | keystore2_client_test_utils.rs | 145 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key_and_grant_to_users() 151 key_generations::generate_ec_p256_signing_key(sec_level, Domain::APP, -1, alias, None)?; in generate_ec_key_and_grant_to_users() 175 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in create_signing_operation() localVariable 178 key_generations::generate_ec_p256_signing_key(&sec_level, domain, nspace, alias, None) in create_signing_operation() 181 sec_level.createOperation( in create_signing_operation() 200 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sample_hmac_sign_verify_op() 203 let sign_op = sec_level in perform_sample_hmac_sign_verify_op() 221 let verify_op = sec_level in perform_sample_hmac_sign_verify_op() 263 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sample_asym_sign_verify_op() 276 let sign_op = sec_level.createOperation(&key_metadata.key, &authorizations, false).unwrap(); in perform_sample_asym_sign_verify_op() [all …]
|
D | keystore2_client_rsa_key_tests.rs | 80 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_rsa_key_and_operation() 89 key_generations::generate_rsa_key(sec_level, domain, nspace, alias, key_params, None)?; in create_rsa_key_and_operation() 106 sec_level.createOperation(&key_metadata.key, &op_params, forced_op.0) in create_rsa_key_and_operation() 117 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_rsa_sign_key_op_success() localVariable 120 &sec_level, in perform_rsa_sign_key_op_success() 153 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_rsa_sign_key_op_failure() localVariable 156 &sec_level, in perform_rsa_sign_key_op_failure() 191 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in create_rsa_encrypt_decrypt_key_op_success() localVariable 194 &sec_level, in create_rsa_encrypt_decrypt_key_op_success() 1537 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_rsa_generate_signing_key_padding_pss_fail() localVariable [all …]
|
D | keystore2_client_update_subcomponent_tests.rs | 35 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_update_subcomponent_success() localVariable 38 &sec_level, in keystore2_update_subcomponent_success() 174 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_update_subcomponent_fails_permission_denied() localVariable 179 &sec_level, in keystore2_update_subcomponent_fails_permission_denied()
|
D | keystore2_client_operation_tests.rs | 316 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ops_prune_test() localVariable 319 &sec_level, in keystore2_ops_prune_test() 330 sec_level.createOperation( in keystore2_ops_prune_test() 356 sec_level.createOperation( in keystore2_ops_prune_test()
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 535 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_p256_signing_key() 555 match sec_level.generateKey( in generate_ec_p256_signing_key() 584 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key() 599 let key_metadata = sec_level.generateKey( in generate_ec_key() 624 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_rsa_key() 656 let key_metadata = sec_level.generateKey( in generate_rsa_key() 698 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_sym_key() 719 let key_metadata = sec_level.generateKey( in generate_sym_key() 743 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_hmac_key() 758 let key_metadata = sec_level.generateKey( in generate_hmac_key() [all …]
|
/system/keymint/common/src/ |
D | tag.rs | 225 sec_level: SecurityLevel, in characteristics_at() 229 if chars.security_level != sec_level { in characteristics_at() 235 return Err(km_err!(InvalidKeyBlob, "multiple key characteristics at {:?}", sec_level)); in characteristics_at() 239 km_err!(InvalidKeyBlob, "no parameters at security level {:?} found", sec_level) in characteristics_at() 273 sec_level: SecurityLevel, in extract_key_gen_characteristics() 276 Algorithm::Rsa => check_rsa_gen_params(params, sec_level), in extract_key_gen_characteristics() 277 Algorithm::Ec => check_ec_gen_params(params, sec_level), in extract_key_gen_characteristics() 278 Algorithm::Aes => check_aes_gen_params(params, sec_level), in extract_key_gen_characteristics() 280 Algorithm::Hmac => check_hmac_gen_params(params, sec_level), in extract_key_gen_characteristics() 282 Ok((extract_key_characteristics(secure_storage, params, &[], sec_level)?, keygen_info)) in extract_key_gen_characteristics() [all …]
|
D | keyblob.rs | 169 sec_level: SecurityLevel, in convert_legacy_key() 322 pub fn characteristics_at(&self, sec_level: SecurityLevel) -> Result<&[KeyParam], Error> { in characteristics_at() 323 tag::characteristics_at(&self.characteristics, sec_level) in characteristics_at() 327 pub fn suitable_for(&self, purpose: KeyPurpose, sec_level: SecurityLevel) -> Result<(), Error> { in suitable_for() 328 if contains_tag_value!(self.characteristics_at(sec_level)?, Purpose, purpose) { in suitable_for() 340 sec_level: SecurityLevel, in encrypt() 354 .characteristics_at(sec_level)? in encrypt()
|
/system/security/keystore2/src/ |
D | metrics_store.rs | 147 sec_level: SecurityLevel, in log_key_creation_event_stats() 155 ) = process_key_creation_event_stats(sec_level, key_params, result); in log_key_creation_event_stats() 170 sec_level: SecurityLevel, in process_key_creation_event_stats() 207 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats() 310 sec_level: SecurityLevel, in log_key_operation_event_stats() 318 sec_level, in log_key_operation_event_stats() 335 sec_level: SecurityLevel, in process_key_operation_event_stats() 355 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats() 413 fn process_security_level(sec_level: SecurityLevel) -> MetricsSecurityLevel { in process_security_level() 414 match sec_level { in process_security_level() [all …]
|
D | km_compat.rs | 330 sec_level: SecurityLevel, field 334 pub fn new(sec_level: SecurityLevel) -> Self { in new() 335 Self { sec_level } in new() 343 if self.sec_level == SecurityLevel::STRONGBOX { in emulation_required() 376 pub fn new(sec_level: SecurityLevel) -> Self { in new() 377 Self { v1: KeyMintV1::new(sec_level) } in new() 502 for (sec_level, params, want) in tests { in test_keymintv1_emulation_required() 503 let v1 = KeyMintV1::new(sec_level); in test_keymintv1_emulation_required() 592 for (sec_level, params, want) in tests { in test_keymaster_emulation_required() 593 let v0 = Keymaster::new(sec_level); in test_keymaster_emulation_required()
|
D | maintenance.rs | 173 fn call_with_watchdog<F>(sec_level: SecurityLevel, name: &'static str, op: &F) -> Result<()> in call_with_watchdog() 178 get_keymint_device(&sec_level).context(ks_err!("getting keymint device"))?; in call_with_watchdog() 181 format!("Seclevel: {:?} Op: {}", sec_level, name) in call_with_watchdog() 195 sec_levels.iter().try_fold((), |_result, (sec_level, sec_level_string)| { in call_on_all_security_levels() 196 let curr_result = Maintenance::call_with_watchdog(*sec_level, name, &op); in call_on_all_security_levels()
|
D | globals.rs | 103 sec_level: &SecurityLevel, in dev_by_sec_level() 105 self.uuid_by_sec_level.get(sec_level).and_then(|uuid| self.dev_by_uuid(uuid)) in dev_by_sec_level() 121 fn insert(&mut self, sec_level: SecurityLevel, dev: Strong<T>, hw_info: KeyMintHardwareInfo) { in insert() 124 let uuid: Uuid = sec_level.into(); in insert() 126 self.uuid_by_sec_level.insert(sec_level, uuid); in insert()
|