Home
last modified time | relevance | path

Searched refs:sec_level (Results 1 – 25 of 36) sorted by relevance

12

/system/security/keystore2/tests/
Dkeystore2_client_import_keys_tests.rs46 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in import_rsa_sign_key_and_perform_sample_operation()
53 key_generations::import_rsa_2048_key(sec_level, domain, nspace, alias, import_params) in import_rsa_sign_key_and_perform_sample_operation()
57 sec_level, in import_rsa_sign_key_and_perform_sample_operation()
65 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sym_key_encrypt_decrypt_op()
69 sec_level, in perform_sym_key_encrypt_decrypt_op()
81 sec_level, in perform_sym_key_encrypt_decrypt_op()
96 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in build_secure_key_wrapper()
106 key_generations::import_transport_key(sec_level, Some(transport_key_alias), transport_key) in build_secure_key_wrapper()
109 sec_level, in build_secure_key_wrapper()
139 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_rsa_import_key_success() localVariable
[all …]
Dkeystore2_client_aes_key_tests.rs34 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_aes_key_and_operation()
45 sec_level, in create_aes_key_and_operation()
55 sec_level, in create_aes_key_and_operation()
66 sec_level, in create_aes_key_and_operation()
91 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ecb_cbc_generate_key() localVariable
98 &sec_level, in keystore2_aes_ecb_cbc_generate_key()
122 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ctr_gcm_generate_key_success() localVariable
127 &sec_level, in keystore2_aes_ctr_gcm_generate_key_success()
152 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() localVariable
157 &sec_level, in keystore2_aes_ctr_gcm_generate_key_fails_incompatible()
[all …]
Dkeystore2_client_3des_key_tests.rs34 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_3des_key_and_operation()
42 sec_level, in create_3des_key_and_operation()
53 sec_level, in create_3des_key_and_operation()
63 sec_level, in create_3des_key_and_operation()
87 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_ecb_cbc_generate_key_success() localVariable
92 create_3des_key_and_operation(&sec_level, padding_mode, block_mode, &mut None) in keystore2_3des_ecb_cbc_generate_key_success()
103 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_key_fails_unsupported_key_size() localVariable
108 &sec_level, in keystore2_3des_key_fails_unsupported_key_size()
126 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_3des_key_fails_missing_padding() localVariable
137 let key_metadata = sec_level in keystore2_3des_key_fails_missing_padding()
[all …]
Dkeystore2_client_hmac_key_tests.rs31 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_hmac_key_and_operation()
39 key_generations::generate_hmac_key(sec_level, alias, key_size, min_mac_len, digest)?; in create_hmac_key_and_operation()
41 let op_response = sec_level.createOperation( in create_hmac_key_and_operation()
73 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_key_op_success() localVariable
81 &sec_level, in keystore2_hmac_key_op_success()
100 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() localVariable
105 &sec_level, in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size()
132 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length() localVariable
137 &sec_level, in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length()
163 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_hmac_gen_key_multi_digests_fails_expect_unsupported_digest() localVariable
[all …]
Dkeystore2_client_authorizations_tests.rs55 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in gen_key_including_unique_id()
68 let key_metadata = key_generations::generate_key(sec_level, &gen_params, alias).unwrap(); in gen_key_including_unique_id()
81 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_key_and_perform_sign_verify_op_max_times()
86 let key_metadata = key_generations::generate_key(sec_level, gen_params, alias)?; in generate_key_and_perform_sign_verify_op_max_times()
90 perform_sample_asym_sign_verify_op(sec_level, &key_metadata, None, Some(Digest::SHA_2_256)); in generate_key_and_perform_sign_verify_op_max_times()
101 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_key_and_perform_op_with_max_usage_limit()
109 sec_level, in generate_key_and_perform_op_with_max_usage_limit()
145 let result = key_generations::map_ks_error(sec_level.createOperation( in generate_key_and_perform_op_with_max_usage_limit()
160 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_gen_key_auth_active_datetime_test_success() localVariable
176 &sec_level, in keystore2_gen_key_auth_active_datetime_test_success()
[all …]
Dkeystore2_client_delete_key_tests.rs31 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_success() localVariable
35 &sec_level, in keystore2_delete_key_success()
74 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_with_blob_domain_fail() localVariable
78 &sec_level, in keystore2_delete_key_with_blob_domain_fail()
96 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_blob_success() localVariable
100 &sec_level, in keystore2_delete_key_blob_success()
108 let result = sec_level.deleteKey(&key_metadata.key); in keystore2_delete_key_blob_success()
117 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_fails_with_missing_key_blob() localVariable
119 let result = key_generations::map_ks_error(sec_level.deleteKey(&KeyDescriptor { in keystore2_delete_key_fails_with_missing_key_blob()
135 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_delete_key_blob_fail() localVariable
[all …]
Dkeystore2_client_attest_key_tests.rs50 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_signing_key_success() localVariable
56 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_rsa_signing_key_success()
66 &sec_level, in keystore2_attest_rsa_signing_key_success()
98 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_encrypt_key_success() localVariable
104 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_rsa_encrypt_key_success()
114 &sec_level, in keystore2_attest_rsa_encrypt_key_success()
147 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_ec_key_success() localVariable
153 key_generations::generate_attestation_key(&sec_level, algo, att_challenge).unwrap(); in keystore2_attest_ec_key_success()
163 &sec_level, in keystore2_attest_ec_key_success()
187 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() localVariable
[all …]
Dkeystore2_client_ec_key_tests.rs60 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_ec_key_and_operation()
68 key_generations::generate_ec_key(sec_level, domain, nspace, alias, ec_curve, digest)?; in create_ec_key_and_operation()
70 sec_level.createOperation( in create_ec_key_and_operation()
79 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_sign_key_op_success() localVariable
82 &sec_level, in perform_ec_sign_key_op_success()
104 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_sign_key_op_with_none_or_md5_digest() localVariable
107 &sec_level, in perform_ec_sign_key_op_with_none_or_md5_digest()
203 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_get_key_entry_blob_fail() localVariable
207 &sec_level, in keystore2_get_key_entry_blob_fail()
221 sec_level.deleteKey(&key_metadata.key).unwrap(); in keystore2_get_key_entry_blob_fail()
[all …]
Dkeystore2_client_key_id_domain_tests.rs37 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_generate_key_with_key_id_domain_expect_sys_error() localVariable
40 &sec_level, in keystore2_generate_key_with_key_id_domain_expect_sys_error()
57 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_find_key_with_key_id_as_domain() localVariable
61 &sec_level, in keystore2_find_key_with_key_id_as_domain()
88 let op_response = sec_level in keystore2_find_key_with_key_id_as_domain()
114 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_key_id_alias_rebind_verify_by_alias() localVariable
118 &sec_level, in keystore2_key_id_alias_rebind_verify_by_alias()
130 &sec_level, in keystore2_key_id_alias_rebind_verify_by_alias()
145 let result = key_generations::map_ks_error(sec_level.createOperation( in keystore2_key_id_alias_rebind_verify_by_alias()
155 let op_response = sec_level in keystore2_key_id_alias_rebind_verify_by_alias()
[all …]
Dkeystore2_client_key_agreement_tests.rs56 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in check_agreement()
63 let key_agree_op = sec_level.createOperation(keymint_key, &authorizations, false).unwrap(); in check_agreement()
93 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_ec_key_agreement() localVariable
98 &sec_level, in perform_ec_key_agreement()
114 check_agreement(&sec_level, &keymint_key.key, &keymint_pub_key, &local_key, &local_pub_key); in perform_ec_key_agreement()
127 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ec_25519_agree_key_success() localVariable
131 &sec_level, in keystore2_ec_25519_agree_key_success()
145 check_agreement(&sec_level, &keymint_key.key, &keymint_pub_key, &local_key, &local_pub_key); in keystore2_ec_25519_agree_key_success()
153 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ec_agree_key_with_different_curves_fail() localVariable
157 &sec_level, in keystore2_ec_agree_key_with_different_curves_fail()
[all …]
Dkeystore2_client_keystore_engine_tests.rs35 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_rsa_key_and_grant_to_user()
50 let key_metadata = sec_level in generate_rsa_key_and_grant_to_user()
72 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key_and_grant_to_user()
85 let key_metadata = sec_level in generate_ec_key_and_grant_to_user()
107 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_key_and_grant_to_user()
119 sec_level, in generate_key_and_grant_to_user()
127 sec_level, in generate_key_and_grant_to_user()
174 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_perofrm_crypto_op_using_keystore2_engine_rsa_key_success() localVariable
178 &sec_level, in keystore2_perofrm_crypto_op_using_keystore2_engine_rsa_key_success()
217 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_perofrm_crypto_op_using_keystore2_engine_ec_key_success() localVariable
[all …]
Dkeystore2_client_grant_key_tests.rs41 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in generate_ec_key_and_grant_to_user() localVariable
45 &sec_level, in generate_ec_key_and_grant_to_user()
58 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in load_grant_key_and_perform_sign_operation()
69 let op_response = sec_level.createOperation( in load_grant_key_and_perform_sign_operation()
199 let sec_level = in keystore2_grant_get_info_use_key_perm() localVariable
213 let op_response = sec_level in keystore2_grant_get_info_use_key_perm()
262 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_grant_delete_key_success() localVariable
266 &sec_level, in keystore2_grant_delete_key_success()
339 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_grant_key_fails_with_permission_denied() localVariable
344 &sec_level, in keystore2_grant_key_fails_with_permission_denied()
[all …]
Dkeystore2_client_device_unique_attestation_tests.rs123 let sec_level = result.unwrap(); in generate_device_unique_attested_key_with_device_attest_ids() localVariable
138 &sec_level, in generate_device_unique_attested_key_with_device_attest_ids()
165 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_gen_key_device_unique_attest_with_default_sec_level_unimplemented() localVariable
179 &sec_level, in keystore2_gen_key_device_unique_attest_with_default_sec_level_unimplemented()
203 let sec_level = result.unwrap(); in keystore2_gen_ec_key_device_unique_attest_with_strongbox_sec_level_test_success() localVariable
216 &sec_level, in keystore2_gen_ec_key_device_unique_attest_with_strongbox_sec_level_test_success()
222 &sec_level, in keystore2_gen_ec_key_device_unique_attest_with_strongbox_sec_level_test_success()
248 let sec_level = result.unwrap(); in keystore2_gen_rsa_key_device_unique_attest_with_strongbox_sec_level_test_success() localVariable
263 &sec_level, in keystore2_gen_rsa_key_device_unique_attest_with_strongbox_sec_level_test_success()
269 &sec_level, in keystore2_gen_rsa_key_device_unique_attest_with_strongbox_sec_level_test_success()
[all …]
Dkeystore2_client_list_entries_tests.rs67 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_success() localVariable
91 &sec_level, in keystore2_list_entries_success()
125 let sec_level = in keystore2_list_entries_success() localVariable
130 &sec_level, in keystore2_list_entries_success()
208 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_with_long_aliases_success() localVariable
227 key_generations::import_aes_key(&sec_level, Domain::APP, -1, Some(alias)); in keystore2_list_entries_with_long_aliases_success()
275 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_batched_with_long_aliases_success() localVariable
282 key_generations::import_aes_keys(&sec_level, "X".repeat(6000), 1..101).unwrap(); in keystore2_list_entries_batched_with_long_aliases_success()
343 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_list_entries_batched_with_multi_procs_success() localVariable
351 key_generations::import_aes_keys(&sec_level, ALIAS_PREFIX.to_string(), 1..4) in keystore2_list_entries_batched_with_multi_procs_success()
[all …]
Dkeystore2_client_test_utils.rs145 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key_and_grant_to_users()
151 key_generations::generate_ec_p256_signing_key(sec_level, Domain::APP, -1, alias, None)?; in generate_ec_key_and_grant_to_users()
175 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in create_signing_operation() localVariable
178 key_generations::generate_ec_p256_signing_key(&sec_level, domain, nspace, alias, None) in create_signing_operation()
181 sec_level.createOperation( in create_signing_operation()
200 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sample_hmac_sign_verify_op()
203 let sign_op = sec_level in perform_sample_hmac_sign_verify_op()
221 let verify_op = sec_level in perform_sample_hmac_sign_verify_op()
263 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in perform_sample_asym_sign_verify_op()
276 let sign_op = sec_level.createOperation(&key_metadata.key, &authorizations, false).unwrap(); in perform_sample_asym_sign_verify_op()
[all …]
Dkeystore2_client_rsa_key_tests.rs80 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in create_rsa_key_and_operation()
89 key_generations::generate_rsa_key(sec_level, domain, nspace, alias, key_params, None)?; in create_rsa_key_and_operation()
106 sec_level.createOperation(&key_metadata.key, &op_params, forced_op.0) in create_rsa_key_and_operation()
117 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_rsa_sign_key_op_success() localVariable
120 &sec_level, in perform_rsa_sign_key_op_success()
153 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in perform_rsa_sign_key_op_failure() localVariable
156 &sec_level, in perform_rsa_sign_key_op_failure()
191 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in create_rsa_encrypt_decrypt_key_op_success() localVariable
194 &sec_level, in create_rsa_encrypt_decrypt_key_op_success()
1537 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_rsa_generate_signing_key_padding_pss_fail() localVariable
[all …]
Dkeystore2_client_update_subcomponent_tests.rs35 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_update_subcomponent_success() localVariable
38 &sec_level, in keystore2_update_subcomponent_success()
174 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_update_subcomponent_fails_permission_denied() localVariable
179 &sec_level, in keystore2_update_subcomponent_fails_permission_denied()
Dkeystore2_client_operation_tests.rs316 let sec_level = keystore2.getSecurityLevel(SecurityLevel::TRUSTED_ENVIRONMENT).unwrap(); in keystore2_ops_prune_test() localVariable
319 &sec_level, in keystore2_ops_prune_test()
330 sec_level.createOperation( in keystore2_ops_prune_test()
356 sec_level.createOperation( in keystore2_ops_prune_test()
/system/security/keystore2/test_utils/
Dkey_generations.rs535 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_p256_signing_key()
555 match sec_level.generateKey( in generate_ec_p256_signing_key()
584 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_ec_key()
599 let key_metadata = sec_level.generateKey( in generate_ec_key()
624 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_rsa_key()
656 let key_metadata = sec_level.generateKey( in generate_rsa_key()
698 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_sym_key()
719 let key_metadata = sec_level.generateKey( in generate_sym_key()
743 sec_level: &binder::Strong<dyn IKeystoreSecurityLevel>, in generate_hmac_key()
758 let key_metadata = sec_level.generateKey( in generate_hmac_key()
[all …]
/system/keymint/common/src/
Dtag.rs225 sec_level: SecurityLevel, in characteristics_at()
229 if chars.security_level != sec_level { in characteristics_at()
235 return Err(km_err!(InvalidKeyBlob, "multiple key characteristics at {:?}", sec_level)); in characteristics_at()
239 km_err!(InvalidKeyBlob, "no parameters at security level {:?} found", sec_level) in characteristics_at()
273 sec_level: SecurityLevel, in extract_key_gen_characteristics()
276 Algorithm::Rsa => check_rsa_gen_params(params, sec_level), in extract_key_gen_characteristics()
277 Algorithm::Ec => check_ec_gen_params(params, sec_level), in extract_key_gen_characteristics()
278 Algorithm::Aes => check_aes_gen_params(params, sec_level), in extract_key_gen_characteristics()
280 Algorithm::Hmac => check_hmac_gen_params(params, sec_level), in extract_key_gen_characteristics()
282 Ok((extract_key_characteristics(secure_storage, params, &[], sec_level)?, keygen_info)) in extract_key_gen_characteristics()
[all …]
Dkeyblob.rs169 sec_level: SecurityLevel, in convert_legacy_key()
322 pub fn characteristics_at(&self, sec_level: SecurityLevel) -> Result<&[KeyParam], Error> { in characteristics_at()
323 tag::characteristics_at(&self.characteristics, sec_level) in characteristics_at()
327 pub fn suitable_for(&self, purpose: KeyPurpose, sec_level: SecurityLevel) -> Result<(), Error> { in suitable_for()
328 if contains_tag_value!(self.characteristics_at(sec_level)?, Purpose, purpose) { in suitable_for()
340 sec_level: SecurityLevel, in encrypt()
354 .characteristics_at(sec_level)? in encrypt()
/system/security/keystore2/src/
Dmetrics_store.rs147 sec_level: SecurityLevel, in log_key_creation_event_stats()
155 ) = process_key_creation_event_stats(sec_level, key_params, result); in log_key_creation_event_stats()
170 sec_level: SecurityLevel, in process_key_creation_event_stats()
207 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats()
310 sec_level: SecurityLevel, in log_key_operation_event_stats()
318 sec_level, in log_key_operation_event_stats()
335 sec_level: SecurityLevel, in process_key_operation_event_stats()
355 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats()
413 fn process_security_level(sec_level: SecurityLevel) -> MetricsSecurityLevel { in process_security_level()
414 match sec_level { in process_security_level()
[all …]
Dkm_compat.rs330 sec_level: SecurityLevel, field
334 pub fn new(sec_level: SecurityLevel) -> Self { in new()
335 Self { sec_level } in new()
343 if self.sec_level == SecurityLevel::STRONGBOX { in emulation_required()
376 pub fn new(sec_level: SecurityLevel) -> Self { in new()
377 Self { v1: KeyMintV1::new(sec_level) } in new()
502 for (sec_level, params, want) in tests { in test_keymintv1_emulation_required()
503 let v1 = KeyMintV1::new(sec_level); in test_keymintv1_emulation_required()
592 for (sec_level, params, want) in tests { in test_keymaster_emulation_required()
593 let v0 = Keymaster::new(sec_level); in test_keymaster_emulation_required()
Dmaintenance.rs173 fn call_with_watchdog<F>(sec_level: SecurityLevel, name: &'static str, op: &F) -> Result<()> in call_with_watchdog()
178 get_keymint_device(&sec_level).context(ks_err!("getting keymint device"))?; in call_with_watchdog()
181 format!("Seclevel: {:?} Op: {}", sec_level, name) in call_with_watchdog()
195 sec_levels.iter().try_fold((), |_result, (sec_level, sec_level_string)| { in call_on_all_security_levels()
196 let curr_result = Maintenance::call_with_watchdog(*sec_level, name, &op); in call_on_all_security_levels()
Dglobals.rs103 sec_level: &SecurityLevel, in dev_by_sec_level()
105 self.uuid_by_sec_level.get(sec_level).and_then(|uuid| self.dev_by_uuid(uuid)) in dev_by_sec_level()
121 fn insert(&mut self, sec_level: SecurityLevel, dev: Strong<T>, hw_info: KeyMintHardwareInfo) { in insert()
124 let uuid: Uuid = sec_level.into(); in insert()
126 self.uuid_by_sec_level.insert(sec_level, uuid); in insert()

12