Home
last modified time | relevance | path

Searched refs:None (Results 1 – 25 of 187) sorted by relevance

12345678

/system/security/keystore2/src/
Dpermission.rs201 return None; in next()
368 None => { in check_key_permission()
523 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app()
544 alias: None, in check_grant_permission_selinux()
545 blob: None, in check_grant_permission_selinux()
560 let key = KeyDescriptor { domain: Domain::GRANT, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_grant()
585 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_app()
587 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::Use, &key, &None).is_ok()); in check_key_permission_domain_app()
588 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::Delete, &key, &None).is_ok()); in check_key_permission_domain_app()
589 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::GetInfo, &key, &None).is_ok()); in check_key_permission_domain_app()
[all …]
Denforcements.rs69 Arc::new(Self { state: AuthRequestState::OpAuth, hat: Mutex::new(None) }) in op_auth()
75 hat: Mutex::new(None), in timestamped_op_auth()
114 AuthRequestState::OpAuth => None, in get_auth_tokens()
273 None in finalize_create_authorization()
275 _ => None, in finalize_create_authorization()
291 let mut confirmation_token: Option<Vec<u8>> = None; in before_finish()
342 None in get_auth_tokens()
350 DeferredAuthState::NoAuthRequired => Ok((None, None)), in get_auth_tokens()
416 None => { in authorize_create()
418 None, in authorize_create()
[all …]
Draw_device.rs87 Some(Error::Km(ErrorCode::HARDWARE_TYPE_UNAVAILABLE)) => Ok(None), in get_or_none()
132 &CertificateInfo::new(None, None), in create_and_store_key()
146 blob: None, in internal_descriptor()
167 Some(&Error::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in not_found_is_none()
202 None in lookup_or_generate_key()
234 km_dev.generateKey(params, None) in lookup_or_generate_key()
284 None => key_blob, in upgrade_keyblob_if_required_with()
317 operation.finish(Some(input), None, None, None, None) in use_key_in_one_step()
Ddatabase.rs120 TransactionBehavior::Deferred => None, in name()
585 None in try_get()
629 Self { blob, metadata, superseded_blob: None } in new()
1299 KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }; in key_exists()
1374 blob: None, in load_super_key()
1384 Some(KsError::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in load_super_key()
1559 (None, SubComponentType::CERT) | (None, SubComponentType::CERT_CHAIN) => { in set_blob_internal()
1567 (None, _) => { in set_blob_internal()
1754 KeyDescriptor { alias: Some(alias), domain: Domain::APP, nspace, blob: None } in store_new_key()
1755 | KeyDescriptor { alias: Some(alias), domain: Domain::SELINUX, nspace, blob: None } => { in store_new_key()
[all …]
Dboot_level_keys.rs58 return Ok(None); in lookup_level_zero_km_and_strategy()
64 return Ok(None); in lookup_level_zero_km_and_strategy()
71 return Ok(None); in lookup_level_zero_km_and_strategy()
79 return Ok(None); in lookup_level_zero_km_and_strategy()
171 None, in get_level_zero_key()
218 return Ok(None); in get_hkdf_key()
313 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent()
320 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent()
327 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent()
334 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent()
[all …]
Dlegacy_blob.rs337 let mut multi: Option<u8> = None; in decode_alias()
344 None in decode_alias()
346 (b'+'..=b'.', None) => Some((c - b'+') << 6), in decode_alias()
347 (b'0'..=b'~', None) => { in decode_alias()
349 None in decode_alias()
378 _ => None, in new_from_stream()
458 (blob_types::SUPER_KEY, _, None) | (blob_types::SUPER_KEY_AES256, _, None) => { in new_from_stream()
491 value: BlobValue::Decrypted(decrypt(data, iv, tag, None, None).context(ks_err!())?), in new_from_stream_decrypt_with()
502 decrypt(data, iv, tag, None, None).context(ks_err!())?[..].to_vec(), in new_from_stream_decrypt_with()
699 None => return Ok(LegacyKeyCharacteristics::Cache(Vec::new())), in read_characteristics_file()
[all …]
Dsecurity_level.rs137 0 => None, in store_new_key()
141 0 => None, in store_new_key()
232 check_key_permission(KeyPerm::Use, key, &None) in create_operation()
235 check_key_permission(KeyPerm::ReqForcedOp, key, &None) in create_operation()
241 None => { in create_operation()
248 None, in create_operation()
249 None, in create_operation()
376 None => { in create_operation()
394 0 => None, in create_operation()
400 upgradedBlob: if key.domain == Domain::BLOB { upgraded_blob } else { None }, in create_operation()
[all …]
/system/security/keystore2/tests/
Dkeystore2_client_aes_key_tests.rs102 None, in keystore2_aes_ecb_cbc_generate_key()
103 None, in keystore2_aes_ecb_cbc_generate_key()
104 &mut None, in keystore2_aes_ecb_cbc_generate_key()
120 let key_params = [(BlockMode::CTR, None, None), (BlockMode::GCM, Some(128), Some(128))]; in keystore2_aes_ctr_gcm_generate_key_success()
133 &mut None, in keystore2_aes_ctr_gcm_generate_key_success()
150 let key_params = [(BlockMode::CTR, None, None), (BlockMode::GCM, Some(128), Some(128))]; in keystore2_aes_ctr_gcm_generate_key_fails_incompatible()
163 &mut None, in keystore2_aes_ctr_gcm_generate_key_fails_incompatible()
187 None, in keystore2_aes_key_fails_unsupported_key_size()
208 None, in keystore2_aes_gcm_key_fails_missing_min_mac_len()
238 blob: None, in keystore2_aes_key_op_fails_multi_block_modes()
[all …]
Dkeystore2_client_rsa_key_tests.rs59 None,
89 key_generations::generate_rsa_key(sec_level, domain, nspace, alias, key_params, None)?; in create_rsa_key_and_operation()
129 mgf_digest: None, in perform_rsa_sign_key_op_success()
130 block_mode: None, in perform_rsa_sign_key_op_success()
131 att_challenge: None, in perform_rsa_sign_key_op_success()
165 mgf_digest: None, in perform_rsa_sign_key_op_failure()
166 block_mode: None, in perform_rsa_sign_key_op_failure()
167 att_challenge: None, in perform_rsa_sign_key_op_failure()
204 block_mode: None, in create_rsa_encrypt_decrypt_key_op_success()
205 att_challenge: None, in create_rsa_encrypt_decrypt_key_op_success()
[all …]
Dkeystore2_client_update_subcomponent_tests.rs42 None, in keystore2_update_subcomponent_success()
74 blob: None, in keystore2_update_subcomponent_fail()
96 blob: None, in keystore2_update_subcomponent_no_key_entry_cert_fail()
99 None, in keystore2_update_subcomponent_no_key_entry_cert_fail()
118 &KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }, in keystore2_update_subcomponent_no_key_entry_cert_chain_success()
119 None, in keystore2_update_subcomponent_no_key_entry_cert_chain_success()
129 blob: None, in keystore2_update_subcomponent_no_key_entry_cert_chain_success()
142 blob: None, in keystore2_update_subcomponent_no_key_entry_cert_chain_success()
183 None, in keystore2_update_subcomponent_fails_permission_denied()
225 alias: None, in keystore2_update_subcomponent_fails_permission_denied()
[all …]
Dkeystore2_client_grant_key_tests.rs49 None, in generate_ec_key_and_grant_to_user()
64 alias: None, in load_grant_key_and_perform_sign_operation()
65 blob: None, in load_grant_key_and_perform_sign_operation()
148 alias: None, in keystore2_grant_key_with_perm_none()
149 blob: None, in keystore2_grant_key_with_perm_none()
207 alias: None, in keystore2_grant_get_info_use_key_perm()
208 blob: None, in keystore2_grant_get_info_use_key_perm()
234 alias: None, in keystore2_grant_get_info_use_key_perm()
235 blob: None, in keystore2_grant_get_info_use_key_perm()
290 alias: None, in keystore2_grant_delete_key_success()
[all …]
Dkeystore2_client_3des_key_tests.rs48 None, in create_3des_key_and_operation()
57 None, in create_3des_key_and_operation()
68 None, in create_3des_key_and_operation()
92 create_3des_key_and_operation(&sec_level, padding_mode, block_mode, &mut None) in keystore2_3des_ecb_cbc_generate_key_success()
114 None, in keystore2_3des_key_fails_unsupported_key_size()
143 blob: None, in keystore2_3des_key_fails_missing_padding()
145 None, in keystore2_3des_key_fails_missing_padding()
180 None, in keystore2_3des_key_encrypt_fails_invalid_input_length()
198 let result = key_generations::map_ks_error(op.finish(Some(invalid_block_size_msg), None)); in keystore2_3des_key_encrypt_fails_invalid_input_length()
214 &mut None, in keystore2_3des_key_fails_unsupported_block_mode()
Dkeystore2_client_delete_key_tests.rs39 None, in keystore2_delete_key_success()
62 blob: None, in keystore2_delete_key_fail()
82 None, in keystore2_delete_key_with_blob_domain_fail()
104 None, in keystore2_delete_key_blob_success()
122 alias: None, in keystore2_delete_key_fails_with_missing_key_blob()
123 blob: None, in keystore2_delete_key_fails_with_missing_key_blob()
143 None, in keystore2_delete_key_blob_fail()
Dkeystore2_client_attest_key_tests.rs75 mgf_digest: None, in keystore2_attest_rsa_signing_key_success()
76 block_mode: None, in keystore2_attest_rsa_signing_key_success()
123 mgf_digest: None, in keystore2_attest_rsa_encrypt_key_success()
124 block_mode: None, in keystore2_attest_rsa_encrypt_key_success()
216 mgf_digest: None, in keystore2_attest_rsa_signing_key_with_ec_25519_key_success()
217 block_mode: None, in keystore2_attest_rsa_signing_key_with_ec_25519_key_success()
263 blob: None, in keystore2_generate_rsa_attest_key_with_multi_purpose_fail()
265 None, in keystore2_generate_rsa_attest_key_with_multi_purpose_fail()
299 blob: None, in keystore2_ec_attest_key_with_multi_purpose_fail()
301 None, in keystore2_ec_attest_key_with_multi_purpose_fail()
[all …]
Dkeystore2_client_test_utils.rs151 key_generations::generate_ec_p256_signing_key(sec_level, Domain::APP, -1, alias, None)?; in generate_ec_key_and_grant_to_users()
178 key_generations::generate_ec_p256_signing_key(&sec_level, domain, nspace, alias, None) in create_signing_operation()
193 let sig = op.finish(None, None)?; in perform_sample_sign_operation()
217 let sig = op.finish(None, None).unwrap(); in perform_sample_hmac_sign_verify_op()
281 let sig = op.finish(None, None).unwrap(); in perform_sample_asym_sign_verify_op()
357 None in get_op_nonce()
388 op.finish(Some(SAMPLE_PLAIN_TEXT), None) in perform_sample_sym_key_encrypt_op()
416 op.finish(Some(input), None) in perform_sample_sym_key_decrypt_op()
428 blob: None, in delete_app_key()
463 op.finish(Some(secure_key), None) in encrypt_secure_key()
[all …]
Dkeystore2_client_import_keys_tests.rs72 &mut None, in perform_sym_key_encrypt_decrypt_op()
73 None, in perform_sym_key_encrypt_decrypt_op()
85 &mut None, in perform_sym_key_encrypt_decrypt_op()
86 None, in perform_sym_key_encrypt_decrypt_op()
217 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_fails_with_keysize_param_mismatch_error()
218 None, in keystore2_rsa_import_key_fails_with_keysize_param_mismatch_error()
250 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_fails_with_public_exponent_param_mismatch_error()
251 None, in keystore2_rsa_import_key_fails_with_public_exponent_param_mismatch_error()
284 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_with_multipurpose_fails_incompt_purpose_error()
285 None, in keystore2_rsa_import_key_with_multipurpose_fails_incompt_purpose_error()
[all …]
/system/media/camera/docs/
Dmetadata_template.mako47 % if section.description is not None:
78 % if prop.details is not None:
82 % if prop.ndk_details is not None:
86 % if prop.hal_details is not None:
112 % if prop.type_notes is not None:
115 % if prop.container is not None:
119 % if prop.typedef is not None:
167 % if value.visibility is not None:
170 % if value.id is not None:
180 % if value.notes is not None:
[all …]
/system/security/keystore2/src/km_compat/
Dlib.rs55 None => return,
77 legacy.generateKey(&kps, None /* attest_key */).expect("Failed to generate key"); in generate_key()
170 legacy.importKey(&kps, kf, &kd, None /* attest_key */).expect("Failed to import key"); in test_import_key()
264 let result = legacy.begin(purpose, blob, &kps, None); in begin()
273 let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); in test_begin_abort()
286 let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); in test_begin_update_finish()
291 None, /* authToken */ in test_begin_update_finish()
292 None, /* timestampToken */ in test_begin_update_finish()
299 None, /* signature */ in test_begin_update_finish()
300 None, /* authToken */ in test_begin_update_finish()
[all …]
/system/keymint/common/src/keyblob/
Dsdd_mem.rs30 factory_secret: None, in default()
57 None => Err(km_err!(UnknownError, "no factory secret available!")), in get_factory_reset_secret()
84 None => Err(km_err!(InvalidKeyBlob, "slot idx empty")), in get_secret()
91 None => Err(km_err!(InvalidKeyBlob, "slot idx empty")), in delete_secret()
96 self.factory_secret = None; in delete_all()
98 self.slots[idx] = None; in delete_all()
/system/security/mls/mls-rs-crypto-boringssl/src/
Daead.rs215 let ciphertext = aead.seal(&key, plaintext, None, &nonce).unwrap(); in seal_and_open()
218 aead.open(&key, ciphertext.as_slice(), None, &nonce).unwrap().as_slice(), in seal_and_open()
233 aead.seal(&key_short, data, None, &nonce), in seal_and_open_with_invalid_key()
239 aead.open(&key_short, data, None, &nonce), in seal_and_open_with_invalid_key()
247 aead.seal(&key_long, data, None, &nonce), in seal_and_open_with_invalid_key()
253 aead.open(&key_long, data, None, &nonce), in seal_and_open_with_invalid_key()
269 aead.open(&key, &ciphertext_short, None, &nonce), in invalid_ciphertext()
291 aead.open(&key, &ciphertext, None, &nonce), in associated_data_mismatch()
307 aead.seal(&key, data, None, &nonce_short), in invalid_nonce()
313 aead.open(&key, data, None, &nonce_short), in invalid_nonce()
[all …]
/system/security/keystore2/test_utils/
Dkey_generations.rs524 None in get_key_auth()
556 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_ec_p256_signing_key()
557 None, in generate_ec_p256_signing_key()
600 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_ec_key()
601 None, in generate_ec_key()
657 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_rsa_key()
724 blob: None, in generate_sym_key()
726 None, in generate_sym_key()
763 blob: None, in generate_hmac_key()
765 None, in generate_hmac_key()
[all …]
/system/keymint/ta/src/
Dcert.rs93 None => { in tbs_certificate()
112 None => cert_subject, in tbs_certificate()
150 signature: AlgorithmIdentifier { oid: sig_alg_oid, parameters: None }, in tbs_certificate()
160 issuer_unique_id: None, in tbs_certificate()
161 subject_unique_id: None, in tbs_certificate()
246 BasicConstraints { ca: ca_required, path_len_constraint: None } in basic_constraints_ext_value()
332 AuthorizationList::new(sw_chars, sw_params, attestation_ids, None, Some(app_id))?; in attestation_extension()
338 None, in attestation_extension()
420 None => return Err(km_err!(CannotAttestIds,
476 None in new()
[all …]
/system/librustutils/
Dsystem_properties.rs59 None in get_prop_info()
76 None in read_raw()
83 None in read_raw()
135 None => { in wait_for_property_creation_until()
166 return self.wait_for_property_creation_until(None); in wait_for_property_change_until()
223 Err(PropertyWatcherError::SystemPropertyAbsent) => Ok(None), in read()
232 _ => None, in parse_bool()
345 assert_eq!(parse_bool(s), None, "testing with {}", s); in parse_bool_test()
352 assert!(matches!(read(prop), Ok(None))); in read_absent_bool_test()
/system/keymint/common/src/keyblob/legacy/
Dtests.rs109 kdf_version: None, in test_serialize_encrypted_keyblob()
110 addl_info: None, in test_serialize_encrypted_keyblob()
113 key_slot: None, in test_serialize_encrypted_keyblob()
142 kdf_version: None, in test_serialize_encrypted_keyblob()
143 addl_info: None, in test_serialize_encrypted_keyblob()
/system/libfmq/tests/
Dfmq_test.rs47 None => { in test_body()
60 None => { in test_body()
77 None => { in test_body()

12345678