/system/security/keystore2/src/ |
D | permission.rs | 201 return None; in next() 368 None => { in check_key_permission() 523 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app() 544 alias: None, in check_grant_permission_selinux() 545 blob: None, in check_grant_permission_selinux() 560 let key = KeyDescriptor { domain: Domain::GRANT, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_grant() 585 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_app() 587 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::Use, &key, &None).is_ok()); in check_key_permission_domain_app() 588 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::Delete, &key, &None).is_ok()); in check_key_permission_domain_app() 589 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::GetInfo, &key, &None).is_ok()); in check_key_permission_domain_app() [all …]
|
D | enforcements.rs | 69 Arc::new(Self { state: AuthRequestState::OpAuth, hat: Mutex::new(None) }) in op_auth() 75 hat: Mutex::new(None), in timestamped_op_auth() 114 AuthRequestState::OpAuth => None, in get_auth_tokens() 273 None in finalize_create_authorization() 275 _ => None, in finalize_create_authorization() 291 let mut confirmation_token: Option<Vec<u8>> = None; in before_finish() 342 None in get_auth_tokens() 350 DeferredAuthState::NoAuthRequired => Ok((None, None)), in get_auth_tokens() 416 None => { in authorize_create() 418 None, in authorize_create() [all …]
|
D | raw_device.rs | 87 Some(Error::Km(ErrorCode::HARDWARE_TYPE_UNAVAILABLE)) => Ok(None), in get_or_none() 132 &CertificateInfo::new(None, None), in create_and_store_key() 146 blob: None, in internal_descriptor() 167 Some(&Error::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in not_found_is_none() 202 None in lookup_or_generate_key() 234 km_dev.generateKey(params, None) in lookup_or_generate_key() 284 None => key_blob, in upgrade_keyblob_if_required_with() 317 operation.finish(Some(input), None, None, None, None) in use_key_in_one_step()
|
D | database.rs | 120 TransactionBehavior::Deferred => None, in name() 585 None in try_get() 629 Self { blob, metadata, superseded_blob: None } in new() 1299 KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }; in key_exists() 1374 blob: None, in load_super_key() 1384 Some(KsError::Rc(ResponseCode::KEY_NOT_FOUND)) => Ok(None), in load_super_key() 1559 (None, SubComponentType::CERT) | (None, SubComponentType::CERT_CHAIN) => { in set_blob_internal() 1567 (None, _) => { in set_blob_internal() 1754 KeyDescriptor { alias: Some(alias), domain: Domain::APP, nspace, blob: None } in store_new_key() 1755 | KeyDescriptor { alias: Some(alias), domain: Domain::SELINUX, nspace, blob: None } => { in store_new_key() [all …]
|
D | boot_level_keys.rs | 58 return Ok(None); in lookup_level_zero_km_and_strategy() 64 return Ok(None); in lookup_level_zero_km_and_strategy() 71 return Ok(None); in lookup_level_zero_km_and_strategy() 79 return Ok(None); in lookup_level_zero_km_and_strategy() 171 None, in get_level_zero_key() 218 return Ok(None); in get_hkdf_key() 313 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent() 320 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent() 327 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent() 334 assert_eq!(None, blkc.aes_key(0)?); in test_output_is_consistent() [all …]
|
D | legacy_blob.rs | 337 let mut multi: Option<u8> = None; in decode_alias() 344 None in decode_alias() 346 (b'+'..=b'.', None) => Some((c - b'+') << 6), in decode_alias() 347 (b'0'..=b'~', None) => { in decode_alias() 349 None in decode_alias() 378 _ => None, in new_from_stream() 458 (blob_types::SUPER_KEY, _, None) | (blob_types::SUPER_KEY_AES256, _, None) => { in new_from_stream() 491 value: BlobValue::Decrypted(decrypt(data, iv, tag, None, None).context(ks_err!())?), in new_from_stream_decrypt_with() 502 decrypt(data, iv, tag, None, None).context(ks_err!())?[..].to_vec(), in new_from_stream_decrypt_with() 699 None => return Ok(LegacyKeyCharacteristics::Cache(Vec::new())), in read_characteristics_file() [all …]
|
D | security_level.rs | 137 0 => None, in store_new_key() 141 0 => None, in store_new_key() 232 check_key_permission(KeyPerm::Use, key, &None) in create_operation() 235 check_key_permission(KeyPerm::ReqForcedOp, key, &None) in create_operation() 241 None => { in create_operation() 248 None, in create_operation() 249 None, in create_operation() 376 None => { in create_operation() 394 0 => None, in create_operation() 400 upgradedBlob: if key.domain == Domain::BLOB { upgraded_blob } else { None }, in create_operation() [all …]
|
/system/security/keystore2/tests/ |
D | keystore2_client_aes_key_tests.rs | 102 None, in keystore2_aes_ecb_cbc_generate_key() 103 None, in keystore2_aes_ecb_cbc_generate_key() 104 &mut None, in keystore2_aes_ecb_cbc_generate_key() 120 let key_params = [(BlockMode::CTR, None, None), (BlockMode::GCM, Some(128), Some(128))]; in keystore2_aes_ctr_gcm_generate_key_success() 133 &mut None, in keystore2_aes_ctr_gcm_generate_key_success() 150 let key_params = [(BlockMode::CTR, None, None), (BlockMode::GCM, Some(128), Some(128))]; in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() 163 &mut None, in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() 187 None, in keystore2_aes_key_fails_unsupported_key_size() 208 None, in keystore2_aes_gcm_key_fails_missing_min_mac_len() 238 blob: None, in keystore2_aes_key_op_fails_multi_block_modes() [all …]
|
D | keystore2_client_rsa_key_tests.rs | 59 None, 89 key_generations::generate_rsa_key(sec_level, domain, nspace, alias, key_params, None)?; in create_rsa_key_and_operation() 129 mgf_digest: None, in perform_rsa_sign_key_op_success() 130 block_mode: None, in perform_rsa_sign_key_op_success() 131 att_challenge: None, in perform_rsa_sign_key_op_success() 165 mgf_digest: None, in perform_rsa_sign_key_op_failure() 166 block_mode: None, in perform_rsa_sign_key_op_failure() 167 att_challenge: None, in perform_rsa_sign_key_op_failure() 204 block_mode: None, in create_rsa_encrypt_decrypt_key_op_success() 205 att_challenge: None, in create_rsa_encrypt_decrypt_key_op_success() [all …]
|
D | keystore2_client_update_subcomponent_tests.rs | 42 None, in keystore2_update_subcomponent_success() 74 blob: None, in keystore2_update_subcomponent_fail() 96 blob: None, in keystore2_update_subcomponent_no_key_entry_cert_fail() 99 None, in keystore2_update_subcomponent_no_key_entry_cert_fail() 118 &KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }, in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 119 None, in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 129 blob: None, in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 142 blob: None, in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 183 None, in keystore2_update_subcomponent_fails_permission_denied() 225 alias: None, in keystore2_update_subcomponent_fails_permission_denied() [all …]
|
D | keystore2_client_grant_key_tests.rs | 49 None, in generate_ec_key_and_grant_to_user() 64 alias: None, in load_grant_key_and_perform_sign_operation() 65 blob: None, in load_grant_key_and_perform_sign_operation() 148 alias: None, in keystore2_grant_key_with_perm_none() 149 blob: None, in keystore2_grant_key_with_perm_none() 207 alias: None, in keystore2_grant_get_info_use_key_perm() 208 blob: None, in keystore2_grant_get_info_use_key_perm() 234 alias: None, in keystore2_grant_get_info_use_key_perm() 235 blob: None, in keystore2_grant_get_info_use_key_perm() 290 alias: None, in keystore2_grant_delete_key_success() [all …]
|
D | keystore2_client_3des_key_tests.rs | 48 None, in create_3des_key_and_operation() 57 None, in create_3des_key_and_operation() 68 None, in create_3des_key_and_operation() 92 create_3des_key_and_operation(&sec_level, padding_mode, block_mode, &mut None) in keystore2_3des_ecb_cbc_generate_key_success() 114 None, in keystore2_3des_key_fails_unsupported_key_size() 143 blob: None, in keystore2_3des_key_fails_missing_padding() 145 None, in keystore2_3des_key_fails_missing_padding() 180 None, in keystore2_3des_key_encrypt_fails_invalid_input_length() 198 let result = key_generations::map_ks_error(op.finish(Some(invalid_block_size_msg), None)); in keystore2_3des_key_encrypt_fails_invalid_input_length() 214 &mut None, in keystore2_3des_key_fails_unsupported_block_mode()
|
D | keystore2_client_delete_key_tests.rs | 39 None, in keystore2_delete_key_success() 62 blob: None, in keystore2_delete_key_fail() 82 None, in keystore2_delete_key_with_blob_domain_fail() 104 None, in keystore2_delete_key_blob_success() 122 alias: None, in keystore2_delete_key_fails_with_missing_key_blob() 123 blob: None, in keystore2_delete_key_fails_with_missing_key_blob() 143 None, in keystore2_delete_key_blob_fail()
|
D | keystore2_client_attest_key_tests.rs | 75 mgf_digest: None, in keystore2_attest_rsa_signing_key_success() 76 block_mode: None, in keystore2_attest_rsa_signing_key_success() 123 mgf_digest: None, in keystore2_attest_rsa_encrypt_key_success() 124 block_mode: None, in keystore2_attest_rsa_encrypt_key_success() 216 mgf_digest: None, in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() 217 block_mode: None, in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() 263 blob: None, in keystore2_generate_rsa_attest_key_with_multi_purpose_fail() 265 None, in keystore2_generate_rsa_attest_key_with_multi_purpose_fail() 299 blob: None, in keystore2_ec_attest_key_with_multi_purpose_fail() 301 None, in keystore2_ec_attest_key_with_multi_purpose_fail() [all …]
|
D | keystore2_client_test_utils.rs | 151 key_generations::generate_ec_p256_signing_key(sec_level, Domain::APP, -1, alias, None)?; in generate_ec_key_and_grant_to_users() 178 key_generations::generate_ec_p256_signing_key(&sec_level, domain, nspace, alias, None) in create_signing_operation() 193 let sig = op.finish(None, None)?; in perform_sample_sign_operation() 217 let sig = op.finish(None, None).unwrap(); in perform_sample_hmac_sign_verify_op() 281 let sig = op.finish(None, None).unwrap(); in perform_sample_asym_sign_verify_op() 357 None in get_op_nonce() 388 op.finish(Some(SAMPLE_PLAIN_TEXT), None) in perform_sample_sym_key_encrypt_op() 416 op.finish(Some(input), None) in perform_sample_sym_key_decrypt_op() 428 blob: None, in delete_app_key() 463 op.finish(Some(secure_key), None) in encrypt_secure_key() [all …]
|
D | keystore2_client_import_keys_tests.rs | 72 &mut None, in perform_sym_key_encrypt_decrypt_op() 73 None, in perform_sym_key_encrypt_decrypt_op() 85 &mut None, in perform_sym_key_encrypt_decrypt_op() 86 None, in perform_sym_key_encrypt_decrypt_op() 217 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_fails_with_keysize_param_mismatch_error() 218 None, in keystore2_rsa_import_key_fails_with_keysize_param_mismatch_error() 250 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_fails_with_public_exponent_param_mismatch_error() 251 None, in keystore2_rsa_import_key_fails_with_public_exponent_param_mismatch_error() 284 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_with_multipurpose_fails_incompt_purpose_error() 285 None, in keystore2_rsa_import_key_with_multipurpose_fails_incompt_purpose_error() [all …]
|
/system/media/camera/docs/ |
D | metadata_template.mako | 47 % if section.description is not None: 78 % if prop.details is not None: 82 % if prop.ndk_details is not None: 86 % if prop.hal_details is not None: 112 % if prop.type_notes is not None: 115 % if prop.container is not None: 119 % if prop.typedef is not None: 167 % if value.visibility is not None: 170 % if value.id is not None: 180 % if value.notes is not None: [all …]
|
/system/security/keystore2/src/km_compat/ |
D | lib.rs | 55 None => return, 77 legacy.generateKey(&kps, None /* attest_key */).expect("Failed to generate key"); in generate_key() 170 legacy.importKey(&kps, kf, &kd, None /* attest_key */).expect("Failed to import key"); in test_import_key() 264 let result = legacy.begin(purpose, blob, &kps, None); in begin() 273 let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); in test_begin_abort() 286 let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); in test_begin_update_finish() 291 None, /* authToken */ in test_begin_update_finish() 292 None, /* timestampToken */ in test_begin_update_finish() 299 None, /* signature */ in test_begin_update_finish() 300 None, /* authToken */ in test_begin_update_finish() [all …]
|
/system/keymint/common/src/keyblob/ |
D | sdd_mem.rs | 30 factory_secret: None, in default() 57 None => Err(km_err!(UnknownError, "no factory secret available!")), in get_factory_reset_secret() 84 None => Err(km_err!(InvalidKeyBlob, "slot idx empty")), in get_secret() 91 None => Err(km_err!(InvalidKeyBlob, "slot idx empty")), in delete_secret() 96 self.factory_secret = None; in delete_all() 98 self.slots[idx] = None; in delete_all()
|
/system/security/mls/mls-rs-crypto-boringssl/src/ |
D | aead.rs | 215 let ciphertext = aead.seal(&key, plaintext, None, &nonce).unwrap(); in seal_and_open() 218 aead.open(&key, ciphertext.as_slice(), None, &nonce).unwrap().as_slice(), in seal_and_open() 233 aead.seal(&key_short, data, None, &nonce), in seal_and_open_with_invalid_key() 239 aead.open(&key_short, data, None, &nonce), in seal_and_open_with_invalid_key() 247 aead.seal(&key_long, data, None, &nonce), in seal_and_open_with_invalid_key() 253 aead.open(&key_long, data, None, &nonce), in seal_and_open_with_invalid_key() 269 aead.open(&key, &ciphertext_short, None, &nonce), in invalid_ciphertext() 291 aead.open(&key, &ciphertext, None, &nonce), in associated_data_mismatch() 307 aead.seal(&key, data, None, &nonce_short), in invalid_nonce() 313 aead.open(&key, data, None, &nonce_short), in invalid_nonce() [all …]
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 524 None in get_key_auth() 556 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_ec_p256_signing_key() 557 None, in generate_ec_p256_signing_key() 600 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_ec_key() 601 None, in generate_ec_key() 657 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_rsa_key() 724 blob: None, in generate_sym_key() 726 None, in generate_sym_key() 763 blob: None, in generate_hmac_key() 765 None, in generate_hmac_key() [all …]
|
/system/keymint/ta/src/ |
D | cert.rs | 93 None => { in tbs_certificate() 112 None => cert_subject, in tbs_certificate() 150 signature: AlgorithmIdentifier { oid: sig_alg_oid, parameters: None }, in tbs_certificate() 160 issuer_unique_id: None, in tbs_certificate() 161 subject_unique_id: None, in tbs_certificate() 246 BasicConstraints { ca: ca_required, path_len_constraint: None } in basic_constraints_ext_value() 332 AuthorizationList::new(sw_chars, sw_params, attestation_ids, None, Some(app_id))?; in attestation_extension() 338 None, in attestation_extension() 420 None => return Err(km_err!(CannotAttestIds, 476 None in new() [all …]
|
/system/librustutils/ |
D | system_properties.rs | 59 None in get_prop_info() 76 None in read_raw() 83 None in read_raw() 135 None => { in wait_for_property_creation_until() 166 return self.wait_for_property_creation_until(None); in wait_for_property_change_until() 223 Err(PropertyWatcherError::SystemPropertyAbsent) => Ok(None), in read() 232 _ => None, in parse_bool() 345 assert_eq!(parse_bool(s), None, "testing with {}", s); in parse_bool_test() 352 assert!(matches!(read(prop), Ok(None))); in read_absent_bool_test()
|
/system/keymint/common/src/keyblob/legacy/ |
D | tests.rs | 109 kdf_version: None, in test_serialize_encrypted_keyblob() 110 addl_info: None, in test_serialize_encrypted_keyblob() 113 key_slot: None, in test_serialize_encrypted_keyblob() 142 kdf_version: None, in test_serialize_encrypted_keyblob() 143 addl_info: None, in test_serialize_encrypted_keyblob()
|
/system/libfmq/tests/ |
D | fmq_test.rs | 47 None => { in test_body() 60 None => { in test_body() 77 None => { in test_body()
|