Home
last modified time | relevance | path

Searched refs:kp (Results 1 – 17 of 17) sorted by relevance

/system/security/keystore2/src/km_compat/
Dkm_compat_type_conversion.h451 static V4_0::KeyParameter convertKeyParameterToLegacy(const KMV1::KeyParameter& kp) { in convertKeyParameterToLegacy() argument
452 switch (kp.tag) { in convertKeyParameterToLegacy()
456 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in convertKeyParameterToLegacy()
464 if (auto v = KMV1::authorizationValue(KMV1::TAG_ALGORITHM, kp)) { in convertKeyParameterToLegacy()
469 if (auto v = KMV1::authorizationValue(KMV1::TAG_KEY_SIZE, kp)) { in convertKeyParameterToLegacy()
474 if (auto v = KMV1::authorizationValue(KMV1::TAG_BLOCK_MODE, kp)) { in convertKeyParameterToLegacy()
479 if (auto v = KMV1::authorizationValue(KMV1::TAG_DIGEST, kp)) { in convertKeyParameterToLegacy()
484 if (auto v = KMV1::authorizationValue(KMV1::TAG_PADDING, kp)) { in convertKeyParameterToLegacy()
489 if (auto v = KMV1::authorizationValue(KMV1::TAG_CALLER_NONCE, kp)) { in convertKeyParameterToLegacy()
494 if (auto v = KMV1::authorizationValue(KMV1::TAG_MIN_MAC_LENGTH, kp)) { in convertKeyParameterToLegacy()
[all …]
Dlib.rs397 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
398 kp, in test_get_key_characteristics()
404 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
405 kp, in test_get_key_characteristics()
408 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
409 kp, in test_get_key_characteristics()
415 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
416 kp, in test_get_key_characteristics()
422 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics()
423 kp, in test_get_key_characteristics()
[all …]
Dkm_compat.cpp302 for (const auto& kp : kps) { in convertKeyParametersToLegacy() local
303 auto p = convertKeyParameterToLegacy(kp); in convertKeyParametersToLegacy()
1063 for (const KeyParameter& kp : keyParams) { in getMaximum() local
1064 if (auto value = authorizationValue(tag, kp)) { in getMaximum()
1326 std::find_if(keyParams.begin(), keyParams.end(), [&](const KeyParameter& kp) { in getCertificate() argument
1327 if (auto v = KMV1::authorizationValue(KMV1::TAG_PURPOSE, kp)) { in getCertificate()
/system/security/keystore2/src/
Dkey_parameter.rs589 fn from(kp: KmKeyParameter) -> Self {
590 match kp {
1035 fn from(kp: &KmKeyParameter) -> Self { in from()
1036 kp.clone().into() in from()
1137 for kp in list_o_parameters.iter() { in check_field_matches_tag_type()
1138 match (&kp.value, get_field_by_tag_type(kp.tag)) { in check_field_matches_tag_type()
1159 kp.tag, actual, expected in check_field_matches_tag_type()
1315 let kp = KeyParameter::new( in test_to_sql_enum_i32() localVariable
1319 store_keyparameter(&db, 1, &kp)?; in test_to_sql_enum_i32()
1321 assert_eq!(kp.get_tag(), key_param.get_tag()); in test_to_sql_enum_i32()
[all …]
Dattestation_key_utils.rs61 let challenge_present = params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE); in get_attest_key_info()
63 params.iter().any(|kp| kp.tag == Tag::DEVICE_UNIQUE_ATTESTATION); in get_attest_key_info()
Dsecurity_level.rs297 |kp| match kp.value { in create_operation()
413 if params.iter().any(|kp| kp.tag == Tag::CREATION_DATETIME) { in add_required_parameters()
446 if params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE) { in add_required_parameters()
460 if params.iter().any(|kp| kp.tag == Tag::INCLUDE_UNIQUE_ID) { in add_required_parameters()
482 if params.iter().any(|kp| is_device_id_attestation_tag(kp.tag)) { in add_required_parameters()
490 match params.iter().find(|kp| kp.tag == Tag::ALGORITHM) { in add_required_parameters()
493 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_BEFORE) { in add_required_parameters()
499 if !params.iter().any(|kp| kp.tag == Tag::CERTIFICATE_NOT_AFTER) { in add_required_parameters()
Dremote_provisioning.rs68 params.iter().any(|kp| { in is_asymmetric_key()
70 kp, in is_asymmetric_key()
Denforcements.rs438 for kp in key_params.iter() { in authorize_create()
439 if kp.get_tag() == Tag::ALGORITHM in authorize_create()
440 && *kp.key_parameter_value() != KeyParameterValue::Algorithm(Algorithm::EC) in authorize_create()
450 for kp in key_params.iter() { in authorize_create()
451 match *kp.key_parameter_value() { in authorize_create()
581 && op_params.iter().any(|kp| kp.tag == Tag::NONCE) in authorize_create()
799 for kp in key_parameters { in super_encryption_required()
800 let t = match kp.key_parameter_value() { in super_encryption_required()
Dutils.rs202 let asymmetric = chars.iter().any(|kp| { in import_keyblob_and_perform_op()
203 kp.tag == Tag::ALGORITHM in import_keyblob_and_perform_op()
204 && (kp.value == KeyParameterValue::Algorithm(Algorithm::RSA) in import_keyblob_and_perform_op()
205 || (kp.value == KeyParameterValue::Algorithm(Algorithm::EC))) in import_keyblob_and_perform_op()
216 .filter(|kp| { in import_keyblob_and_perform_op()
218 kp.tag, in import_keyblob_and_perform_op()
Dsw_keyblob.rs43 params.iter().find_map(|kp| if kp.tag == tag { Some(&kp.value) } else { None }) in get_tag_value()
Dlegacy_importer.rs797 params.iter().any(|kp| { in bulk_delete()
798 KeyParameterValue::RollbackResistance == *kp.key_parameter_value() in bulk_delete()
Ddatabase.rs2528 let is_auth_bound_key = params.iter().any(|kp| { in unbind_auth_bound_keys_for_user()
2529 matches!(kp.key_parameter_value(), KeyParameterValue::UserSecureID(_)) in unbind_auth_bound_keys_for_user()
2877 let is_key_bound_to_sid = params.iter().any(|kp| { in get_app_uids_affected_by_sid()
2879 kp.key_parameter_value(), in get_app_uids_affected_by_sid()
/system/keymaster/key_blob_utils/
Docb.c451 kp[idx] = _mm_castps_si128(_mm_shuffle_ps(_mm_castsi128_ps(tmp), _mm_castsi128_ps(x0), 68)); \
452 kp[idx + 1] = \
457 kp[idx + 2] = x0; \
462 __m128i* kp = (__m128i*)key; in AES_128_Key_Expansion() local
463 kp[0] = x0 = _mm_loadu_si128((__m128i*)userkey); in AES_128_Key_Expansion()
466 kp[1] = x0; in AES_128_Key_Expansion()
468 kp[2] = x0; in AES_128_Key_Expansion()
470 kp[3] = x0; in AES_128_Key_Expansion()
472 kp[4] = x0; in AES_128_Key_Expansion()
474 kp[5] = x0; in AES_128_Key_Expansion()
[all …]
/system/security/keystore2/test_utils/
Dkey_generations.rs1436 if gen_params.iter().any(|kp| { in generate_key()
1438 kp.value, in generate_key()
1444 if gen_params.iter().any(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE) { in generate_key()
1450 !(gen_params.iter().any(|kp| kp.tag == Tag::DEVICE_UNIQUE_ATTESTATION)); in generate_key()
1456 gen_params.iter().find(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE) in generate_key()
/system/security/keystore2/tests/
Dkeystore2_client_authorizations_tests.rs122 gen_params.iter().filter(|kp| kp.tag == Tag::ATTESTATION_CHALLENGE).count(), in generate_key_and_perform_op_with_max_usage_limit()
/system/timezone/output_data/android/
Dtzids.prototxt1031 isoCode: "kp"
/system/timezone/input_data/android/
Dcountryzones.txt1908 isoCode:"kp"