/system/keymaster/include/keymaster/ |
D | operation.h | 43 struct KeyType { struct 44 KeyType(keymaster_algorithm_t alg, keymaster_purpose_t purp) in KeyType() argument 50 bool operator==(const KeyType& rhs) const { argument 54 virtual KeyType registry_key() const = 0;
|
/system/security/keystore2/src/ |
D | database.rs | 291 pub enum KeyType { enum 300 impl ToSql for KeyType { implementation 303 KeyType::Client => 0, in to_sql() 304 KeyType::Super => 1, in to_sql() 309 impl FromSql for KeyType { implementation 312 0 => Ok(KeyType::Client), in column_result() 313 1 => Ok(KeyType::Super), in column_result() 1293 key_type: KeyType, in key_exists() argument 1332 KeyType::Super, in store_super_key() 1376 let id = Self::load_key_entry_id(tx, &key_descriptor, KeyType::Super); in load_super_key() [all …]
|
D | raw_device.rs | 20 KeyEntryLoadBits, KeyIdGuard, KeyMetaData, KeyMetaEntry, KeyType, KeystoreDB, 110 key_type: KeyType, in create_and_store_key() argument 154 key_type: KeyType, in lookup_from_desc() argument 179 key_type: KeyType, in lookup_or_generate_key() argument
|
D | attestation_key_utils.rs | 18 use crate::database::{BlobMetaData, KeyEntryLoadBits, KeyType}; 108 KeyType::Client, in load_attest_key_blob_and_cert()
|
D | super_key.rs | 21 database::KeyType, 492 KeyType::Super, in super_key_exists_in_db_for_user() 920 KeyType::Client, /* TODO Should be Super b/189470584 */ in lock_unlocked_device_required_keys() 1001 KeyType::Client, // This should not be a Client key. in try_unlock_user_with_biometric() 1557 .key_exists(Domain::APP, USER_ID.into(), TEST_KEY_ALIAS, KeyType::Client) in test_user_removal() 1560 .key_exists(Domain::APP, USER_ID.into(), TEST_BOOT_KEY_ALIAS, KeyType::Client) in test_user_removal() 1594 .key_exists(Domain::APP, USER_ID.into(), TEST_KEY_ALIAS, KeyType::Client) in test_user_removal() 1597 .key_exists(Domain::APP, USER_ID.into(), TEST_BOOT_KEY_ALIAS, KeyType::Client) in test_user_removal() 1629 .key_exists(Domain::APP, USER_ID.into(), TEST_KEY_ALIAS, KeyType::Client) in test_user_reset() 1632 .key_exists(Domain::APP, USER_ID.into(), TEST_BOOT_KEY_ALIAS, KeyType::Client) in test_user_reset() [all …]
|
D | service.rs | 34 database::{KeyEntryLoadBits, KeyType, SubComponentType}, 139 KeyType::Client, in get_key_entry() 195 KeyType::Client, in update_subcomponent() 248 KeyType::Client, in update_subcomponent() 329 db.borrow_mut().unbind_key(key, KeyType::Client, caller_uid, |k, av| { in delete_key()
|
D | boot_level_keys.rs | 19 database::{KeyType, KeystoreDB}, 138 .lookup_or_generate_key(db, &key_desc, KeyType::Client, ¶ms, |key_characteristics| { in get_level_zero_key()
|
D | utils.rs | 25 database::{KeyType, KeystoreDB}, 568 .list_past_alias(domain, namespace, KeyType::Client, start_past_alias) in list_key_entries() 589 let num_keys_in_db = db.count_keys(domain, namespace, KeyType::Client)?; in count_key_entries()
|
D | maintenance.rs | 17 use crate::database::{KeyEntryLoadBits, KeyType}; 255 KeyType::Client, in migrate_key_namespace()
|
D | security_level.rs | 42 KeyMetaEntry, KeyType, SubComponentType, Uuid, 192 KeyType::Client, in store_new_key() 263 KeyType::Client, in create_operation() 745 KeyType::Client, in import_wrapped_key()
|
D | legacy_importer.rs | 19 KeyMetaEntry, KeyType, KeystoreDB, Uuid, KEYSTORE_UUID, 678 KeyType::Client, in check_and_import() 691 .store_new_certificate(&key, KeyType::Client, &ca_cert, &KEYSTORE_UUID) in check_and_import()
|
/system/keymaster/km_openssl/ |
D | hmac_operation.h | 56 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); } in registry_key()
|
D | block_cipher_operation.h | 52 KeyType registry_key() const override { in registry_key() 53 return KeyType(GetCipherDescription().algorithm(), purpose_); in registry_key()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | ecdh_operation.h | 66 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, KM_PURPOSE_AGREE_KEY); } in registry_key()
|
D | ecdsa_operation.h | 108 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); } in registry_key()
|
D | rsa_operation.h | 198 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); } in registry_key()
|
/system/keymaster/legacy_support/ |
D | rsa_keymaster1_operation.h | 107 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose_); } in registry_key()
|
D | ecdsa_keymaster1_operation.h | 108 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose_); } in registry_key()
|
D | keymaster_passthrough_operation.h | 101 KeyType registry_key() const override { return key_type_; } in registry_key() 132 KeyType key_type_;
|
/system/authgraph/boringssl/src/ |
D | ec.rs | 289 iana::KeyType::EC2, in p256_ecdh_pkey_from_cose() 303 iana::KeyType::EC2, in p256_ecdsa_pkey_from_cose() 317 iana::KeyType::EC2, in p384_ecdsa_pkey_from_cose() 327 want_kty: iana::KeyType, in nist_pkey_from_cose() argument 372 iana::KeyType::OKP, in ed25519_ecdsa_pkey_from_cose()
|
/system/authgraph/core/src/ |
D | key.rs | 260 iana::KeyType::OKP, in validate_cose_key_params() 267 iana::KeyType::EC2, in validate_cose_key_params() 274 iana::KeyType::EC2, in validate_cose_key_params() 1022 want_kty: iana::KeyType, in check_cose_key_params() argument 1027 if cose_key.kty != coset::KeyType::Assigned(want_kty) { in check_cose_key_params()
|
D | keyexchange.rs | 754 iana::KeyType::EC2, in compute_shared_secret()
|
/system/keymaster/android_keymaster/ |
D | operation.cpp | 64 KeyType key_type = registry_key(); in is_public_key_operation()
|
/system/authgraph/tests/src/ |
D | lib.rs | 18 KeyOperation, KeyType, Label, 875 kty: KeyType::Assigned(iana::KeyType::OKP), in create_identity()
|