/aosp12/system/security/keystore2/src/ |
H A D | remote_provisioning.rs | 28 MacedPublicKey::MacedPublicKey, ProtectedData::ProtectedData, SecurityLevel::SecurityLevel, 54 security_level: SecurityLevel, 228 sec_level: &SecurityLevel, in get_dev_by_sec_level() argument 247 SecurityLevel::TRUSTED_ENVIRONMENT, in new_native_binder() 257 SecurityLevel::STRONGBOX, in new_native_binder() 283 sec_level: SecurityLevel, in generate_csr() argument 343 sec_level: SecurityLevel, in provision_cert_chain() argument 431 sec_level: SecurityLevel, in getPoolStatus() argument 443 sec_level: SecurityLevel, in generateCsr() argument 468 sec_level: SecurityLevel, in provisionCertChain() argument [all …]
|
H A D | globals.rs | 34 KeyMintHardwareInfo::KeyMintHardwareInfo, SecurityLevel::SecurityLevel, 91 uuid_by_sec_level: HashMap<SecurityLevel, Uuid>, 97 sec_level: &SecurityLevel, in dev_by_sec_level() argument 126 devices_by_sec_level: HashMap<SecurityLevel, Asp>, 130 fn dev_by_sec_level(&self, sec_level: &SecurityLevel) -> Option<Asp> { in dev_by_sec_level() 134 fn insert(&mut self, sec_level: SecurityLevel, dev: Asp) { in insert() argument 192 SecurityLevel::TRUSTED_ENVIRONMENT => { in connect_keymint() 199 SecurityLevel::STRONGBOX => { in connect_keymint() 261 security_level: &SecurityLevel, in get_keymint_device() argument 352 SecurityLevel::TRUSTED_ENVIRONMENT => { in connect_remotely_provisioned_component() [all …]
|
H A D | key_parameter.rs | 104 PaddingMode::PaddingMode, SecurityLevel::SecurityLevel, Tag::Tag, 987 security_level: SecurityLevel, 1090 | (&KmKeyParameterValue::SecurityLevel(_), KmKeyParameterValue::SecurityLevel(_)) in check_field_matches_tag_type() 1120 SecurityLevel::STRONGBOX, in test_key_parameter() 1160 SecurityLevel::STRONGBOX.0, in test_new_from_sql_enum_i32() 1192 SecurityLevel::STRONGBOX.0, in test_new_from_sql_i64() 1245 SecurityLevel::STRONGBOX, in test_to_sql_enum_i32() 1275 SecurityLevel::STRONGBOX, in test_to_sql_i64() 1291 SecurityLevel::STRONGBOX, in test_to_sql_vec_u8() 1432 SecurityLevel::STRONGBOX, in test_convert_to_wire_integer() [all …]
|
H A D | metrics_store.rs | 29 SecurityLevel::SecurityLevel, 44 RkpPoolStats::RkpPoolStats, SecurityLevel::SecurityLevel as MetricsSecurityLevel, 154 sec_level: SecurityLevel, in log_key_creation_event_stats() argument 177 sec_level: SecurityLevel, in process_key_creation_event_stats() argument 316 sec_level: SecurityLevel, in log_key_operation_event_stats() argument 341 sec_level: SecurityLevel, in process_key_operation_event_stats() argument 419 fn process_security_level(sec_level: SecurityLevel) -> MetricsSecurityLevel { in process_security_level() 421 SecurityLevel::SOFTWARE => MetricsSecurityLevel::SECURITY_LEVEL_SOFTWARE, in process_security_level() 422 SecurityLevel::TRUSTED_ENVIRONMENT => { in process_security_level() 426 SecurityLevel::KEYSTORE => MetricsSecurityLevel::SECURITY_LEVEL_KEYSTORE, in process_security_level() [all …]
|
H A D | service.rs | 40 …ardware_security_keymint::aidl::android::hardware::security::keymint::SecurityLevel::SecurityLevel; 55 uuid_by_sec_level: HashMap<SecurityLevel, Uuid>, 65 SecurityLevel::TRUSTED_ENVIRONMENT, in new_native_binder() 74 result.uuid_by_sec_level.insert(SecurityLevel::TRUSTED_ENVIRONMENT, uuid); in new_native_binder() 78 KeystoreSecurityLevel::new_native_binder(SecurityLevel::STRONGBOX, id_rotation_state) in new_native_binder() 82 result.uuid_by_sec_level.insert(SecurityLevel::STRONGBOX, uuid); in new_native_binder() 100 fn uuid_to_sec_level(&self, uuid: &Uuid) -> SecurityLevel { in uuid_to_sec_level() argument 105 .unwrap_or(SecurityLevel::SOFTWARE) in uuid_to_sec_level() 119 sec_level: SecurityLevel, in get_security_level() argument 360 security_level: SecurityLevel, in getSecurityLevel() argument
|
H A D | raw_device.rs | 31 SecurityLevel::SecurityLevel, 52 security_level: SecurityLevel, 64 pub fn get(security_level: SecurityLevel) -> Result<KeyMintDevice> { in get() 78 pub fn get_or_none(security_level: SecurityLevel) -> Result<Option<KeyMintDevice>> { in get_or_none() 95 pub fn security_level(&self) -> SecurityLevel { in security_level() argument
|
H A D | database.rs | 65 HardwareAuthenticatorType::HardwareAuthenticatorType, SecurityLevel::SecurityLevel, 296 impl From<SecurityLevel> for Uuid { 297 fn from(sec_level: SecurityLevel) -> Self { in from() 5048 SecurityLevel::STRONGBOX, in make_test_params() 5060 SecurityLevel::STRONGBOX, in make_test_params() 5093 SecurityLevel::STRONGBOX, in make_test_params() 5137 SecurityLevel::SOFTWARE, in make_test_params() 5141 SecurityLevel::SOFTWARE, in make_test_params() 5145 SecurityLevel::SOFTWARE, in make_test_params() 5159 SecurityLevel::SOFTWARE, in make_test_params() [all …]
|
/aosp12/system/security/keystore2/aidl/android/security/remoteprovisioning/ |
H A D | IRemoteProvisioning.aidl | 21 import android.hardware.security.keymint.SecurityLevel; 59 AttestationPoolStatus getPoolStatus(in long expiredBy, in SecurityLevel secLevel); in getPoolStatus() 95 in SecurityLevel secLevel, out ProtectedData protectedData, out DeviceInfo deviceInfo); in generateCsr() 116 in long expirationDate, in SecurityLevel secLevel); in provisionCertChain() 128 void generateKeyPair(in boolean is_test_mode, in SecurityLevel secLevel); in generateKeyPair()
|
H A D | ImplInfo.aidl | 19 import android.hardware.security.keymint.SecurityLevel; 30 SecurityLevel secLevel;
|
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | attestation_record.h | 54 SecurityLevel security_level; 64 SecurityLevel attestation_security_level; 66 SecurityLevel keymint_security_level; 75 SecurityLevel* attestation_security_level, 76 uint32_t* keymint_version, SecurityLevel* keymint_security_level,
|
/aosp12/system/security/keystore/ |
H A D | keystore_utils.cpp | 155 SecurityLevel flagsToSecurityLevel(int32_t flags) { in flagsToSecurityLevel() 160 return SecurityLevel::SOFTWARE; in flagsToSecurityLevel() 162 return SecurityLevel::STRONGBOX; in flagsToSecurityLevel() 164 return SecurityLevel::TRUSTED_ENVIRONMENT; in flagsToSecurityLevel() 168 uint32_t securityLevelToFlags(SecurityLevel secLevel) { in securityLevelToFlags() 170 case SecurityLevel::SOFTWARE: in securityLevelToFlags() 172 case SecurityLevel::STRONGBOX: in securityLevelToFlags()
|
/aosp12/hardware/interfaces/keymaster/aidl/android/hardware/keymaster/ |
H A D | VerificationToken.aidl | 19 import android.hardware.keymaster.SecurityLevel; 46 SecurityLevel securityLevel = SecurityLevel.SOFTWARE;
|
/aosp12/hardware/interfaces/security/keymint/aidl/android/hardware/security/keymint/ |
H A D | KeyCharacteristics.aidl | 20 import android.hardware.security.keymint.SecurityLevel; 35 SecurityLevel securityLevel = SecurityLevel.SOFTWARE;
|
H A D | KeyMintHardwareInfo.aidl | 19 import android.hardware.security.keymint.SecurityLevel; 38 SecurityLevel securityLevel = SecurityLevel.SOFTWARE;
|
/aosp12/system/security/keystore2/aidl/android/security/compat/ |
H A D | IKeystoreCompatService.aidl | 20 import android.hardware.security.keymint.SecurityLevel; 35 IKeyMintDevice getKeyMintDevice (SecurityLevel securityLevel); in getKeyMintDevice() 47 ISharedSecret getSharedSecret (SecurityLevel securityLevel); in getSharedSecret()
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | attestation_record.h | 33 SecurityLevel security_level; 43 SecurityLevel attestation_security_level; 45 SecurityLevel keymaster_security_level;
|
/aosp12/hardware/interfaces/drm/1.4/vts/functional/include/android/hardware/drm/1.4/vts/ |
H A D | drm_hal_test.h | 55 using V1_1::SecurityLevel; 64 static const uint32_t kSecLevelMin = static_cast<uint32_t>(SecurityLevel::SW_SECURE_CRYPTO); 65 static const uint32_t kSecLevelMax = static_cast<uint32_t>(SecurityLevel::HW_SECURE_ALL);
|
/aosp12/system/keymaster/ng/include/ |
H A D | AndroidKeymaster4Device.h | 47 using ::android::hardware::keymaster::V4_0::SecurityLevel; 53 explicit AndroidKeymaster4Device(SecurityLevel securityLevel) in AndroidKeymaster4Device() 105 AndroidKeymaster4Device(::keymaster::KmVersion version, SecurityLevel securityLevel); 108 SecurityLevel securityLevel_; 116 IKeymasterDevice* CreateKeymasterDevice(SecurityLevel securityLevel);
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | DeviceUniqueAttestationTest.cpp | 67 if (SecLevel() == SecurityLevel::STRONGBOX) return; in TEST_P() 95 if (SecLevel() == SecurityLevel::STRONGBOX) return; in TEST_P() 122 if (SecLevel() != SecurityLevel::STRONGBOX) return; in TEST_P() 180 if (SecLevel() != SecurityLevel::STRONGBOX) return; in TEST_P() 233 if (SecLevel() != SecurityLevel::STRONGBOX) return; in TEST_P() 301 if (SecLevel() != SecurityLevel::STRONGBOX) return; in TEST_P()
|
/aosp12/hardware/interfaces/keymaster/4.0/vts/functional/ |
H A D | KeymasterHidlTest.cpp | 198 if (SecLevel() != SecurityLevel::SOFTWARE) { in CheckGetCharacteristics() 640 case SecurityLevel::SOFTWARE: in ValidKeySizes() 643 case SecurityLevel::STRONGBOX: in ValidKeySizes() 652 case SecurityLevel::SOFTWARE: in ValidKeySizes() 655 case SecurityLevel::STRONGBOX: in ValidKeySizes() 681 if (SecLevel() == SecurityLevel::STRONGBOX) { in InvalidKeySizes() 697 if (securityLevel_ == SecurityLevel::STRONGBOX) { in ValidCurves() 706 CHECK(SecLevel() == SecurityLevel::STRONGBOX); in InvalidCurves() 712 case SecurityLevel::SOFTWARE: in ValidDigests() 713 case SecurityLevel::TRUSTED_ENVIRONMENT: in ValidDigests() [all …]
|
/aosp12/hardware/interfaces/drm/1.1/vts/functional/ |
H A D | drm_hal_clearkey_test.cpp | 55 SessionId DrmHalClearkeyTest::openSession(SecurityLevel level) { in openSession() 141 auto res = drmPlugin->openSession_1_1(SecurityLevel::HW_SECURE_ALL, in TEST_P() 276 SecurityLevel defaultLevel; in TEST_P() 278 [&](Status status, SecurityLevel level) { in TEST_P() 287 [&](Status status, SecurityLevel level) { in TEST_P() 300 SessionId session = openSession(SecurityLevel::SW_SECURE_CRYPTO); in TEST_P() 302 [&](Status status, SecurityLevel level) { in TEST_P() 304 EXPECT_EQ(level, SecurityLevel::SW_SECURE_CRYPTO); in TEST_P() 317 [&](Status status, SecurityLevel /*level*/) { in TEST_P() argument
|
/aosp12/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/ |
H A D | DrmFactory.cpp | 38 using ::android::hardware::drm::V1_1::SecurityLevel; 50 SecurityLevel level) { in isCryptoSchemeSupported_1_2() 52 level == SecurityLevel::SW_SECURE_CRYPTO; in isCryptoSchemeSupported_1_2()
|
/aosp12/system/security/keystore/tests/ |
H A D | verification_token_seralization_test.cpp | 24 using android::hardware::keymaster::V4_0::SecurityLevel; 35 token.securityLevel = SecurityLevel::TRUSTED_ENVIRONMENT; in TEST() 55 token.securityLevel = SecurityLevel::TRUSTED_ENVIRONMENT; in TEST()
|
/aosp12/frameworks/av/drm/libmediadrm/ |
H A D | DrmHal.cpp | 53 using drm::V1_1::SecurityLevel; 122 static DrmPlugin::SecurityLevel toSecurityLevel(SecurityLevel level) { in toSecurityLevel() 124 case SecurityLevel::SW_SECURE_CRYPTO: in toSecurityLevel() 126 case SecurityLevel::SW_SECURE_DECODE: in toSecurityLevel() 128 case SecurityLevel::HW_SECURE_CRYPTO: in toSecurityLevel() 130 case SecurityLevel::HW_SECURE_DECODE: in toSecurityLevel() 132 case SecurityLevel::HW_SECURE_ALL: in toSecurityLevel() 139 static SecurityLevel toHidlSecurityLevel(DrmPlugin::SecurityLevel level) { in toHidlSecurityLevel() 142 return SecurityLevel::SW_SECURE_CRYPTO; in toHidlSecurityLevel() 150 return SecurityLevel::HW_SECURE_ALL; in toHidlSecurityLevel() [all …]
|
/aosp12/packages/apps/RemoteProvisioner/tests/unittests/src/com/android/remoteprovisioner/unittest/ |
H A D | SystemInterfaceTest.java | 33 import android.hardware.security.keymint.SecurityLevel; 124 SecurityLevel.TRUSTED_ENVIRONMENT, in testGenerateCSR() 160 mBinder.generateKeyPair(true /* testMode */, SecurityLevel.TRUSTED_ENVIRONMENT); in testGenerateCSRProvisionAndUseKey() 164 SecurityLevel.TRUSTED_ENVIRONMENT, in testGenerateCSRProvisionAndUseKey() 204 SecurityLevel.TRUSTED_ENVIRONMENT, in testGenerateCSRProvisionAndUseKey() 208 mBinder.getPoolStatus(0, SecurityLevel.TRUSTED_ENVIRONMENT); in testGenerateCSRProvisionAndUseKey() 283 mBinder.generateKeyPair(true /* testMode */, SecurityLevel.TRUSTED_ENVIRONMENT); in testDecryptProtectedPayload() 286 SecurityLevel.TRUSTED_ENVIRONMENT, in testDecryptProtectedPayload()
|