/aosp12/system/security/keystore2/src/ |
H A D | globals.rs | 191 let service_name = match *security_level { in connect_keymint() 226 map_binder_status(keystore_compat_service.getKeyMintDevice(*security_level)) in connect_keymint() 261 security_level: &SecurityLevel, in get_keymint_device() 264 if let Some((dev, hw_info, uuid)) = devices_map.dev_by_sec_level(&security_level) { in get_keymint_device() 268 devices_map.insert(*security_level, dev, hw_info); in get_keymint_device() 270 Ok(devices_map.dev_by_sec_level(security_level).unwrap()) in get_keymint_device() 351 let service_name = match *security_level { in connect_remotely_provisioned_component() 385 if let Some(dev) = devices_map.dev_by_sec_level(&security_level) { in get_remotely_provisioned_component() 388 let dev = connect_remotely_provisioned_component(security_level) in get_remotely_provisioned_component() 390 devices_map.insert(*security_level, dev); in get_remotely_provisioned_component() [all …]
|
H A D | raw_device.rs | 52 security_level: SecurityLevel, field 64 pub fn get(security_level: SecurityLevel) -> Result<KeyMintDevice> { in get() 65 let (asp, hw_info, km_uuid) = get_keymint_device(&security_level) in get() 72 security_level: hw_info.securityLevel, in get() 78 pub fn get_or_none(security_level: SecurityLevel) -> Result<Option<KeyMintDevice>> { in get_or_none() 79 KeyMintDevice::get(security_level).map(Some).or_else(|e| { in get_or_none() 95 pub fn security_level(&self) -> SecurityLevel { in security_level() method 96 self.security_level in security_level()
|
H A D | key_parameter.rs | 987 security_level: SecurityLevel, field 993 KeyParameter { value, security_level } in new() 1009 security_level: security_level_val, in new_from_sql() 1024 pub fn security_level(&self) -> &SecurityLevel { in security_level() method 1025 &self.security_level in security_level() 1251 assert_eq!(kp.security_level(), key_param.security_level()); in test_to_sql_enum_i32() 1264 assert_eq!(kp.security_level(), key_param.security_level()); in test_to_sql_i32() 1281 assert_eq!(kp.security_level(), key_param.security_level()); in test_to_sql_i64() 1297 assert_eq!(kp.security_level(), key_param.security_level()); in test_to_sql_vec_u8() 1310 assert_eq!(kp.security_level(), key_param.security_level()); in test_to_sql_bool() [all …]
|
H A D | security_level.rs | 65 security_level: SecurityLevel, field 87 security_level: SecurityLevel, in new_native_binder() 90 let (dev, hw_info, km_uuid) = get_keymint_device(&security_level) in new_native_binder() 94 security_level, in new_native_binder() 99 rem_prov_state: RemProvState::new(security_level, km_uuid), in new_native_binder() 108 let sec_level = self.security_level; in watch_millis() 200 keySecurityLevel: self.security_level, in store_new_key() 361 LoggingInfo::new(self.security_level, purpose, op_params, upgraded_blob.is_some()), in create_operation() 1011 log_key_creation_event_stats(self.security_level, params, &result); in generateKey() 1025 log_key_creation_event_stats(self.security_level, params, &result); in importKey() [all …]
|
H A D | remote_provisioning.rs | 54 security_level: SecurityLevel, field 61 pub fn new(security_level: SecurityLevel, km_uuid: Uuid) -> Self { in new() 62 Self { security_level, km_uuid, is_hal_present: AtomicBool::new(true) } in new() 71 || get_remotely_provisioned_component(&self.security_level).is_err() in check_rem_prov_enabled()
|
H A D | service.rs | 22 use crate::security_level::KeystoreSecurityLevel; 360 security_level: SecurityLevel, in getSecurityLevel() 363 format!("security_level: {}", security_level.0) in getSecurityLevel() 365 map_or_log_err(self.get_security_level(security_level), Ok) in getSecurityLevel()
|
H A D | metrics_store.rs | 201 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_creation_event_stats() 214 key_creation_with_auth_info.security_level = process_security_level(sec_level); in process_key_creation_event_stats() 350 security_level: MetricsSecurityLevel::SECURITY_LEVEL_UNSPECIFIED, in process_key_operation_event_stats() 361 key_operation_with_general_info.security_level = process_security_level(sec_level); in process_key_operation_event_stats() 577 security_level: process_security_level(*sec_level), in pull_attestation_pool_stats()
|
H A D | lib.rs | 40 pub mod security_level; module
|
/aosp12/system/keymaster/km_openssl/ |
H A D | soft_keymaster_enforcement.cpp | 187 response.token.security_level = SecurityLevel(); in VerifyAuthorization() 192 toBlob(response.token.security_level), in VerifyAuthorization() 202 token->security_level = SecurityLevel(); in GenerateTimestampToken() 207 toBlob(token->security_level), in GenerateTimestampToken()
|
/aosp12/system/bt/gd/security/record/ |
H A D | security_record_storage.cc | 71 penc_keys[26] = record->security_level; in SetLeData() 87 *(psrk_keys.data() + 20) = record->security_level; in SetLeData() 166 record->security_level = peer_encryption_keys->data()[26]; in LoadSecurityRecords() 176 record->security_level = peer_signature_resolving_keys->data()[20]; in LoadSecurityRecords()
|
H A D | security_record.h | 131 uint8_t security_level; variable
|
/aosp12/system/security/keystore2/aidl/android/security/metrics/ |
H A D | RkpPoolStats.aidl | 27 SecurityLevel security_level;
|
H A D | KeyCreationWithAuthInfo.aidl | 34 SecurityLevel security_level;
|
H A D | KeyOperationWithGeneralInfo.aidl | 31 SecurityLevel security_level;
|
/aosp12/system/bt/gd/cert/ |
H A D | py_l2cap.py | 236 def register_coc(self, cert_address, psm=0x33, security_level=SecurityLevel.NO_SECURITY): argument 238 …_le_facade_pb2.SetEnableDynamicChannelRequest(psm=psm, enable=True, security_level=security_level))
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | android_keymaster_messages.h | 917 security_level = other.security_level; in VerificationToken() 928 keymaster_security_level_t security_level{}; 1053 security_level = other.security_level; in TimestampToken() 1057 return sizeof(challenge) + sizeof(timestamp) + sizeof(security_level) + in SerializedSize() 1063 buf = append_uint32_to_buf(buf, end, security_level); in Serialize() 1069 copy_uint32_from_buf(buf_ptr, end, &security_level) && mac.Deserialize(buf_ptr, end); in Deserialize() 1073 keymaster_security_level_t security_level{};
|
/aosp12/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
H A D | attestation_record.h | 33 SecurityLevel security_level; member
|
/aosp12/system/keymaster/ng/ |
H A D | AndroidKeymaster41Device.cpp | 49 serializableToken.security_level = in deviceLocked()
|
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | attestation_record.h | 54 SecurityLevel security_level; member
|
/aosp12/system/keymaster/contexts/ |
H A D | pure_soft_keymaster_context.cpp | 54 keymaster_security_level_t security_level) in PureSoftKeymasterContext() argument 63 security_level_(security_level) { in PureSoftKeymasterContext() 66 if (security_level != KM_SECURITY_LEVEL_SOFTWARE) { in PureSoftKeymasterContext()
|
/aosp12/system/bt/gd/security/ |
H A D | initial_informations.h | 61 uint8_t security_level; member
|
/aosp12/system/bt/gd/l2cap/le/ |
H A D | facade.proto | 58 SecurityLevel security_level = 3;
|
/aosp12/system/keymaster/include/keymaster/contexts/ |
H A D | pure_soft_keymaster_context.h | 50 KmVersion version, keymaster_security_level_t security_level = KM_SECURITY_LEVEL_SOFTWARE);
|
/aosp12/hardware/qcom/sdm845/display/sdm/libs/core/drm/ |
H A D | hw_device_drm.cpp | 929 DRMSecurityLevel security_level; in SetupAtomic() local 930 SetSecureConfig(layer.input_buffer, &fb_secure_mode, &security_level); in SetupAtomic() 932 if (security_level > crtc_security_level) { in SetupAtomic() 933 crtc_security_level = security_level; in SetupAtomic() 1570 DRMSecurityLevel *security_level) { in SetSecureConfig() argument 1572 *security_level = DRMSecurityLevel::SECURE_NON_SECURE; in SetSecureConfig() 1585 *security_level = DRMSecurityLevel::SECURE_ONLY; in SetSecureConfig()
|
/aosp12/hardware/qcom/sm8150/display/sdm/libs/core/drm/ |
H A D | hw_device_drm.cpp | 1118 DRMSecurityLevel security_level; in SetupAtomic() local 1119 SetSecureConfig(layer.input_buffer, &fb_secure_mode, &security_level); in SetupAtomic() 1121 if (security_level > crtc_security_level) { in SetupAtomic() 1122 crtc_security_level = security_level; in SetupAtomic() 1862 DRMSecurityLevel *security_level) { in SetSecureConfig() argument 1864 *security_level = DRMSecurityLevel::SECURE_NON_SECURE; in SetSecureConfig() 1877 *security_level = DRMSecurityLevel::SECURE_ONLY; in SetSecureConfig()
|