Lines Matching refs:SecurityLevel
28 MacedPublicKey::MacedPublicKey, ProtectedData::ProtectedData, SecurityLevel::SecurityLevel,
54 security_level: SecurityLevel,
61 pub fn new(security_level: SecurityLevel, km_uuid: Uuid) -> Self { in new() argument
221 device_by_sec_level: HashMap<SecurityLevel, Asp>,
222 curve_by_sec_level: HashMap<SecurityLevel, i32>,
228 sec_level: &SecurityLevel, in get_dev_by_sec_level() argument
243 let dev = get_remotely_provisioned_component(&SecurityLevel::TRUSTED_ENVIRONMENT) in new_native_binder()
247 SecurityLevel::TRUSTED_ENVIRONMENT, in new_native_binder()
253 result.device_by_sec_level.insert(SecurityLevel::TRUSTED_ENVIRONMENT, dev); in new_native_binder()
254 if let Ok(dev) = get_remotely_provisioned_component(&SecurityLevel::STRONGBOX) { in new_native_binder()
257 SecurityLevel::STRONGBOX, in new_native_binder()
263 result.device_by_sec_level.insert(SecurityLevel::STRONGBOX, dev); in new_native_binder()
283 sec_level: SecurityLevel, in generate_csr() argument
343 sec_level: SecurityLevel, in provision_cert_chain() argument
362 pub fn generate_key_pair(&self, is_test_mode: bool, sec_level: SecurityLevel) -> Result<()> { in generate_key_pair()
410 pub fn get_pool_status(expired_by: i64, sec_level: SecurityLevel) -> Result<AttestationPoolStatus> { in get_pool_status()
431 sec_level: SecurityLevel, in getPoolStatus() argument
443 sec_level: SecurityLevel, in generateCsr() argument
468 sec_level: SecurityLevel, in provisionCertChain() argument
480 sec_level: SecurityLevel, in generateKeyPair() argument