/system/security/keystore/ |
D | keymaster_enforcement.cpp | 107 case Tag::NO_AUTH_REQUIRED: in AuthorizeUpdateOrFinish() 108 case Tag::AUTH_TIMEOUT: in AuthorizeUpdateOrFinish() 112 case Tag::USER_AUTH_TYPE: in AuthorizeUpdateOrFinish() 157 case Tag::AUTH_TIMEOUT: in AuthorizeBegin() 160 case Tag::USER_AUTH_TYPE: in AuthorizeBegin() 163 case Tag::NO_AUTH_REQUIRED: in AuthorizeBegin() 193 case Tag::ACTIVE_DATETIME: { in AuthorizeBegin() 199 case Tag::ORIGINATION_EXPIRE_DATETIME: { in AuthorizeBegin() 206 case Tag::USAGE_EXPIRE_DATETIME: { in AuthorizeBegin() 212 case Tag::MIN_SECONDS_BETWEEN_OPS: { in AuthorizeBegin() [all …]
|
D | key_proto_handler.cpp | 34 case Tag::PURPOSE: in checkEnforcedCharacteristics() 37 case Tag::ALGORITHM: in checkEnforcedCharacteristics() 40 case Tag::KEY_SIZE: in checkEnforcedCharacteristics() 43 case Tag::BLOCK_MODE: in checkEnforcedCharacteristics() 46 case Tag::PADDING: in checkEnforcedCharacteristics() 49 case Tag::DIGEST: in checkEnforcedCharacteristics() 52 case Tag::EC_CURVE: in checkEnforcedCharacteristics() 55 case Tag::AUTH_TIMEOUT: in checkEnforcedCharacteristics() 58 case Tag::ORIGIN: in checkEnforcedCharacteristics() 61 case Tag::BLOB_USAGE_REQUIREMENTS: in checkEnforcedCharacteristics() [all …]
|
D | operation_proto_handler.cpp | 60 case Tag::ALGORITHM: in checkKeyCharacteristics() 63 case Tag::KEY_SIZE: in checkKeyCharacteristics() 66 case Tag::EC_CURVE: in checkKeyCharacteristics() 69 case Tag::AUTH_TIMEOUT: in checkKeyCharacteristics() 72 case Tag::ORIGIN: in checkKeyCharacteristics() 75 case Tag::BLOB_USAGE_REQUIREMENTS: in checkKeyCharacteristics() 79 case Tag::USER_AUTH_TYPE: in checkKeyCharacteristics() 93 case Tag::BLOCK_MODE: in checkOpCharacteristics() 96 case Tag::PADDING: in checkOpCharacteristics() 99 case Tag::DIGEST: in checkOpCharacteristics()
|
D | key_store_service.cpp | 77 bool containsTag(const hidl_vec<KeyParameter>& params, Tag tag) { in containsTag() 637 if (containsTag(params.getParameters(), Tag::INCLUDE_UNIQUE_ID)) { in generateKey() 1004 bool isDeviceIdAttestationTag(Tag tag) { in isDeviceIdAttestationTag() 1006 case Tag::ATTESTATION_ID_BRAND: in isDeviceIdAttestationTag() 1007 case Tag::ATTESTATION_ID_DEVICE: in isDeviceIdAttestationTag() 1008 case Tag::ATTESTATION_ID_MANUFACTURER: in isDeviceIdAttestationTag() 1009 case Tag::ATTESTATION_ID_MODEL: in isDeviceIdAttestationTag() 1010 case Tag::ATTESTATION_ID_PRODUCT: in isDeviceIdAttestationTag() 1011 case Tag::ATTESTATION_ID_IMEI: in isDeviceIdAttestationTag() 1012 case Tag::ATTESTATION_ID_MEID: in isDeviceIdAttestationTag() [all …]
|
D | legacy_keymaster_device_wrapper.cpp | 51 inline static keymaster_tag_t legacy_enum_conversion(const Tag value) { in legacy_enum_conversion() 54 inline static Tag legacy_enum_conversion(const keymaster_tag_t value) { in legacy_enum_conversion() 55 return Tag(value); in legacy_enum_conversion() 357 case Tag::ATTESTATION_ID_BRAND: in attestKey() 358 case Tag::ATTESTATION_ID_DEVICE: in attestKey() 359 case Tag::ATTESTATION_ID_PRODUCT: in attestKey() 360 case Tag::ATTESTATION_ID_SERIAL: in attestKey() 361 case Tag::ATTESTATION_ID_IMEI: in attestKey() 362 case Tag::ATTESTATION_ID_MEID: in attestKey() 363 case Tag::ATTESTATION_ID_MANUFACTURER: in attestKey() [all …]
|
D | keymaster_worker.cpp | 392 if (param.tag == Tag::APPLICATION_ID) { in begin() 394 } else if (param.tag == Tag::APPLICATION_DATA) { in begin() 655 case Tag::ATTESTATION_APPLICATION_ID: in checkAllowedOperationParams() 656 case Tag::RESET_SINCE_ID_ROTATION: in checkAllowedOperationParams() 698 if (key_auths.Contains(Tag::TRUSTED_CONFIRMATION_REQUIRED)) { in finish() 776 bool containsTag(const hidl_vec<KeyParameter>& params, Tag tag) { in containsTag() 783 return !containsTag(params, Tag::NO_AUTH_REQUIRED); in isAuthenticationBound() 831 return !(param.tag == Tag::APPLICATION_DATA || param.tag == Tag::APPLICATION_ID); in generateKey() 833 if (!sw_enforced.Contains(Tag::USER_ID)) { in generateKey() 936 return !(param.tag == Tag::APPLICATION_DATA || param.tag == Tag::APPLICATION_ID); in importKey() [all …]
|
D | auth_token_table.cpp | 106 key_info.find(Tag::NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication() 111 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation() 233 if (param.tag == Tag::USER_SECURE_ID) in ExtractSids()
|
/system/keymaster/include/keymaster/ |
D | authorization_set.h | 243 template <keymaster_tag_t Tag, typename T> 244 bool Contains(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T val) const { in Contains() argument 251 template <keymaster_tag_t Tag, typename T> 252 bool Contains(TypedEnumTag<KM_ENUM, Tag, T> tag, T val) const { in Contains() argument 259 template <keymaster_tag_t Tag> 260 bool Contains(TypedTag<KM_UINT, Tag> tag, uint32_t val) const { in Contains() 278 template <keymaster_tag_t Tag> 279 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, uint32_t* val) const { in GetTagValue() 297 template <keymaster_tag_t Tag> 298 bool GetTagValue(TypedTag<KM_ULONG_REP, Tag> tag, size_t instance, uint64_t* val) const { in GetTagValue() [all …]
|
D | keymaster_tags.h | 209 template <keymaster_tag_t Tag> 210 inline keymaster_key_param_t Authorization(TypedTag<KM_BOOL, Tag> tag) { 214 template <keymaster_tag_t Tag> 215 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT, Tag> tag, uint32_t value) { 219 template <keymaster_tag_t Tag> 220 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT_REP, Tag> tag, uint32_t value) { 224 template <keymaster_tag_t Tag> 225 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG, Tag> tag, uint64_t value) { 229 template <keymaster_tag_t Tag> 230 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG_REP, Tag> tag, uint64_t value) { [all …]
|
/system/core/logd/ |
D | LogTags.cpp | 218 unsigned long Tag = strtoul(cp, &cp, 10); in ReadFileEventLogTags() local 219 if (warn && (Tag > emptyTag)) { in ReadFileEventLogTags() 220 LOG(WARNING) << "tag too large " << Tag; in ReadFileEventLogTags() 241 if (Tag > emptyTag) { in ReadFileEventLogTags() 263 AddEventLogTags((uint32_t)Tag, uid, Name, Format, in ReadFileEventLogTags() 314 uint32_t Tag = get4LE(msg); in ReadPersistEventLogTags() local 315 if (Tag != TAG_DEF_LOG_TAG) continue; in ReadPersistEventLogTags() 333 Tag = elem.data.int32; in ReadPersistEventLogTags() 348 AddEventLogTags(Tag, uid, Name, Format); in ReadPersistEventLogTags() 454 uint32_t Tag = Hash; in nameToTag_locked() local [all …]
|
D | event.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/keymaster/ng/include/ |
D | keymaster_tags.h | 85 using ::android::hardware::keymaster::V3_0::Tag; 97 constexpr TagType typeFromTag(Tag tag) { in typeFromTag() 107 template <TagType tag_type, Tag tag> struct TypedTag { 115 operator Tag() const { return tag; } in Tag() function 118 template <Tag tag> struct Tag2TypedTag { typedef TypedTag<typeFromTag(tag), tag> type; }; 120 template <Tag tag> struct Tag2String; 126 typedef typename Tag2TypedTag<Tag::name>::type TAG_##name##_t; \ 128 template <> struct Tag2String<Tag::name> { \ 195 extern const char* stringifyTag(Tag tag); 200 template <Tag tag> struct TypedTag2ValueType<TypedTag<tag_type, tag>> { \ [all …]
|
D | authorization_set.h | 121 int find(Tag tag, int begin = -1) const; 156 bool Contains(Tag tag) const { in Contains() 160 template <TagType tag_type, Tag tag, typename ValueT> 171 size_t GetTagCount(Tag tag) const; 215 NullOr<const KeyParameter&> GetEntry(Tag tag) const; 228 template <Tag tag> 237 template <Tag tag>
|
/system/extras/libjsonpb/parse/include/jsonpb/ |
D | error_or.h | 54 return ErrorOr<T>(message, Tag::kDummy); in MakeError() 58 enum class Tag { kDummy }; enum 61 ErrorOr(const std::string& msg, Tag) : data_(kIndex0, msg) {} in ErrorOr()
|
/system/keymaster/tests/ |
D | android_keymaster_test_utils.h | 57 template <keymaster_tag_t Tag, typename KeymasterEnum> 58 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM, Tag, KeymasterEnum> tag, in contains() argument 64 template <keymaster_tag_t Tag, typename KeymasterEnum> 65 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM_REP, Tag, KeymasterEnum> tag, in contains() argument 74 template <keymaster_tag_t Tag> 75 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT, Tag> tag, uint32_t val) { in contains() 80 template <keymaster_tag_t Tag> 81 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT_REP, Tag> tag, uint32_t val) { in contains() 89 template <keymaster_tag_t Tag> 90 bool contains(const AuthorizationSet& set, TypedTag<KM_ULONG, Tag> tag, uint64_t val) { in contains() [all …]
|
/system/netd/libnetdutils/include/netdutils/ |
D | Handle.h | 63 struct _##name##Tag {}; \ 64 using name = ::android::netdutils::Handle<type, _##name##Tag>;
|
/system/bt/ |
D | EventLogTags.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/core/liblog/ |
D | event.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/core/storaged/ |
D | EventLogTags.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/memory/lmkd/ |
D | event.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/security/keystore/include/keystore/ |
D | keymaster_types.h | 45 using ::android::hardware::keymaster::V4_0::Tag; 48 using V4_1_Tag = ::android::hardware::keymaster::V4_1::Tag;
|
/system/libbase/include/android-base/ |
D | unique_fd.h | 58 static void Tag(int fd, void* old_addr, void* new_addr) { in Tag() function 157 -> decltype(T::Tag(fd, old_tag, new_tag), void()) { 158 T::Tag(fd, old_tag, new_tag);
|
/system/media/camera/docs/ |
D | metadata_validate.py | 36 from bs4 import Tag 130 matching_tags = [i for i in element.children if isinstance(i, Tag) and i.name == tag]
|
/system/timezone/apex/tests/ |
D | Android.bp | 28 // Tag this module as an mts test artifact
|
/system/core/trusty/keymaster/4.0/ |
D | TrustyKeymaster4Device.cpp | 48 using ::keymaster::ng::Tag; 50 typedef ::android::hardware::keymaster::V3_0::Tag Tag3; 57 inline keymaster_tag_t legacy_enum_conversion(const Tag value) { in legacy_enum_conversion() 60 inline Tag legacy_enum_conversion(const keymaster_tag_t value) { in legacy_enum_conversion() 61 return Tag(value); in legacy_enum_conversion() 106 p.tag = static_cast<Tag>(Tag3::AUTH_TOKEN); in injectAuthToken()
|