/system/security/keystore/ |
D | keymaster_enforcement.cpp | 107 case Tag::NO_AUTH_REQUIRED: in AuthorizeUpdateOrFinish() 108 case Tag::AUTH_TIMEOUT: in AuthorizeUpdateOrFinish() 112 case Tag::USER_AUTH_TYPE: in AuthorizeUpdateOrFinish() 157 case Tag::AUTH_TIMEOUT: in AuthorizeBegin() 160 case Tag::USER_AUTH_TYPE: in AuthorizeBegin() 163 case Tag::NO_AUTH_REQUIRED: in AuthorizeBegin() 193 case Tag::ACTIVE_DATETIME: { in AuthorizeBegin() 199 case Tag::ORIGINATION_EXPIRE_DATETIME: { in AuthorizeBegin() 206 case Tag::USAGE_EXPIRE_DATETIME: { in AuthorizeBegin() 212 case Tag::MIN_SECONDS_BETWEEN_OPS: { in AuthorizeBegin() [all …]
|
D | legacy_keymaster_device_wrapper.cpp | 51 inline static keymaster_tag_t legacy_enum_conversion(const Tag value) { in legacy_enum_conversion() 54 inline static Tag legacy_enum_conversion(const keymaster_tag_t value) { in legacy_enum_conversion() 55 return Tag(value); in legacy_enum_conversion() 357 case Tag::ATTESTATION_ID_BRAND: in attestKey() 358 case Tag::ATTESTATION_ID_DEVICE: in attestKey() 359 case Tag::ATTESTATION_ID_PRODUCT: in attestKey() 360 case Tag::ATTESTATION_ID_SERIAL: in attestKey() 361 case Tag::ATTESTATION_ID_IMEI: in attestKey() 362 case Tag::ATTESTATION_ID_MEID: in attestKey() 363 case Tag::ATTESTATION_ID_MANUFACTURER: in attestKey() [all …]
|
D | key_operation_log_handler.cpp | 26 template <typename Tag> 27 int32_t getOptionalEnumTagValue(const AuthorizationSet& authorization_set, Tag tag) { in getOptionalEnumTagValue()
|
D | keymaster_worker.cpp | 394 if (param.tag == Tag::APPLICATION_ID) { in begin() 396 } else if (param.tag == Tag::APPLICATION_DATA) { in begin() 657 case Tag::ATTESTATION_APPLICATION_ID: in checkAllowedOperationParams() 658 case Tag::RESET_SINCE_ID_ROTATION: in checkAllowedOperationParams() 700 if (key_auths.Contains(Tag::TRUSTED_CONFIRMATION_REQUIRED)) { in finish() 779 bool containsTag(const hidl_vec<KeyParameter>& params, Tag tag) { in containsTag() 786 return !containsTag(params, Tag::NO_AUTH_REQUIRED); in isAuthenticationBound() 836 return !(param.tag == Tag::APPLICATION_DATA || param.tag == Tag::APPLICATION_ID); in generateKey() 838 if (!sw_enforced.Contains(Tag::USER_ID)) { in generateKey() 944 return !(param.tag == Tag::APPLICATION_DATA || param.tag == Tag::APPLICATION_ID); in importKey() [all …]
|
D | key_creation_log_handler.cpp | 23 template <typename Tag> 24 int32_t getEnumTagValue(const AuthorizationSet& authorization_set, Tag tag) { in getEnumTagValue()
|
D | auth_token_table.cpp | 106 key_info.find(Tag::NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication() 111 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation() 233 if (param.tag == Tag::USER_SECURE_ID) in ExtractSids()
|
D | key_store_service.cpp | 77 bool containsTag(const hidl_vec<KeyParameter>& params, Tag tag) { in containsTag() 637 if (containsTag(params.getParameters(), Tag::INCLUDE_UNIQUE_ID)) { in generateKey() 1008 case Tag::ATTESTATION_ID_BRAND: in isDeviceIdAttestationRequested() 1009 case Tag::ATTESTATION_ID_DEVICE: in isDeviceIdAttestationRequested() 1010 case Tag::ATTESTATION_ID_MANUFACTURER: in isDeviceIdAttestationRequested() 1011 case Tag::ATTESTATION_ID_MODEL: in isDeviceIdAttestationRequested() 1012 case Tag::ATTESTATION_ID_PRODUCT: in isDeviceIdAttestationRequested() 1013 case Tag::ATTESTATION_ID_IMEI: in isDeviceIdAttestationRequested() 1014 case Tag::ATTESTATION_ID_MEID: in isDeviceIdAttestationRequested() 1015 case Tag::ATTESTATION_ID_SERIAL: in isDeviceIdAttestationRequested() [all …]
|
/system/keymaster/include/keymaster/ |
D | authorization_set.h | 240 template <keymaster_tag_t Tag, typename T> 241 bool Contains(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T val) const { in Contains() argument 248 template <keymaster_tag_t Tag, typename T> 249 bool Contains(TypedEnumTag<KM_ENUM, Tag, T> tag, T val) const { in Contains() argument 256 template <keymaster_tag_t Tag> 257 bool Contains(TypedTag<KM_UINT, Tag> tag, uint32_t val) const { in Contains() 275 template <keymaster_tag_t Tag> 276 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, uint32_t* val) const { in GetTagValue() 294 template <keymaster_tag_t Tag> 295 bool GetTagValue(TypedTag<KM_ULONG_REP, Tag> tag, size_t instance, uint64_t* val) const { in GetTagValue() [all …]
|
D | keymaster_tags.h | 209 template <keymaster_tag_t Tag> 210 inline keymaster_key_param_t Authorization(TypedTag<KM_BOOL, Tag> tag) { 214 template <keymaster_tag_t Tag> 215 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT, Tag> tag, uint32_t value) { 219 template <keymaster_tag_t Tag> 220 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT_REP, Tag> tag, uint32_t value) { 224 template <keymaster_tag_t Tag> 225 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG, Tag> tag, uint64_t value) { 229 template <keymaster_tag_t Tag> 230 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG_REP, Tag> tag, uint64_t value) { [all …]
|
/system/core/logd/ |
D | LogTags.cpp | 216 unsigned long Tag = strtoul(cp, &cp, 10); in ReadFileEventLogTags() local 217 if (warn && (Tag > emptyTag)) { in ReadFileEventLogTags() 218 android::prdebug("tag too large %lu", Tag); in ReadFileEventLogTags() 240 if (Tag > emptyTag) { in ReadFileEventLogTags() 262 AddEventLogTags((uint32_t)Tag, uid, Name, Format, in ReadFileEventLogTags() 312 uint32_t Tag = get4LE(msg); in ReadPersistEventLogTags() local 313 if (Tag != TAG_DEF_LOG_TAG) continue; in ReadPersistEventLogTags() 331 Tag = elem.data.int32; in ReadPersistEventLogTags() 346 AddEventLogTags(Tag, uid, Name, Format); in ReadPersistEventLogTags() 469 uint32_t Tag = Hash; in nameToTag_locked() local [all …]
|
D | event.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/keymaster/ng/include/ |
D | keymaster_tags.h | 85 using ::android::hardware::keymaster::V3_0::Tag; 97 constexpr TagType typeFromTag(Tag tag) { in typeFromTag() 107 template <TagType tag_type, Tag tag> struct TypedTag { 115 operator Tag() const { return tag; } in Tag() function 118 template <Tag tag> struct Tag2TypedTag { typedef TypedTag<typeFromTag(tag), tag> type; }; 120 template <Tag tag> struct Tag2String; 126 typedef typename Tag2TypedTag<Tag::name>::type TAG_##name##_t; \ 128 template <> struct Tag2String<Tag::name> { \ 195 extern const char* stringifyTag(Tag tag); 200 template <Tag tag> struct TypedTag2ValueType<TypedTag<tag_type, tag>> { \ [all …]
|
D | authorization_set.h | 121 int find(Tag tag, int begin = -1) const; 156 bool Contains(Tag tag) const { in Contains() 160 template <TagType tag_type, Tag tag, typename ValueT> 171 size_t GetTagCount(Tag tag) const; 215 NullOr<const KeyParameter&> GetEntry(Tag tag) const; 228 template <Tag tag> 237 template <Tag tag>
|
/system/extras/libjsonpb/parse/include/jsonpb/ |
D | error_or.h | 54 return ErrorOr<T>(message, Tag::kDummy); in MakeError() 58 enum class Tag { kDummy }; enum 61 ErrorOr(const std::string& msg, Tag) : data_(kIndex0, msg) {} in ErrorOr()
|
/system/keymaster/tests/ |
D | android_keymaster_test_utils.h | 57 template <keymaster_tag_t Tag, typename KeymasterEnum> 58 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM, Tag, KeymasterEnum> tag, in contains() argument 64 template <keymaster_tag_t Tag, typename KeymasterEnum> 65 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM_REP, Tag, KeymasterEnum> tag, in contains() argument 74 template <keymaster_tag_t Tag> 75 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT, Tag> tag, uint32_t val) { in contains() 80 template <keymaster_tag_t Tag> 81 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT_REP, Tag> tag, uint32_t val) { in contains() 89 template <keymaster_tag_t Tag> 90 bool contains(const AuthorizationSet& set, TypedTag<KM_ULONG, Tag> tag, uint64_t val) { in contains() [all …]
|
/system/netd/libnetdutils/include/netdutils/ |
D | Handle.h | 63 struct _##name##Tag {}; \ 64 using name = ::android::netdutils::Handle<type, _##name##Tag>;
|
/system/bt/ |
D | EventLogTags.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/core/storaged/ |
D | EventLogTags.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/core/liblog/ |
D | event.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/memory/lmkd/ |
D | event.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|
/system/security/keystore/include/keystore/ |
D | keymaster_types.h | 45 using ::android::hardware::keymaster::V4_0::Tag; 48 using V4_1_Tag = ::android::hardware::keymaster::V4_1::Tag;
|
/system/core/base/include/android-base/ |
D | unique_fd.h | 58 static void Tag(int fd, void* old_addr, void* new_addr) { in Tag() function 157 -> decltype(T::Tag(fd, old_tag, new_tag), void()) { 158 T::Tag(fd, old_tag, new_tag);
|
/system/media/camera/docs/ |
D | metadata_validate.py | 36 from bs4 import Tag 130 matching_tags = [i for i in element.children if isinstance(i, Tag) and i.name == tag]
|
/system/timezone/apex/tests/ |
D | Android.bp | 28 // Tag this module as an mts test artifact
|
/system/core/logcat/ |
D | event.logtags | 4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the 7 # Tag names are one or more ASCII letters and numbers or underscores, i.e. 11 # Tag numbers and names are separated by whitespace. Blank lines and lines
|