Home
last modified time | relevance | path

Searched refs:Tag (Results 1 – 25 of 39) sorted by relevance

12

/system/security/keystore/
Dkeymaster_enforcement.cpp107 case Tag::NO_AUTH_REQUIRED: in AuthorizeUpdateOrFinish()
108 case Tag::AUTH_TIMEOUT: in AuthorizeUpdateOrFinish()
112 case Tag::USER_AUTH_TYPE: in AuthorizeUpdateOrFinish()
157 case Tag::AUTH_TIMEOUT: in AuthorizeBegin()
160 case Tag::USER_AUTH_TYPE: in AuthorizeBegin()
163 case Tag::NO_AUTH_REQUIRED: in AuthorizeBegin()
193 case Tag::ACTIVE_DATETIME: { in AuthorizeBegin()
199 case Tag::ORIGINATION_EXPIRE_DATETIME: { in AuthorizeBegin()
206 case Tag::USAGE_EXPIRE_DATETIME: { in AuthorizeBegin()
212 case Tag::MIN_SECONDS_BETWEEN_OPS: { in AuthorizeBegin()
[all …]
Dlegacy_keymaster_device_wrapper.cpp51 inline static keymaster_tag_t legacy_enum_conversion(const Tag value) { in legacy_enum_conversion()
54 inline static Tag legacy_enum_conversion(const keymaster_tag_t value) { in legacy_enum_conversion()
55 return Tag(value); in legacy_enum_conversion()
357 case Tag::ATTESTATION_ID_BRAND: in attestKey()
358 case Tag::ATTESTATION_ID_DEVICE: in attestKey()
359 case Tag::ATTESTATION_ID_PRODUCT: in attestKey()
360 case Tag::ATTESTATION_ID_SERIAL: in attestKey()
361 case Tag::ATTESTATION_ID_IMEI: in attestKey()
362 case Tag::ATTESTATION_ID_MEID: in attestKey()
363 case Tag::ATTESTATION_ID_MANUFACTURER: in attestKey()
[all …]
Dkey_operation_log_handler.cpp26 template <typename Tag>
27 int32_t getOptionalEnumTagValue(const AuthorizationSet& authorization_set, Tag tag) { in getOptionalEnumTagValue()
Dkeymaster_worker.cpp394 if (param.tag == Tag::APPLICATION_ID) { in begin()
396 } else if (param.tag == Tag::APPLICATION_DATA) { in begin()
657 case Tag::ATTESTATION_APPLICATION_ID: in checkAllowedOperationParams()
658 case Tag::RESET_SINCE_ID_ROTATION: in checkAllowedOperationParams()
700 if (key_auths.Contains(Tag::TRUSTED_CONFIRMATION_REQUIRED)) { in finish()
779 bool containsTag(const hidl_vec<KeyParameter>& params, Tag tag) { in containsTag()
786 return !containsTag(params, Tag::NO_AUTH_REQUIRED); in isAuthenticationBound()
836 return !(param.tag == Tag::APPLICATION_DATA || param.tag == Tag::APPLICATION_ID); in generateKey()
838 if (!sw_enforced.Contains(Tag::USER_ID)) { in generateKey()
944 return !(param.tag == Tag::APPLICATION_DATA || param.tag == Tag::APPLICATION_ID); in importKey()
[all …]
Dkey_creation_log_handler.cpp23 template <typename Tag>
24 int32_t getEnumTagValue(const AuthorizationSet& authorization_set, Tag tag) { in getEnumTagValue()
Dauth_token_table.cpp106 key_info.find(Tag::NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication()
111 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation()
233 if (param.tag == Tag::USER_SECURE_ID) in ExtractSids()
Dkey_store_service.cpp77 bool containsTag(const hidl_vec<KeyParameter>& params, Tag tag) { in containsTag()
637 if (containsTag(params.getParameters(), Tag::INCLUDE_UNIQUE_ID)) { in generateKey()
1008 case Tag::ATTESTATION_ID_BRAND: in isDeviceIdAttestationRequested()
1009 case Tag::ATTESTATION_ID_DEVICE: in isDeviceIdAttestationRequested()
1010 case Tag::ATTESTATION_ID_MANUFACTURER: in isDeviceIdAttestationRequested()
1011 case Tag::ATTESTATION_ID_MODEL: in isDeviceIdAttestationRequested()
1012 case Tag::ATTESTATION_ID_PRODUCT: in isDeviceIdAttestationRequested()
1013 case Tag::ATTESTATION_ID_IMEI: in isDeviceIdAttestationRequested()
1014 case Tag::ATTESTATION_ID_MEID: in isDeviceIdAttestationRequested()
1015 case Tag::ATTESTATION_ID_SERIAL: in isDeviceIdAttestationRequested()
[all …]
/system/keymaster/include/keymaster/
Dauthorization_set.h240 template <keymaster_tag_t Tag, typename T>
241 bool Contains(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T val) const { in Contains() argument
248 template <keymaster_tag_t Tag, typename T>
249 bool Contains(TypedEnumTag<KM_ENUM, Tag, T> tag, T val) const { in Contains() argument
256 template <keymaster_tag_t Tag>
257 bool Contains(TypedTag<KM_UINT, Tag> tag, uint32_t val) const { in Contains()
275 template <keymaster_tag_t Tag>
276 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, uint32_t* val) const { in GetTagValue()
294 template <keymaster_tag_t Tag>
295 bool GetTagValue(TypedTag<KM_ULONG_REP, Tag> tag, size_t instance, uint64_t* val) const { in GetTagValue()
[all …]
Dkeymaster_tags.h209 template <keymaster_tag_t Tag>
210 inline keymaster_key_param_t Authorization(TypedTag<KM_BOOL, Tag> tag) {
214 template <keymaster_tag_t Tag>
215 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT, Tag> tag, uint32_t value) {
219 template <keymaster_tag_t Tag>
220 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT_REP, Tag> tag, uint32_t value) {
224 template <keymaster_tag_t Tag>
225 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG, Tag> tag, uint64_t value) {
229 template <keymaster_tag_t Tag>
230 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG_REP, Tag> tag, uint64_t value) {
[all …]
/system/core/logd/
DLogTags.cpp216 unsigned long Tag = strtoul(cp, &cp, 10); in ReadFileEventLogTags() local
217 if (warn && (Tag > emptyTag)) { in ReadFileEventLogTags()
218 android::prdebug("tag too large %lu", Tag); in ReadFileEventLogTags()
240 if (Tag > emptyTag) { in ReadFileEventLogTags()
262 AddEventLogTags((uint32_t)Tag, uid, Name, Format, in ReadFileEventLogTags()
312 uint32_t Tag = get4LE(msg); in ReadPersistEventLogTags() local
313 if (Tag != TAG_DEF_LOG_TAG) continue; in ReadPersistEventLogTags()
331 Tag = elem.data.int32; in ReadPersistEventLogTags()
346 AddEventLogTags(Tag, uid, Name, Format); in ReadPersistEventLogTags()
469 uint32_t Tag = Hash; in nameToTag_locked() local
[all …]
Devent.logtags4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the
7 # Tag names are one or more ASCII letters and numbers or underscores, i.e.
11 # Tag numbers and names are separated by whitespace. Blank lines and lines
/system/keymaster/ng/include/
Dkeymaster_tags.h85 using ::android::hardware::keymaster::V3_0::Tag;
97 constexpr TagType typeFromTag(Tag tag) { in typeFromTag()
107 template <TagType tag_type, Tag tag> struct TypedTag {
115 operator Tag() const { return tag; } in Tag() function
118 template <Tag tag> struct Tag2TypedTag { typedef TypedTag<typeFromTag(tag), tag> type; };
120 template <Tag tag> struct Tag2String;
126 typedef typename Tag2TypedTag<Tag::name>::type TAG_##name##_t; \
128 template <> struct Tag2String<Tag::name> { \
195 extern const char* stringifyTag(Tag tag);
200 template <Tag tag> struct TypedTag2ValueType<TypedTag<tag_type, tag>> { \
[all …]
Dauthorization_set.h121 int find(Tag tag, int begin = -1) const;
156 bool Contains(Tag tag) const { in Contains()
160 template <TagType tag_type, Tag tag, typename ValueT>
171 size_t GetTagCount(Tag tag) const;
215 NullOr<const KeyParameter&> GetEntry(Tag tag) const;
228 template <Tag tag>
237 template <Tag tag>
/system/extras/libjsonpb/parse/include/jsonpb/
Derror_or.h54 return ErrorOr<T>(message, Tag::kDummy); in MakeError()
58 enum class Tag { kDummy }; enum
61 ErrorOr(const std::string& msg, Tag) : data_(kIndex0, msg) {} in ErrorOr()
/system/keymaster/tests/
Dandroid_keymaster_test_utils.h57 template <keymaster_tag_t Tag, typename KeymasterEnum>
58 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM, Tag, KeymasterEnum> tag, in contains() argument
64 template <keymaster_tag_t Tag, typename KeymasterEnum>
65 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM_REP, Tag, KeymasterEnum> tag, in contains() argument
74 template <keymaster_tag_t Tag>
75 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT, Tag> tag, uint32_t val) { in contains()
80 template <keymaster_tag_t Tag>
81 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT_REP, Tag> tag, uint32_t val) { in contains()
89 template <keymaster_tag_t Tag>
90 bool contains(const AuthorizationSet& set, TypedTag<KM_ULONG, Tag> tag, uint64_t val) { in contains()
[all …]
/system/netd/libnetdutils/include/netdutils/
DHandle.h63 struct _##name##Tag {}; \
64 using name = ::android::netdutils::Handle<type, _##name##Tag>;
/system/bt/
DEventLogTags.logtags4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the
7 # Tag names are one or more ASCII letters and numbers or underscores, i.e.
11 # Tag numbers and names are separated by whitespace. Blank lines and lines
/system/core/storaged/
DEventLogTags.logtags4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the
7 # Tag names are one or more ASCII letters and numbers or underscores, i.e.
11 # Tag numbers and names are separated by whitespace. Blank lines and lines
/system/core/liblog/
Devent.logtags4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the
7 # Tag names are one or more ASCII letters and numbers or underscores, i.e.
11 # Tag numbers and names are separated by whitespace. Blank lines and lines
/system/memory/lmkd/
Devent.logtags4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the
7 # Tag names are one or more ASCII letters and numbers or underscores, i.e.
11 # Tag numbers and names are separated by whitespace. Blank lines and lines
/system/security/keystore/include/keystore/
Dkeymaster_types.h45 using ::android::hardware::keymaster::V4_0::Tag;
48 using V4_1_Tag = ::android::hardware::keymaster::V4_1::Tag;
/system/core/base/include/android-base/
Dunique_fd.h58 static void Tag(int fd, void* old_addr, void* new_addr) { in Tag() function
157 -> decltype(T::Tag(fd, old_tag, new_tag), void()) {
158 T::Tag(fd, old_tag, new_tag);
/system/media/camera/docs/
Dmetadata_validate.py36 from bs4 import Tag
130 matching_tags = [i for i in element.children if isinstance(i, Tag) and i.name == tag]
/system/timezone/apex/tests/
DAndroid.bp28 // Tag this module as an mts test artifact
/system/core/logcat/
Devent.logtags4 # Tag numbers are decimal integers, from 0 to 2^31. (Let's leave the
7 # Tag names are one or more ASCII letters and numbers or underscores, i.e.
11 # Tag numbers and names are separated by whitespace. Blank lines and lines

12