/system/security/keystore2/src/ |
D | database.rs | 68 Domain::Domain, KeyDescriptor::KeyDescriptor, 1237 domain: Domain, in key_exists() argument 1280 Domain::APP.0, in store_super_key() 1318 domain: Domain::APP, in load_super_key() 1346 domain: Domain, in get_or_create_key_with() argument 1489 domain: &Domain, in create_key_entry() argument 1504 domain: &Domain, in create_key_entry_internal() argument 1510 Domain::APP | Domain::SELINUX => {} in create_key_entry_internal() 1784 domain: Domain, in assign_attestation_key() argument 1791 Domain::APP | Domain::SELINUX => {} in assign_attestation_key() [all …]
|
D | audit_log.rs | 20 Domain::Domain, KeyDescriptor::KeyDescriptor, 33 fn key_owner(domain: Domain, nspace: i64, uid: i32) -> i32 { in key_owner() argument 35 Domain::APP => uid, in key_owner() 36 Domain::SELINUX => (nspace | FLAG_NAMESPACE) as i32, in key_owner()
|
D | maintenance.rs | 41 pub use android_system_keystore2::aidl::android::system::keystore2::Domain::Domain; 47 fn delete_namespace(&self, domain: Domain, namespace: i64) -> Result<()>; in delete_namespace() argument 124 fn clear_namespace(&self, domain: Domain, nspace: i64) -> Result<()> { in clear_namespace() argument 224 Domain::APP | Domain::SELINUX | Domain::KEY_ID => { in migrate_key_namespace() 284 fn clearNamespace(&self, domain: Domain, nspace: i64) -> BinderResult<()> { in clearNamespace() argument
|
D | service.rs | 43 Domain::Domain, IKeystoreSecurityLevel::IKeystoreSecurityLevel, 162 domain: Domain::KEY_ID, in get_key_entry() 227 (Domain::APP, Some(ref alias)) => KeyDescriptor { in update_subcomponent() 228 domain: Domain::APP, in update_subcomponent() 233 (Domain::SELINUX, Some(_)) => key.clone(), in update_subcomponent() 256 fn list_entries(&self, domain: Domain, namespace: i64) -> Result<Vec<KeyDescriptor>> { in list_entries() argument 258 Domain::APP => KeyDescriptor { in list_entries() 263 Domain::SELINUX => KeyDescriptor{domain, nspace: namespace, ..Default::default()}, in list_entries() 382 domain: Domain, in listEntries() argument
|
D | security_level.rs | 54 Domain::Domain, EphemeralStorageKeyResponse::EphemeralStorageKeyResponse, 151 Domain::BLOB => KeyDescriptor { in store_new_key() 152 domain: Domain::BLOB, in store_new_key() 188 domain: Domain::KEY_ID, in store_new_key() 218 Domain::BLOB => { in create_operation() 385 upgradedBlob: if key.domain == Domain::BLOB { upgraded_blob } else { None }, in create_operation() 472 if key.domain != Domain::BLOB && key.alias.is_none() { in generate_key() 479 Domain::APP => KeyDescriptor { in generate_key() 493 (Domain::BLOB, _) => None, in generate_key() 589 if key.domain != Domain::BLOB && key.alias.is_none() { in import_key() [all …]
|
D | attestation_key_utils.rs | 28 Domain::Domain, KeyDescriptor::KeyDescriptor, 102 Domain::BLOB => Err(Error::Km(ErrorCode::INVALID_ARGUMENT)).context( in load_attest_key_blob_and_cert()
|
D | legacy_migrator.rs | 31 Domain::Domain, KeyDescriptor::KeyDescriptor, ResponseCode::ResponseCode, 198 pub fn list_uid(&self, domain: Domain, namespace: i64) -> Result<Vec<KeyDescriptor>> { in list_uid() argument 202 (Domain::APP, namespace) => namespace as u32, in list_uid() 203 (Domain::SELINUX, Self::WIFI_NAMESPACE) => Self::AID_WIFI, in list_uid() 309 KeyDescriptor { domain: Domain::APP, alias: Some(_), .. } => caller_uid, in with_try_migrate() 310 KeyDescriptor { domain: Domain::SELINUX, nspace, alias: Some(_), .. } => { in with_try_migrate() 372 pub fn bulk_delete_uid(&self, domain: Domain, nspace: i64) -> Result<()> { in bulk_delete_uid() argument 376 (Domain::APP, nspace) => nspace as u32, in bulk_delete_uid() 377 (Domain::SELINUX, Self::WIFI_NAMESPACE) => Self::AID_WIFI, in bulk_delete_uid() 447 if key.domain == Domain::APP { in check_and_migrate()
|
D | permission.rs | 22 Domain::Domain, KeyDescriptor::KeyDescriptor, KeyPermission::KeyPermission, 459 Domain::APP => getcon().context("check_grant_permission: getcon failed.")?, in check_grant_permission() 460 Domain::SELINUX => lookup_keystore2_key_context(key.nspace) in check_grant_permission() 526 Domain::APP => { in check_key_permission() 533 Domain::SELINUX => lookup_keystore2_key_context(key.nspace) in check_key_permission() 535 Domain::GRANT => { in check_key_permission() 549 Domain::KEY_ID => { in check_key_permission() 555 Domain::BLOB => { in check_key_permission() 704 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app() 723 domain: Domain::SELINUX, in check_grant_permission_selinux() [all …]
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | KeyDescriptor.aidl | 19 import android.system.keystore2.Domain; 55 Domain domain;
|
D | IKeystoreService.aidl | 20 import android.system.keystore2.Domain; 134 KeyDescriptor[] listEntries(in Domain domain, in long nspace); in listEntries()
|
D | Domain.aidl | 22 enum Domain { enum
|
/system/security/keystore2/aidl/android/security/maintenance/ |
D | IKeystoreMaintenance.aidl | 17 import android.system.keystore2.Domain; 77 void clearNamespace(Domain domain, long nspace); in clearNamespace()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | Domain.aidl | 37 enum Domain { enum
|
D | KeyDescriptor.aidl | 38 android.system.keystore2.Domain domain;
|
D | IKeystoreService.aidl | 41 …android.system.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in… in listEntries()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | Domain.aidl | 37 enum Domain { enum
|
D | KeyDescriptor.aidl | 38 android.system.keystore2.Domain domain;
|
D | IKeystoreService.aidl | 41 …android.system.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in… in listEntries()
|
/system/vold/ |
D | Keymaster.cpp | 132 .domain = ks2::Domain::BLOB, in generateKey() 156 .domain = ks2::Domain::BLOB, in exportKey() 180 .domain = ks2::Domain::BLOB, in deleteKey() 194 .domain = ks2::Domain::BLOB, in begin()
|
/system/sepolicy/private/ |
D | derive_sdk.te | 2 # Domain for derive_sdk
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | derive_sdk.te | 2 # Domain for derive_sdk
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | derive_sdk.te | 2 # Domain for derive_sdk
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | attributes | 2 # Motivation: Domain is overly permissive. Start removing permissions
|
D | atrace.te | 1 # Domain for atrace process spawned by boottrace service.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | attributes | 2 # Motivation: Domain is overly permissive. Start removing permissions
|