Home
last modified time | relevance | path

Searched refs:Domain (Results 1 – 25 of 103) sorted by relevance

12345

/system/security/keystore2/src/
Ddatabase.rs68 Domain::Domain, KeyDescriptor::KeyDescriptor,
1237 domain: Domain, in key_exists() argument
1280 Domain::APP.0, in store_super_key()
1318 domain: Domain::APP, in load_super_key()
1346 domain: Domain, in get_or_create_key_with() argument
1489 domain: &Domain, in create_key_entry() argument
1504 domain: &Domain, in create_key_entry_internal() argument
1510 Domain::APP | Domain::SELINUX => {} in create_key_entry_internal()
1784 domain: Domain, in assign_attestation_key() argument
1791 Domain::APP | Domain::SELINUX => {} in assign_attestation_key()
[all …]
Daudit_log.rs20 Domain::Domain, KeyDescriptor::KeyDescriptor,
33 fn key_owner(domain: Domain, nspace: i64, uid: i32) -> i32 { in key_owner() argument
35 Domain::APP => uid, in key_owner()
36 Domain::SELINUX => (nspace | FLAG_NAMESPACE) as i32, in key_owner()
Dmaintenance.rs41 pub use android_system_keystore2::aidl::android::system::keystore2::Domain::Domain;
47 fn delete_namespace(&self, domain: Domain, namespace: i64) -> Result<()>; in delete_namespace() argument
124 fn clear_namespace(&self, domain: Domain, nspace: i64) -> Result<()> { in clear_namespace() argument
224 Domain::APP | Domain::SELINUX | Domain::KEY_ID => { in migrate_key_namespace()
284 fn clearNamespace(&self, domain: Domain, nspace: i64) -> BinderResult<()> { in clearNamespace() argument
Dservice.rs43 Domain::Domain, IKeystoreSecurityLevel::IKeystoreSecurityLevel,
162 domain: Domain::KEY_ID, in get_key_entry()
227 (Domain::APP, Some(ref alias)) => KeyDescriptor { in update_subcomponent()
228 domain: Domain::APP, in update_subcomponent()
233 (Domain::SELINUX, Some(_)) => key.clone(), in update_subcomponent()
256 fn list_entries(&self, domain: Domain, namespace: i64) -> Result<Vec<KeyDescriptor>> { in list_entries() argument
258 Domain::APP => KeyDescriptor { in list_entries()
263 Domain::SELINUX => KeyDescriptor{domain, nspace: namespace, ..Default::default()}, in list_entries()
382 domain: Domain, in listEntries() argument
Dsecurity_level.rs54 Domain::Domain, EphemeralStorageKeyResponse::EphemeralStorageKeyResponse,
151 Domain::BLOB => KeyDescriptor { in store_new_key()
152 domain: Domain::BLOB, in store_new_key()
188 domain: Domain::KEY_ID, in store_new_key()
218 Domain::BLOB => { in create_operation()
385 upgradedBlob: if key.domain == Domain::BLOB { upgraded_blob } else { None }, in create_operation()
472 if key.domain != Domain::BLOB && key.alias.is_none() { in generate_key()
479 Domain::APP => KeyDescriptor { in generate_key()
493 (Domain::BLOB, _) => None, in generate_key()
589 if key.domain != Domain::BLOB && key.alias.is_none() { in import_key()
[all …]
Dattestation_key_utils.rs28 Domain::Domain, KeyDescriptor::KeyDescriptor,
102 Domain::BLOB => Err(Error::Km(ErrorCode::INVALID_ARGUMENT)).context( in load_attest_key_blob_and_cert()
Dlegacy_migrator.rs31 Domain::Domain, KeyDescriptor::KeyDescriptor, ResponseCode::ResponseCode,
198 pub fn list_uid(&self, domain: Domain, namespace: i64) -> Result<Vec<KeyDescriptor>> { in list_uid() argument
202 (Domain::APP, namespace) => namespace as u32, in list_uid()
203 (Domain::SELINUX, Self::WIFI_NAMESPACE) => Self::AID_WIFI, in list_uid()
309 KeyDescriptor { domain: Domain::APP, alias: Some(_), .. } => caller_uid, in with_try_migrate()
310 KeyDescriptor { domain: Domain::SELINUX, nspace, alias: Some(_), .. } => { in with_try_migrate()
372 pub fn bulk_delete_uid(&self, domain: Domain, nspace: i64) -> Result<()> { in bulk_delete_uid() argument
376 (Domain::APP, nspace) => nspace as u32, in bulk_delete_uid()
377 (Domain::SELINUX, Self::WIFI_NAMESPACE) => Self::AID_WIFI, in bulk_delete_uid()
447 if key.domain == Domain::APP { in check_and_migrate()
Dpermission.rs22 Domain::Domain, KeyDescriptor::KeyDescriptor, KeyPermission::KeyPermission,
459 Domain::APP => getcon().context("check_grant_permission: getcon failed.")?, in check_grant_permission()
460 Domain::SELINUX => lookup_keystore2_key_context(key.nspace) in check_grant_permission()
526 Domain::APP => { in check_key_permission()
533 Domain::SELINUX => lookup_keystore2_key_context(key.nspace) in check_key_permission()
535 Domain::GRANT => { in check_key_permission()
549 Domain::KEY_ID => { in check_key_permission()
555 Domain::BLOB => { in check_key_permission()
704 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app()
723 domain: Domain::SELINUX, in check_grant_permission_selinux()
[all …]
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/
DKeyDescriptor.aidl19 import android.system.keystore2.Domain;
55 Domain domain;
DIKeystoreService.aidl20 import android.system.keystore2.Domain;
134 KeyDescriptor[] listEntries(in Domain domain, in long nspace); in listEntries()
DDomain.aidl22 enum Domain { enum
/system/security/keystore2/aidl/android/security/maintenance/
DIKeystoreMaintenance.aidl17 import android.system.keystore2.Domain;
77 void clearNamespace(Domain domain, long nspace); in clearNamespace()
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/
DDomain.aidl37 enum Domain { enum
DKeyDescriptor.aidl38 android.system.keystore2.Domain domain;
DIKeystoreService.aidl41 …android.system.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in… in listEntries()
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/
DDomain.aidl37 enum Domain { enum
DKeyDescriptor.aidl38 android.system.keystore2.Domain domain;
DIKeystoreService.aidl41 …android.system.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in… in listEntries()
/system/vold/
DKeymaster.cpp132 .domain = ks2::Domain::BLOB, in generateKey()
156 .domain = ks2::Domain::BLOB, in exportKey()
180 .domain = ks2::Domain::BLOB, in deleteKey()
194 .domain = ks2::Domain::BLOB, in begin()
/system/sepolicy/private/
Dderive_sdk.te2 # Domain for derive_sdk
/system/sepolicy/prebuilts/api/31.0/private/
Dderive_sdk.te2 # Domain for derive_sdk
/system/sepolicy/prebuilts/api/30.0/private/
Dderive_sdk.te2 # Domain for derive_sdk
/system/sepolicy/prebuilts/api/26.0/private/
Dattributes2 # Motivation: Domain is overly permissive. Start removing permissions
Datrace.te1 # Domain for atrace process spawned by boottrace service.
/system/sepolicy/prebuilts/api/27.0/private/
Dattributes2 # Motivation: Domain is overly permissive. Start removing permissions

12345