/system/hardware/interfaces/wifi/keystore/1.0/default/ |
D | keystore.cpp | 36 ks2::KeyDescriptor mkKeyDescriptor(const std::string& alias) { in mkKeyDescriptor() argument 39 if (android::base::StartsWith(alias, keystore2_grant_id_prefix)) { in mkKeyDescriptor() 40 std::stringstream s(alias.substr(keystore2_grant_id_prefix.size())); in mkKeyDescriptor() 44 LOG(ERROR) << AT << "Couldn't parse grant name: " << alias; in mkKeyDescriptor() 49 .alias = std::nullopt, in mkKeyDescriptor() 56 .alias = alias, in mkKeyDescriptor() 115 std::string alias = key.c_str(); in keyStore2GetCert() local 116 if (android::base::StartsWith(alias, "CACERT_")) { in keyStore2GetCert() 117 alias = alias.substr(7); in keyStore2GetCert() 119 } else if (android::base::StartsWith(alias, "USRCERT_")) { in keyStore2GetCert() [all …]
|
/system/security/keystore2/legacykeystore/ |
D | lib.rs | 118 fn put(&mut self, caller_uid: u32, alias: &str, entry: &[u8]) -> Result<()> { in put() 122 params![caller_uid, alias, entry,], in put() 129 fn get(&mut self, caller_uid: u32, alias: &str) -> Result<Option<Vec<u8>>> { in get() 133 params![caller_uid, alias], in get() 141 fn remove(&mut self, caller_uid: u32, alias: &str) -> Result<bool> { in remove() 145 params![caller_uid, alias], in remove() 308 fn get(&self, alias: &str, uid: i32) -> Result<Vec<u8>> { in get() 312 if let Some(entry) = db.get(uid, alias).context("In get: Trying to load entry from DB.")? { in get() 315 if self.get_legacy(uid, alias).context("In get: Trying to migrate legacy blob.")? { in get() 318 db.get(uid, alias).context("In get: Trying to load entry from DB.")? in get() [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | file.te | 2 typealias audio_data_file alias audio_firmware_file; 3 typealias app_data_file alias platform_app_data_file; 4 typealias app_data_file alias download_file;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | file.te | 2 typealias audio_data_file alias audio_firmware_file; 3 typealias app_data_file alias platform_app_data_file; 4 typealias app_data_file alias download_file;
|
/system/security/keystore2/aidl/android/security/legacykeystore/ |
D | ILegacyKeystore.aidl | 65 byte[] get(in String alias, int uid); in get() argument 79 void put(in String alias, int uid, in byte[] blob); in put() argument 88 void remove(in String alias, int uid); in remove() argument
|
/system/security/keystore2/src/ |
D | legacy_migrator.rs | 63 alias: String, field 67 fn new(uid: u32, alias: String) -> Self { in new() 68 Self { uid, alias } in new() 209 .map(|alias| KeyDescriptor { in list_uid() 212 alias: Some(alias), in list_uid() 309 KeyDescriptor { domain: Domain::APP, alias: Some(_), .. } => caller_uid, in with_try_migrate() 310 KeyDescriptor { domain: Domain::SELINUX, nspace, alias: Some(_), .. } => { in with_try_migrate() 436 let alias = key.alias.clone().ok_or_else(|| { in check_and_migrate() localVariable 443 if self.recently_migrated.contains(&RecentMigration::new(uid, alias.clone())) { in check_and_migrate() 454 .load_by_uid_alias(uid, &alias, None) in check_and_migrate() [all …]
|
D | legacy_blob.rs | 553 alias: &str, in read_characteristics_file() 556 let blob = Self::read_generic_blob(&self.make_chr_filename(uid, alias, prefix)) in read_characteristics_file() 611 fn read_km_blob_file(&self, uid: u32, alias: &str) -> Result<Option<(Blob, String)>> { in read_km_blob_file() 617 Self::read_generic_blob(&self.make_blob_filename(uid, alias, prefix)) in read_km_blob_file() 643 pub fn read_legacy_keystore_entry(&self, uid: u32, alias: &str) -> Result<Option<Vec<u8>>> { in read_legacy_keystore_entry() 644 let path = match self.make_legacy_keystore_entry_filename(uid, alias) { in read_legacy_keystore_entry() 662 pub fn remove_legacy_keystore_entry(&self, uid: u32, alias: &str) -> Result<()> { in remove_legacy_keystore_entry() 663 let path = match self.make_legacy_keystore_entry_filename(uid, alias) { in remove_legacy_keystore_entry() 741 if let Some(alias) = Self::extract_legacy_alias(&v[sep_pos + 1..]) { in list_legacy_keystore_entries_for_user() 743 entry.insert(alias); in list_legacy_keystore_entries_for_user() [all …]
|
D | database.rs | 1239 alias: &str, in key_exists() 1246 KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }; in key_exists() 1282 key_type.alias, in store_super_key() 1320 alias: Some(key_type.alias.into()), in load_super_key() 1348 alias: &str, in get_or_create_key_with() 1371 .query(params![KeyType::Super, domain.0, namespace, alias, KeyLifeCycle::Live]) in get_or_create_key_with() 1401 alias, in get_or_create_key_with() 2005 for (alias, domain) in rows { in get_attestation_pool_status() 2006 match (alias, domain) { in get_attestation_pool_status() 2113 alias: &str, in rebind_alias() [all …]
|
D | audit_log.rs | 63 ctx.append_str(key.alias.as_ref().map_or("none", String::as_str)).append_i32(owner) in log_key_integrity_violation() 71 .append_str(key.alias.as_ref().map_or("none", String::as_str)) in log_key_event()
|
D | security_level.rs | 472 if key.domain != Domain::BLOB && key.alias.is_none() { in generate_key() 482 alias: key.alias.clone(), in generate_key() 589 if key.domain != Domain::BLOB && key.alias.is_none() { in import_key() 599 alias: key.alias.clone(), in import_key() 650 KeyDescriptor { domain: Domain::APP, blob: Some(ref blob), alias: Some(_), .. } in import_wrapped_key() 652 domain: Domain::SELINUX, blob: Some(ref blob), alias: Some(_), .. in import_wrapped_key() 678 alias: key.alias.clone(), in import_wrapped_key() 684 alias: key.alias.clone(), in import_wrapped_key()
|
D | raw_device.rs | 136 pub fn internal_descriptor(alias: String) -> KeyDescriptor { in internal_descriptor() 140 alias: Some(alias), in internal_descriptor()
|
D | service.rs | 226 let key = match (key.domain, &key.alias) { in update_subcomponent() 227 (Domain::APP, Some(ref alias)) => KeyDescriptor { in update_subcomponent() 230 alias: Some(alias.clone()), in update_subcomponent()
|
D | super_key.rs | 80 pub alias: &'static str, field 88 SuperKeyType { alias: "USER_SUPER_KEY", algorithm: SuperEncryptionAlgorithm::Aes256Gcm }; 93 alias: "USER_SCREEN_LOCK_BOUND_KEY", 100 alias: "USER_SCREEN_LOCK_BOUND_P521_KEY", 401 &USER_SUPER_KEY.alias, in unlock_user_key() 504 .key_exists(Domain::APP, user_id as u64 as i64, &USER_SUPER_KEY.alias, KeyType::Super) in super_key_exists_in_db_for_user() 526 let alias = &USER_SUPER_KEY; in check_and_unlock_super_key() localVariable 528 .with_try_migrate_super_key(user_id, pw, || db.load_super_key(alias, user_id)) in check_and_unlock_super_key() 534 .populate_cache_from_super_key_blob(user_id, alias.algorithm, entry, pw) in check_and_unlock_super_key()
|
D | permission.rs | 704 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app() 725 alias: None, in check_grant_permission_selinux() 741 let key = KeyDescriptor { domain: Domain::GRANT, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_grant() 766 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_app() 853 alias: None, in check_key_permission_domain_selinux() 907 alias: None, in check_key_permission_domain_blob() 921 let key = KeyDescriptor { domain: Domain::KEY_ID, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_key_id()
|
/system/core/init/ |
D | selabel.cpp | 64 for (const auto& alias : aliases) { in SelabelLookupFileContextBestMatch() local 65 c_aliases.emplace_back(alias.c_str()); in SelabelLookupFileContextBestMatch()
|
/system/security/keystore-engine/ |
D | keystore2_engine.cpp | 345 std::string alias = key_id; in EVP_PKEY_from_keystore2() local 346 if (android::base::StartsWith(alias, "USRPKEY_")) { in EVP_PKEY_from_keystore2() 348 alias = alias.substr(8); in EVP_PKEY_from_keystore2() 354 .alias = alias, in EVP_PKEY_from_keystore2() 360 if (alias.find(keystore2_grant_id_prefix) == 0) { in EVP_PKEY_from_keystore2() 361 std::stringstream s(alias.substr(keystore2_grant_id_prefix.size())); in EVP_PKEY_from_keystore2() 364 descriptor.alias = std::nullopt; in EVP_PKEY_from_keystore2()
|
/system/hardware/interfaces/wifi/keystore/1.0/default/test/ |
D | WifiLegacyKeystoreIntegrationTest.cpp | 148 static bool LegacyKeystoreRemove(const std::string& alias, in LegacyKeystoreRemove() argument 158 auto rc = legacyKeystore->remove(alias, uid); in LegacyKeystoreRemove() 166 static bool LegacyKeystorePut(const std::string& alias, const std::vector<uint8_t>& blob, in LegacyKeystorePut() argument 176 auto rc = legacyKeystore->put(alias, uid, blob); in LegacyKeystorePut() 182 const std::string& alias, int uid = lks::ILegacyKeystore::UID_SELF) { in LegacyKeystoreGet() argument 192 auto rc = legacyKeystore->get(alias, uid, &*blob); in LegacyKeystoreGet()
|
/system/vold/ |
D | Keymaster.cpp | 133 .alias = std::nullopt, in generateKey() 157 .alias = std::nullopt, in exportKey() 181 .alias = std::nullopt, in deleteKey() 195 .alias = std::nullopt, in begin()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | KeyDescriptor.aidl | 40 @nullable String alias;
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | KeyDescriptor.aidl | 40 @nullable String alias;
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | KeyDescriptor.aidl | 60 @nullable String alias;
|
/system/hardware/interfaces/wifi/keystore/1.0/vts/functional/ |
D | VtsHalWifiKeystoreV1_0TargetTest.cpp | 88 ks2::KeyDescriptor keyDescriptor(const std::string& alias, bool useWifiNamespace) { in keyDescriptor() argument 93 .alias = alias, in keyDescriptor() 100 .alias = alias, in keyDescriptor()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | file.te | 18 typealias app_exec_data_file alias rs_data_file;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | file.te | 18 typealias app_exec_data_file alias rs_data_file;
|
/system/core/libmodprobe/ |
D | libmodprobe.cpp | 105 const std::string& alias = *it++; in ParseAliasCallback() local 107 this->module_aliases_.emplace_back(alias, module_name); in ParseAliasCallback() 408 for (const auto& [alias, aliased_module] : module_aliases_) { in LoadWithAliases() 409 if (fnmatch(alias.c_str(), module_name.c_str(), 0) != 0) continue; in LoadWithAliases()
|