Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 36) sorted by relevance

12

/system/nfc/src/nfc/tags/
Drw_mfc.cc237 p_mfc->next_block.auth = true; in rw_mfc_handle_format_rsp()
238 p_mfc->last_block_accessed.auth = true; in rw_mfc_handle_format_rsp()
248 p_mfc->next_block.auth = false; in rw_mfc_handle_format_rsp()
249 p_mfc->last_block_accessed.auth = false; in rw_mfc_handle_format_rsp()
440 p_mfc->next_block.auth = true; in rw_mfc_handle_write_rsp()
441 p_mfc->last_block_accessed.auth = true; in rw_mfc_handle_write_rsp()
451 p_mfc->next_block.auth = false; in rw_mfc_handle_write_rsp()
452 p_mfc->last_block_accessed.auth = false; in rw_mfc_handle_write_rsp()
567 p_mfc->last_block_accessed.auth = false; in rw_mfc_select()
569 p_mfc->next_block.auth = false; in rw_mfc_select()
[all …]
/system/security/ondevice-signing/
DKeystoreHmacKey.cpp99 KeyParameter auth; in createKey() local
100 auth.tag = Tag::NO_AUTH_REQUIRED; in createKey()
101 auth.value = KeyParameterValue::make<KeyParameterValue::boolValue>(true); in createKey()
102 params.push_back(auth); in createKey()
131 for (const auto& auth : keyEntryResponse.metadata.authorizations) { in initialize() local
132 if (auth.keyParameter.tag == Tag::MAX_BOOT_LEVEL) { in initialize()
133 if (auth.keyParameter.value.get<KeyParameterValue::integer>() == mKeyBootLevel) { in initialize()
DKeystoreKey.cpp106 KeyParameter auth; in createKey() local
107 auth.tag = Tag::NO_AUTH_REQUIRED; in createKey()
108 auth.value = KeyParameterValue::make<KeyParameterValue::boolValue>(true); in createKey()
109 params.push_back(auth); in createKey()
204 for (const auto& auth : keyEntryResponse.metadata.authorizations) { in verifyExistingKey() local
205 if (auth.keyParameter.tag == Tag::MAX_BOOT_LEVEL) { in verifyExistingKey()
206 if (auth.keyParameter.value.get<KeyParameterValue::integer>() == mKeyBootLevel) { in verifyExistingKey()
/system/vold/
DKeyStorage.h56 const KeyAuthentication& auth, const KeyBuffer& key);
59 bool retrieveKey(const std::string& dir, const KeyAuthentication& auth, KeyBuffer* key);
DKeyStorage.cpp411 static std::string generateAppId(const KeyAuthentication& auth, in generateAppId() argument
413 std::string appId = secdiscardable_hash + auth.secret; in generateAppId()
544 static bool storeKey(const std::string& dir, const KeyAuthentication& auth, const KeyBuffer& key) { in storeKey() argument
551 if (auth.usesKeystore() && in storeKey()
554 std::string appId = generateAppId(auth, secdiscardable_hash); in storeKey()
556 if (auth.usesKeystore()) { in storeKey()
579 const KeyAuthentication& auth, const KeyBuffer& key) { in storeKeyAtomically() argument
588 if (!storeKey(tmp_path, auth, key)) return false; in storeKeyAtomically()
597 bool retrieveKey(const std::string& dir, const KeyAuthentication& auth, KeyBuffer* key) { in retrieveKey() argument
606 std::string appId = generateAppId(auth, secdiscardable_hash); in retrieveKey()
[all …]
DFsCrypt.cpp219 const android::vold::KeyAuthentication& auth, in read_and_fixate_user_ce_key() argument
225 if (retrieveKey(ce_key_path, auth, ce_key)) { in read_and_fixate_user_ce_key()
710 android::vold::KeyAuthentication auth(secdiscardable_hash); in read_or_create_volkey() local
715 if (!retrieveOrGenerateKey(key_path, key_path + "_tmp", auth, makeGen(options), &key)) in read_or_create_volkey()
736 auto auth = authentication_from_secret(secret); in fscrypt_set_ce_key_protection() local
737 if (auth.secret.empty()) { in fscrypt_set_ce_key_protection()
765 if (read_and_fixate_user_ce_key(user_id, auth, &ce_key)) { in fscrypt_set_ce_key_protection()
791 if (!android::vold::storeKeyAtomically(ce_key_path, user_key_temp, auth, ce_key)) return false; in fscrypt_set_ce_key_protection()
841 auto auth = authentication_from_secret(secret); in fscrypt_unlock_ce_storage() local
843 if (!read_and_fixate_user_ce_key(user_id, auth, &ce_key)) return false; in fscrypt_unlock_ce_storage()
/system/security/keystore2/test_utils/
Dkey_generations.rs402 authorizations.iter().any(|auth| &auth.keyParameter == key_param) in check_key_param()
412 authorizations.iter().all(|auth| { in check_key_authorizations()
415 if !has_default_keymint() && auth.keyParameter.tag == Tag::INVALID { in check_key_authorizations()
419 ALLOWED_TAGS_IN_KEY_AUTHS.contains(&auth.keyParameter.tag), in check_key_authorizations()
421 auth.keyParameter in check_key_authorizations()
431 && !authorizations.iter().any(|auth| auth.keyParameter.tag == key_param.tag) in check_key_authorizations()
511 .map(|auth| &auth.keyParameter) in check_common_auths()
519 authorizations.iter().filter(|auth| auth.keyParameter.tag == tag).collect(); in get_key_auth()
/system/sepolicy/prebuilts/api/202404/public/
Dfingerprintd.te18 # Need to add auth tokens to KeyStore
Dgatekeeperd.te23 # Need to add auth tokens to KeyStore
/system/sepolicy/private/
Dfingerprintd.te19 # Need to add auth tokens to KeyStore
Dgatekeeperd.te27 # Need to add auth tokens to KeyStore
/system/sepolicy/prebuilts/api/30.0/public/
Dfingerprintd.te18 # Need to add auth tokens to KeyStore
Dgatekeeperd.te23 # Need to add auth tokens to KeyStore
/system/sepolicy/prebuilts/api/29.0/public/
Dfingerprintd.te18 # Need to add auth tokens to KeyStore
Dgatekeeperd.te23 # Need to add auth tokens to KeyStore
/system/sepolicy/prebuilts/api/33.0/public/
Dfingerprintd.te18 # Need to add auth tokens to KeyStore
Dgatekeeperd.te23 # Need to add auth tokens to KeyStore
/system/sepolicy/prebuilts/api/34.0/public/
Dfingerprintd.te18 # Need to add auth tokens to KeyStore
Dgatekeeperd.te23 # Need to add auth tokens to KeyStore
/system/sepolicy/prebuilts/api/32.0/public/
Dfingerprintd.te18 # Need to add auth tokens to KeyStore
Dgatekeeperd.te23 # Need to add auth tokens to KeyStore
/system/sepolicy/prebuilts/api/31.0/public/
Dfingerprintd.te18 # Need to add auth tokens to KeyStore
Dgatekeeperd.te23 # Need to add auth tokens to KeyStore
/system/keymint/tests/
DAndroid.bp66 srcs: ["src/bin/auth-keyblob-parse.rs"],
/system/netd/server/
DXfrmController.cpp562 saInfo.auth = XfrmAlgo{ in ipSecAddSecurityAssociation()
943 nlattr_algo_auth auth{}; in updateSecurityAssociation() local
979 {&auth, 0}, // adjust size if auth algo is present in updateSecurityAssociation()
995 if (!record.aead.name.empty() && (!record.auth.name.empty() || !record.crypt.name.empty())) { in updateSecurityAssociation()
1001 if (record.aead.key.size() > MAX_KEY_LENGTH || record.auth.key.size() > MAX_KEY_LENGTH || in updateSecurityAssociation()
1022 len = iov[AUTH].iov_len = fillNlAttrXfrmAlgoAuth(record.auth, &auth); in updateSecurityAssociation()
1068 strncpy(algo->auth.alg_name, inAlgo.name.c_str(), sizeof(algo->auth.alg_name)); in fillNlAttrXfrmAlgoAuth()
1069 algo->auth.alg_key_len = inAlgo.key.size() * 8; // bits in fillNlAttrXfrmAlgoAuth()
1072 algo->auth.alg_trunc_len = inAlgo.truncLenBits; in fillNlAttrXfrmAlgoAuth()

12