/system/nfc/src/nfc/tags/ |
D | rw_mfc.cc | 237 p_mfc->next_block.auth = true; in rw_mfc_handle_format_rsp() 238 p_mfc->last_block_accessed.auth = true; in rw_mfc_handle_format_rsp() 248 p_mfc->next_block.auth = false; in rw_mfc_handle_format_rsp() 249 p_mfc->last_block_accessed.auth = false; in rw_mfc_handle_format_rsp() 440 p_mfc->next_block.auth = true; in rw_mfc_handle_write_rsp() 441 p_mfc->last_block_accessed.auth = true; in rw_mfc_handle_write_rsp() 451 p_mfc->next_block.auth = false; in rw_mfc_handle_write_rsp() 452 p_mfc->last_block_accessed.auth = false; in rw_mfc_handle_write_rsp() 567 p_mfc->last_block_accessed.auth = false; in rw_mfc_select() 569 p_mfc->next_block.auth = false; in rw_mfc_select() [all …]
|
/system/security/ondevice-signing/ |
D | KeystoreHmacKey.cpp | 99 KeyParameter auth; in createKey() local 100 auth.tag = Tag::NO_AUTH_REQUIRED; in createKey() 101 auth.value = KeyParameterValue::make<KeyParameterValue::boolValue>(true); in createKey() 102 params.push_back(auth); in createKey() 131 for (const auto& auth : keyEntryResponse.metadata.authorizations) { in initialize() local 132 if (auth.keyParameter.tag == Tag::MAX_BOOT_LEVEL) { in initialize() 133 if (auth.keyParameter.value.get<KeyParameterValue::integer>() == mKeyBootLevel) { in initialize()
|
D | KeystoreKey.cpp | 106 KeyParameter auth; in createKey() local 107 auth.tag = Tag::NO_AUTH_REQUIRED; in createKey() 108 auth.value = KeyParameterValue::make<KeyParameterValue::boolValue>(true); in createKey() 109 params.push_back(auth); in createKey() 204 for (const auto& auth : keyEntryResponse.metadata.authorizations) { in verifyExistingKey() local 205 if (auth.keyParameter.tag == Tag::MAX_BOOT_LEVEL) { in verifyExistingKey() 206 if (auth.keyParameter.value.get<KeyParameterValue::integer>() == mKeyBootLevel) { in verifyExistingKey()
|
/system/vold/ |
D | KeyStorage.h | 56 const KeyAuthentication& auth, const KeyBuffer& key); 59 bool retrieveKey(const std::string& dir, const KeyAuthentication& auth, KeyBuffer* key);
|
D | KeyStorage.cpp | 411 static std::string generateAppId(const KeyAuthentication& auth, in generateAppId() argument 413 std::string appId = secdiscardable_hash + auth.secret; in generateAppId() 544 static bool storeKey(const std::string& dir, const KeyAuthentication& auth, const KeyBuffer& key) { in storeKey() argument 551 if (auth.usesKeystore() && in storeKey() 554 std::string appId = generateAppId(auth, secdiscardable_hash); in storeKey() 556 if (auth.usesKeystore()) { in storeKey() 579 const KeyAuthentication& auth, const KeyBuffer& key) { in storeKeyAtomically() argument 588 if (!storeKey(tmp_path, auth, key)) return false; in storeKeyAtomically() 597 bool retrieveKey(const std::string& dir, const KeyAuthentication& auth, KeyBuffer* key) { in retrieveKey() argument 606 std::string appId = generateAppId(auth, secdiscardable_hash); in retrieveKey() [all …]
|
D | FsCrypt.cpp | 219 const android::vold::KeyAuthentication& auth, in read_and_fixate_user_ce_key() argument 225 if (retrieveKey(ce_key_path, auth, ce_key)) { in read_and_fixate_user_ce_key() 710 android::vold::KeyAuthentication auth(secdiscardable_hash); in read_or_create_volkey() local 715 if (!retrieveOrGenerateKey(key_path, key_path + "_tmp", auth, makeGen(options), &key)) in read_or_create_volkey() 736 auto auth = authentication_from_secret(secret); in fscrypt_set_ce_key_protection() local 737 if (auth.secret.empty()) { in fscrypt_set_ce_key_protection() 765 if (read_and_fixate_user_ce_key(user_id, auth, &ce_key)) { in fscrypt_set_ce_key_protection() 791 if (!android::vold::storeKeyAtomically(ce_key_path, user_key_temp, auth, ce_key)) return false; in fscrypt_set_ce_key_protection() 841 auto auth = authentication_from_secret(secret); in fscrypt_unlock_ce_storage() local 843 if (!read_and_fixate_user_ce_key(user_id, auth, &ce_key)) return false; in fscrypt_unlock_ce_storage()
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 402 authorizations.iter().any(|auth| &auth.keyParameter == key_param) in check_key_param() 412 authorizations.iter().all(|auth| { in check_key_authorizations() 415 if !has_default_keymint() && auth.keyParameter.tag == Tag::INVALID { in check_key_authorizations() 419 ALLOWED_TAGS_IN_KEY_AUTHS.contains(&auth.keyParameter.tag), in check_key_authorizations() 421 auth.keyParameter in check_key_authorizations() 431 && !authorizations.iter().any(|auth| auth.keyParameter.tag == key_param.tag) in check_key_authorizations() 511 .map(|auth| &auth.keyParameter) in check_common_auths() 519 authorizations.iter().filter(|auth| auth.keyParameter.tag == tag).collect(); in get_key_auth()
|
/system/sepolicy/prebuilts/api/202404/public/ |
D | fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 23 # Need to add auth tokens to KeyStore
|
/system/sepolicy/private/ |
D | fingerprintd.te | 19 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 27 # Need to add auth tokens to KeyStore
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 23 # Need to add auth tokens to KeyStore
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 23 # Need to add auth tokens to KeyStore
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 23 # Need to add auth tokens to KeyStore
|
/system/sepolicy/prebuilts/api/34.0/public/ |
D | fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 23 # Need to add auth tokens to KeyStore
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 23 # Need to add auth tokens to KeyStore
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | fingerprintd.te | 18 # Need to add auth tokens to KeyStore
|
D | gatekeeperd.te | 23 # Need to add auth tokens to KeyStore
|
/system/keymint/tests/ |
D | Android.bp | 66 srcs: ["src/bin/auth-keyblob-parse.rs"],
|
/system/netd/server/ |
D | XfrmController.cpp | 562 saInfo.auth = XfrmAlgo{ in ipSecAddSecurityAssociation() 943 nlattr_algo_auth auth{}; in updateSecurityAssociation() local 979 {&auth, 0}, // adjust size if auth algo is present in updateSecurityAssociation() 995 if (!record.aead.name.empty() && (!record.auth.name.empty() || !record.crypt.name.empty())) { in updateSecurityAssociation() 1001 if (record.aead.key.size() > MAX_KEY_LENGTH || record.auth.key.size() > MAX_KEY_LENGTH || in updateSecurityAssociation() 1022 len = iov[AUTH].iov_len = fillNlAttrXfrmAlgoAuth(record.auth, &auth); in updateSecurityAssociation() 1068 strncpy(algo->auth.alg_name, inAlgo.name.c_str(), sizeof(algo->auth.alg_name)); in fillNlAttrXfrmAlgoAuth() 1069 algo->auth.alg_key_len = inAlgo.key.size() * 8; // bits in fillNlAttrXfrmAlgoAuth() 1072 algo->auth.alg_trunc_len = inAlgo.truncLenBits; in fillNlAttrXfrmAlgoAuth()
|