/system/security/keystore2/tests/ |
D | keystore2_client_key_id_domain_tests.rs | 74 nspace: key_metadata.key.nspace, in keystore2_find_key_with_key_id_as_domain() 84 assert_eq!(key_metadata.key.nspace, key_entry_response.metadata.key.nspace); in keystore2_find_key_with_key_id_as_domain() 141 assert_ne!(key_metadata.key.nspace, new_key_metadata.key.nspace); in keystore2_key_id_alias_rebind_verify_by_alias() 198 nspace: key_metadata.key.nspace, in keystore2_key_id_alias_rebind_verify_by_key_id() 208 assert_eq!(key_metadata.key.nspace, key_entry_response.metadata.key.nspace); in keystore2_key_id_alias_rebind_verify_by_key_id() 226 assert_ne!(key_metadata.key.nspace, new_key_metadata.key.nspace); in keystore2_key_id_alias_rebind_verify_by_key_id()
|
D | keystore2_client_update_subcomponent_tests.rs | 72 nspace: key_generations::SELINUX_SHELL_NAMESPACE, in keystore2_update_subcomponent_fail() 94 nspace: -1, in keystore2_update_subcomponent_no_key_entry_cert_fail() 115 for (domain, nspace) in cert_entries { in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 118 &KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }, in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 127 nspace, in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 140 nspace, in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 193 granted_keys.push(granted_key.nspace); in keystore2_update_subcomponent_fails_permission_denied() 201 granted_keys.push(granted_key.nspace); in keystore2_update_subcomponent_fails_permission_denied() 224 nspace: granted_key1_nspace, in keystore2_update_subcomponent_fails_permission_denied() 255 nspace: granted_key2_nspace, in keystore2_update_subcomponent_fails_permission_denied() [all …]
|
D | keystore2_client_grant_key_tests.rs | 63 nspace: grant_key_nspace, in load_grant_key_and_perform_sign_operation() 130 grant_key.nspace in keystore2_grant_key_with_perm_none() 147 nspace: grant_key_nspace, in keystore2_grant_key_with_perm_none() 186 grant_key.nspace in keystore2_grant_get_info_use_key_perm() 206 nspace: grant_key_nspace, in keystore2_grant_get_info_use_key_perm() 233 nspace: grant_key_nspace, in keystore2_grant_get_info_use_key_perm() 289 nspace: grant_key_nspace, in keystore2_grant_delete_key_success() 306 nspace: -1, in keystore2_grant_delete_key_success() 369 nspace: grant_key_nspace, in keystore2_grant_key_fails_with_permission_denied() 398 nspace: grant_key_nspace, in keystore2_grant_key_fails_with_permission_denied() [all …]
|
D | keystore2_client_keystore_engine_tests.rs | 54 nspace: -1, in generate_rsa_key_and_grant_to_user() 89 nspace: -1, in generate_ec_key_and_grant_to_user() 138 Ok(grant_key.nspace) in generate_key_and_grant_to_user() 152 nspace: grant_key_nspace, in perform_crypto_op_using_granted_key() 276 nspace: -1, in keystore2_perofrm_crypto_op_using_keystore2_engine_pem_pub_key_success()
|
D | keystore2_client_import_keys_tests.rs | 48 nspace: i64, in import_rsa_sign_key_and_perform_sample_operation() 53 key_generations::import_rsa_2048_key(sec_level, domain, nspace, alias, import_params) in import_rsa_sign_key_and_perform_sample_operation() 217 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_fails_with_keysize_param_mismatch_error() 250 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_fails_with_public_exponent_param_mismatch_error() 284 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_rsa_import_key_with_multipurpose_fails_incompt_purpose_error() 358 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias: Some(alias), blob: None }, in keystore2_ec_import_key_fails_with_mismatch_curve_error() 627 nspace: -1, in keystore2_import_wrapped_key_fails_with_missing_wrapping_key() 633 nspace: -1, in keystore2_import_wrapped_key_fails_with_missing_wrapping_key()
|
/system/tools/hidl/ |
D | generateCppImpl.cpp | 95 const std::string nspace = getImplNamespace(mPackage); in generateCppImplHeader() local 96 out << "namespace " << nspace << " {\n\n"; in generateCppImplHeader() 132 out << "} // namespace " << nspace << "\n"; in generateCppImplHeader() 147 const std::string nspace = getImplNamespace(mPackage); in generateCppImplSource() local 148 out << "namespace " << nspace << " {\n\n"; in generateCppImplSource() 164 out << "} // namespace " << nspace << "\n"; in generateCppImplSource()
|
/system/security/keystore2/src/ |
D | audit_log.rs | 33 fn key_owner(domain: Domain, nspace: i64, uid: i32) -> i32 { in key_owner() 36 Domain::SELINUX => (nspace | FLAG_NAMESPACE) as i32, in key_owner() 61 let owner = key_owner(key.domain, key.nspace, key.nspace as i32); in log_key_integrity_violation() 70 let owner = key_owner(key.domain, key.nspace, calling_app as i32); in log_key_event()
|
D | database.rs | 1291 nspace: i64, in key_exists() 1299 KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }; in key_exists() 1372 nspace: user_id as i64, in load_super_key() 1683 Domain::APP => KeyDescriptor { nspace: caller_uid as i64, ..(*destination).clone() }, in migrate_key_namespace() 1706 params![alias, destination.domain.0, destination.nspace], in migrate_key_namespace() 1722 params![alias, destination.domain.0, destination.nspace, key_id_guard.id()], in migrate_key_namespace() 1754 KeyDescriptor { alias: Some(alias), domain: Domain::APP, nspace, blob: None } in store_new_key() 1755 | KeyDescriptor { alias: Some(alias), domain: Domain::SELINUX, nspace, blob: None } => { in store_new_key() 1756 (alias, key.domain, nspace) in store_new_key() 1833 KeyDescriptor { alias: Some(alias), domain: Domain::APP, nspace, blob: None } in store_new_certificate() [all …]
|
D | service.rs | 162 nspace: key_id_guard.id(), in get_key_entry() 231 nspace: ThreadState::get_calling_uid() as i64, in update_subcomponent() 266 nspace: ThreadState::get_calling_uid() as u64 as i64, in get_key_descriptor_for_lookup() 269 Domain::SELINUX => KeyDescriptor { domain, nspace: namespace, ..Default::default() }, in get_key_descriptor_for_lookup() 289 k.nspace = namespace; in get_key_descriptor_for_lookup() 301 DB.with(|db| list_key_entries(&mut db.borrow_mut(), k.domain, k.nspace, None)) in list_entries() 307 DB.with(|db| count_key_entries(&mut db.borrow_mut(), k.domain, k.nspace)) in count_num_entries() 317 DB.with(|db| list_key_entries(&mut db.borrow_mut(), k.domain, k.nspace, start_past_alias)) in list_entries_batched()
|
D | maintenance.rs | 159 fn clear_namespace(&self, domain: Domain, nspace: i64) -> Result<()> { in clear_namespace() 164 .bulk_delete_uid(domain, nspace) in clear_namespace() 166 DB.with(|db| db.borrow_mut().unbind_keys_for_namespace(domain, nspace)) in clear_namespace() 169 .delete_namespace(domain, nspace) in clear_namespace() 340 fn clearNamespace(&self, domain: Domain, nspace: i64) -> BinderResult<()> { in clearNamespace() 343 self.clear_namespace(domain, nspace).map_err(into_logged_binder) in clearNamespace()
|
D | permission.rs | 290 Domain::SELINUX => lookup_keystore2_key_context(key.nspace) in check_grant_permission() 354 if caller_uid as i64 != key.nspace { in check_key_permission() 360 Domain::SELINUX => lookup_keystore2_key_context(key.nspace) in check_key_permission() 384 let tctx = lookup_keystore2_key_context(key.nspace) in check_key_permission() 523 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app() 543 nspace: namespace as i64, in check_grant_permission_selinux() 560 let key = KeyDescriptor { domain: Domain::GRANT, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_grant() 585 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_app() 641 nspace: namespace as i64, in check_key_permission_domain_selinux() 673 nspace: namespace as i64, in check_key_permission_domain_blob() [all …]
|
D | legacy_importer.rs | 217 nspace: namespace, in list_uid() 317 KeyDescriptor { domain: Domain::SELINUX, nspace, alias: Some(_), .. } => { in with_try_import() 318 match *nspace { in with_try_import() 322 .context(format!("No legacy keys for namespace {}", nspace)) in with_try_import() 381 pub fn bulk_delete_uid(&self, domain: Domain, nspace: i64) -> Result<()> { in bulk_delete_uid() 384 let uid = match (domain, nspace) { in bulk_delete_uid() 385 (Domain::APP, nspace) => nspace as u32, in bulk_delete_uid() 603 key.nspace = uid as i64; in check_and_import()
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | IKeystoreService.aidl | 138 KeyDescriptor[] listEntries(in Domain domain, in long nspace); in listEntries() argument 217 int getNumberOfEntries(in Domain domain, in long nspace); in getNumberOfEntries() argument 246 KeyDescriptor[] listEntriesBatched(in Domain domain, in long nspace, in listEntriesBatched() argument
|
D | KeyDescriptor.aidl | 56 long nspace; /* namespace is a keyword in C++, so we had a to pick a different field name. */
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 537 nspace: i64, in generate_ec_p256_signing_key() 556 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_ec_p256_signing_key() 586 nspace: i64, in generate_ec_key() 600 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_ec_key() 626 nspace: i64, in generate_rsa_key() 657 &KeyDescriptor { domain, nspace, alias, blob: None }, in generate_rsa_key() 722 nspace: -1, in generate_sym_key() 761 nspace: -1, in generate_hmac_key() 847 nspace: -1, in generate_ec_attestation_key() 888 &KeyDescriptor { domain: Domain::APP, nspace: -1, alias, blob: None }, in generate_ec_256_attested_key() [all …]
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/3/android/system/keystore2/ |
D | IKeystoreService.aidl | 44 …m.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in long nspace); in listEntries() argument 48 int getNumberOfEntries(in android.system.keystore2.Domain domain, in long nspace); in getNumberOfEntries() argument 49 …[] listEntriesBatched(in android.system.keystore2.Domain domain, in long nspace, in @nullable Stri… in listEntriesBatched() argument
|
D | KeyDescriptor.aidl | 39 long nspace;
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/4/android/system/keystore2/ |
D | IKeystoreService.aidl | 44 …m.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in long nspace); in listEntries() argument 48 int getNumberOfEntries(in android.system.keystore2.Domain domain, in long nspace); in getNumberOfEntries() argument 49 …[] listEntriesBatched(in android.system.keystore2.Domain domain, in long nspace, in @nullable Stri… in listEntriesBatched() argument
|
D | KeyDescriptor.aidl | 39 long nspace;
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | IKeystoreService.aidl | 44 …m.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in long nspace); in listEntries() argument 48 int getNumberOfEntries(in android.system.keystore2.Domain domain, in long nspace); in getNumberOfEntries() argument 49 …[] listEntriesBatched(in android.system.keystore2.Domain domain, in long nspace, in @nullable Stri… in listEntriesBatched() argument
|
D | KeyDescriptor.aidl | 39 long nspace;
|
/system/vold/ |
D | Keystore.cpp | 134 .nspace = VOLD_NAMESPACE, in generateKey() 158 .nspace = VOLD_NAMESPACE, in exportKey() 188 .nspace = VOLD_NAMESPACE, in deleteKey() 202 .nspace = VOLD_NAMESPACE, in begin()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | KeyDescriptor.aidl | 39 long nspace;
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/2/android/system/keystore2/ |
D | KeyDescriptor.aidl | 39 long nspace;
|
/system/security/keystore2/aidl/android/security/maintenance/ |
D | IKeystoreMaintenance.aidl | 102 void clearNamespace(Domain domain, long nspace); in clearNamespace() argument
|