/system/tools/hidl/ |
D | generateCppImpl.cpp | 95 const std::string nspace = getImplNamespace(mPackage); in generateCppImplHeader() local 96 out << "namespace " << nspace << " {\n\n"; in generateCppImplHeader() 132 out << "} // namespace " << nspace << "\n"; in generateCppImplHeader() 147 const std::string nspace = getImplNamespace(mPackage); in generateCppImplSource() local 148 out << "namespace " << nspace << " {\n\n"; in generateCppImplSource() 164 out << "} // namespace " << nspace << "\n"; in generateCppImplSource()
|
/system/security/keystore2/src/ |
D | audit_log.rs | 33 fn key_owner(domain: Domain, nspace: i64, uid: i32) -> i32 { in key_owner() 36 Domain::SELINUX => (nspace | FLAG_NAMESPACE) as i32, in key_owner() 62 let owner = key_owner(key.domain, key.nspace, key.nspace as i32); in log_key_integrity_violation() 69 let owner = key_owner(key.domain, key.nspace, calling_app as i32); in log_key_event()
|
D | maintenance.rs | 124 fn clear_namespace(&self, domain: Domain, nspace: i64) -> Result<()> { in clear_namespace() 129 .bulk_delete_uid(domain, nspace) in clear_namespace() 131 DB.with(|db| db.borrow_mut().unbind_keys_for_namespace(domain, nspace)) in clear_namespace() 134 .delete_namespace(domain, nspace) in clear_namespace() 284 fn clearNamespace(&self, domain: Domain, nspace: i64) -> BinderResult<()> { in clearNamespace() 286 map_or_log_err(self.clear_namespace(domain, nspace), Ok) in clearNamespace()
|
D | service.rs | 163 nspace: key_id_guard.id(), in get_key_entry() 229 nspace: ThreadState::get_calling_uid() as i64, in update_subcomponent() 260 nspace: ThreadState::get_calling_uid() as u64 as i64, in list_entries() 263 Domain::SELINUX => KeyDescriptor{domain, nspace: namespace, ..Default::default()}, in list_entries() 282 k.nspace = namespace; in list_entries() 292 .list_uid(k.domain, k.nspace) in list_entries() 299 db.list(k.domain, k.nspace, KeyType::Client) in list_entries()
|
D | database.rs | 1238 nspace: i64, in key_exists() 1246 KeyDescriptor { domain, nspace, alias: Some(alias.to_string()), blob: None }; in key_exists() 1319 nspace: user_id as i64, in load_super_key() 2172 Domain::APP => KeyDescriptor { nspace: caller_uid as i64, ..(*destination).clone() }, in migrate_key_namespace() 2196 params![alias, destination.domain.0, destination.nspace], in migrate_key_namespace() 2212 params![alias, destination.domain.0, destination.nspace, key_id_guard.id()], in migrate_key_namespace() 2244 KeyDescriptor { alias: Some(alias), domain: Domain::APP, nspace, blob: None } in store_new_key() 2245 | KeyDescriptor { alias: Some(alias), domain: Domain::SELINUX, nspace, blob: None } => { in store_new_key() 2246 (alias, key.domain, nspace) in store_new_key() 2302 KeyDescriptor { alias: Some(alias), domain: Domain::APP, nspace, blob: None } in store_new_certificate() [all …]
|
D | legacy_migrator.rs | 211 nspace: namespace, in list_uid() 310 KeyDescriptor { domain: Domain::SELINUX, nspace, alias: Some(_), .. } => { in with_try_migrate() 311 match *nspace { in with_try_migrate() 315 .context(format!("No legacy keys for namespace {}", nspace)) in with_try_migrate() 372 pub fn bulk_delete_uid(&self, domain: Domain, nspace: i64) -> Result<()> { in bulk_delete_uid() 375 let uid = match (domain, nspace) { in bulk_delete_uid() 376 (Domain::APP, nspace) => nspace as u32, in bulk_delete_uid() 448 key.nspace = uid as i64; in check_and_migrate()
|
D | permission.rs | 460 Domain::SELINUX => lookup_keystore2_key_context(key.nspace) in check_grant_permission() 527 if caller_uid as i64 != key.nspace { in check_key_permission() 533 Domain::SELINUX => lookup_keystore2_key_context(key.nspace) in check_key_permission() 556 let tctx = lookup_keystore2_key_context(key.nspace) in check_key_permission() 704 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app() 724 nspace: namespace as i64, in check_grant_permission_selinux() 741 let key = KeyDescriptor { domain: Domain::GRANT, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_grant() 766 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_app() 852 nspace: namespace as i64, in check_key_permission_domain_selinux() 906 nspace: namespace as i64, in check_key_permission_domain_blob() [all …]
|
D | security_level.rs | 189 nspace: key_id.id(), in store_new_key() 481 nspace: caller_uid as i64, in generate_key() 598 nspace: caller_uid as i64, in import_key() 677 nspace: caller_uid as i64, in import_wrapped_key() 683 nspace: key.nspace, in import_wrapped_key()
|
D | raw_device.rs | 139 nspace: AID_KEYSTORE as i64, in internal_descriptor()
|
/system/vold/ |
D | Keymaster.cpp | 134 .nspace = VOLD_NAMESPACE, in generateKey() 158 .nspace = VOLD_NAMESPACE, in exportKey() 182 .nspace = VOLD_NAMESPACE, in deleteKey() 196 .nspace = VOLD_NAMESPACE, in begin()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | KeyDescriptor.aidl | 39 long nspace;
|
D | IKeystoreService.aidl | 41 …m.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in long nspace); in listEntries() argument
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | KeyDescriptor.aidl | 39 long nspace;
|
D | IKeystoreService.aidl | 41 …m.keystore2.KeyDescriptor[] listEntries(in android.system.keystore2.Domain domain, in long nspace); in listEntries() argument
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | KeyDescriptor.aidl | 56 long nspace; /* namespace is a keyword in C++, so we had a to pick a different field name. */
|
D | IKeystoreService.aidl | 134 KeyDescriptor[] listEntries(in Domain domain, in long nspace); in listEntries() argument
|
/system/security/keystore2/aidl/android/security/maintenance/ |
D | IKeystoreMaintenance.aidl | 77 void clearNamespace(Domain domain, long nspace); in clearNamespace() argument
|
/system/hardware/interfaces/wifi/keystore/1.0/default/ |
D | keystore.cpp | 48 .nspace = static_cast<int64_t>(tmp), in mkKeyDescriptor() 55 .nspace = KS2_NAMESPACE_WIFI, in mkKeyDescriptor() 134 descriptor.nspace = static_cast<int64_t>(tmp); in keyStore2GetCert()
|
/system/security/keystore-engine/ |
D | keystore2_engine.cpp | 353 .nspace = getNamespaceforCurrentUid(), in EVP_PKEY_from_keystore2() 362 s >> std::hex >> reinterpret_cast<uint64_t&>(descriptor.nspace); in EVP_PKEY_from_keystore2()
|
/system/hardware/interfaces/wifi/keystore/1.0/vts/functional/ |
D | VtsHalWifiKeystoreV1_0TargetTest.cpp | 92 .nspace = 102, // Namespace Wifi in keyDescriptor() 99 .nspace = -1, // ignored - should be -1. in keyDescriptor()
|
/system/security/ondevice-signing/ |
D | KeystoreHmacKey.cpp | 62 descriptor.nspace = 101; // odsign_key in getHmacKeyDescriptor()
|
D | KeystoreKey.cpp | 65 descriptor.nspace = 101; // odsign_key in getKeyDescriptor()
|
/system/security/keystore/ |
D | keystore_cli_v2.cpp | 73 .nspace = -1, // ignored - should be -1. in keyDescriptor() 548 .nspace = -1, in TestKey()
|