HomeSort by relevance Sort by last modified time
    Searched refs:key_info (Results 1 - 13 of 13) sorted by null

  /system/security/keystore/
auth_token_table.cpp 71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info,
74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1;
78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info,
81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1;
85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info,
89 if (!KeyRequiresAuthentication(key_info, purpose))
93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type);
96 ExtractSids(key_info, &key_sids)
    [all...]
auth_token_table.h 65 * a key with the characteristics specified in \p key_info.
67 * This method is O(n * m), where n is the number of KM_TAG_USER_SECURE_ID entries in key_info
73 Error FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose,
78 * a key with the characteristics specified in \p key_info.
80 * This method is O(n * m), where n is the number of KM_TAG_USER_SECURE_ID entries in key_info
151 const AuthorizationSet& key_info, const hw_auth_token_t** found);
152 void ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids);
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 44 struct wpa_eapol_key *key, u16 key_info, u16 ver,
48 u16 key_info, u16 ver);
64 struct wpa_eapol_key *key, u16 key_info, u16 ver,
72 u16 key_info, u16 ver)
wpa.c 94 int key_info, ver; local
125 key_info = WPA_KEY_INFO_REQUEST | ver;
127 key_info |= WPA_KEY_INFO_MIC;
129 key_info |= WPA_KEY_INFO_ERROR;
131 key_info |= WPA_KEY_INFO_KEY_TYPE;
132 WPA_PUT_BE16(reply->key_info, key_info);
142 if (!(key_info & WPA_KEY_INFO_MIC))
377 WPA_PUT_BE16(reply->key_info,
748 int key_info)
1130 u16 key_info, keylen; local
1436 u16 key_info; local
1637 u16 key_info = WPA_GET_BE16(key->key_info); local
1691 u16 key_info, ver; local
    [all...]
peerkey.c 72 u16 key_info; local
86 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
89 WPA_PUT_BE16(err->key_info, key_info);
134 u16 key_info; local
149 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
151 WPA_PUT_BE16(reply->key_info, key_info);
329 u16 key_info, ver; local
346 key_info = ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_ACK
386 u16 key_info, ver; local
985 int key_info, ver; local
    [all...]
wpa_i.h 362 u16 ver, u16 key_info,
  /system/security/keystore/tests/
auth_token_table_test.cpp 275 auto key_info = make_set(1, 5 /* five second timeout */); local
278 // sixth request should fail, since key_info says the key is good for five seconds.
284 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
285 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
286 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
287 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
288 EXPECT_EQ(AuthTokenTable::OK, table.FindAuthorization(key_info, 0 /* no op handle */, &found));
290 table.FindAuthorization(key_info, 0 /* no op handle */, &found));
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c 876 u16 key_info, key_data_length; local
897 key_info = WPA_GET_BE16(key->key_info);
906 " key_info=0x%x type=%u key_data_length=%u",
907 MAC2STR(sm->addr), key_info, key->type, key_data_length);
948 if ((key_info & (WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_REQUEST)) ==
950 if (key_info & WPA_KEY_INFO_ERROR) {
957 } else if (key_info & WPA_KEY_INFO_SMK_MESSAGE) {
960 } else if (key_info & WPA_KEY_INFO_REQUEST) {
963 } else if (!(key_info & WPA_KEY_INFO_KEY_TYPE))
1638 u16 key_info; local
    [all...]
wpa_auth_i.h 220 struct wpa_state_machine *sm, int key_info,
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 107 unsigned short key_info; /* Key Information (unaligned) */ member in struct:__anon23454
121 /* WPA/802.11i/WPA2 KEY KEY_INFO bits */
135 /* WPA-only KEY KEY_INFO bits */
143 /* 802.11i/WPA2-only KEY KEY_INFO bits */
802.11.h 1981 uint16 key_info; member in struct:dot11_wnm_sleep_subelem_gtk
3337 uint16 key_info; member in struct:dot11_gtk_ie
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 172 /* Note: key_info, key_length, and key_data_length are unaligned */
173 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key
187 /* Note: key_info, key_length, and key_data_length are unaligned */
188 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key_192
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 710 u16 key_info; local
743 key_info = WPA_GET_BE16(key->key_info);
745 return !!(key_info & WPA_KEY_INFO_ACK);

Completed in 1034 milliseconds