/system/keymaster/ |
asymmetric_key.cpp | 47 ASN1_BIT_STRING_Ptr key_usage(ASN1_BIT_STRING_new()); 50 if (!ASN1_BIT_STRING_set_bit(key_usage.get(), i, 0)) { 59 if (!ASN1_BIT_STRING_set_bit(key_usage.get(), kDigitalSignatureKeyUsageBit, 1)) { 68 if (!ASN1_BIT_STRING_set_bit(key_usage.get(), kKeyEnciphermentKeyUsageBit, 1) || 69 !ASN1_BIT_STRING_set_bit(key_usage.get(), kDataEnciphermentKeyUsageBit, 1)) { 75 int len = i2d_ASN1_BIT_STRING(key_usage.get(), nullptr); 84 len = i2d_ASN1_BIT_STRING(key_usage.get(), &p);
|
/external/libchrome/crypto/ |
nss_key_util.cc | 108 const unsigned int key_usage = local 113 permanent /* sensitive */, key_usage, &key_raw, nullptr);
|
/system/tpm/attestation/common/ |
tpm_utility.h | 50 // correspond to |key_type| and |key_usage|. The parent key will be the 58 KeyUsage key_usage,
|
interface.proto | 38 optional KeyUsage key_usage = 3; 70 optional KeyUsage key_usage = 3; 131 optional KeyUsage key_usage = 4;
|
database.proto | 88 optional KeyUsage key_usage = 12;
|
tpm_utility_v1.h | 49 KeyUsage key_usage,
|
print_interface_proto.cc | 87 output += indent + " key_usage: "; 89 GetProtoDebugStringWithIndent(value.key_usage(), 195 output += indent + " key_usage: "; 197 GetProtoDebugStringWithIndent(value.key_usage(), 464 output += indent + " key_usage: "; 466 GetProtoDebugStringWithIndent(value.key_usage(),
|
tpm_utility_v1.cc | 171 KeyUsage key_usage, 199 UINT32 tss_key_type = (key_usage == KEY_USAGE_SIGN) ? TSS_KEY_TYPE_SIGNING : 213 if (key_usage == KEY_USAGE_SIGN) {
|
/system/tpm/attestation/server/ |
mock_key_store.h | 47 KeyUsage key_usage,
|
dbus_service_test.cc | 90 EXPECT_EQ(KEY_USAGE_SIGN, request.key_usage()); 163 EXPECT_EQ(KEY_USAGE_SIGN, reply.key_usage()); 276 EXPECT_EQ(KEY_USAGE_SIGN, request.key_usage());
|
key_store.h | 66 KeyUsage key_usage,
|
attestation_service.cc | 133 request.key_usage(), &key)) { 207 result->set_key_usage(key.key_usage()); 396 request.key_usage(), &key)) { 501 key.key_type(), key.key_usage(), key.key_blob(), 732 KeyUsage key_usage, 747 key_usage,
|
attestation_service.h | 228 // |key_label|, |key_type|, and |key_usage|. Returns true on success. 232 KeyUsage key_usage,
|
pkcs11_key_store.h | 64 KeyUsage key_usage,
|
pkcs11_key_store.cc | 241 KeyUsage key_usage, 289 CK_BBOOL sign_usage = (key_usage == KEY_USAGE_SIGN); 290 CK_BBOOL decrypt_usage = (key_usage == KEY_USAGE_DECRYPT);
|
attestation_service_test.cc | 470 EXPECT_EQ(KEY_USAGE_SIGN, reply.key_usage()); 501 EXPECT_EQ(KEY_USAGE_SIGN, reply.key_usage()); [all...] |
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 83 unsigned long key_usage; member in struct:x509_certificate
|
x509v3.c | 761 cert->key_usage = asn1_bit_string_to_long(hdr.payload, hdr.length); 763 wpa_printf(MSG_DEBUG, "X509: KeyUsage 0x%lx", cert->key_usage); [all...] |
/system/tpm/attestation/client/ |
dbus_proxy_test.cc | 56 EXPECT_EQ(KEY_USAGE_SIGN, request_proto.key_usage()); 126 EXPECT_EQ(KEY_USAGE_SIGN, reply.key_usage()); 269 EXPECT_EQ(KEY_USAGE_SIGN, request_proto.key_usage());
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathValidatorSpi.java | 395 criticalExtensions.remove(RFC3280CertPathUtilities.KEY_USAGE); 459 criticalExtensions.remove(RFC3280CertPathUtilities.KEY_USAGE);
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
OIDMap.java | 61 private static final String KEY_USAGE = ROOT + "." + 121 addInternal(KEY_USAGE, PKIXExtensions.KeyUsage_Id,
|
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/ |
MainFragment.java | 65 private static final String KEY_USAGE = "usageAndDiag"; 176 hideIfIntentUnhandled(findPreference(KEY_USAGE));
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/ |
layer1.py | 223 def create_key(self, policy=None, description=None, key_usage=None): 241 :type key_usage: string 242 :param key_usage: Specifies the intended use of the key. Currently this 252 if key_usage is not None: 253 params['KeyUsage'] = key_usage [all...] |
/external/boringssl/src/crypto/obj/ |
obj_mac.num | 84 key_usage 83
|
/external/boringssl/src/crypto/x509v3/ |
v3_purp.c | 734 * 3. If key_usage(issuer) exists check it supports certificate signing
|