HomeSort by relevance Sort by last modified time
    Searched refs:key_info (Results 1 - 19 of 19) sorted by null

  /system/security/keystore/
auth_token_table.cpp 71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info,
74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1;
78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info,
81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm);
82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1;
85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info,
89 if (!KeyRequiresAuthentication(key_info, purpose))
93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type);
96 ExtractSids(key_info, &key_sids)
    [all...]
auth_token_table.h 65 * a key with the characteristics specified in \p key_info.
67 * This method is O(n * m), where n is the number of KM_TAG_USER_SECURE_ID entries in key_info
73 Error FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose,
78 * a key with the characteristics specified in \p key_info.
80 * This method is O(n * m), where n is the number of KM_TAG_USER_SECURE_ID entries in key_info
151 const AuthorizationSet& key_info, const hw_auth_token_t** found);
152 void ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids);
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 44 struct wpa_eapol_key *key, u16 key_info, u16 ver,
48 u16 key_info, u16 ver);
64 struct wpa_eapol_key *key, u16 key_info, u16 ver,
72 u16 key_info, u16 ver)
wpa.c 101 int key_info, ver; local
132 key_info = WPA_KEY_INFO_REQUEST | ver;
134 key_info |= WPA_KEY_INFO_MIC | WPA_KEY_INFO_SECURE;
136 key_info |= WPA_KEY_INFO_ERROR;
138 key_info |= WPA_KEY_INFO_KEY_TYPE;
139 WPA_PUT_BE16(reply->key_info, key_info);
149 if (!(key_info & WPA_KEY_INFO_MIC))
400 WPA_PUT_BE16(reply->key_info,
806 int key_info)
1191 u16 key_info, keylen; local
1501 u16 key_info; local
1713 u16 key_info = WPA_GET_BE16(key->key_info); local
1767 u16 key_info, ver; local
    [all...]
peerkey.c 72 u16 key_info; local
86 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
89 WPA_PUT_BE16(err->key_info, key_info);
134 u16 key_info; local
149 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
151 WPA_PUT_BE16(reply->key_info, key_info);
329 u16 key_info, ver; local
346 key_info = ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_ACK
386 u16 key_info, ver; local
985 int key_info, ver; local
    [all...]
wpa_i.h 366 u16 ver, u16 key_info,
  /external/libchrome/crypto/
signature_creator_unittest.cc 36 std::vector<uint8_t> key_info; local
37 key_original->ExportPrivateKey(&key_info);
39 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
74 std::vector<uint8_t> key_info; local
75 key_original->ExportPrivateKey(&key_info);
77 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
109 std::vector<uint8_t> key_info; local
110 key_original->ExportPrivateKey(&key_info);
112 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
  /system/tpm/attestation/common/
tpm_utility.h 53 // be included in the |key_info|. On success, returns true and populates
55 // format, |key_info| with the TPM_CERTIFY_INFO that was signed, and |proof|
56 // with the signature of |key_info| by the identity key.
64 std::string* key_info,
tpm_utility_v1.h 55 std::string* key_info,
tpm_utility_v1.cc 177 std::string* key_info,
179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof);
277 key_info->assign(TSSBufferAsString(validation.rgbData,
  /system/security/keystore/tests/
auth_token_table_test.cpp 274 auto key_info = make_set(1, 5 /* five second timeout */); local
277 // sixth request should fail, since key_info says the key is good for five seconds.
284 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
286 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
288 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
290 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
292 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
294 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c 881 u16 key_info, key_data_length; local
902 key_info = WPA_GET_BE16(key->key_info);
911 " key_info=0x%x type=%u key_data_length=%u",
912 MAC2STR(sm->addr), key_info, key->type, key_data_length);
953 if ((key_info & (WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_REQUEST)) ==
955 if (key_info & WPA_KEY_INFO_ERROR) {
962 } else if (key_info & WPA_KEY_INFO_SMK_MESSAGE) {
965 } else if (key_info & WPA_KEY_INFO_REQUEST) {
968 } else if (!(key_info & WPA_KEY_INFO_KEY_TYPE))
1645 u16 key_info; local
    [all...]
wpa_auth_i.h 222 struct wpa_state_machine *sm, int key_info,
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 107 unsigned short key_info; /* Key Information (unaligned) */ member in struct:__anon30468
121 /* WPA/802.11i/WPA2 KEY KEY_INFO bits */
135 /* WPA-only KEY KEY_INFO bits */
143 /* 802.11i/WPA2-only KEY KEY_INFO bits */
802.11.h 1981 uint16 key_info; member in struct:dot11_wnm_sleep_subelem_gtk
3337 uint16 key_info; member in struct:dot11_gtk_ie
    [all...]
  /system/tpm/attestation/client/
main.cc 413 const GetKeyInfoReply& key_info) {
416 if (!crypto.EncryptForUnbind(key_info.public_key(), input, &output)) {
469 const GetKeyInfoReply& key_info) {
471 if (crypto.VerifySignature(key_info.public_key(), input, signature)) {
  /external/wpa_supplicant_8/src/common/
wpa_common.h 174 /* Note: key_info, key_length, and key_data_length are unaligned */
175 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key
189 /* Note: key_info, key_length, and key_data_length are unaligned */
190 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key_192
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 711 u16 key_info; local
744 key_info = WPA_GET_BE16(key->key_info);
746 return !!(key_info & WPA_KEY_INFO_ACK);
  /system/tpm/attestation/server/
attestation_service.cc 742 std::string key_info; local
753 &key_info,
761 key->set_certified_key_info(key_info);

Completed in 4270 milliseconds