/system/security/keystore/ |
auth_token_table.cpp | 71 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, 74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); 75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; 78 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, 81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); 82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; 85 AuthTokenTable::Error AuthTokenTable::FindAuthorization(const AuthorizationSet& key_info, 89 if (!KeyRequiresAuthentication(key_info, purpose)) 93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type); 96 ExtractSids(key_info, &key_sids) [all...] |
auth_token_table.h | 65 * a key with the characteristics specified in \p key_info. 67 * This method is O(n * m), where n is the number of KM_TAG_USER_SECURE_ID entries in key_info 73 Error FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, 78 * a key with the characteristics specified in \p key_info. 80 * This method is O(n * m), where n is the number of KM_TAG_USER_SECURE_ID entries in key_info 151 const AuthorizationSet& key_info, const hw_auth_token_t** found); 152 void ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 44 struct wpa_eapol_key *key, u16 key_info, u16 ver, 48 u16 key_info, u16 ver); 64 struct wpa_eapol_key *key, u16 key_info, u16 ver, 72 u16 key_info, u16 ver)
|
wpa.c | 101 int key_info, ver; local 132 key_info = WPA_KEY_INFO_REQUEST | ver; 134 key_info |= WPA_KEY_INFO_MIC | WPA_KEY_INFO_SECURE; 136 key_info |= WPA_KEY_INFO_ERROR; 138 key_info |= WPA_KEY_INFO_KEY_TYPE; 139 WPA_PUT_BE16(reply->key_info, key_info); 149 if (!(key_info & WPA_KEY_INFO_MIC)) 400 WPA_PUT_BE16(reply->key_info, 806 int key_info) 1191 u16 key_info, keylen; local 1501 u16 key_info; local 1713 u16 key_info = WPA_GET_BE16(key->key_info); local 1767 u16 key_info, ver; local [all...] |
peerkey.c | 72 u16 key_info; local 86 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 89 WPA_PUT_BE16(err->key_info, key_info); 134 u16 key_info; local 149 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 151 WPA_PUT_BE16(reply->key_info, key_info); 329 u16 key_info, ver; local 346 key_info = ver | WPA_KEY_INFO_KEY_TYPE | WPA_KEY_INFO_ACK 386 u16 key_info, ver; local 985 int key_info, ver; local [all...] |
wpa_i.h | 366 u16 ver, u16 key_info,
|
/external/libchrome/crypto/ |
signature_creator_unittest.cc | 36 std::vector<uint8_t> key_info; local 37 key_original->ExportPrivateKey(&key_info); 39 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info)); 74 std::vector<uint8_t> key_info; local 75 key_original->ExportPrivateKey(&key_info); 77 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info)); 109 std::vector<uint8_t> key_info; local 110 key_original->ExportPrivateKey(&key_info); 112 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(key_info));
|
/system/tpm/attestation/common/ |
tpm_utility.h | 53 // be included in the |key_info|. On success, returns true and populates 55 // format, |key_info| with the TPM_CERTIFY_INFO that was signed, and |proof| 56 // with the signature of |key_info| by the identity key. 64 std::string* key_info,
|
tpm_utility_v1.h | 55 std::string* key_info,
|
tpm_utility_v1.cc | 177 std::string* key_info, 179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof); 277 key_info->assign(TSSBufferAsString(validation.rgbData,
|
/system/security/keystore/tests/ |
auth_token_table_test.cpp | 274 auto key_info = make_set(1, 5 /* five second timeout */); local 277 // sixth request should fail, since key_info says the key is good for five seconds. 284 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 286 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 288 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 290 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 292 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found)); 294 table.FindAuthorization(key_info, KM_PURPOSE_SIGN, 0 /* no op handle */, &found));
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 881 u16 key_info, key_data_length; local 902 key_info = WPA_GET_BE16(key->key_info); 911 " key_info=0x%x type=%u key_data_length=%u", 912 MAC2STR(sm->addr), key_info, key->type, key_data_length); 953 if ((key_info & (WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_REQUEST)) == 955 if (key_info & WPA_KEY_INFO_ERROR) { 962 } else if (key_info & WPA_KEY_INFO_SMK_MESSAGE) { 965 } else if (key_info & WPA_KEY_INFO_REQUEST) { 968 } else if (!(key_info & WPA_KEY_INFO_KEY_TYPE)) 1645 u16 key_info; local [all...] |
wpa_auth_i.h | 222 struct wpa_state_machine *sm, int key_info,
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 107 unsigned short key_info; /* Key Information (unaligned) */ member in struct:__anon30468 121 /* WPA/802.11i/WPA2 KEY KEY_INFO bits */ 135 /* WPA-only KEY KEY_INFO bits */ 143 /* 802.11i/WPA2-only KEY KEY_INFO bits */
|
802.11.h | 1981 uint16 key_info; member in struct:dot11_wnm_sleep_subelem_gtk 3337 uint16 key_info; member in struct:dot11_gtk_ie [all...] |
/system/tpm/attestation/client/ |
main.cc | 413 const GetKeyInfoReply& key_info) { 416 if (!crypto.EncryptForUnbind(key_info.public_key(), input, &output)) { 469 const GetKeyInfoReply& key_info) { 471 if (crypto.VerifySignature(key_info.public_key(), input, signature)) {
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 174 /* Note: key_info, key_length, and key_data_length are unaligned */ 175 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key 189 /* Note: key_info, key_length, and key_data_length are unaligned */ 190 u8 key_info[2]; /* big endian */ member in struct:wpa_eapol_key_192
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 711 u16 key_info; local 744 key_info = WPA_GET_BE16(key->key_info); 746 return !!(key_info & WPA_KEY_INFO_ACK);
|
/system/tpm/attestation/server/ |
attestation_service.cc | 742 std::string key_info; local 753 &key_info, 761 key->set_certified_key_info(key_info);
|