/device/google/contexthub/firmware/inc/platform/stm32f4xx/ |
eeData.h | 33 #define PREPOPULATED_ENCR_KEY(name, keyid, ...) \ 34 const struct Stm32f4xxEedataEncrKey __attribute__ ((section (".eedata"))) __EE__ ## name = { { EE_DATA_NAME_ENCR_KEY + sizeof(struct SeosEedataEncrKeyData) * (EE_DATA_NAME_MAX + 1)}, {keyid, {__VA_ARGS__}}}
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
SubjectKeyIdentifier.java | 48 byte[] keyid) 50 this.keyidentifier = keyid; 54 ASN1OctetString keyid) 56 this.keyidentifier = keyid.getOctets();
|
/system/keymaster/ |
keymaster_enforcement.cpp | 41 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 45 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 49 km_id_t keyid; member in struct:keymaster::AccessTimeMap::AccessTime 63 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 67 bool IncrementKeyAccessCount(km_id_t keyid); 71 km_id_t keyid; member in struct:keymaster::AccessCountMap::AccessCount 119 const km_id_t keyid, 139 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); 193 const km_id_t keyid, 254 if (!MinTimeBetweenOpsPassed(min_ops_timeout, keyid)) [all...] |
keymaster_enforcement_test.cpp | 35 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, 39 purpose, keyid, auth_set, empty_set, 0 /* op_handle */, true /* is_begin_operation */); [all...] |
/system/keymaster/include/keymaster/ |
keymaster_enforcement.h | 52 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, 63 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, 96 static bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid); 151 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 152 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
/external/boringssl/src/crypto/x509/ |
x_x509a.c | 75 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 109 if (!x || !x->aux || !x->aux->keyid) 111 ASN1_OCTET_STRING_free(x->aux->keyid); 112 x->aux->keyid = NULL; 116 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0; 117 return ASN1_STRING_set(aux->keyid, id, len); 129 if(!x->aux || !x->aux->keyid) return NULL; 130 if(len) *len = x->aux->keyid->length; 131 return x->aux->keyid->data [all...] |
t_x509a.c | 100 if(aux->keyid) { 102 for(j = 0; j < aux->keyid->length; j++) 105 aux->keyid->data[j]);
|
/external/boringssl/src/crypto/x509v3/ |
v3_akey.c | 90 if(akeyid->keyid) { 91 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 92 X509V3_add_value("keyid", tmp, &extlist); 107 * keyid: use the issuers subject keyid, the value 'always' means its is 110 * to only use this if keyid is not present. With the option 'always' 117 char keyid=0, issuer=0; local 133 if(!strcmp(cnf->name, "keyid")) 135 keyid = 1 [all...] |
v3_akeya.c | 66 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
v3_purp.c | 771 if(akid->keyid && issuer->skid && 772 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) )
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/ |
ca.conf | 115 authorityKeyIdentifier = keyid:always,issuer 122 authorityKeyIdentifier = keyid:always,issuer 132 authorityKeyIdentifier = keyid,issuer 142 authorityKeyIdentifier = keyid,issuer:always 148 authorityKeyIdentifier=keyid:always 154 authorityKeyIdentifier = keyid,issuer
|
/system/security/keystore/ |
operation.h | 50 sp<IBinder> addOperation(keymaster_operation_handle_t handle, uint64_t keyid, 72 Operation(keymaster_operation_handle_t handle, uint64_t keyid, keymaster_purpose_t purpose, 76 uint64_t keyid; member in struct:android::OperationMap::Operation
|
operation.cpp | 26 sp<IBinder> OperationMap::addOperation(keymaster_operation_handle_t handle, uint64_t keyid, 32 mMap[token] = Operation(handle, keyid, purpose, dev, characteristics, appToken); 57 *outKeyid = entry->second.keyid; 151 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
|
key_store_service.cpp | 891 // Create a keyid for this key. 892 keymaster::km_id_t keyid; local 893 if (!enforcement_policy.CreateKeyId(key, &keyid)) { 903 err = enforcement_policy.AuthorizeOperation(purpose, keyid, key_auths, operation_params 968 keymaster::km_id_t keyid; local 1019 keymaster::km_id_t keyid; local 1081 keymaster::km_id_t keyid; local 1104 keymaster::km_id_t keyid; local 1414 keymaster::km_id_t keyid; local [all...] |
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 403 KeyStatus(@NonNull byte[] keyId, @KeyStatusCode int statusCode) { 404 mKeyId = keyId; 590 byte[] keyId = parcel.createByteArray(); 592 keyStatusList.add(new KeyStatus(keyId, keyStatusCode)); [all...] |
/build/tools/releasetools/ |
sign_target_files_apks | 80 with keyid of the cert pointed by <path_to_X509_PEM_cert_file>. 277 # Skip verity keyid (for system_root_image use) if we will replace it. 312 # Replace the keyid string in META/misc_info.txt. 328 # Replace the keyid string in BOOT/cmdline. 555 # extract keyid using openssl command 557 keyid, stderr = p.communicate() 558 keyid = re.search(r'keyid:([0-9a-fA-F:]*)', keyid).group(1).replace(':', '').lower() 559 print "Replacing verity keyid with %s error=%s" % (keyid, stderr [all...] |
sign_target_files_apks.py | 80 with keyid of the cert pointed by <path_to_X509_PEM_cert_file>. 277 # Skip verity keyid (for system_root_image use) if we will replace it. 312 # Replace the keyid string in META/misc_info.txt. 328 # Replace the keyid string in BOOT/cmdline. 555 # extract keyid using openssl command 557 keyid, stderr = p.communicate() 558 keyid = re.search(r'keyid:([0-9a-fA-F:]*)', keyid).group(1).replace(':', '').lower() 559 print "Replacing verity keyid with %s error=%s" % (keyid, stderr [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 298 u8 keyid[2]; member in struct:wpa_igtk_kde
|
/system/bt/stack/smp/ |
smp_keys.c | [all...] |
smp_int.h | 534 extern BOOLEAN smp_calculate_h6(UINT8 *w, UINT8 *keyid, UINT8 *h2);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 814 * KeyID[bits 0-1], Tx [bit 2], Reserved [bits 3-7] 872 keyidx = WPA_GET_LE16(igtk->keyid); 873 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d " 880 "WPA: Invalid IGTK KeyID %d", keyidx); [all...] |
/external/boringssl/src/include/openssl/ |
x509v3.h | 258 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509.go | [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509.go | [all...] |
/external/ipsec-tools/src/racoon/ |
cftoken.l | 549 keyid { YYD; yylval.num = IDTYPE_KEYID; return(IDENTIFIERTYPE); }
|