/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_mod_oem_crypto.h | 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object 49 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
|
wv_mod_drm_api.h | 88 const uint8_t *key_id, 326 * @brief Returns the decrypted key control block for the given key_id. 329 const uint8_t *key_id,
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/ |
layer1.py | 158 def create_grant(self, key_id, grantee_principal, 176 :type key_id: string 177 :param key_id: A unique key identifier for a customer master key. This 209 'KeyId': key_id, 306 def describe_key(self, key_id): 311 :type key_id: string 312 :param key_id: Unique identifier of the customer master key to be 317 params = {'KeyId': key_id, } 321 def disable_key(self, key_id): 325 :type key_id: strin [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 34 key_id="4"
|
/system/keymaster/ |
keymaster_enforcement_test.cpp | 91 static const km_id_t key_id = 0xa; member in class:keymaster::test::KeymasterBaseTest 102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set); 115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set); 168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set) 866 km_id_t key_id = 0; local [all...] |
operation.h | 95 void set_key_id(uint64_t key_id) { key_id_ = key_id; } 96 uint64_t key_id() const { return key_id_; } function in class:keymaster::Operation
|
android_keymaster.cpp | 268 km_id_t key_id; local 270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) 272 operation->set_key_id(key_id); 274 request.purpose, key_id, key->authorizations(), request.additional_params, 301 operation->purpose(), operation->key_id(), operation->authorizations(), 330 operation->purpose(), operation->key_id(), operation->authorizations(),
|
/system/security/keystore-engine/ |
android_engine.cpp | 57 char *key_id = reinterpret_cast<char *>(*from_d); local 58 if (key_id != NULL) { 59 *from_d = strdup(key_id); 71 char *key_id = reinterpret_cast<char *>(ptr); local 72 free(key_id); 142 const char *key_id = rsa_get_key_id(rsa); local 143 if (key_id == NULL) { 144 ALOGE("key had no key_id!"); 159 int32_t ret = service->sign(String16(key_id), in, len, &reply, &reply_len); 239 const char *key_id = ecdsa_get_key_id(ec_key) local [all...] |
dsa_meth.cpp | 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local 54 if (key_id == NULL) { 55 ALOGE("key had no key_id!"); 72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
|
ecdsa_meth.cpp | 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local 60 if (key_id == NULL) { 61 ALOGE("key had no key_id!"); 78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
|
eng_keystore.cpp | 93 * Called to initialize RSA's ex_data for the key_id handle. This should 101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method, 107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data); 121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen); 142 dsa_pkey_setup(e, pkey.get(), key_id); 146 rsa_pkey_setup(e, pkey.get(), key_id); 150 ecdsa_pkey_setup(e, pkey.get(), key_id);
|
rsa_meth.cpp | 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 77 if (key_id == NULL) { 78 ALOGE("key had no key_id!"); 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), 120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 121 if (key_id == NULL) { 122 ALOGE("key had no key_id!"); 139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from, 212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/kms/ |
test_kms.py | 40 key_id='nonexistant_key',
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/ |
test_kms.py | 41 self.service_connection.encrypt(key_id='foo', plaintext=data) 52 self.service_connection.encrypt(key_id='foo', plaintext=data)
|
/external/dbus/dbus/ |
dbus-keyring.h | 46 int key_id,
|
dbus-keyring.c | 1002 * @param key_id the key ID 1008 int key_id, 1015 key_id);
|
/external/tcpdump/ |
print-ntp.c | 128 uint32_t key_id; member in struct:ntpdata 306 ND_TCHECK(bp->key_id); 307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); 309 ND_TCHECK(bp->key_id); 310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 527 * key_id - Key ID for OpenSSL engine 532 char *key_id; member in struct:eap_peer_config
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 179 uint16 key_id; member in struct:__anon29171
|
/system/bt/stack/smp/ |
smp_int.h | 383 extern void smp_h6_calc_chk (UINT8 *key, UINT8 *key_id, UINT8 *mac); 386 UINT8 *key_id, UINT8 *n1, 529 UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1,
|
smp_keys.c | 1498 UINT8 key_id[4] = {0x65, 0x6c, 0x74, 0x62}; local [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 181 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member in struct:wpa_eapol_key 196 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member in struct:wpa_eapol_key_192
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 136 * @key_id: the private key's id when using engine (this is OpenSSL 180 const char *key_id; member in struct:tls_connection_params
|
tls_openssl.c | 1069 EVP_PKEY * EVP_PKEY_from_keystore(const char *key_id); 1073 const char *pin, const char *key_id, 1080 if (!key_id) 1083 conn->private_key = EVP_PKEY_from_keystore(key_id); 1087 key_id, 1125 if (key_id) { 1137 key_id, NULL, 1144 key_id, 3934 const char *key_id = params->key_id; local [all...] |