HomeSort by relevance Sort by last modified time
    Searched refs:key_id (Results 1 - 25 of 51) sorted by null

1 2 3

  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_mod_oem_crypto.h 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object
49 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
wv_mod_drm_api.h 88 const uint8_t *key_id,
326 * @brief Returns the decrypted key control block for the given key_id.
329 const uint8_t *key_id,
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/
layer1.py 158 def create_grant(self, key_id, grantee_principal,
176 :type key_id: string
177 :param key_id: A unique key identifier for a customer master key. This
209 'KeyId': key_id,
306 def describe_key(self, key_id):
311 :type key_id: string
312 :param key_id: Unique identifier of the customer master key to be
317 params = {'KeyId': key_id, }
321 def disable_key(self, key_id):
325 :type key_id: strin
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
openCryptoki.conf 34 key_id="4"
  /system/keymaster/
keymaster_enforcement_test.cpp 91 static const km_id_t key_id = 0xa; member in class:keymaster::test::KeymasterBaseTest
102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set);
115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set));
118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set);
140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set));
143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set);
168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set);
182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)
866 km_id_t key_id = 0; local
    [all...]
operation.h 95 void set_key_id(uint64_t key_id) { key_id_ = key_id; }
96 uint64_t key_id() const { return key_id_; } function in class:keymaster::Operation
android_keymaster.cpp 268 km_id_t key_id; local
270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id))
272 operation->set_key_id(key_id);
274 request.purpose, key_id, key->authorizations(), request.additional_params,
301 operation->purpose(), operation->key_id(), operation->authorizations(),
330 operation->purpose(), operation->key_id(), operation->authorizations(),
  /system/security/keystore-engine/
android_engine.cpp 57 char *key_id = reinterpret_cast<char *>(*from_d); local
58 if (key_id != NULL) {
59 *from_d = strdup(key_id);
71 char *key_id = reinterpret_cast<char *>(ptr); local
72 free(key_id);
142 const char *key_id = rsa_get_key_id(rsa); local
143 if (key_id == NULL) {
144 ALOGE("key had no key_id!");
159 int32_t ret = service->sign(String16(key_id), in, len, &reply, &reply_len);
239 const char *key_id = ecdsa_get_key_id(ec_key) local
    [all...]
dsa_meth.cpp 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local
54 if (key_id == NULL) {
55 ALOGE("key had no key_id!");
72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
ecdsa_meth.cpp 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local
60 if (key_id == NULL) {
61 ALOGE("key had no key_id!");
78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
eng_keystore.cpp 93 * Called to initialize RSA's ex_data for the key_id handle. This should
101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method,
107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data);
121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen);
142 dsa_pkey_setup(e, pkey.get(), key_id);
146 rsa_pkey_setup(e, pkey.get(), key_id);
150 ecdsa_pkey_setup(e, pkey.get(), key_id);
rsa_meth.cpp 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
77 if (key_id == NULL) {
78 ALOGE("key had no key_id!");
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(),
120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
121 if (key_id == NULL) {
122 ALOGE("key had no key_id!");
139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from,
212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) {
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/kms/
test_kms.py 40 key_id='nonexistant_key',
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/
test_kms.py 41 self.service_connection.encrypt(key_id='foo', plaintext=data)
52 self.service_connection.encrypt(key_id='foo', plaintext=data)
  /external/dbus/dbus/
dbus-keyring.h 46 int key_id,
dbus-keyring.c 1002 * @param key_id the key ID
1008 int key_id,
1015 key_id);
  /external/tcpdump/
print-ntp.c 128 uint32_t key_id; member in struct:ntpdata
306 ND_TCHECK(bp->key_id);
307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
309 ND_TCHECK(bp->key_id);
310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 527 * key_id - Key ID for OpenSSL engine
532 char *key_id; member in struct:eap_peer_config
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 179 uint16 key_id; member in struct:__anon29171
  /system/bt/stack/smp/
smp_int.h 383 extern void smp_h6_calc_chk (UINT8 *key, UINT8 *key_id, UINT8 *mac);
386 UINT8 *key_id, UINT8 *n1,
529 UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1,
smp_keys.c 1498 UINT8 key_id[4] = {0x65, 0x6c, 0x74, 0x62}; local
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 181 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member in struct:wpa_eapol_key
196 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member in struct:wpa_eapol_key_192
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf     [all...]
  /external/wpa_supplicant_8/src/crypto/
tls.h 136 * @key_id: the private key's id when using engine (this is OpenSSL
180 const char *key_id; member in struct:tls_connection_params
tls_openssl.c 1069 EVP_PKEY * EVP_PKEY_from_keystore(const char *key_id);
1073 const char *pin, const char *key_id,
1080 if (!key_id)
1083 conn->private_key = EVP_PKEY_from_keystore(key_id);
1087 key_id,
1125 if (key_id) {
1137 key_id, NULL,
1144 key_id,
3934 const char *key_id = params->key_id; local
    [all...]

Completed in 753 milliseconds

1 2 3