HomeSort by relevance Sort by last modified time
    Searched refs:keyid (Results 1 - 25 of 36) sorted by null

1 2

  /device/google/contexthub/firmware/inc/platform/stm32f4xx/
eeData.h 33 #define PREPOPULATED_ENCR_KEY(name, keyid, ...) \
34 const struct Stm32f4xxEedataEncrKey __attribute__ ((section (".eedata"))) __EE__ ## name = { { EE_DATA_NAME_ENCR_KEY + sizeof(struct SeosEedataEncrKeyData) * (EE_DATA_NAME_MAX + 1)}, {keyid, {__VA_ARGS__}}}
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
SubjectKeyIdentifier.java 48 byte[] keyid)
50 this.keyidentifier = keyid;
54 ASN1OctetString keyid)
56 this.keyidentifier = keyid.getOctets();
  /system/keymaster/
keymaster_enforcement.cpp 41 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const;
45 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout);
49 km_id_t keyid; member in struct:keymaster::AccessTimeMap::AccessTime
63 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const;
67 bool IncrementKeyAccessCount(km_id_t keyid);
71 km_id_t keyid; member in struct:keymaster::AccessCountMap::AccessCount
119 const km_id_t keyid,
139 return AuthorizeBegin(purpose, keyid, auth_set, operation_params);
193 const km_id_t keyid,
254 if (!MinTimeBetweenOpsPassed(min_ops_timeout, keyid))
    [all...]
keymaster_enforcement_test.cpp 35 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid,
39 purpose, keyid, auth_set, empty_set, 0 /* op_handle */, true /* is_begin_operation */);
    [all...]
  /system/keymaster/include/keymaster/
keymaster_enforcement.h 52 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid,
63 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid,
96 static bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid);
151 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid);
152 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
  /external/boringssl/src/crypto/x509/
x_x509a.c 75 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
109 if (!x || !x->aux || !x->aux->keyid)
111 ASN1_OCTET_STRING_free(x->aux->keyid);
112 x->aux->keyid = NULL;
116 if(!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) return 0;
117 return ASN1_STRING_set(aux->keyid, id, len);
129 if(!x->aux || !x->aux->keyid) return NULL;
130 if(len) *len = x->aux->keyid->length;
131 return x->aux->keyid->data
    [all...]
t_x509a.c 100 if(aux->keyid) {
102 for(j = 0; j < aux->keyid->length; j++)
105 aux->keyid->data[j]);
  /external/boringssl/src/crypto/x509v3/
v3_akey.c 90 if(akeyid->keyid) {
91 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
92 X509V3_add_value("keyid", tmp, &extlist);
107 * keyid: use the issuers subject keyid, the value 'always' means its is
110 * to only use this if keyid is not present. With the option 'always'
117 char keyid=0, issuer=0; local
133 if(!strcmp(cnf->name, "keyid"))
135 keyid = 1
    [all...]
v3_akeya.c 66 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
v3_purp.c 771 if(akid->keyid && issuer->skid &&
772 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid) )
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/
ca.conf 115 authorityKeyIdentifier = keyid:always,issuer
122 authorityKeyIdentifier = keyid:always,issuer
132 authorityKeyIdentifier = keyid,issuer
142 authorityKeyIdentifier = keyid,issuer:always
148 authorityKeyIdentifier=keyid:always
154 authorityKeyIdentifier = keyid,issuer
  /system/security/keystore/
operation.h 50 sp<IBinder> addOperation(keymaster_operation_handle_t handle, uint64_t keyid,
72 Operation(keymaster_operation_handle_t handle, uint64_t keyid, keymaster_purpose_t purpose,
76 uint64_t keyid; member in struct:android::OperationMap::Operation
operation.cpp 26 sp<IBinder> OperationMap::addOperation(keymaster_operation_handle_t handle, uint64_t keyid,
32 mMap[token] = Operation(handle, keyid, purpose, dev, characteristics, appToken);
57 *outKeyid = entry->second.keyid;
151 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
key_store_service.cpp 891 // Create a keyid for this key.
892 keymaster::km_id_t keyid; local
893 if (!enforcement_policy.CreateKeyId(key, &keyid)) {
903 err = enforcement_policy.AuthorizeOperation(purpose, keyid, key_auths, operation_params
968 keymaster::km_id_t keyid; local
1019 keymaster::km_id_t keyid; local
1081 keymaster::km_id_t keyid; local
1104 keymaster::km_id_t keyid; local
1414 keymaster::km_id_t keyid; local
    [all...]
  /frameworks/base/media/java/android/media/
MediaDrm.java 403 KeyStatus(@NonNull byte[] keyId, @KeyStatusCode int statusCode) {
404 mKeyId = keyId;
590 byte[] keyId = parcel.createByteArray();
592 keyStatusList.add(new KeyStatus(keyId, keyStatusCode));
    [all...]
  /build/tools/releasetools/
sign_target_files_apks 80 with keyid of the cert pointed by <path_to_X509_PEM_cert_file>.
277 # Skip verity keyid (for system_root_image use) if we will replace it.
312 # Replace the keyid string in META/misc_info.txt.
328 # Replace the keyid string in BOOT/cmdline.
555 # extract keyid using openssl command
557 keyid, stderr = p.communicate()
558 keyid = re.search(r'keyid:([0-9a-fA-F:]*)', keyid).group(1).replace(':', '').lower()
559 print "Replacing verity keyid with %s error=%s" % (keyid, stderr
    [all...]
sign_target_files_apks.py 80 with keyid of the cert pointed by <path_to_X509_PEM_cert_file>.
277 # Skip verity keyid (for system_root_image use) if we will replace it.
312 # Replace the keyid string in META/misc_info.txt.
328 # Replace the keyid string in BOOT/cmdline.
555 # extract keyid using openssl command
557 keyid, stderr = p.communicate()
558 keyid = re.search(r'keyid:([0-9a-fA-F:]*)', keyid).group(1).replace(':', '').lower()
559 print "Replacing verity keyid with %s error=%s" % (keyid, stderr
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 298 u8 keyid[2]; member in struct:wpa_igtk_kde
  /system/bt/stack/smp/
smp_keys.c     [all...]
smp_int.h 534 extern BOOLEAN smp_calculate_h6(UINT8 *w, UINT8 *keyid, UINT8 *h2);
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c 814 * KeyID[bits 0-1], Tx [bit 2], Reserved [bits 3-7]
872 keyidx = WPA_GET_LE16(igtk->keyid);
873 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d "
880 "WPA: Invalid IGTK KeyID %d", keyidx);
    [all...]
  /external/boringssl/src/include/openssl/
x509v3.h 258 ASN1_OCTET_STRING *keyid; member in struct:AUTHORITY_KEYID_st
x509.h 236 ASN1_OCTET_STRING *keyid; /* key id of private key */ member in struct:x509_cert_aux_st
    [all...]
  /external/ipsec-tools/src/racoon/
cftoken.l 549 keyid { YYD; yylval.num = IDTYPE_KEYID; return(IDENTIFIERTYPE); }
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c     [all...]

Completed in 992 milliseconds

1 2