/frameworks/av/drm/mediacas/plugins/clearkey/ |
KeyFetcher.h | 35 int key_id; member in struct:android::clearkeycas::KeyFetcher::KeyInfo
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_mod_oem_crypto.h | 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object 49 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
|
/system/keymaster/ |
operation.h | 95 void set_key_id(uint64_t key_id) { key_id_ = key_id; } 96 uint64_t key_id() const { return key_id_; } function in class:keymaster::Operation
|
keymaster_enforcement_test.cpp | 91 static const km_id_t key_id = 0xa; member in class:keymaster::test::KeymasterBaseTest 102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set); 115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set); 168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set) 866 km_id_t key_id = 0; local [all...] |
android_keymaster.cpp | 268 km_id_t key_id; local 270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) 272 operation->set_key_id(key_id); 274 request.purpose, key_id, key->authorizations(), request.additional_params, 301 operation->purpose(), operation->key_id(), operation->authorizations(), 330 operation->purpose(), operation->key_id(), operation->authorizations(),
|
/external/kmod/libkmod/ |
libkmod-internal.h | 186 const char *key_id; member in struct:kmod_signature_info
|
/external/iw/ |
event.c | 200 __u8 key_id = nla_get_u8(attrs[NL80211_ATTR_KEY_IDX]); local 201 printf(" Key Id %d", key_id);
|
/external/ltp/testcases/kernel/controllers/cpuset/cpuset_memory_test/ |
cpuset_memory_test.c | 58 static int key_id; /* used with opt_shm */ variable 106 key_id = atoi(optarg); 257 key = ftok("/dev/null", key_id);
|
/external/ltp/testcases/kernel/controllers/memcg/functional/ |
memcg_process.c | 50 int key_id; /* used with opt_shm */ variable 85 key_id = atoi(optarg); 231 key = ftok("/dev/null", key_id);
|
/external/openssh/ |
sshkey.h | 89 char *key_id; member in struct:sshkey_cert
|
krl.c | 67 char *key_id; member in struct:revoked_key_id 115 return strcmp(a->key_id, b->key_id); 156 free(rki->key_id); 338 const char *key_id) 347 KRL_DBG(("%s: revoke %s", __func__, key_id)); 349 (rki->key_id = strdup(key_id)) == NULL) { 355 free(rki->key_id); 435 key->cert->key_id); 815 char *key_id = NULL; local [all...] |
/external/tcpdump/ |
print-ntp.c | 128 uint32_t key_id; member in struct:ntpdata 306 ND_TCHECK(bp->key_id); 307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); 309 ND_TCHECK(bp->key_id); 310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
|
print-rsvp.c | 297 uint8_t key_id[6]; member in struct:rsvp_obj_integrity_t [all...] |
/system/security/keystore-engine/ |
android_engine.cpp | 60 char *key_id = reinterpret_cast<char *>(*from_d); local 61 if (key_id != NULL) { 62 *from_d = strdup(key_id); 74 char *key_id = reinterpret_cast<char *>(ptr); local 75 free(key_id); 153 const char *key_id = rsa_get_key_id(rsa); local 154 if (key_id == NULL) { 155 ALOGE("key had no key_id!"); 161 int32_t ret = g_keystore_backend->sign(key_id, in, len, &reply, &reply_len); 242 const char *key_id = ecdsa_get_key_id(ec_key) local [all...] |
/bionic/libc/dns/nameser/ |
ns_print.c | 461 u_int keyflags, protocol, algorithm, key_id; local 470 key_id = dst_s_dns_key_id(rdata, edata-rdata); 472 key_id = 0; 499 n = snprintf(tmp, sizeof(tmp), " ; key_tag= %u", key_id);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 527 * key_id - Key ID for OpenSSL engine 532 char *key_id; member in struct:eap_peer_config
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 136 * @key_id: the private key's id when using engine (this is OpenSSL 180 const char *key_id; member in struct:tls_connection_params
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 179 uint16 key_id; member in struct:__anon39997
|
/system/bt/stack/smp/ |
smp_keys.cc | 1233 uint8_t key_id[4] = {0x65, 0x6c, 0x74, 0x62}; local [all...] |
/external/ipsec-tools/src/racoon/ |
oakley.c | 1831 const char *key_id; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_nl80211_event.c | 957 u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]); local 958 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id); [all...] |
/external/iproute2/tc/ |
tc_bpf.c | 1418 uint32_t map_id, key_id; local 1429 ret = sscanf(data.sec_name, "%i/%i", &map_id, &key_id); 1441 ret = bpf_map_update(ctx->map_fds[idx], &key_id, [all...] |
/external/libvpx/libvpx/third_party/libwebm/mkvparser/ |
mkvparser.h | 219 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
|
/external/libvpx/libwebm/mkvparser/ |
mkvparser.h | 219 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 191 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member in struct:wpa_eapol_key
|