HomeSort by relevance Sort by last modified time
    Searched defs:key_id (Results 1 - 25 of 28) sorted by null

1 2

  /frameworks/av/drm/mediacas/plugins/clearkey/
KeyFetcher.h 35 int key_id; member in struct:android::clearkeycas::KeyFetcher::KeyInfo
  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_mod_oem_crypto.h 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object
49 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
  /system/keymaster/
operation.h 95 void set_key_id(uint64_t key_id) { key_id_ = key_id; }
96 uint64_t key_id() const { return key_id_; } function in class:keymaster::Operation
keymaster_enforcement_test.cpp 91 static const km_id_t key_id = 0xa; member in class:keymaster::test::KeymasterBaseTest
102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set);
115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set));
118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set);
140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set));
143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set);
168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set);
182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)
866 km_id_t key_id = 0; local
    [all...]
android_keymaster.cpp 268 km_id_t key_id; local
270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id))
272 operation->set_key_id(key_id);
274 request.purpose, key_id, key->authorizations(), request.additional_params,
301 operation->purpose(), operation->key_id(), operation->authorizations(),
330 operation->purpose(), operation->key_id(), operation->authorizations(),
  /external/kmod/libkmod/
libkmod-internal.h 186 const char *key_id; member in struct:kmod_signature_info
  /external/iw/
event.c 200 __u8 key_id = nla_get_u8(attrs[NL80211_ATTR_KEY_IDX]); local
201 printf(" Key Id %d", key_id);
  /external/ltp/testcases/kernel/controllers/cpuset/cpuset_memory_test/
cpuset_memory_test.c 58 static int key_id; /* used with opt_shm */ variable
106 key_id = atoi(optarg);
257 key = ftok("/dev/null", key_id);
  /external/ltp/testcases/kernel/controllers/memcg/functional/
memcg_process.c 50 int key_id; /* used with opt_shm */ variable
85 key_id = atoi(optarg);
231 key = ftok("/dev/null", key_id);
  /external/openssh/
sshkey.h 89 char *key_id; member in struct:sshkey_cert
krl.c 67 char *key_id; member in struct:revoked_key_id
115 return strcmp(a->key_id, b->key_id);
156 free(rki->key_id);
338 const char *key_id)
347 KRL_DBG(("%s: revoke %s", __func__, key_id));
349 (rki->key_id = strdup(key_id)) == NULL) {
355 free(rki->key_id);
435 key->cert->key_id);
815 char *key_id = NULL; local
    [all...]
  /external/tcpdump/
print-ntp.c 128 uint32_t key_id; member in struct:ntpdata
306 ND_TCHECK(bp->key_id);
307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
309 ND_TCHECK(bp->key_id);
310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
print-rsvp.c 297 uint8_t key_id[6]; member in struct:rsvp_obj_integrity_t
    [all...]
  /system/security/keystore-engine/
android_engine.cpp 60 char *key_id = reinterpret_cast<char *>(*from_d); local
61 if (key_id != NULL) {
62 *from_d = strdup(key_id);
74 char *key_id = reinterpret_cast<char *>(ptr); local
75 free(key_id);
153 const char *key_id = rsa_get_key_id(rsa); local
154 if (key_id == NULL) {
155 ALOGE("key had no key_id!");
161 int32_t ret = g_keystore_backend->sign(key_id, in, len, &reply, &reply_len);
242 const char *key_id = ecdsa_get_key_id(ec_key) local
    [all...]
  /bionic/libc/dns/nameser/
ns_print.c 461 u_int keyflags, protocol, algorithm, key_id; local
470 key_id = dst_s_dns_key_id(rdata, edata-rdata);
472 key_id = 0;
499 n = snprintf(tmp, sizeof(tmp), " ; key_tag= %u", key_id);
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 527 * key_id - Key ID for OpenSSL engine
532 char *key_id; member in struct:eap_peer_config
  /external/wpa_supplicant_8/src/crypto/
tls.h 136 * @key_id: the private key's id when using engine (this is OpenSSL
180 const char *key_id; member in struct:tls_connection_params
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 179 uint16 key_id; member in struct:__anon39997
  /system/bt/stack/smp/
smp_keys.cc 1233 uint8_t key_id[4] = {0x65, 0x6c, 0x74, 0x62}; local
    [all...]
  /external/ipsec-tools/src/racoon/
oakley.c 1831 const char *key_id; local
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_nl80211_event.c 957 u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]); local
958 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id);
    [all...]
  /external/iproute2/tc/
tc_bpf.c 1418 uint32_t map_id, key_id; local
1429 ret = sscanf(data.sec_name, "%i/%i", &map_id, &key_id);
1441 ret = bpf_map_update(ctx->map_fds[idx], &key_id,
    [all...]
  /external/libvpx/libvpx/third_party/libwebm/mkvparser/
mkvparser.h 219 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
  /external/libvpx/libwebm/mkvparser/
mkvparser.h 219 unsigned char* key_id; member in struct:mkvparser::ContentEncoding::ContentEncryption
  /external/wpa_supplicant_8/src/common/
wpa_common.h 191 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ member in struct:wpa_eapol_key

Completed in 514 milliseconds

1 2