/system/security/keystore-engine/ |
keystore_backend.h | 31 virtual int32_t sign(const char *key_id, const uint8_t* in, size_t len, 33 virtual int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
keystore_backend_binder.h | 32 int32_t sign(const char *key_id, const uint8_t* in, size_t len, 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
keystore_backend_hidl.h | 32 int32_t sign(const char *key_id, const uint8_t* in, size_t len, 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
keystore_backend_hidl.cpp | 34 const char *key_id, const uint8_t* in, size_t len, uint8_t** reply, 36 if (key_id == NULL || in == NULL || reply == NULL || reply_len == NULL) { 57 key_id, std::vector<uint8_t>(in, in + len), cb); 65 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) { 66 if (key_id == NULL || pubkey == NULL || pubkey_len == NULL) { 86 Return<void> ret = service->getPublicKey(key_id, cb);
|
android_engine.cpp | 60 char *key_id = reinterpret_cast<char *>(*from_d); local 61 if (key_id != NULL) { 62 *from_d = strdup(key_id); 74 char *key_id = reinterpret_cast<char *>(ptr); local 75 free(key_id); 153 const char *key_id = rsa_get_key_id(rsa); local 154 if (key_id == NULL) { 155 ALOGE("key had no key_id!"); 161 int32_t ret = g_keystore_backend->sign(key_id, in, len, &reply, &reply_len); 242 const char *key_id = ecdsa_get_key_id(ec_key) local [all...] |
keystore_backend_binder.cpp | 39 const char *key_id, const uint8_t* in, size_t len, uint8_t** reply, 52 auto ret = service->sign(String16(key_id), inBlob, &reply_vec); 63 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) { 74 auto ret = service->get_pubkey(String16(key_id), &pubkey_vec);
|
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_mod_oem_crypto.h | 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object 49 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
|
wv_mod_drm_api.h | 88 const uint8_t *key_id, 326 * @brief Returns the decrypted key control block for the given key_id. 329 const uint8_t *key_id,
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 34 key_id="4"
|
/system/keymaster/ |
keymaster_enforcement_test.cpp | 91 static const km_id_t key_id = 0xa; member in class:keymaster::test::KeymasterBaseTest 102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set); 115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set); 168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set) 866 km_id_t key_id = 0; local [all...] |
operation.h | 95 void set_key_id(uint64_t key_id) { key_id_ = key_id; } 96 uint64_t key_id() const { return key_id_; } function in class:keymaster::Operation
|
android_keymaster.cpp | 268 km_id_t key_id; local 270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) 272 operation->set_key_id(key_id); 274 request.purpose, key_id, key->authorizations(), request.additional_params, 301 operation->purpose(), operation->key_id(), operation->authorizations(), 330 operation->purpose(), operation->key_id(), operation->authorizations(),
|
/frameworks/av/drm/mediacas/plugins/clearkey/ |
KeyFetcher.h | 35 int key_id; member in struct:android::clearkeycas::KeyFetcher::KeyInfo
|
ClearKeyFetcher.cpp | 118 key.key_id = container.descriptor(i).id(); 121 keys->at(key.key_id & 1) = key;
|
/external/tcpdump/ |
print-ntp.c | 128 uint32_t key_id; member in struct:ntpdata 306 ND_TCHECK(bp->key_id); 307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id)); 309 ND_TCHECK(bp->key_id); 310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
|
/external/autotest/frontend/afe/ |
moblab_rpc_interface.py | 342 def _is_valid_boto_key(key_id, key_secret): 345 @param: key_id: The boto key id string. 350 if not key_id or not key_secret: 352 conn = boto.connect_gs(key_id, key_secret) 363 def _is_valid_bucket(key_id, key_secret, bucket_name): 366 @param: key_id: The boto key id string. 372 if not key_id or not key_secret or not bucket_name: 374 conn = boto.connect_gs(key_id, key_secret) 382 def _is_valid_bucket_url(key_id, key_secret, bucket_url): 385 @param: key_id: The boto key id string [all...] |
/external/openssh/ |
krl.h | 53 const struct sshkey *ca_key, const char *key_id);
|
krl.c | 67 char *key_id; member in struct:revoked_key_id 115 return strcmp(a->key_id, b->key_id); 156 free(rki->key_id); 338 const char *key_id) 347 KRL_DBG(("%s: revoke %s", __func__, key_id)); 349 (rki->key_id = strdup(key_id)) == NULL) { 355 free(rki->key_id); 435 key->cert->key_id); 815 char *key_id = NULL; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 527 * key_id - Key ID for OpenSSL engine 532 char *key_id; member in struct:eap_peer_config
|
/frameworks/av/drm/mediacas/plugins/clearkey/tests/ |
ClearKeyFetcherTest.cpp | 97 EXPECT_EQ(0, keys[0].key_id); 101 EXPECT_EQ(1, keys[1].key_id);
|
/external/ltp/testcases/kernel/controllers/cpuset/cpuset_memory_test/ |
cpuset_memory_test.c | 58 static int key_id; /* used with opt_shm */ variable 106 key_id = atoi(optarg); 257 key = ftok("/dev/null", key_id);
|
/external/ltp/testcases/kernel/controllers/memcg/functional/ |
memcg_process.c | 50 int key_id; /* used with opt_shm */ variable 85 key_id = atoi(optarg); 231 key = ftok("/dev/null", key_id);
|
/external/kmod/libkmod/ |
libkmod-signature.c | 137 sig_info->key_id = mem + size;
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 179 uint16 key_id; member in struct:__anon39997
|
/system/bt/stack/smp/ |
smp_int.h | 358 extern void smp_h6_calc_chk(uint8_t* key, uint8_t* key_id, uint8_t* mac); 361 uint8_t* key_id, uint8_t* n1, 525 uint8_t* t, uint8_t* counter, uint8_t* key_id, uint8_t* n1, uint8_t* n2,
|