HomeSort by relevance Sort by last modified time
    Searched refs:key_id (Results 1 - 25 of 59) sorted by null

1 2 3

  /system/security/keystore-engine/
keystore_backend.h 31 virtual int32_t sign(const char *key_id, const uint8_t* in, size_t len,
33 virtual int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
keystore_backend_binder.h 32 int32_t sign(const char *key_id, const uint8_t* in, size_t len,
34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
keystore_backend_hidl.h 32 int32_t sign(const char *key_id, const uint8_t* in, size_t len,
34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
keystore_backend_hidl.cpp 34 const char *key_id, const uint8_t* in, size_t len, uint8_t** reply,
36 if (key_id == NULL || in == NULL || reply == NULL || reply_len == NULL) {
57 key_id, std::vector<uint8_t>(in, in + len), cb);
65 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) {
66 if (key_id == NULL || pubkey == NULL || pubkey_len == NULL) {
86 Return<void> ret = service->getPublicKey(key_id, cb);
android_engine.cpp 60 char *key_id = reinterpret_cast<char *>(*from_d); local
61 if (key_id != NULL) {
62 *from_d = strdup(key_id);
74 char *key_id = reinterpret_cast<char *>(ptr); local
75 free(key_id);
153 const char *key_id = rsa_get_key_id(rsa); local
154 if (key_id == NULL) {
155 ALOGE("key had no key_id!");
161 int32_t ret = g_keystore_backend->sign(key_id, in, len, &reply, &reply_len);
242 const char *key_id = ecdsa_get_key_id(ec_key) local
    [all...]
keystore_backend_binder.cpp 39 const char *key_id, const uint8_t* in, size_t len, uint8_t** reply,
52 auto ret = service->sign(String16(key_id), inBlob, &reply_vec);
63 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) {
74 auto ret = service->get_pubkey(String16(key_id), &pubkey_vec);
  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_mod_oem_crypto.h 37 const uint8_t *key_id; member in struct:drm_wv_mod_key_object
49 const uint8_t *key_id; member in struct:drm_wv_mod_key_refresh_object
wv_mod_drm_api.h 88 const uint8_t *key_id,
326 * @brief Returns the decrypted key control block for the given key_id.
329 const uint8_t *key_id,
  /external/wpa_supplicant_8/wpa_supplicant/examples/
openCryptoki.conf 34 key_id="4"
  /system/keymaster/
keymaster_enforcement_test.cpp 91 static const km_id_t key_id = 0xa; member in class:keymaster::test::KeymasterBaseTest
102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set);
115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set));
118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set);
140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set));
143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set);
168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set);
182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)
866 km_id_t key_id = 0; local
    [all...]
operation.h 95 void set_key_id(uint64_t key_id) { key_id_ = key_id; }
96 uint64_t key_id() const { return key_id_; } function in class:keymaster::Operation
android_keymaster.cpp 268 km_id_t key_id; local
270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id))
272 operation->set_key_id(key_id);
274 request.purpose, key_id, key->authorizations(), request.additional_params,
301 operation->purpose(), operation->key_id(), operation->authorizations(),
330 operation->purpose(), operation->key_id(), operation->authorizations(),
  /frameworks/av/drm/mediacas/plugins/clearkey/
KeyFetcher.h 35 int key_id; member in struct:android::clearkeycas::KeyFetcher::KeyInfo
ClearKeyFetcher.cpp 118 key.key_id = container.descriptor(i).id();
121 keys->at(key.key_id & 1) = key;
  /external/tcpdump/
print-ntp.c 128 uint32_t key_id; member in struct:ntpdata
306 ND_TCHECK(bp->key_id);
307 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
309 ND_TCHECK(bp->key_id);
310 ND_PRINT((ndo, "\n\tKey id: %u", bp->key_id));
  /external/autotest/frontend/afe/
moblab_rpc_interface.py 342 def _is_valid_boto_key(key_id, key_secret):
345 @param: key_id: The boto key id string.
350 if not key_id or not key_secret:
352 conn = boto.connect_gs(key_id, key_secret)
363 def _is_valid_bucket(key_id, key_secret, bucket_name):
366 @param: key_id: The boto key id string.
372 if not key_id or not key_secret or not bucket_name:
374 conn = boto.connect_gs(key_id, key_secret)
382 def _is_valid_bucket_url(key_id, key_secret, bucket_url):
385 @param: key_id: The boto key id string
    [all...]
  /external/openssh/
krl.h 53 const struct sshkey *ca_key, const char *key_id);
krl.c 67 char *key_id; member in struct:revoked_key_id
115 return strcmp(a->key_id, b->key_id);
156 free(rki->key_id);
338 const char *key_id)
347 KRL_DBG(("%s: revoke %s", __func__, key_id));
349 (rki->key_id = strdup(key_id)) == NULL) {
355 free(rki->key_id);
435 key->cert->key_id);
815 char *key_id = NULL; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 527 * key_id - Key ID for OpenSSL engine
532 char *key_id; member in struct:eap_peer_config
  /frameworks/av/drm/mediacas/plugins/clearkey/tests/
ClearKeyFetcherTest.cpp 97 EXPECT_EQ(0, keys[0].key_id);
101 EXPECT_EQ(1, keys[1].key_id);
  /external/ltp/testcases/kernel/controllers/cpuset/cpuset_memory_test/
cpuset_memory_test.c 58 static int key_id; /* used with opt_shm */ variable
106 key_id = atoi(optarg);
257 key = ftok("/dev/null", key_id);
  /external/ltp/testcases/kernel/controllers/memcg/functional/
memcg_process.c 50 int key_id; /* used with opt_shm */ variable
85 key_id = atoi(optarg);
231 key = ftok("/dev/null", key_id);
  /external/kmod/libkmod/
libkmod-signature.c 137 sig_info->key_id = mem + size;
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 179 uint16 key_id; member in struct:__anon39997
  /system/bt/stack/smp/
smp_int.h 358 extern void smp_h6_calc_chk(uint8_t* key, uint8_t* key_id, uint8_t* mac);
361 uint8_t* key_id, uint8_t* n1,
525 uint8_t* t, uint8_t* counter, uint8_t* key_id, uint8_t* n1, uint8_t* n2,

Completed in 628 milliseconds

1 2 3