/external/ltp/testcases/kernel/security/mmc_security/ |
change_password.sh | 46 keyid=$(keyctl request mmc "mmc:key") 47 if [ -z "$keyid" ]; then 68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
|
remove_password.sh | 48 keyid=$(keyctl request mmc "mmc:key") 49 if [ -z "$keyid" ]; then
|
/device/google/contexthub/firmware/os/platform/stm32/inc/plat/ |
eeData.h | 33 #define PREPOPULATED_ENCR_KEY(name, keyid, ...) \ 34 const struct Stm32f4xxEedataEncrKey __attribute__ ((section (".eedata"))) __EE__ ## name = { { EE_DATA_NAME_ENCR_KEY + sizeof(struct SeosEedataEncrKeyData) * (EE_DATA_NAME_MAX + 1)}, {keyid, {__VA_ARGS__}}}
|
/system/keymaster/ |
keymaster_enforcement.cpp | 41 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 45 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 49 km_id_t keyid; member in struct:keymaster::AccessTimeMap::AccessTime 63 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 67 bool IncrementKeyAccessCount(km_id_t keyid); 71 km_id_t keyid; member in struct:keymaster::AccessCountMap::AccessCount 119 const km_id_t keyid, 139 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); 193 const km_id_t keyid, 254 if (!MinTimeBetweenOpsPassed(min_ops_timeout, keyid)) [all...] |
/system/keymaster/include/keymaster/ |
keymaster_enforcement.h | 52 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, 63 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, 96 static bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid); 151 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 152 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
/system/security/keystore/ |
keymaster_enforcement.h | 52 ErrorCode AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid, 62 ErrorCode AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, 93 static bool CreateKeyId(const hidl_vec<uint8_t>& key_blob, km_id_t* keyid); 147 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 148 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
keymaster_enforcement.cpp | 40 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 44 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 48 km_id_t keyid; member in struct:keystore::AccessTimeMap::AccessTime 62 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 66 bool IncrementKeyAccessCount(km_id_t keyid); 70 km_id_t keyid; member in struct:keystore::AccessCountMap::AccessCount 115 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid, 136 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); 189 ErrorCode KeymasterEnforcement::AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, 253 if (min_ops_timeout.isOk() && !MinTimeBetweenOpsPassed(min_ops_timeout.value(), keyid)) [all...] |
operation.h | 45 android::sp<android::IBinder> addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, 71 Operation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, const km_device_t& device, 74 uint64_t keyid; member in struct:keystore::OperationMap::Operation
|
operation.cpp | 28 sp<IBinder> OperationMap::addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, 33 mMap[token] = Operation(handle, keyid, purpose, dev, std::move(characteristics), appToken); 57 *outKeyid = entry->second.keyid; 152 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_), 156 : handle(0), keyid(0), device(nullptr), characteristics(), appToken(nullptr) {}
|
key_store_service.cpp | 1095 km_id_t keyid; local 1179 km_id_t keyid; local 1231 km_id_t keyid; local 1286 km_id_t keyid; local 1302 km_id_t keyid; local 1724 km_id_t keyid; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
SubjectKeyIdentifier.java | 49 byte[] keyid) 51 this.keyidentifier = Arrays.clone(keyid); 55 ASN1OctetString keyid) 57 this(keyid.getOctets());
|
/external/boringssl/src/crypto/x509/ |
x_x509a.c | 77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING), 113 if (!x || !x->aux || !x->aux->keyid) 115 ASN1_OCTET_STRING_free(x->aux->keyid); 116 x->aux->keyid = NULL; 121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new())) 123 return ASN1_STRING_set(aux->keyid, id, len); 137 if (!x->aux || !x->aux->keyid) 140 *len = x->aux->keyid->length; 141 return x->aux->keyid->data [all...] |
t_x509a.c | 104 if (aux->keyid) { 106 for (j = 0; j < aux->keyid->length; j++) 107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]);
|
/external/boringssl/src/crypto/x509v3/ |
v3_akey.c | 94 if (akeyid->keyid) { 95 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); 96 X509V3_add_value("keyid", tmp, &extlist); 110 * Currently two options: keyid: use the issuers subject keyid, the value 113 * is to only use this if keyid is not present. With the option 'always' this 121 char keyid = 0, issuer = 0; local 136 if (!strcmp(cnf->name, "keyid")) { 137 keyid = 1 [all...] |
v3_akeya.c | 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
|
v3_purp.c | 836 if (akid->keyid && issuer->skid && 837 ASN1_OCTET_STRING_cmp(akid->keyid, issuer->skid))
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/ |
ca.conf | 115 authorityKeyIdentifier = keyid:always,issuer 122 authorityKeyIdentifier = keyid:always,issuer 132 authorityKeyIdentifier = keyid,issuer 142 authorityKeyIdentifier = keyid,issuer:always 148 authorityKeyIdentifier=keyid:always 154 authorityKeyIdentifier = keyid,issuer
|
/external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
tpmtoken_import_openssl.cnf | 189 authorityKeyIdentifier=keyid,issuer:always 225 authorityKeyIdentifier=keyid:always,issuer:always 258 authorityKeyIdentifier=keyid:always,issuer:always
|
/frameworks/base/media/java/android/media/ |
MediaDrm.java | 404 KeyStatus(@NonNull byte[] keyId, @KeyStatusCode int statusCode) { 405 mKeyId = keyId; 594 byte[] keyId = parcel.createByteArray(); 596 keyStatusList.add(new KeyStatus(keyId, keyStatusCode)); [all...] |
/build/make/tools/releasetools/ |
sign_target_files_apks | 80 with keyid of the cert pointed by <path_to_X509_PEM_cert_file>. 287 # Skip verity keyid (for system_root_image use) if we will replace it. 322 # Replace the keyid string in META/misc_info.txt. 338 # Replace the keyid string in BOOT/cmdline. 565 # extract keyid using openssl command 569 keyid, stderr = p.communicate() 570 keyid = re.search( 571 r'keyid:([0-9a-fA-F:]*)', keyid).group(1).replace(':', '').lower() 572 print "Replacing verity keyid with %s error=%s" % (keyid, stderr [all...] |
sign_target_files_apks.py | 80 with keyid of the cert pointed by <path_to_X509_PEM_cert_file>. 287 # Skip verity keyid (for system_root_image use) if we will replace it. 322 # Replace the keyid string in META/misc_info.txt. 338 # Replace the keyid string in BOOT/cmdline. 565 # extract keyid using openssl command 569 keyid, stderr = p.communicate() 570 keyid = re.search( 571 r'keyid:([0-9a-fA-F:]*)', keyid).group(1).replace(':', '').lower() 572 print "Replacing verity keyid with %s error=%s" % (keyid, stderr [all...] |
/external/openssh/ |
ssh-pkcs11.c | 71 char *keyid; member in struct:pkcs11_key 185 free(k11->keyid); 284 key_filter[1].pValue = k11->keyid; 325 k11->keyid = xmalloc(k11->keyid_len); 326 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|
monitor.c | 697 int r, keyid, is_proof = 0; local 702 if ((r = sshbuf_get_u32(m, &keyid)) != 0 || 724 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) 725 fatal("%s: no hostkey for index %d", __func__, keyid); 749 if ((key = get_hostkey_by_index(keyid)) != NULL) { 754 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && 762 fatal("%s: no hostkey from index %d", __func__, keyid); [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Tools/msi/ |
msilib.py | 474 keyid = self.cab.gen_id(self.absolute, keyfile)
475 self.keyfiles[keyfile] = keyid
477 keyid = None
479 [(component, uuid, self.logical, flags, None, keyid)])
|
/external/e2fsprogs/misc/ |
e4crypt.c | 798 long keyid, ret; local 805 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL); 806 if (keyid < 0) { 815 printf("Switched invoking process to new session keyring %ld\n", keyid);
|