/system/security/keystore/include/keystore/ |
keystore_client.h | 62 // decryption. If a key identified by |key_name| does not already exist it 65 // have |key_name| as a prefix. 66 virtual bool encryptWithAuthentication(const std::string& key_name, const std::string& data, 70 // EncryptWithAuthentication using the key(s) identified by |key_name|. On 72 virtual bool decryptWithAuthentication(const std::string& key_name, 77 // |key_name|, |input_parameters|, and |output_parameters| are as in 81 virtual bool oneShotOperation(KeyPurpose purpose, const std::string& key_name, 93 // the given |key_name|. The [hardware|software]_enforced_characteristics of 97 virtual KeyStoreNativeReturnCode generateKey(const std::string& key_name, 103 // identified by |key_name|. Returns KM_ERROR_OK on success and a Keystor [all...] |
keystore_client_mock.h | 33 bool(const std::string& key_name, const std::string& data, 36 bool(const std::string& key_name, const std::string& encrypted_data, 39 bool(keymaster_purpose_t purpose, const std::string& key_name, 45 int32_t(const std::string& key_name, 50 int32_t(const std::string& key_name, 54 int32_t(const std::string& key_name, 60 const std::string& key_name, std::string* export_data)); 61 MOCK_METHOD1(deleteKey, int32_t(const std::string& key_name)); 63 MOCK_METHOD5(beginOperation, int32_t(keymaster_purpose_t purpose, const std::string& key_name, 78 MOCK_METHOD1(doesKeyExist, bool(const std::string& key_name)); [all...] |
keystore_client_impl.h | 37 bool encryptWithAuthentication(const std::string& key_name, const std::string& data, 39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data, 41 bool oneShotOperation(KeyPurpose purpose, const std::string& key_name, 47 KeyStoreNativeReturnCode generateKey(const std::string& key_name, 52 getKeyCharacteristics(const std::string& key_name, 55 KeyStoreNativeReturnCode importKey(const std::string& key_name, 60 KeyStoreNativeReturnCode exportKey(KeyFormat export_format, const std::string& key_name, 62 KeyStoreNativeReturnCode deleteKey(const std::string& key_name) override; 64 KeyStoreNativeReturnCode beginOperation(KeyPurpose purpose, const std::string& key_name, 79 bool doesKeyExist(const std::string& key_name) override [all...] |
/system/tpm/attestation/server/ |
pkcs11_key_store.h | 52 const std::string& key_name, 55 const std::string& key_name, 58 const std::string& key_name) override; 73 base::Callback<bool(const std::string& key_name, 79 const std::string& key_name); 94 std::string* key_name); 97 // object identified by |object_handle| if |key_name| matches |key_prefix|. 101 const std::string& key_name,
|
pkcs11_key_store.cc | 95 const std::string& key_name, 107 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); 109 LOG(WARNING) << "Pkcs11KeyStore: Key does not exist: " << key_name; 116 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 123 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 131 const std::string& key_name, 134 if (!Delete(username, key_name)) { 147 std::string mutable_key_name(key_name); 166 LOG(ERROR) << "Pkcs11KeyStore: Failed to write key data: " << key_name; 173 const std::string& key_name) { 509 std::string key_name; local [all...] |
pkcs11_key_store_test.cc | 576 std::string key_name = std::string("prefix") + base::IntToString(i); local 577 key_store.Write(kDefaultUser, key_name, std::string(key_name)); 584 std::string key_name = std::string("prefix") + base::IntToString(i); local 585 EXPECT_FALSE(key_store.Read(kDefaultUser, key_name, &blob));
|
/external/autotest/client/site_tests/hardware_Keyboard/ |
hardware_Keyboard.py | 34 def _supported(self, event, key_name): 36 cmd += ' -s ' + key_name 39 logging.error('Unsupported Key : %s' % key_name) 41 logging.info('%s : %s' % (key_name, output)) 65 if not all(self._supported(high_key_event, key_name) 66 for key_name in hardware_Keyboard.supported_keys):
|
/system/security/keystore/ |
keystore_client_impl.cpp | 62 bool KeystoreClientImpl::encryptWithAuthentication(const std::string& key_name, 69 std::string encryption_key_name = key_name + kEncryptSuffix; 73 std::string authentication_key_name = key_name + kAuthenticateSuffix; 116 bool KeystoreClientImpl::decryptWithAuthentication(const std::string& key_name, 124 std::string authentication_key_name = key_name + kAuthenticateSuffix; 135 std::string encryption_key_name = key_name + kEncryptSuffix; 150 bool KeystoreClientImpl::oneShotOperation(KeyPurpose purpose, const std::string& key_name, 158 beginOperation(purpose, key_name, input_parameters, output_parameters, &handle); 185 KeyStoreNativeReturnCode KeystoreClientImpl::generateKey(const std::string& key_name, 189 String16 key_name16(key_name.data(), key_name.size()) [all...] |
keystore_cli_v2.cpp | 46 " generate --name=<key_name>\n" 47 " get-chars --name=<key_name>\n" 48 " export --name=<key_name>\n" 49 " delete --name=<key_name>\n" 51 " exists --name=<key_name>\n" 53 " sign-verify --name=<key_name>\n" 54 " [en|de]crypt --name=<key_name> --in=<file> --out=<file>\n"); 342 for (const auto& key_name : key_list) { 343 printf(" %s\n", key_name.c_str()); 406 int Encrypt(const std::string& key_name, const std::string& input_filename [all...] |
/external/webrtc/webrtc/base/ |
win32regkey.cc | 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) { 40 key_name, 48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) { 49 return Open(parent_key, key_name, KEY_ALL_ACCESS); 221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) { 222 ASSERT(key_name != NULL); 225 LONG res = ::RegDeleteKey(h_key_, key_name); 257 const wchar_t* key_name, 263 ASSERT(key_name != NULL); 268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options [all...] |
win32regkey.h | 45 HRESULT Create(HKEY parent_key, const wchar_t* key_name); 48 const wchar_t* key_name, 56 HRESULT Open(HKEY parent_key, const wchar_t* key_name); 58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired); 80 bool HasSubkey(const wchar_t* key_name) const; 91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name); 245 HRESULT DeleteSubKey(const wchar_t* key_name); 248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name); 282 static bool SafeKeyNameForDeletion(const wchar_t* key_name); 307 static std::wstring GetParentKeyInfo(std::wstring* key_name); [all...] |
/tools/test/connectivity/tools/lab/ |
runner.py | 60 key_name = self.convert_to_snake(metric.__class__.__name__)[:-7] 61 responses[key_name] = metric.gather_metric()
|
/external/autotest/client/tests/iozone/ |
iozone.py | 100 key_name = "%d-%d-%s" % (fields[0], fields[1], l) 101 keylist[key_name] = v 125 key_name = '%s-%d-kids' % (section, w_count) 126 keylist[key_name] = match.group(3) 157 key_name = "%s-%d-%s" % (section, w_count, basekey) 158 keylist[key_name] = result
|
/external/autotest/frontend/migrations/ |
037_db_constraints.py | 73 key_name = foreign_key_name(table, field) 76 (table, key_name, field, destination_table)) 80 key_name = foreign_key_name(table, field) 81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
|
/external/boringssl/src/crypto/evp/ |
evp_test.cc | 182 const std::string &key_name = t->GetParameter(); local 183 EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name; 184 (*key_map)[key_name] = std::move(pkey); 248 const std::string &key_name = t->GetParameter(); local 249 if (key_map->count(key_name) == 0) { 250 ADD_FAILURE() << "Could not find key " << key_name; 253 EVP_PKEY *key = (*key_map)[key_name].get();
|
/frameworks/base/tools/aapt2/tools/consumers/ |
duplicates.py | 125 key_name = "{0}:{1}".format(self._current_resource.name, 128 self.resource_definitions[key_name] += [self._current_resource] 130 self.resource_definitions[key_name] = [self._current_resource]
|
/system/tpm/trunks/ |
tpm_generated_test.cc | 243 TPM2B_NAME key_name; local 249 &creation_ticket, &key_name, &authorization); 259 EXPECT_EQ(key_name.size, 3); 260 EXPECT_EQ(key_name.name[0], 'K'); 261 EXPECT_EQ(key_name.name[1], 'E'); 262 EXPECT_EQ(key_name.name[2], 'Y');
|
tpm_utility_impl.cc | 444 std::string key_name; local 445 result = ComputeKeyName(public_area, &key_name); 455 result = factory_.GetTpm()->RSA_EncryptSync(key_handle, key_name, in_message, 511 std::string key_name; local 512 result = ComputeKeyName(public_area, &key_name); 522 result = factory_.GetTpm()->RSA_DecryptSync(key_handle, key_name, in_message, 578 std::string key_name; local 579 result = ComputeKeyName(public_area, &key_name); 592 factory_.GetTpm()->SignSync(key_handle, key_name, tpm_digest, in_scheme, 650 std::string key_name; local 709 std::string key_name; local 950 TPM2B_NAME key_name; local 1662 TPM2B_NAME key_name; local [all...] |
/external/libchrome/base/trace_event/ |
trace_event_argument.cc | 58 std::string key_name; local 62 key_name = reinterpret_cast<const char*>(static_cast<uintptr_t>(ptr_value)); 64 res = pickle_iterator.ReadString(&key_name); 67 return key_name;
|
/system/bt/stack/smp/ |
smp_cmac.cc | 46 void print128(BT_OCTET16 x, const uint8_t* key_name) { 51 SMP_TRACE_WARNING("%s(MSB ~ LSB) = ", key_name);
|
smp_int.h | 535 const char* key_name, 543 extern void print128(BT_OCTET16 x, const uint8_t* key_name);
|
/external/boringssl/src/tool/ |
speed.cc | 143 static bool SpeedRSA(const std::string &key_name, RSA *key, 145 if (!selected.empty() && key_name.find(selected) == std::string::npos) { 166 results.Print(key_name + " signing"); 192 results.Print(key_name + " verify");
|
/external/autotest/client/site_tests/hardware_Keyboard/src/ |
evtest.c | 350 int is_key_supported(int fd, char *key_name)
353 int keycode = keycode_from_name(key_name);
364 printf("Invalid keycode %s", key_name);
|
/external/boringssl/src/ssl/ |
ssl_session.cc | 615 uint8_t key_name[16]; local 617 if (tctx->tlsext_ticket_key_cb(ssl, key_name, iv, ctx.get(), hctx.get(), 629 OPENSSL_memcpy(key_name, tctx->tlsext_tick_key_name, 16); 633 if (!CBB_add_bytes(out, key_name, 16) || [all...] |
/external/syslinux/com32/menu/ |
readconfig.c | 753 char *key_name, *k, *ek; local 756 p = get_word(skipspace(p + 9), &key_name); 758 k = key_name; 772 refstr_put(key_name);
|