HomeSort by relevance Sort by last modified time
    Searched refs:key_name (Results 1 - 25 of 38) sorted by null

1 2

  /system/security/keystore/include/keystore/
keystore_client.h 62 // decryption. If a key identified by |key_name| does not already exist it
65 // have |key_name| as a prefix.
66 virtual bool encryptWithAuthentication(const std::string& key_name, const std::string& data,
70 // EncryptWithAuthentication using the key(s) identified by |key_name|. On
72 virtual bool decryptWithAuthentication(const std::string& key_name,
77 // |key_name|, |input_parameters|, and |output_parameters| are as in
81 virtual bool oneShotOperation(KeyPurpose purpose, const std::string& key_name,
93 // the given |key_name|. The [hardware|software]_enforced_characteristics of
97 virtual KeyStoreNativeReturnCode generateKey(const std::string& key_name,
103 // identified by |key_name|. Returns KM_ERROR_OK on success and a Keystor
    [all...]
keystore_client_mock.h 33 bool(const std::string& key_name, const std::string& data,
36 bool(const std::string& key_name, const std::string& encrypted_data,
39 bool(keymaster_purpose_t purpose, const std::string& key_name,
45 int32_t(const std::string& key_name,
50 int32_t(const std::string& key_name,
54 int32_t(const std::string& key_name,
60 const std::string& key_name, std::string* export_data));
61 MOCK_METHOD1(deleteKey, int32_t(const std::string& key_name));
63 MOCK_METHOD5(beginOperation, int32_t(keymaster_purpose_t purpose, const std::string& key_name,
78 MOCK_METHOD1(doesKeyExist, bool(const std::string& key_name));
    [all...]
keystore_client_impl.h 37 bool encryptWithAuthentication(const std::string& key_name, const std::string& data,
39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data,
41 bool oneShotOperation(KeyPurpose purpose, const std::string& key_name,
47 KeyStoreNativeReturnCode generateKey(const std::string& key_name,
52 getKeyCharacteristics(const std::string& key_name,
55 KeyStoreNativeReturnCode importKey(const std::string& key_name,
60 KeyStoreNativeReturnCode exportKey(KeyFormat export_format, const std::string& key_name,
62 KeyStoreNativeReturnCode deleteKey(const std::string& key_name) override;
64 KeyStoreNativeReturnCode beginOperation(KeyPurpose purpose, const std::string& key_name,
79 bool doesKeyExist(const std::string& key_name) override
    [all...]
  /system/tpm/attestation/server/
pkcs11_key_store.h 52 const std::string& key_name,
55 const std::string& key_name,
58 const std::string& key_name) override;
73 base::Callback<bool(const std::string& key_name,
79 const std::string& key_name);
94 std::string* key_name);
97 // object identified by |object_handle| if |key_name| matches |key_prefix|.
101 const std::string& key_name,
pkcs11_key_store.cc 95 const std::string& key_name,
107 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name);
109 LOG(WARNING) << "Pkcs11KeyStore: Key does not exist: " << key_name;
116 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name;
123 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name;
131 const std::string& key_name,
134 if (!Delete(username, key_name)) {
147 std::string mutable_key_name(key_name);
166 LOG(ERROR) << "Pkcs11KeyStore: Failed to write key data: " << key_name;
173 const std::string& key_name) {
509 std::string key_name; local
    [all...]
pkcs11_key_store_test.cc 576 std::string key_name = std::string("prefix") + base::IntToString(i); local
577 key_store.Write(kDefaultUser, key_name, std::string(key_name));
584 std::string key_name = std::string("prefix") + base::IntToString(i); local
585 EXPECT_FALSE(key_store.Read(kDefaultUser, key_name, &blob));
  /external/autotest/client/site_tests/hardware_Keyboard/
hardware_Keyboard.py 34 def _supported(self, event, key_name):
36 cmd += ' -s ' + key_name
39 logging.error('Unsupported Key : %s' % key_name)
41 logging.info('%s : %s' % (key_name, output))
65 if not all(self._supported(high_key_event, key_name)
66 for key_name in hardware_Keyboard.supported_keys):
  /system/security/keystore/
keystore_client_impl.cpp 62 bool KeystoreClientImpl::encryptWithAuthentication(const std::string& key_name,
69 std::string encryption_key_name = key_name + kEncryptSuffix;
73 std::string authentication_key_name = key_name + kAuthenticateSuffix;
116 bool KeystoreClientImpl::decryptWithAuthentication(const std::string& key_name,
124 std::string authentication_key_name = key_name + kAuthenticateSuffix;
135 std::string encryption_key_name = key_name + kEncryptSuffix;
150 bool KeystoreClientImpl::oneShotOperation(KeyPurpose purpose, const std::string& key_name,
158 beginOperation(purpose, key_name, input_parameters, output_parameters, &handle);
185 KeyStoreNativeReturnCode KeystoreClientImpl::generateKey(const std::string& key_name,
189 String16 key_name16(key_name.data(), key_name.size())
    [all...]
keystore_cli_v2.cpp 46 " generate --name=<key_name>\n"
47 " get-chars --name=<key_name>\n"
48 " export --name=<key_name>\n"
49 " delete --name=<key_name>\n"
51 " exists --name=<key_name>\n"
53 " sign-verify --name=<key_name>\n"
54 " [en|de]crypt --name=<key_name> --in=<file> --out=<file>\n");
342 for (const auto& key_name : key_list) {
343 printf(" %s\n", key_name.c_str());
406 int Encrypt(const std::string& key_name, const std::string& input_filename
    [all...]
  /external/webrtc/webrtc/base/
win32regkey.cc 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) {
40 key_name,
48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) {
49 return Open(parent_key, key_name, KEY_ALL_ACCESS);
221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) {
222 ASSERT(key_name != NULL);
225 LONG res = ::RegDeleteKey(h_key_, key_name);
257 const wchar_t* key_name,
263 ASSERT(key_name != NULL);
268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options
    [all...]
win32regkey.h 45 HRESULT Create(HKEY parent_key, const wchar_t* key_name);
48 const wchar_t* key_name,
56 HRESULT Open(HKEY parent_key, const wchar_t* key_name);
58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired);
80 bool HasSubkey(const wchar_t* key_name) const;
91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name);
245 HRESULT DeleteSubKey(const wchar_t* key_name);
248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name);
282 static bool SafeKeyNameForDeletion(const wchar_t* key_name);
307 static std::wstring GetParentKeyInfo(std::wstring* key_name);
    [all...]
  /tools/test/connectivity/tools/lab/
runner.py 60 key_name = self.convert_to_snake(metric.__class__.__name__)[:-7]
61 responses[key_name] = metric.gather_metric()
  /external/autotest/client/tests/iozone/
iozone.py 100 key_name = "%d-%d-%s" % (fields[0], fields[1], l)
101 keylist[key_name] = v
125 key_name = '%s-%d-kids' % (section, w_count)
126 keylist[key_name] = match.group(3)
157 key_name = "%s-%d-%s" % (section, w_count, basekey)
158 keylist[key_name] = result
  /external/autotest/frontend/migrations/
037_db_constraints.py 73 key_name = foreign_key_name(table, field)
76 (table, key_name, field, destination_table))
80 key_name = foreign_key_name(table, field)
81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
  /external/boringssl/src/crypto/evp/
evp_test.cc 182 const std::string &key_name = t->GetParameter(); local
183 EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name;
184 (*key_map)[key_name] = std::move(pkey);
248 const std::string &key_name = t->GetParameter(); local
249 if (key_map->count(key_name) == 0) {
250 ADD_FAILURE() << "Could not find key " << key_name;
253 EVP_PKEY *key = (*key_map)[key_name].get();
  /frameworks/base/tools/aapt2/tools/consumers/
duplicates.py 125 key_name = "{0}:{1}".format(self._current_resource.name,
128 self.resource_definitions[key_name] += [self._current_resource]
130 self.resource_definitions[key_name] = [self._current_resource]
  /system/tpm/trunks/
tpm_generated_test.cc 243 TPM2B_NAME key_name; local
249 &creation_ticket, &key_name, &authorization);
259 EXPECT_EQ(key_name.size, 3);
260 EXPECT_EQ(key_name.name[0], 'K');
261 EXPECT_EQ(key_name.name[1], 'E');
262 EXPECT_EQ(key_name.name[2], 'Y');
tpm_utility_impl.cc 444 std::string key_name; local
445 result = ComputeKeyName(public_area, &key_name);
455 result = factory_.GetTpm()->RSA_EncryptSync(key_handle, key_name, in_message,
511 std::string key_name; local
512 result = ComputeKeyName(public_area, &key_name);
522 result = factory_.GetTpm()->RSA_DecryptSync(key_handle, key_name, in_message,
578 std::string key_name; local
579 result = ComputeKeyName(public_area, &key_name);
592 factory_.GetTpm()->SignSync(key_handle, key_name, tpm_digest, in_scheme,
650 std::string key_name; local
709 std::string key_name; local
950 TPM2B_NAME key_name; local
1662 TPM2B_NAME key_name; local
    [all...]
  /external/libchrome/base/trace_event/
trace_event_argument.cc 58 std::string key_name; local
62 key_name = reinterpret_cast<const char*>(static_cast<uintptr_t>(ptr_value));
64 res = pickle_iterator.ReadString(&key_name);
67 return key_name;
  /system/bt/stack/smp/
smp_cmac.cc 46 void print128(BT_OCTET16 x, const uint8_t* key_name) {
51 SMP_TRACE_WARNING("%s(MSB ~ LSB) = ", key_name);
smp_int.h 535 const char* key_name,
543 extern void print128(BT_OCTET16 x, const uint8_t* key_name);
  /external/boringssl/src/tool/
speed.cc 143 static bool SpeedRSA(const std::string &key_name, RSA *key,
145 if (!selected.empty() && key_name.find(selected) == std::string::npos) {
166 results.Print(key_name + " signing");
192 results.Print(key_name + " verify");
  /external/autotest/client/site_tests/hardware_Keyboard/src/
evtest.c 350 int is_key_supported(int fd, char *key_name)
353 int keycode = keycode_from_name(key_name);
364 printf("Invalid keycode %s", key_name);
  /external/boringssl/src/ssl/
ssl_session.cc 615 uint8_t key_name[16]; local
617 if (tctx->tlsext_ticket_key_cb(ssl, key_name, iv, ctx.get(), hctx.get(),
629 OPENSSL_memcpy(key_name, tctx->tlsext_tick_key_name, 16);
633 if (!CBB_add_bytes(out, key_name, 16) ||
    [all...]
  /external/syslinux/com32/menu/
readconfig.c 753 char *key_name, *k, *ek; local
756 p = get_word(skipspace(p + 9), &key_name);
758 k = key_name;
772 refstr_put(key_name);

Completed in 572 milliseconds

1 2