HomeSort by relevance Sort by last modified time
    Searched refs:keyid (Results 1 - 25 of 54) sorted by null

1 2 3

  /external/ltp/testcases/kernel/security/mmc_security/
change_password.sh 46 keyid=$(keyctl request mmc "mmc:key")
47 if [ -z "$keyid" ]; then
68 if ! keyctl update $keyid "$oldpasswd$newpasswd"; then
remove_password.sh 48 keyid=$(keyctl request mmc "mmc:key")
49 if [ -z "$keyid" ]; then
  /device/google/contexthub/firmware/os/platform/stm32/inc/plat/
eeData.h 33 #define PREPOPULATED_ENCR_KEY(name, keyid, ...) \
34 const struct Stm32f4xxEedataEncrKey __attribute__ ((section (".eedata"))) __EE__ ## name = { { EE_DATA_NAME_ENCR_KEY + sizeof(struct SeosEedataEncrKeyData) * (EE_DATA_NAME_MAX + 1)}, {keyid, {__VA_ARGS__}}}
  /system/keymaster/
keymaster_enforcement.cpp 41 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const;
45 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout);
49 km_id_t keyid; member in struct:keymaster::AccessTimeMap::AccessTime
63 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const;
67 bool IncrementKeyAccessCount(km_id_t keyid);
71 km_id_t keyid; member in struct:keymaster::AccessCountMap::AccessCount
119 const km_id_t keyid,
139 return AuthorizeBegin(purpose, keyid, auth_set, operation_params);
193 const km_id_t keyid,
254 if (!MinTimeBetweenOpsPassed(min_ops_timeout, keyid))
    [all...]
  /system/keymaster/include/keymaster/
keymaster_enforcement.h 52 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid,
63 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid,
96 static bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid);
151 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid);
152 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
  /system/security/keystore/
keymaster_enforcement.h 52 ErrorCode AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid,
62 ErrorCode AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid,
93 static bool CreateKeyId(const hidl_vec<uint8_t>& key_blob, km_id_t* keyid);
147 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid);
148 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
keymaster_enforcement.cpp 40 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const;
44 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout);
48 km_id_t keyid; member in struct:keystore::AccessTimeMap::AccessTime
62 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const;
66 bool IncrementKeyAccessCount(km_id_t keyid);
70 km_id_t keyid; member in struct:keystore::AccessCountMap::AccessCount
115 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid,
136 return AuthorizeBegin(purpose, keyid, auth_set, operation_params);
189 ErrorCode KeymasterEnforcement::AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid,
253 if (min_ops_timeout.isOk() && !MinTimeBetweenOpsPassed(min_ops_timeout.value(), keyid))
    [all...]
operation.h 45 android::sp<android::IBinder> addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose,
71 Operation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, const km_device_t& device,
74 uint64_t keyid; member in struct:keystore::OperationMap::Operation
operation.cpp 28 sp<IBinder> OperationMap::addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose,
33 mMap[token] = Operation(handle, keyid, purpose, dev, std::move(characteristics), appToken);
57 *outKeyid = entry->second.keyid;
152 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
156 : handle(0), keyid(0), device(nullptr), characteristics(), appToken(nullptr) {}
key_store_service.cpp 1117 km_id_t keyid; local
1205 km_id_t keyid; local
1257 km_id_t keyid; local
1312 km_id_t keyid; local
1328 km_id_t keyid; local
1751 km_id_t keyid; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
SubjectKeyIdentifier.java 49 byte[] keyid)
51 this.keyidentifier = Arrays.clone(keyid);
55 ASN1OctetString keyid)
57 this(keyid.getOctets());
  /external/boringssl/src/crypto/x509/
x_x509a.c 77 ASN1_OPT(X509_CERT_AUX, keyid, ASN1_OCTET_STRING),
113 if (!x || !x->aux || !x->aux->keyid)
115 ASN1_OCTET_STRING_free(x->aux->keyid);
116 x->aux->keyid = NULL;
121 if (!aux->keyid && !(aux->keyid = ASN1_OCTET_STRING_new()))
123 return ASN1_STRING_set(aux->keyid, id, len);
137 if (!x->aux || !x->aux->keyid)
140 *len = x->aux->keyid->length;
141 return x->aux->keyid->data
    [all...]
t_x509a.c 104 if (aux->keyid) {
106 for (j = 0; j < aux->keyid->length; j++)
107 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]);
  /external/boringssl/src/crypto/x509v3/
v3_akey.c 94 if (akeyid->keyid) {
95 tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length);
96 X509V3_add_value("keyid", tmp, &extlist);
110 * Currently two options: keyid: use the issuers subject keyid, the value
113 * is to only use this if keyid is not present. With the option 'always' this
121 char keyid = 0, issuer = 0; local
136 if (!strcmp(cnf->name, "keyid")) {
137 keyid = 1
    [all...]
v3_akeya.c 67 ASN1_IMP_OPT(AUTHORITY_KEYID, keyid, ASN1_OCTET_STRING, 0),
  /external/openssh/regress/
krl.sh 48 touch $OBJ/revoked-keyid
52 echo "id: revoked $n" >> $OBJ/revoked-keyid
103 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid $OBJ/revoked-keyid \
108 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \
109 $OBJ/revoked-keyid >/dev/null || fatal "$SSHKEYGEN KRL failed"
113 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid-wild -s NONE $OBJ/revoked-keyid \
157 check_krl $f $OBJ/krl-keyid $KEYID_RESULT "$TAG"
161 check_krl $f $OBJ/krl-keyid-wild $KEYID_WRESULT "$TAG
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/
ca.conf 115 authorityKeyIdentifier = keyid:always,issuer
122 authorityKeyIdentifier = keyid:always,issuer
132 authorityKeyIdentifier = keyid,issuer
142 authorityKeyIdentifier = keyid,issuer:always
148 authorityKeyIdentifier=keyid:always
154 authorityKeyIdentifier = keyid,issuer
  /external/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/
tpmtoken_import_openssl.cnf 189 authorityKeyIdentifier=keyid,issuer:always
225 authorityKeyIdentifier=keyid:always,issuer:always
258 authorityKeyIdentifier=keyid:always,issuer:always
  /frameworks/base/media/java/android/media/
MediaDrm.java 404 KeyStatus(@NonNull byte[] keyId, @KeyStatusCode int statusCode) {
405 mKeyId = keyId;
594 byte[] keyId = parcel.createByteArray();
596 keyStatusList.add(new KeyStatus(keyId, keyStatusCode));
    [all...]
  /external/openssh/
ssh-pkcs11.c 71 char *keyid; member in struct:pkcs11_key
185 free(k11->keyid);
284 key_filter[1].pValue = k11->keyid;
326 k11->keyid = xmalloc(k11->keyid_len);
327 memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
monitor.c 606 u_int keyid; local
611 if ((r = sshbuf_get_u32(m, &keyid)) != 0 ||
615 if (keyid > INT_MAX)
636 if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL)
637 fatal("%s: no hostkey for index %d", __func__, keyid);
661 if ((key = get_hostkey_by_index(keyid)) != NULL) {
666 } else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL &&
674 fatal("%s: no hostkey from index %d", __func__, keyid);
    [all...]
  /build/make/tools/releasetools/
sign_target_files_apks 80 with keyid of the cert pointed by <path_to_X509_PEM_cert_file>.
315 # Skip verity keyid (for system_root_image use) if we will replace it.
331 # Replace the keyid string in misc_info dict.
345 # Replace the keyid string in BOOT/cmdline.
551 # extract keyid using openssl command
555 keyid, stderr = p.communicate()
556 keyid = re.search(
557 r'keyid:([0-9a-fA-F:]*)', keyid).group(1).replace(':', '').lower()
558 print "Replacing verity keyid with %s error=%s" % (keyid, stderr
    [all...]
sign_target_files_apks.py 80 with keyid of the cert pointed by <path_to_X509_PEM_cert_file>.
315 # Skip verity keyid (for system_root_image use) if we will replace it.
331 # Replace the keyid string in misc_info dict.
345 # Replace the keyid string in BOOT/cmdline.
551 # extract keyid using openssl command
555 keyid, stderr = p.communicate()
556 keyid = re.search(
557 r'keyid:([0-9a-fA-F:]*)', keyid).group(1).replace(':', '').lower()
558 print "Replacing verity keyid with %s error=%s" % (keyid, stderr
    [all...]
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Tools/msi/
msilib.py 474 keyid = self.cab.gen_id(self.absolute, keyfile)
475 self.keyfiles[keyfile] = keyid
477 keyid = None
479 [(component, uuid, self.logical, flags, None, keyid)])
  /external/e2fsprogs/misc/
e4crypt.c 798 long keyid, ret; local
805 keyid = keyctl(KEYCTL_JOIN_SESSION_KEYRING, NULL);
806 if (keyid < 0) {
815 printf("Switched invoking process to new session keyring %ld\n", keyid);

Completed in 1302 milliseconds

1 2 3