/system/security/keystore/include/keystore/ |
keystore_client.h | 60 // decryption. If a key identified by |key_name| does not already exist it 63 // have |key_name| as a prefix. 64 virtual bool encryptWithAuthentication(const std::string& key_name, const std::string& data, 68 // EncryptWithAuthentication using the key(s) identified by |key_name|. On 70 virtual bool decryptWithAuthentication(const std::string& key_name, 75 // |key_name|, |input_parameters|, and |output_parameters| are as in 79 virtual bool oneShotOperation(KeyPurpose purpose, const std::string& key_name, 92 // the given |key_name|. The [hardware|software]_enforced_characteristics of 97 generateKey(const std::string& key_name, const keystore::AuthorizationSet& key_parameters, 102 // identified by |key_name|. Returns KM_ERROR_OK on success and a Keystor [all...] |
keystore_client_mock.h | 33 bool(const std::string& key_name, const std::string& data, 36 bool(const std::string& key_name, const std::string& encrypted_data, 39 bool(keymaster_purpose_t purpose, const std::string& key_name, 45 int32_t(const std::string& key_name, 50 int32_t(const std::string& key_name, 54 int32_t(const std::string& key_name, 60 const std::string& key_name, std::string* export_data)); 61 MOCK_METHOD1(deleteKey, int32_t(const std::string& key_name)); 63 MOCK_METHOD5(beginOperation, int32_t(keymaster_purpose_t purpose, const std::string& key_name, 78 MOCK_METHOD1(doesKeyExist, bool(const std::string& key_name)); [all...] |
keystore_client_impl.h | 37 bool encryptWithAuthentication(const std::string& key_name, const std::string& data, 39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data, 41 bool oneShotOperation(KeyPurpose purpose, const std::string& key_name, 49 generateKey(const std::string& key_name, const keystore::AuthorizationSet& key_parameters, 53 getKeyCharacteristics(const std::string& key_name, 57 importKey(const std::string& key_name, const keystore::AuthorizationSet& key_parameters, 61 KeyStoreNativeReturnCode exportKey(KeyFormat export_format, const std::string& key_name, 63 KeyStoreNativeReturnCode deleteKey(const std::string& key_name) override; 65 KeyStoreNativeReturnCode beginOperation(KeyPurpose purpose, const std::string& key_name, 81 bool doesKeyExist(const std::string& key_name) override [all...] |
/system/tpm/attestation/server/ |
pkcs11_key_store.h | 52 const std::string& key_name, 55 const std::string& key_name, 58 const std::string& key_name) override; 73 base::Callback<bool(const std::string& key_name, 79 const std::string& key_name); 94 std::string* key_name); 97 // object identified by |object_handle| if |key_name| matches |key_prefix|. 101 const std::string& key_name,
|
pkcs11_key_store.cc | 95 const std::string& key_name, 107 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); 109 LOG(WARNING) << "Pkcs11KeyStore: Key does not exist: " << key_name; 116 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 123 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 131 const std::string& key_name, 134 if (!Delete(username, key_name)) { 147 std::string mutable_key_name(key_name); 166 LOG(ERROR) << "Pkcs11KeyStore: Failed to write key data: " << key_name; 173 const std::string& key_name) { 509 std::string key_name; local [all...] |
/external/autotest/client/site_tests/hardware_Keyboard/ |
hardware_Keyboard.py | 34 def _supported(self, event, key_name): 36 cmd += ' -s ' + key_name 39 logging.error('Unsupported Key : %s' % key_name) 41 logging.info('%s : %s' % (key_name, output)) 65 if not all(self._supported(high_key_event, key_name) 66 for key_name in hardware_Keyboard.supported_keys):
|
/system/security/keystore/ |
keystore_client_impl.cpp | 63 bool KeystoreClientImpl::encryptWithAuthentication(const std::string& key_name, 70 std::string encryption_key_name = key_name + kEncryptSuffix; 74 std::string authentication_key_name = key_name + kAuthenticateSuffix; 117 bool KeystoreClientImpl::decryptWithAuthentication(const std::string& key_name, 125 std::string authentication_key_name = key_name + kAuthenticateSuffix; 136 std::string encryption_key_name = key_name + kEncryptSuffix; 151 bool KeystoreClientImpl::oneShotOperation(KeyPurpose purpose, const std::string& key_name, 158 auto result = beginOperation(purpose, key_name, input_parameters, output_parameters, &handle); 190 KeystoreClientImpl::generateKey(const std::string& key_name, const AuthorizationSet& key_parameters, 193 String16 key_name16(key_name.data(), key_name.size()) [all...] |
keystore_cli_v2.cpp | 62 " generate --name=<key_name> [--seclevel=software|strongbox|tee(default)]\n" 63 " get-chars --name=<key_name>\n" 64 " export --name=<key_name>\n" 65 " delete --name=<key_name>\n" 67 " exists --name=<key_name>\n" 69 " sign-verify --name=<key_name>\n" 70 " [en|de]crypt --name=<key_name> --in=<file> --out=<file>\n" 361 for (const auto& key_name : key_list) { 362 printf(" %s\n", key_name.c_str()); 425 int Encrypt(const std::string& key_name, const std::string& input_filename [all...] |
/external/webrtc/webrtc/base/ |
win32regkey.cc | 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) { 40 key_name, 48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) { 49 return Open(parent_key, key_name, KEY_ALL_ACCESS); 221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) { 222 ASSERT(key_name != NULL); 225 LONG res = ::RegDeleteKey(h_key_, key_name); 257 const wchar_t* key_name, 263 ASSERT(key_name != NULL); 268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options [all...] |
win32regkey.h | 45 HRESULT Create(HKEY parent_key, const wchar_t* key_name); 48 const wchar_t* key_name, 56 HRESULT Open(HKEY parent_key, const wchar_t* key_name); 58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired); 80 bool HasSubkey(const wchar_t* key_name) const; 91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name); 245 HRESULT DeleteSubKey(const wchar_t* key_name); 248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name); 282 static bool SafeKeyNameForDeletion(const wchar_t* key_name); 307 static std::wstring GetParentKeyInfo(std::wstring* key_name); [all...] |
/tools/test/connectivity/tools/lab/ |
runner.py | 60 key_name = self.convert_to_snake(metric.__class__.__name__)[:-7] 61 responses[key_name] = metric.gather_metric()
|
/external/chromium-trace/catapult/common/py_utils/py_utils/ |
discover.py | 155 key_name = camel_case.ToUnderscore(obj.__name__) 157 key_name = module.__name__.split('.')[-1] 159 if key_name in classes and index_by_class_name: 160 assert classes[key_name] is obj, ( 161 'Duplicate key_name with different objs detected: ' 162 'key=%s, obj1=%s, obj2=%s' % (key_name, classes[key_name], obj)) 164 classes[key_name] = obj
|
/external/autotest/client/tests/iozone/ |
iozone.py | 100 key_name = "%d-%d-%s" % (fields[0], fields[1], l) 101 keylist[key_name] = v 125 key_name = '%s-%d-kids' % (section, w_count) 126 keylist[key_name] = match.group(3) 157 key_name = "%s-%d-%s" % (section, w_count, basekey) 158 keylist[key_name] = result
|
/external/autotest/frontend/migrations/ |
037_db_constraints.py | 73 key_name = foreign_key_name(table, field) 76 (table, key_name, field, destination_table)) 80 key_name = foreign_key_name(table, field) 81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
|
/frameworks/base/tools/aapt2/tools/consumers/ |
duplicates.py | 125 key_name = "{0}:{1}".format(self._current_resource.name, 128 self.resource_definitions[key_name] += [self._current_resource] 130 self.resource_definitions[key_name] = [self._current_resource]
|
/external/boringssl/src/crypto/evp/ |
evp_test.cc | 183 const std::string &key_name = t->GetParameter(); local 184 EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name; 185 (*key_map)[key_name] = std::move(pkey); 273 const std::string &key_name = t->GetParameter(); local 274 if (key_map->count(key_name) == 0) { 275 ADD_FAILURE() << "Could not find key " << key_name; 278 EVP_PKEY *key = (*key_map)[key_name].get();
|
/system/tpm/trunks/ |
tpm_generated_test.cc | 243 TPM2B_NAME key_name; local 249 &creation_ticket, &key_name, &authorization); 259 EXPECT_EQ(key_name.size, 3); 260 EXPECT_EQ(key_name.name[0], 'K'); 261 EXPECT_EQ(key_name.name[1], 'E'); 262 EXPECT_EQ(key_name.name[2], 'Y');
|
tpm_utility_impl.cc | 444 std::string key_name; local 445 result = ComputeKeyName(public_area, &key_name); 455 result = factory_.GetTpm()->RSA_EncryptSync(key_handle, key_name, in_message, 511 std::string key_name; local 512 result = ComputeKeyName(public_area, &key_name); 522 result = factory_.GetTpm()->RSA_DecryptSync(key_handle, key_name, in_message, 578 std::string key_name; local 579 result = ComputeKeyName(public_area, &key_name); 592 factory_.GetTpm()->SignSync(key_handle, key_name, tpm_digest, in_scheme, 650 std::string key_name; local 709 std::string key_name; local 950 TPM2B_NAME key_name; local 1662 TPM2B_NAME key_name; local [all...] |
/external/libxkbcommon/xkbcommon/src/xkbcomp/ |
ast.h | 191 xkb_atom_t key_name; member in struct:__anon26687 239 ExprKeyName key_name; member in union:ExprDef
|
ast-build.h | 43 ExprCreateKeyName(xkb_atom_t key_name);
|
ast-build.c | 117 ExprCreateKeyName(xkb_atom_t key_name) 120 expr->key_name.key_name = key_name;
|
/external/tensorflow/tensorflow/python/ops/ |
parsing_ops.py | 685 key_name = "padding_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 687 default_value, dtype=dense_types[i], name=key_name) 693 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key) 695 default_value, dtype=dense_types[i], name=key_name) [all...] |
/external/libchrome/base/trace_event/ |
trace_event_argument.cc | 58 std::string key_name; local 62 key_name = reinterpret_cast<const char*>(static_cast<uintptr_t>(ptr_value)); 64 res = pickle_iterator.ReadString(&key_name); 67 return key_name;
|
/system/bt/stack/smp/ |
smp_cmac.cc | 46 void print128(BT_OCTET16 x, const uint8_t* key_name) { 51 SMP_TRACE_WARNING("%s(MSB ~ LSB) = ", key_name);
|
/external/boringssl/src/tool/ |
speed.cc | 143 static bool SpeedRSA(const std::string &key_name, RSA *key, 145 if (!selected.empty() && key_name.find(selected) == std::string::npos) { 166 results.Print(key_name + " signing"); 192 results.Print(key_name + " verify");
|