HomeSort by relevance Sort by last modified time
    Searched refs:key_name (Results 1 - 25 of 48) sorted by null

1 2

  /system/security/keystore/include/keystore/
keystore_client.h 60 // decryption. If a key identified by |key_name| does not already exist it
63 // have |key_name| as a prefix.
64 virtual bool encryptWithAuthentication(const std::string& key_name, const std::string& data,
68 // EncryptWithAuthentication using the key(s) identified by |key_name|. On
70 virtual bool decryptWithAuthentication(const std::string& key_name,
75 // |key_name|, |input_parameters|, and |output_parameters| are as in
79 virtual bool oneShotOperation(KeyPurpose purpose, const std::string& key_name,
92 // the given |key_name|. The [hardware|software]_enforced_characteristics of
97 generateKey(const std::string& key_name, const keystore::AuthorizationSet& key_parameters,
102 // identified by |key_name|. Returns KM_ERROR_OK on success and a Keystor
    [all...]
keystore_client_mock.h 33 bool(const std::string& key_name, const std::string& data,
36 bool(const std::string& key_name, const std::string& encrypted_data,
39 bool(keymaster_purpose_t purpose, const std::string& key_name,
45 int32_t(const std::string& key_name,
50 int32_t(const std::string& key_name,
54 int32_t(const std::string& key_name,
60 const std::string& key_name, std::string* export_data));
61 MOCK_METHOD1(deleteKey, int32_t(const std::string& key_name));
63 MOCK_METHOD5(beginOperation, int32_t(keymaster_purpose_t purpose, const std::string& key_name,
78 MOCK_METHOD1(doesKeyExist, bool(const std::string& key_name));
    [all...]
keystore_client_impl.h 37 bool encryptWithAuthentication(const std::string& key_name, const std::string& data,
39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data,
41 bool oneShotOperation(KeyPurpose purpose, const std::string& key_name,
49 generateKey(const std::string& key_name, const keystore::AuthorizationSet& key_parameters,
53 getKeyCharacteristics(const std::string& key_name,
57 importKey(const std::string& key_name, const keystore::AuthorizationSet& key_parameters,
61 KeyStoreNativeReturnCode exportKey(KeyFormat export_format, const std::string& key_name,
63 KeyStoreNativeReturnCode deleteKey(const std::string& key_name) override;
65 KeyStoreNativeReturnCode beginOperation(KeyPurpose purpose, const std::string& key_name,
81 bool doesKeyExist(const std::string& key_name) override
    [all...]
  /system/tpm/attestation/server/
pkcs11_key_store.h 52 const std::string& key_name,
55 const std::string& key_name,
58 const std::string& key_name) override;
73 base::Callback<bool(const std::string& key_name,
79 const std::string& key_name);
94 std::string* key_name);
97 // object identified by |object_handle| if |key_name| matches |key_prefix|.
101 const std::string& key_name,
pkcs11_key_store.cc 95 const std::string& key_name,
107 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name);
109 LOG(WARNING) << "Pkcs11KeyStore: Key does not exist: " << key_name;
116 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name;
123 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name;
131 const std::string& key_name,
134 if (!Delete(username, key_name)) {
147 std::string mutable_key_name(key_name);
166 LOG(ERROR) << "Pkcs11KeyStore: Failed to write key data: " << key_name;
173 const std::string& key_name) {
509 std::string key_name; local
    [all...]
  /external/autotest/client/site_tests/hardware_Keyboard/
hardware_Keyboard.py 34 def _supported(self, event, key_name):
36 cmd += ' -s ' + key_name
39 logging.error('Unsupported Key : %s' % key_name)
41 logging.info('%s : %s' % (key_name, output))
65 if not all(self._supported(high_key_event, key_name)
66 for key_name in hardware_Keyboard.supported_keys):
  /system/security/keystore/
keystore_client_impl.cpp 63 bool KeystoreClientImpl::encryptWithAuthentication(const std::string& key_name,
70 std::string encryption_key_name = key_name + kEncryptSuffix;
74 std::string authentication_key_name = key_name + kAuthenticateSuffix;
117 bool KeystoreClientImpl::decryptWithAuthentication(const std::string& key_name,
125 std::string authentication_key_name = key_name + kAuthenticateSuffix;
136 std::string encryption_key_name = key_name + kEncryptSuffix;
151 bool KeystoreClientImpl::oneShotOperation(KeyPurpose purpose, const std::string& key_name,
158 auto result = beginOperation(purpose, key_name, input_parameters, output_parameters, &handle);
190 KeystoreClientImpl::generateKey(const std::string& key_name, const AuthorizationSet& key_parameters,
193 String16 key_name16(key_name.data(), key_name.size())
    [all...]
keystore_cli_v2.cpp 62 " generate --name=<key_name> [--seclevel=software|strongbox|tee(default)]\n"
63 " get-chars --name=<key_name>\n"
64 " export --name=<key_name>\n"
65 " delete --name=<key_name>\n"
67 " exists --name=<key_name>\n"
69 " sign-verify --name=<key_name>\n"
70 " [en|de]crypt --name=<key_name> --in=<file> --out=<file>\n"
361 for (const auto& key_name : key_list) {
362 printf(" %s\n", key_name.c_str());
425 int Encrypt(const std::string& key_name, const std::string& input_filename
    [all...]
  /external/webrtc/webrtc/base/
win32regkey.cc 38 HRESULT RegKey::Create(HKEY parent_key, const wchar_t* key_name) {
40 key_name,
48 HRESULT RegKey::Open(HKEY parent_key, const wchar_t* key_name) {
49 return Open(parent_key, key_name, KEY_ALL_ACCESS);
221 HRESULT RegKey::DeleteSubKey(const wchar_t* key_name) {
222 ASSERT(key_name != NULL);
225 LONG res = ::RegDeleteKey(h_key_, key_name);
257 const wchar_t* key_name,
263 ASSERT(key_name != NULL);
268 LONG res = ::RegCreateKeyEx(parent_key, key_name, 0, lpszClass, options
    [all...]
win32regkey.h 45 HRESULT Create(HKEY parent_key, const wchar_t* key_name);
48 const wchar_t* key_name,
56 HRESULT Open(HKEY parent_key, const wchar_t* key_name);
58 HRESULT Open(HKEY parent_key, const wchar_t* key_name, REGSAM sam_desired);
80 bool HasSubkey(const wchar_t* key_name) const;
91 HRESULT GetSubkeyNameAt(int index, std::wstring* key_name);
245 HRESULT DeleteSubKey(const wchar_t* key_name);
248 HRESULT RecurseDeleteSubKey(const wchar_t* key_name);
282 static bool SafeKeyNameForDeletion(const wchar_t* key_name);
307 static std::wstring GetParentKeyInfo(std::wstring* key_name);
    [all...]
  /tools/test/connectivity/tools/lab/
runner.py 60 key_name = self.convert_to_snake(metric.__class__.__name__)[:-7]
61 responses[key_name] = metric.gather_metric()
  /external/chromium-trace/catapult/common/py_utils/py_utils/
discover.py 155 key_name = camel_case.ToUnderscore(obj.__name__)
157 key_name = module.__name__.split('.')[-1]
159 if key_name in classes and index_by_class_name:
160 assert classes[key_name] is obj, (
161 'Duplicate key_name with different objs detected: '
162 'key=%s, obj1=%s, obj2=%s' % (key_name, classes[key_name], obj))
164 classes[key_name] = obj
  /external/autotest/client/tests/iozone/
iozone.py 100 key_name = "%d-%d-%s" % (fields[0], fields[1], l)
101 keylist[key_name] = v
125 key_name = '%s-%d-kids' % (section, w_count)
126 keylist[key_name] = match.group(3)
157 key_name = "%s-%d-%s" % (section, w_count, basekey)
158 keylist[key_name] = result
  /external/autotest/frontend/migrations/
037_db_constraints.py 73 key_name = foreign_key_name(table, field)
76 (table, key_name, field, destination_table))
80 key_name = foreign_key_name(table, field)
81 manager.execute('ALTER TABLE %s DROP FOREIGN KEY %s' % (table, key_name))
  /frameworks/base/tools/aapt2/tools/consumers/
duplicates.py 125 key_name = "{0}:{1}".format(self._current_resource.name,
128 self.resource_definitions[key_name] += [self._current_resource]
130 self.resource_definitions[key_name] = [self._current_resource]
  /external/boringssl/src/crypto/evp/
evp_test.cc 183 const std::string &key_name = t->GetParameter(); local
184 EXPECT_EQ(0u, key_map->count(key_name)) << "Duplicate key: " << key_name;
185 (*key_map)[key_name] = std::move(pkey);
273 const std::string &key_name = t->GetParameter(); local
274 if (key_map->count(key_name) == 0) {
275 ADD_FAILURE() << "Could not find key " << key_name;
278 EVP_PKEY *key = (*key_map)[key_name].get();
  /system/tpm/trunks/
tpm_generated_test.cc 243 TPM2B_NAME key_name; local
249 &creation_ticket, &key_name, &authorization);
259 EXPECT_EQ(key_name.size, 3);
260 EXPECT_EQ(key_name.name[0], 'K');
261 EXPECT_EQ(key_name.name[1], 'E');
262 EXPECT_EQ(key_name.name[2], 'Y');
tpm_utility_impl.cc 444 std::string key_name; local
445 result = ComputeKeyName(public_area, &key_name);
455 result = factory_.GetTpm()->RSA_EncryptSync(key_handle, key_name, in_message,
511 std::string key_name; local
512 result = ComputeKeyName(public_area, &key_name);
522 result = factory_.GetTpm()->RSA_DecryptSync(key_handle, key_name, in_message,
578 std::string key_name; local
579 result = ComputeKeyName(public_area, &key_name);
592 factory_.GetTpm()->SignSync(key_handle, key_name, tpm_digest, in_scheme,
650 std::string key_name; local
709 std::string key_name; local
950 TPM2B_NAME key_name; local
1662 TPM2B_NAME key_name; local
    [all...]
  /external/libxkbcommon/xkbcommon/src/xkbcomp/
ast.h 191 xkb_atom_t key_name; member in struct:__anon26687
239 ExprKeyName key_name; member in union:ExprDef
ast-build.h 43 ExprCreateKeyName(xkb_atom_t key_name);
ast-build.c 117 ExprCreateKeyName(xkb_atom_t key_name)
120 expr->key_name.key_name = key_name;
  /external/tensorflow/tensorflow/python/ops/
parsing_ops.py 685 key_name = "padding_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
687 default_value, dtype=dense_types[i], name=key_name)
693 key_name = "key_" + re.sub("[^A-Za-z0-9_.\\-/]", "_", key)
695 default_value, dtype=dense_types[i], name=key_name)
    [all...]
  /external/libchrome/base/trace_event/
trace_event_argument.cc 58 std::string key_name; local
62 key_name = reinterpret_cast<const char*>(static_cast<uintptr_t>(ptr_value));
64 res = pickle_iterator.ReadString(&key_name);
67 return key_name;
  /system/bt/stack/smp/
smp_cmac.cc 46 void print128(BT_OCTET16 x, const uint8_t* key_name) {
51 SMP_TRACE_WARNING("%s(MSB ~ LSB) = ", key_name);
  /external/boringssl/src/tool/
speed.cc 143 static bool SpeedRSA(const std::string &key_name, RSA *key,
145 if (!selected.empty() && key_name.find(selected) == std::string::npos) {
166 results.Print(key_name + " signing");
192 results.Print(key_name + " verify");

Completed in 403 milliseconds

1 2