Home
last modified time | relevance | path

Searched refs:key_id (Results 1 – 12 of 12) sorted by relevance

/system/keymaster/
Dkeymaster_enforcement_test.cpp91 static const km_id_t key_id = 0xa; member in keymaster::test::KeymasterBaseTest
102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set); in TEST_F()
115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); in TEST_F()
118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); in TEST_F()
128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); in TEST_F()
140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); in TEST_F()
143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); in TEST_F()
155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set); in TEST_F()
168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); in TEST_F()
182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set); in TEST_F()
[all …]
Doperation.h95 void set_key_id(uint64_t key_id) { key_id_ = key_id; } in set_key_id() argument
96 uint64_t key_id() const { return key_id_; } in key_id() function
Dandroid_keymaster.cpp268 km_id_t key_id; in BeginOperation() local
270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) in BeginOperation()
272 operation->set_key_id(key_id); in BeginOperation()
274 request.purpose, key_id, key->authorizations(), request.additional_params, in BeginOperation()
301 operation->purpose(), operation->key_id(), operation->authorizations(), in UpdateOperation()
330 operation->purpose(), operation->key_id(), operation->authorizations(), in FinishOperation()
/system/security/keystore-engine/
Dandroid_engine.cpp57 char *key_id = reinterpret_cast<char *>(*from_d); in key_id_dup() local
58 if (key_id != NULL) { in key_id_dup()
59 *from_d = strdup(key_id); in key_id_dup()
71 char *key_id = reinterpret_cast<char *>(ptr); in key_id_free() local
72 free(key_id); in key_id_free()
142 const char *key_id = rsa_get_key_id(rsa); in rsa_private_transform() local
143 if (key_id == NULL) { in rsa_private_transform()
159 int32_t ret = service->sign(String16(key_id), in, len, &reply, &reply_len); in rsa_private_transform()
239 const char *key_id = ecdsa_get_key_id(ec_key); in ecdsa_sign() local
240 if (key_id == NULL) { in ecdsa_sign()
[all …]
Drsa_meth.cpp76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); in keystore_rsa_priv_enc() local
77 if (key_id == NULL) { in keystore_rsa_priv_enc()
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), in keystore_rsa_priv_enc()
120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); in keystore_rsa_priv_dec() local
121 if (key_id == NULL) { in keystore_rsa_priv_dec()
139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from, in keystore_rsa_priv_dec()
212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { in rsa_pkey_setup() argument
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { in rsa_pkey_setup()
Decdsa_meth.cpp58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, in keystore_ecdsa_do_sign() local
60 if (key_id == NULL) { in keystore_ecdsa_do_sign()
78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, in keystore_ecdsa_do_sign()
124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { in ecdsa_pkey_setup() argument
127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free, in ecdsa_pkey_setup()
Ddsa_meth.cpp53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); in keystore_dsa_do_sign() local
54 if (key_id == NULL) { in keystore_dsa_do_sign()
72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, in keystore_dsa_do_sign()
124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { in dsa_pkey_setup() argument
126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { in dsa_pkey_setup()
Deng_keystore.cpp101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method, in keystore_loadkey() argument
107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data); in keystore_loadkey()
121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen); in keystore_loadkey()
142 dsa_pkey_setup(e, pkey.get(), key_id); in keystore_loadkey()
146 rsa_pkey_setup(e, pkey.get(), key_id); in keystore_loadkey()
150 ecdsa_pkey_setup(e, pkey.get(), key_id); in keystore_loadkey()
/system/bt/stack/smp/
Dsmp_int.h381 extern void smp_h6_calc_chk (UINT8 *key, UINT8 *key_id, UINT8 *mac);
384 UINT8 *key_id, UINT8 *n1,
526 UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1,
Dsmp_keys.c1498 UINT8 key_id[4] = {0x65, 0x6c, 0x74, 0x62}; in smp_calculate_f5() local
1528 if (!smp_calculate_f5_mackey_or_long_term_key(t, counter_mac_key, key_id, n1, n2, a1, a2, in smp_calculate_f5()
1539 if (!smp_calculate_f5_mackey_or_long_term_key(t, counter_ltk, key_id, n1, n2, a1, a2, in smp_calculate_f5()
1586 UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1, UINT8 *a2, in smp_calculate_f5_mackey_or_long_term_key() argument
1607 p_prnt = key_id; in smp_calculate_f5_mackey_or_long_term_key()
1633 ARRAY_TO_STREAM(p, key_id, 4); in smp_calculate_f5_mackey_or_long_term_key()
/system/vold/
DExt4Crypt.cpp165 key_serial_t key_id = in install_key() local
167 if (key_id == -1) { in install_key()
171 LOG(DEBUG) << "Added key " << key_id << " (" << ref << ") to keyring " << device_keyring in install_key()
/system/connectivity/shill/
Deap_credentials_unittest.cc88 void SetKeyId(const string& key_id) { in SetKeyId() argument
89 eap_.key_id_ = key_id; in SetKeyId()