/system/keymaster/ |
D | keymaster_enforcement_test.cpp | 91 static const km_id_t key_id = 0xa; member in keymaster::test::KeymasterBaseTest 102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set); in TEST_F() 115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); in TEST_F() 118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); in TEST_F() 128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); in TEST_F() 140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); in TEST_F() 143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); in TEST_F() 155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set); in TEST_F() 168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); in TEST_F() 182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set); in TEST_F() [all …]
|
D | operation.h | 95 void set_key_id(uint64_t key_id) { key_id_ = key_id; } in set_key_id() argument 96 uint64_t key_id() const { return key_id_; } in key_id() function
|
D | android_keymaster.cpp | 268 km_id_t key_id; in BeginOperation() local 270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) in BeginOperation() 272 operation->set_key_id(key_id); in BeginOperation() 274 request.purpose, key_id, key->authorizations(), request.additional_params, in BeginOperation() 301 operation->purpose(), operation->key_id(), operation->authorizations(), in UpdateOperation() 330 operation->purpose(), operation->key_id(), operation->authorizations(), in FinishOperation()
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 57 char *key_id = reinterpret_cast<char *>(*from_d); in key_id_dup() local 58 if (key_id != NULL) { in key_id_dup() 59 *from_d = strdup(key_id); in key_id_dup() 71 char *key_id = reinterpret_cast<char *>(ptr); in key_id_free() local 72 free(key_id); in key_id_free() 142 const char *key_id = rsa_get_key_id(rsa); in rsa_private_transform() local 143 if (key_id == NULL) { in rsa_private_transform() 159 int32_t ret = service->sign(String16(key_id), in, len, &reply, &reply_len); in rsa_private_transform() 239 const char *key_id = ecdsa_get_key_id(ec_key); in ecdsa_sign() local 240 if (key_id == NULL) { in ecdsa_sign() [all …]
|
D | rsa_meth.cpp | 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); in keystore_rsa_priv_enc() local 77 if (key_id == NULL) { in keystore_rsa_priv_enc() 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), in keystore_rsa_priv_enc() 120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); in keystore_rsa_priv_dec() local 121 if (key_id == NULL) { in keystore_rsa_priv_dec() 139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from, in keystore_rsa_priv_dec() 212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { in rsa_pkey_setup() argument 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { in rsa_pkey_setup()
|
D | ecdsa_meth.cpp | 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, in keystore_ecdsa_do_sign() local 60 if (key_id == NULL) { in keystore_ecdsa_do_sign() 78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, in keystore_ecdsa_do_sign() 124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { in ecdsa_pkey_setup() argument 127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free, in ecdsa_pkey_setup()
|
D | dsa_meth.cpp | 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); in keystore_dsa_do_sign() local 54 if (key_id == NULL) { in keystore_dsa_do_sign() 72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, in keystore_dsa_do_sign() 124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { in dsa_pkey_setup() argument 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { in dsa_pkey_setup()
|
D | eng_keystore.cpp | 101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method, in keystore_loadkey() argument 107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data); in keystore_loadkey() 121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen); in keystore_loadkey() 142 dsa_pkey_setup(e, pkey.get(), key_id); in keystore_loadkey() 146 rsa_pkey_setup(e, pkey.get(), key_id); in keystore_loadkey() 150 ecdsa_pkey_setup(e, pkey.get(), key_id); in keystore_loadkey()
|
/system/bt/stack/smp/ |
D | smp_int.h | 381 extern void smp_h6_calc_chk (UINT8 *key, UINT8 *key_id, UINT8 *mac); 384 UINT8 *key_id, UINT8 *n1, 526 UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1,
|
D | smp_keys.c | 1498 UINT8 key_id[4] = {0x65, 0x6c, 0x74, 0x62}; in smp_calculate_f5() local 1528 if (!smp_calculate_f5_mackey_or_long_term_key(t, counter_mac_key, key_id, n1, n2, a1, a2, in smp_calculate_f5() 1539 if (!smp_calculate_f5_mackey_or_long_term_key(t, counter_ltk, key_id, n1, n2, a1, a2, in smp_calculate_f5() 1586 UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1, UINT8 *a2, in smp_calculate_f5_mackey_or_long_term_key() argument 1607 p_prnt = key_id; in smp_calculate_f5_mackey_or_long_term_key() 1633 ARRAY_TO_STREAM(p, key_id, 4); in smp_calculate_f5_mackey_or_long_term_key()
|
/system/vold/ |
D | Ext4Crypt.cpp | 165 key_serial_t key_id = in install_key() local 167 if (key_id == -1) { in install_key() 171 LOG(DEBUG) << "Added key " << key_id << " (" << ref << ") to keyring " << device_keyring in install_key()
|
/system/connectivity/shill/ |
D | eap_credentials_unittest.cc | 88 void SetKeyId(const string& key_id) { in SetKeyId() argument 89 eap_.key_id_ = key_id; in SetKeyId()
|