/system/bt/btif/include/ |
D | btif_storage.h | 124 uint8_t key_type, 280 uint8_t key_type, 283 UINT8 key_type, 288 uint8_t key_type, 292 bt_status_t btif_storage_get_ble_local_key(UINT8 key_type,
|
/system/bt/stack/btm/ |
D | btm_ble.c | 140 BOOLEAN BTM_SecAddBleKey (BD_ADDR bd_addr, tBTM_LE_KEY_VALUE *p_le_key, tBTM_LE_KEY_TYPE key_type) in BTM_SecAddBleKey() argument 147 (key_type != BTM_LE_KEY_PENC && key_type != BTM_LE_KEY_PID && in BTM_SecAddBleKey() 148 key_type != BTM_LE_KEY_PCSRK && key_type != BTM_LE_KEY_LENC && in BTM_SecAddBleKey() 149 key_type != BTM_LE_KEY_LCSRK && key_type != BTM_LE_KEY_LID)) in BTM_SecAddBleKey() 154 (bd_addr[4]<<8)+bd_addr[5], key_type); in BTM_SecAddBleKey() 160 (bd_addr[4]<<8)+bd_addr[5], key_type); in BTM_SecAddBleKey() 162 btm_sec_save_le_key (bd_addr, key_type, p_le_key, FALSE); in BTM_SecAddBleKey() 165 if (key_type == BTM_LE_KEY_PID || key_type == BTM_LE_KEY_LID) in BTM_SecAddBleKey() 187 void BTM_BleLoadLocalKeys(UINT8 key_type, tBTM_BLE_LOCAL_KEYS *p_key) in BTM_BleLoadLocalKeys() argument 193 switch (key_type) in BTM_BleLoadLocalKeys() [all …]
|
D | btm_dev.c | 63 LINK_KEY link_key, UINT8 key_type, tBTM_IO_CAP io_cap, in BTM_SecAddDevice() argument 70 BTM_TRACE_API("%s: link key type:%x", __func__, key_type); in BTM_SecAddDevice() 141 p_dev_rec->link_key_type = key_type; in BTM_SecAddDevice() 145 key_type == BTM_LKEY_TYPE_AUTH_COMB || in BTM_SecAddDevice() 146 key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256) { in BTM_SecAddDevice() 154 if (key_type < BTM_MAX_PRE_SM4_LKEY_TYPE) in BTM_SecAddDevice()
|
D | btm_ble_addr.c | 282 (p_dev_rec->ble.key_type & BTM_LE_KEY_PID)) in btm_ble_addr_resolvable() 338 !(p_dev_rec->ble.key_type & BTM_LE_KEY_PID)) in btm_ble_match_random_bda()
|
/system/tpm/attestation/common/ |
D | interface.proto | 37 optional KeyType key_type = 2; field 69 optional KeyType key_type = 2; field 82 optional KeyType key_type = 1; field 94 optional KeyType key_type = 1; field 112 optional KeyType key_type = 1; field 130 optional KeyType key_type = 3; field
|
D | print_interface_proto.cc | 82 GetProtoDebugStringWithIndent(value.key_type(), in GetProtoDebugStringWithIndent() 190 GetProtoDebugStringWithIndent(value.key_type(), in GetProtoDebugStringWithIndent() 248 GetProtoDebugStringWithIndent(value.key_type(), in GetProtoDebugStringWithIndent() 305 GetProtoDebugStringWithIndent(value.key_type(), in GetProtoDebugStringWithIndent() 385 GetProtoDebugStringWithIndent(value.key_type(), in GetProtoDebugStringWithIndent() 459 GetProtoDebugStringWithIndent(value.key_type(), in GetProtoDebugStringWithIndent()
|
D | tpm_utility.h | 57 virtual bool CreateCertifiedKey(KeyType key_type,
|
D | tpm_utility_v1.h | 48 bool CreateCertifiedKey(KeyType key_type,
|
/system/keymaster/ |
D | operation.cpp | 68 KeyType key_type = registry_key(); in is_public_key_operation() local 70 if (!is_public_key_algorithm(key_type.algorithm)) in is_public_key_operation() 73 switch (key_type.purpose) { in is_public_key_operation()
|
/system/tpm/attestation/server/ |
D | attestation_service.cc | 132 if (!CreateKey(request.username(), request.key_label(), request.key_type(), in CreateGoogleAttestedKeyTask() 200 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), in GetKeyInfoTask() 206 result->set_key_type(key.key_type()); in GetKeyInfoTask() 238 if (request.key_type() != KEY_TYPE_RSA) { in GetEndorsementInfoTask() 255 request.key_type(), in GetEndorsementInfoTask() 289 if (request.key_type() != KEY_TYPE_RSA) { in GetAttestationKeyInfoTask() 301 request.key_type(), in GetAttestationKeyInfoTask() 346 if (request.key_type() != KEY_TYPE_RSA) { in ActivateAttestationKeyTask() 395 if (!CreateKey(request.username(), request.key_label(), request.key_type(), in CreateCertifiableKeyTask() 401 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), in CreateCertifiableKeyTask() [all …]
|
D | dbus_service_test.cc | 89 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F() 162 EXPECT_EQ(KEY_TYPE_ECC, reply.key_type()); in TEST_F() 177 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F() 204 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F() 241 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F() 275 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F()
|
D | key_store.h | 65 KeyType key_type,
|
D | mock_key_store.h | 46 KeyType key_type,
|
D | attestation_service.h | 231 KeyType key_type, 274 bool GetSubjectPublicKeyInfo(KeyType key_type,
|
D | pkcs11_key_store.h | 63 KeyType key_type,
|
/system/bt/btif/src/ |
D | btif_storage.c | 496 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, bt_bdaddr_t bd_addr, in btif_read_le_key() argument 505 if (btif_storage_get_ble_bonding_key(&bd_addr, key_type, buffer, key_len) == BT_STATUS_SUCCESS) in btif_read_le_key() 520 key_type, bdaddr_to_string(&bd_addr, bd_str, sizeof(bd_str))); in btif_read_le_key() 521 BTA_DmAddBleKey(bta_bd_addr, (tBTA_LE_KEY_VALUE *)buffer, key_type); in btif_read_le_key() 779 uint8_t key_type, in btif_storage_add_bonded_device() argument 784 int ret = btif_config_set_int(bdstr, "LinkKeyType", (int)key_type); in btif_storage_add_bonded_device() 978 UINT8 key_type, in btif_storage_add_ble_bonding_key() argument 984 switch(key_type) in btif_storage_add_ble_bonding_key() 1023 UINT8 key_type, in btif_storage_get_ble_bonding_key() argument 1030 switch(key_type) in btif_storage_get_ble_bonding_key() [all …]
|
/system/tpm/attestation/client/ |
D | dbus_proxy_test.cc | 55 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F() 125 EXPECT_EQ(KEY_TYPE_ECC, reply.key_type()); in TEST_F() 147 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F() 183 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F() 225 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F() 268 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F()
|
/system/bt/stack/smp/ |
D | smp_act.c | 106 static void smp_update_key_mask (tSMP_CB *p_cb, UINT8 key_type, BOOLEAN recv) in smp_update_key_mask() argument 113 ((key_type == SMP_SEC_KEY_TYPE_ENC) || (key_type == SMP_SEC_KEY_TYPE_LK))) in smp_update_key_mask() 117 p_cb->local_i_key &= ~key_type; in smp_update_key_mask() 118 p_cb->local_r_key &= ~key_type; in smp_update_key_mask() 124 p_cb->local_i_key &= ~key_type; in smp_update_key_mask() 126 p_cb->local_r_key &= ~key_type; in smp_update_key_mask() 131 p_cb->local_r_key &= ~key_type; in smp_update_key_mask() 133 p_cb->local_i_key &= ~key_type; in smp_update_key_mask() 1133 UINT8 key_type = p_data->key.key_type; in smp_proc_sl_key() local 1136 if (key_type == SMP_KEY_TYPE_TK) in smp_proc_sl_key() [all …]
|
/system/security/softkeymaster/include/keymaster/ |
D | softkeymaster.h | 22 int openssl_generate_keypair(const keymaster0_device_t* dev, const keymaster_keypair_t key_type,
|
/system/bt/stack/gatt/ |
D | gatt_auth.c | 323 UINT8 key_type; in gatt_determine_sec_act() local 378 btm_ble_get_enc_key_type(p_tcb->peer_bda, &key_type); in gatt_determine_sec_act() 380 if ( (key_type & BTM_LE_KEY_LCSRK) && in gatt_determine_sec_act()
|
/system/tpm/trunks/ |
D | tpm_utility.h | 179 virtual TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, 202 virtual TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type,
|
D | tpm_utility_impl.h | 90 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, 97 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type,
|
D | trunks_factory_for_test.cc | 241 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, in ImportRSAKey() argument 248 return target_->ImportRSAKey(key_type, modulus, public_exponent, in ImportRSAKey() 252 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type, in CreateRSAKeyPair() argument 262 return target_->CreateRSAKeyPair(key_type, modulus_bits, public_exponent, in CreateRSAKeyPair()
|
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 366 const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params, in openssl_generate_keypair() argument 377 } else if (key_type == TYPE_DSA) { in openssl_generate_keypair() 381 } else if (key_type == TYPE_EC) { in openssl_generate_keypair() 385 } else if (key_type == TYPE_RSA) { in openssl_generate_keypair() 390 ALOGW("Unsupported key type %d", key_type); in openssl_generate_keypair()
|
/system/bt/bta/dm/ |
D | bta_dm_api.c | 450 UINT8 key_type, tBTA_IO_CAP io_cap, UINT8 pin_length) in BTA_DmAddDevice() argument 463 p_msg->key_type = key_type; in BTA_DmAddDevice() 641 void BTA_DmAddBleKey (BD_ADDR bd_addr, tBTA_LE_KEY_VALUE *p_le_key, tBTA_LE_KEY_TYPE key_type) in BTA_DmAddBleKey() argument 649 p_msg->key_type = key_type; in BTA_DmAddBleKey()
|