Home
last modified time | relevance | path

Searched refs:key_type (Results 1 – 25 of 51) sorted by relevance

123

/system/bt/btif/include/
Dbtif_storage.h127 LINK_KEY link_key, uint8_t key_type,
211 char* key, uint8_t key_type,
214 uint8_t key_type, char* key_value,
217 bt_status_t btif_storage_add_ble_local_key(char* key, uint8_t key_type,
222 bt_status_t btif_storage_get_ble_local_key(uint8_t key_type, char* key_value,
/system/bt/stack/btm/
Dbtm_ble.cc132 tBTM_LE_KEY_TYPE key_type) { in BTM_SecAddBleKey() argument
137 (key_type != BTM_LE_KEY_PENC && key_type != BTM_LE_KEY_PID && in BTM_SecAddBleKey()
138 key_type != BTM_LE_KEY_PCSRK && key_type != BTM_LE_KEY_LENC && in BTM_SecAddBleKey()
139 key_type != BTM_LE_KEY_LCSRK && key_type != BTM_LE_KEY_LID)) { in BTM_SecAddBleKey()
142 << ", Type: " << key_type; in BTM_SecAddBleKey()
146 VLOG(1) << __func__ << " BDA: " << bd_addr << ", Type: " << key_type; in BTM_SecAddBleKey()
148 btm_sec_save_le_key(bd_addr, key_type, p_le_key, false); in BTM_SecAddBleKey()
151 if (key_type == BTM_LE_KEY_PID || key_type == BTM_LE_KEY_LID) in BTM_SecAddBleKey()
172 void BTM_BleLoadLocalKeys(uint8_t key_type, tBTM_BLE_LOCAL_KEYS* p_key) { in BTM_BleLoadLocalKeys() argument
176 switch (key_type) { in BTM_BleLoadLocalKeys()
[all …]
Dbtm_dev.cc64 uint8_t key_type, tBTM_IO_CAP io_cap, in BTM_SecAddDevice() argument
66 BTM_TRACE_API("%s: link key type:%x", __func__, key_type); in BTM_SecAddDevice()
125 p_dev_rec->link_key_type = key_type; in BTM_SecAddDevice()
128 if (pin_length >= 16 || key_type == BTM_LKEY_TYPE_AUTH_COMB || in BTM_SecAddDevice()
129 key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256) { in BTM_SecAddDevice()
138 if (key_type < BTM_MAX_PRE_SM4_LKEY_TYPE) in BTM_SecAddDevice()
/system/keymaster/
Doperation.cpp69 KeyType key_type = registry_key(); in is_public_key_operation() local
71 if (!is_public_key_algorithm(key_type.algorithm)) in is_public_key_operation()
74 switch (key_type.purpose) { in is_public_key_operation()
/system/tpm/attestation/common/
Dinterface.proto37 optional KeyType key_type = 2; field
69 optional KeyType key_type = 2; field
82 optional KeyType key_type = 1; field
94 optional KeyType key_type = 1; field
112 optional KeyType key_type = 1; field
130 optional KeyType key_type = 3; field
Dprint_interface_proto.cc82 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent()
191 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent()
252 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent()
311 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent()
393 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent()
469 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent()
Dtpm_utility.h57 virtual bool CreateCertifiedKey(KeyType key_type,
Dtpm_utility_v1.h48 bool CreateCertifiedKey(KeyType key_type,
/system/tpm/attestation/server/
Dattestation_service.cc125 if (!CreateKey(request.username(), request.key_label(), request.key_type(), in CreateGoogleAttestedKeyTask()
180 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), in GetKeyInfoTask()
186 result->set_key_type(key.key_type()); in GetKeyInfoTask()
213 if (request.key_type() != KEY_TYPE_RSA) { in GetEndorsementInfoTask()
230 request.key_type(), in GetEndorsementInfoTask()
260 if (request.key_type() != KEY_TYPE_RSA) { in GetAttestationKeyInfoTask()
272 request.key_type(), in GetAttestationKeyInfoTask()
313 if (request.key_type() != KEY_TYPE_RSA) { in ActivateAttestationKeyTask()
356 if (!CreateKey(request.username(), request.key_label(), request.key_type(), in CreateCertifiableKeyTask()
362 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), in CreateCertifiableKeyTask()
[all …]
Ddbus_service_test.cc89 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F()
163 EXPECT_EQ(KEY_TYPE_ECC, reply.key_type()); in TEST_F()
178 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F()
205 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F()
242 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F()
276 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F()
Dmock_key_store.h50 KeyType key_type,
Dkey_store.h65 KeyType key_type,
Dattestation_service.h222 KeyType key_type,
264 bool GetSubjectPublicKeyInfo(KeyType key_type,
Dpkcs11_key_store.h63 KeyType key_type,
/system/bt/btif/src/
Dbtif_storage.cc477 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, in btif_read_le_key() argument
487 if (btif_storage_get_ble_bonding_key(&bd_addr, key_type, buffer, key_len) == in btif_read_le_key()
495 BTIF_TRACE_DEBUG("%s() Adding key type %d for %s", __func__, key_type, in btif_read_le_key()
497 BTA_DmAddBleKey(bd_addr, (tBTA_LE_KEY_VALUE*)buffer, key_type); in btif_read_le_key()
738 LINK_KEY link_key, uint8_t key_type, in btif_storage_add_bonded_device() argument
742 int ret = btif_config_set_int(bdstr, "LinkKeyType", (int)key_type); in btif_storage_add_bonded_device()
977 char* key, uint8_t key_type, in btif_storage_add_ble_bonding_key() argument
980 switch (key_type) { in btif_storage_add_ble_bonding_key()
1019 uint8_t key_type, char* key_value, in btif_storage_get_ble_bonding_key() argument
1022 switch (key_type) { in btif_storage_get_ble_bonding_key()
[all …]
/system/tpm/attestation/client/
Ddbus_proxy_test.cc56 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F()
126 EXPECT_EQ(KEY_TYPE_ECC, reply.key_type()); in TEST_F()
148 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F()
184 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F()
226 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F()
269 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F()
/system/security/softkeymaster/include/keymaster/
Dsoftkeymaster.h22 int openssl_generate_keypair(const keymaster0_device_t* dev, const keymaster_keypair_t key_type,
/system/bt/stack/smp/
Dsmp_act.cc62 static void smp_update_key_mask(tSMP_CB* p_cb, uint8_t key_type, bool recv) { in smp_update_key_mask() argument
68 ((key_type == SMP_SEC_KEY_TYPE_ENC) || in smp_update_key_mask()
69 (key_type == SMP_SEC_KEY_TYPE_LK))) { in smp_update_key_mask()
72 p_cb->local_i_key &= ~key_type; in smp_update_key_mask()
73 p_cb->local_r_key &= ~key_type; in smp_update_key_mask()
76 p_cb->local_i_key &= ~key_type; in smp_update_key_mask()
78 p_cb->local_r_key &= ~key_type; in smp_update_key_mask()
81 p_cb->local_r_key &= ~key_type; in smp_update_key_mask()
83 p_cb->local_i_key &= ~key_type; in smp_update_key_mask()
1053 uint8_t key_type = p_data->key.key_type; in smp_proc_sl_key() local
[all …]
/system/bt/bta/dm/
Dbta_dm_api.cc432 bool is_trusted, uint8_t key_type, tBTA_IO_CAP io_cap, in BTA_DmAddDevice() argument
445 p_msg->key_type = key_type; in BTA_DmAddDevice()
617 tBTA_LE_KEY_TYPE key_type) { in BTA_DmAddBleKey() argument
622 p_msg->key_type = key_type; in BTA_DmAddBleKey()
/system/bt/stack/gatt/
Dgatt_auth.cc275 uint8_t key_type; in gatt_determine_sec_act() local
321 btm_ble_get_enc_key_type(p_tcb->peer_bda, &key_type); in gatt_determine_sec_act()
323 if ((key_type & BTM_LE_KEY_LCSRK) && in gatt_determine_sec_act()
/system/tpm/trunks/
Dtpm_utility.h176 virtual TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type,
199 virtual TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type,
Dtpm_utility_impl.h90 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type,
97 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type,
Dtrunks_factory_for_test.cc214 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, in ImportRSAKey() argument
221 return target_->ImportRSAKey(key_type, modulus, public_exponent, in ImportRSAKey()
225 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type, in CreateRSAKeyPair() argument
236 key_type, modulus_bits, public_exponent, password, policy_digest, in CreateRSAKeyPair()
/system/security/softkeymaster/
Dkeymaster_openssl.cpp360 const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params, in openssl_generate_keypair() argument
371 } else if (key_type == TYPE_DSA) { in openssl_generate_keypair()
375 } else if (key_type == TYPE_EC) { in openssl_generate_keypair()
379 } else if (key_type == TYPE_RSA) { in openssl_generate_keypair()
384 ALOGW("Unsupported key type %d", key_type); in openssl_generate_keypair()
/system/bt/stack/include/
Dbtm_ble_api.h76 tBTM_LE_KEY_TYPE key_type);
406 extern void BTM_BleLoadLocalKeys(uint8_t key_type, tBTM_BLE_LOCAL_KEYS* p_key);

123