/system/bt/btif/include/ |
D | btif_storage.h | 127 LINK_KEY link_key, uint8_t key_type, 211 char* key, uint8_t key_type, 214 uint8_t key_type, char* key_value, 217 bt_status_t btif_storage_add_ble_local_key(char* key, uint8_t key_type, 222 bt_status_t btif_storage_get_ble_local_key(uint8_t key_type, char* key_value,
|
/system/bt/stack/btm/ |
D | btm_ble.cc | 132 tBTM_LE_KEY_TYPE key_type) { in BTM_SecAddBleKey() argument 137 (key_type != BTM_LE_KEY_PENC && key_type != BTM_LE_KEY_PID && in BTM_SecAddBleKey() 138 key_type != BTM_LE_KEY_PCSRK && key_type != BTM_LE_KEY_LENC && in BTM_SecAddBleKey() 139 key_type != BTM_LE_KEY_LCSRK && key_type != BTM_LE_KEY_LID)) { in BTM_SecAddBleKey() 142 << ", Type: " << key_type; in BTM_SecAddBleKey() 146 VLOG(1) << __func__ << " BDA: " << bd_addr << ", Type: " << key_type; in BTM_SecAddBleKey() 148 btm_sec_save_le_key(bd_addr, key_type, p_le_key, false); in BTM_SecAddBleKey() 151 if (key_type == BTM_LE_KEY_PID || key_type == BTM_LE_KEY_LID) in BTM_SecAddBleKey() 172 void BTM_BleLoadLocalKeys(uint8_t key_type, tBTM_BLE_LOCAL_KEYS* p_key) { in BTM_BleLoadLocalKeys() argument 176 switch (key_type) { in BTM_BleLoadLocalKeys() [all …]
|
D | btm_dev.cc | 64 uint8_t key_type, tBTM_IO_CAP io_cap, in BTM_SecAddDevice() argument 66 BTM_TRACE_API("%s: link key type:%x", __func__, key_type); in BTM_SecAddDevice() 125 p_dev_rec->link_key_type = key_type; in BTM_SecAddDevice() 128 if (pin_length >= 16 || key_type == BTM_LKEY_TYPE_AUTH_COMB || in BTM_SecAddDevice() 129 key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256) { in BTM_SecAddDevice() 138 if (key_type < BTM_MAX_PRE_SM4_LKEY_TYPE) in BTM_SecAddDevice()
|
/system/keymaster/ |
D | operation.cpp | 69 KeyType key_type = registry_key(); in is_public_key_operation() local 71 if (!is_public_key_algorithm(key_type.algorithm)) in is_public_key_operation() 74 switch (key_type.purpose) { in is_public_key_operation()
|
/system/tpm/attestation/common/ |
D | interface.proto | 37 optional KeyType key_type = 2; field 69 optional KeyType key_type = 2; field 82 optional KeyType key_type = 1; field 94 optional KeyType key_type = 1; field 112 optional KeyType key_type = 1; field 130 optional KeyType key_type = 3; field
|
D | print_interface_proto.cc | 82 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent() 191 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent() 252 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent() 311 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent() 393 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent() 469 value.key_type(), indent_size + 2) in GetProtoDebugStringWithIndent()
|
D | tpm_utility.h | 57 virtual bool CreateCertifiedKey(KeyType key_type,
|
D | tpm_utility_v1.h | 48 bool CreateCertifiedKey(KeyType key_type,
|
/system/tpm/attestation/server/ |
D | attestation_service.cc | 125 if (!CreateKey(request.username(), request.key_label(), request.key_type(), in CreateGoogleAttestedKeyTask() 180 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), in GetKeyInfoTask() 186 result->set_key_type(key.key_type()); in GetKeyInfoTask() 213 if (request.key_type() != KEY_TYPE_RSA) { in GetEndorsementInfoTask() 230 request.key_type(), in GetEndorsementInfoTask() 260 if (request.key_type() != KEY_TYPE_RSA) { in GetAttestationKeyInfoTask() 272 request.key_type(), in GetAttestationKeyInfoTask() 313 if (request.key_type() != KEY_TYPE_RSA) { in ActivateAttestationKeyTask() 356 if (!CreateKey(request.username(), request.key_label(), request.key_type(), in CreateCertifiableKeyTask() 362 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), in CreateCertifiableKeyTask() [all …]
|
D | dbus_service_test.cc | 89 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F() 163 EXPECT_EQ(KEY_TYPE_ECC, reply.key_type()); in TEST_F() 178 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F() 205 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F() 242 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F() 276 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); in TEST_F()
|
D | mock_key_store.h | 50 KeyType key_type,
|
D | key_store.h | 65 KeyType key_type,
|
D | attestation_service.h | 222 KeyType key_type, 264 bool GetSubjectPublicKeyInfo(KeyType key_type,
|
D | pkcs11_key_store.h | 63 KeyType key_type,
|
/system/bt/btif/src/ |
D | btif_storage.cc | 477 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, in btif_read_le_key() argument 487 if (btif_storage_get_ble_bonding_key(&bd_addr, key_type, buffer, key_len) == in btif_read_le_key() 495 BTIF_TRACE_DEBUG("%s() Adding key type %d for %s", __func__, key_type, in btif_read_le_key() 497 BTA_DmAddBleKey(bd_addr, (tBTA_LE_KEY_VALUE*)buffer, key_type); in btif_read_le_key() 738 LINK_KEY link_key, uint8_t key_type, in btif_storage_add_bonded_device() argument 742 int ret = btif_config_set_int(bdstr, "LinkKeyType", (int)key_type); in btif_storage_add_bonded_device() 977 char* key, uint8_t key_type, in btif_storage_add_ble_bonding_key() argument 980 switch (key_type) { in btif_storage_add_ble_bonding_key() 1019 uint8_t key_type, char* key_value, in btif_storage_get_ble_bonding_key() argument 1022 switch (key_type) { in btif_storage_get_ble_bonding_key() [all …]
|
/system/tpm/attestation/client/ |
D | dbus_proxy_test.cc | 56 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F() 126 EXPECT_EQ(KEY_TYPE_ECC, reply.key_type()); in TEST_F() 148 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F() 184 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F() 226 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F() 269 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); in TEST_F()
|
/system/security/softkeymaster/include/keymaster/ |
D | softkeymaster.h | 22 int openssl_generate_keypair(const keymaster0_device_t* dev, const keymaster_keypair_t key_type,
|
/system/bt/stack/smp/ |
D | smp_act.cc | 62 static void smp_update_key_mask(tSMP_CB* p_cb, uint8_t key_type, bool recv) { in smp_update_key_mask() argument 68 ((key_type == SMP_SEC_KEY_TYPE_ENC) || in smp_update_key_mask() 69 (key_type == SMP_SEC_KEY_TYPE_LK))) { in smp_update_key_mask() 72 p_cb->local_i_key &= ~key_type; in smp_update_key_mask() 73 p_cb->local_r_key &= ~key_type; in smp_update_key_mask() 76 p_cb->local_i_key &= ~key_type; in smp_update_key_mask() 78 p_cb->local_r_key &= ~key_type; in smp_update_key_mask() 81 p_cb->local_r_key &= ~key_type; in smp_update_key_mask() 83 p_cb->local_i_key &= ~key_type; in smp_update_key_mask() 1053 uint8_t key_type = p_data->key.key_type; in smp_proc_sl_key() local [all …]
|
/system/bt/bta/dm/ |
D | bta_dm_api.cc | 432 bool is_trusted, uint8_t key_type, tBTA_IO_CAP io_cap, in BTA_DmAddDevice() argument 445 p_msg->key_type = key_type; in BTA_DmAddDevice() 617 tBTA_LE_KEY_TYPE key_type) { in BTA_DmAddBleKey() argument 622 p_msg->key_type = key_type; in BTA_DmAddBleKey()
|
/system/bt/stack/gatt/ |
D | gatt_auth.cc | 275 uint8_t key_type; in gatt_determine_sec_act() local 321 btm_ble_get_enc_key_type(p_tcb->peer_bda, &key_type); in gatt_determine_sec_act() 323 if ((key_type & BTM_LE_KEY_LCSRK) && in gatt_determine_sec_act()
|
/system/tpm/trunks/ |
D | tpm_utility.h | 176 virtual TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, 199 virtual TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type,
|
D | tpm_utility_impl.h | 90 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, 97 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type,
|
D | trunks_factory_for_test.cc | 214 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, in ImportRSAKey() argument 221 return target_->ImportRSAKey(key_type, modulus, public_exponent, in ImportRSAKey() 225 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type, in CreateRSAKeyPair() argument 236 key_type, modulus_bits, public_exponent, password, policy_digest, in CreateRSAKeyPair()
|
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 360 const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params, in openssl_generate_keypair() argument 371 } else if (key_type == TYPE_DSA) { in openssl_generate_keypair() 375 } else if (key_type == TYPE_EC) { in openssl_generate_keypair() 379 } else if (key_type == TYPE_RSA) { in openssl_generate_keypair() 384 ALOGW("Unsupported key type %d", key_type); in openssl_generate_keypair()
|
/system/bt/stack/include/ |
D | btm_ble_api.h | 76 tBTM_LE_KEY_TYPE key_type); 406 extern void BTM_BleLoadLocalKeys(uint8_t key_type, tBTM_BLE_LOCAL_KEYS* p_key);
|