/system/bt/btif/include/ |
H A D | btif_storage.h | 124 uint8_t key_type, 280 uint8_t key_type, 283 UINT8 key_type, 288 uint8_t key_type, 292 bt_status_t btif_storage_get_ble_local_key(UINT8 key_type,
|
/system/keymaster/ |
H A D | operation.cpp | 68 KeyType key_type = registry_key(); local 70 if (!is_public_key_algorithm(key_type.algorithm)) 73 switch (key_type.purpose) {
|
/system/bt/stack/btm/ |
H A D | btm_ble.c | 131 ** key_type - LE SMP key type. 136 BOOLEAN BTM_SecAddBleKey (BD_ADDR bd_addr, tBTM_LE_KEY_VALUE *p_le_key, tBTM_LE_KEY_TYPE key_type) argument 143 (key_type != BTM_LE_KEY_PENC && key_type != BTM_LE_KEY_PID && 144 key_type != BTM_LE_KEY_PCSRK && key_type != BTM_LE_KEY_LENC && 145 key_type != BTM_LE_KEY_LCSRK && key_type != BTM_LE_KEY_LID)) 150 (bd_addr[4]<<8)+bd_addr[5], key_type); 156 (bd_addr[4]<<8)+bd_addr[5], key_type); 183 BTM_BleLoadLocalKeys(UINT8 key_type, tBTM_BLE_LOCAL_KEYS *p_key) argument 1152 btm_sec_save_le_key(BD_ADDR bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE *p_keys, BOOLEAN pass_to_application) argument 2398 btm_notify_new_key(UINT8 key_type) argument [all...] |
H A D | btm_dev.c | 61 LINK_KEY link_key, UINT8 key_type, tBTM_IO_CAP io_cap, 64 BTM_TRACE_API("%s: link key type:%x", __func__, key_type); 134 p_dev_rec->link_key_type = key_type; 138 key_type == BTM_LKEY_TYPE_AUTH_COMB || 139 key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256) { 147 if (key_type < BTM_MAX_PRE_SM4_LKEY_TYPE) 59 BTM_SecAddDevice(BD_ADDR bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, UINT8 *features, UINT32 trusted_mask[], LINK_KEY link_key, UINT8 key_type, tBTM_IO_CAP io_cap, UINT8 pin_length) argument
|
H A D | btm_ble_addr.c | 282 (p_dev_rec->ble.key_type & BTM_LE_KEY_PID)) 338 !(p_dev_rec->ble.key_type & BTM_LE_KEY_PID))
|
/system/security/softkeymaster/include/keymaster/ |
H A D | softkeymaster.h | 22 int openssl_generate_keypair(const keymaster0_device_t* dev, const keymaster_keypair_t key_type,
|
/system/tpm/attestation/common/ |
H A D | tpm_utility.h | 50 // correspond to |key_type| and |key_usage|. The parent key will be the 57 virtual bool CreateCertifiedKey(KeyType key_type,
|
H A D | print_interface_proto.cc | 80 output += indent + " key_type: "; 82 GetProtoDebugStringWithIndent(value.key_type(), 188 output += indent + " key_type: "; 190 GetProtoDebugStringWithIndent(value.key_type(), 246 output += indent + " key_type: "; 248 GetProtoDebugStringWithIndent(value.key_type(), 303 output += indent + " key_type: "; 305 GetProtoDebugStringWithIndent(value.key_type(), 383 output += indent + " key_type: "; 385 GetProtoDebugStringWithIndent(value.key_type(), [all...] |
H A D | tpm_utility_v1.h | 48 bool CreateCertifiedKey(KeyType key_type,
|
/system/tpm/attestation/server/ |
H A D | key_store.h | 65 KeyType key_type,
|
H A D | mock_key_store.h | 46 KeyType key_type,
|
H A D | attestation_service.cc | 132 if (!CreateKey(request.username(), request.key_label(), request.key_type(), 200 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), 206 result->set_key_type(key.key_type()); 238 if (request.key_type() != KEY_TYPE_RSA) { 255 request.key_type(), 289 if (request.key_type() != KEY_TYPE_RSA) { 301 request.key_type(), 346 if (request.key_type() != KEY_TYPE_RSA) { 395 if (!CreateKey(request.username(), request.key_label(), request.key_type(), 401 if (!GetSubjectPublicKeyInfo(key.key_type(), ke 729 CreateKey(const std::string& username, const std::string& key_label, KeyType key_type, KeyUsage key_usage, CertifiedKey* key) argument 921 GetSubjectPublicKeyInfo( KeyType key_type, const std::string& public_key, std::string* public_key_info) const argument [all...] |
H A D | dbus_service_test.cc | 89 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); 162 EXPECT_EQ(KEY_TYPE_ECC, reply.key_type()); 177 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); 204 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); 241 EXPECT_EQ(KEY_TYPE_ECC, request.key_type()); 275 EXPECT_EQ(KEY_TYPE_ECC, request.key_type());
|
H A D | pkcs11_key_store.h | 63 KeyType key_type,
|
H A D | attestation_service.h | 228 // |key_label|, |key_type|, and |key_usage|. Returns true on success. 231 KeyType key_type, 272 // Creates a X.509/DER SubjectPublicKeyInfo for the given |key_type| and 274 bool GetSubjectPublicKeyInfo(KeyType key_type,
|
/system/bt/btif/src/ |
H A D | btif_storage.c | 496 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, bt_bdaddr_t bd_addr, argument 505 if (btif_storage_get_ble_bonding_key(&bd_addr, key_type, buffer, key_len) == BT_STATUS_SUCCESS) 520 key_type, bdaddr_to_string(&bd_addr, bd_str, sizeof(bd_str))); 521 BTA_DmAddBleKey(bta_bd_addr, (tBTA_LE_KEY_VALUE *)buffer, key_type); 779 uint8_t key_type, 784 int ret = btif_config_set_int(bdstr, "LinkKeyType", (int)key_type); 978 UINT8 key_type, 984 switch(key_type) 1023 UINT8 key_type, 1030 switch(key_type) 777 btif_storage_add_bonded_device(bt_bdaddr_t *remote_bd_addr, LINK_KEY link_key, uint8_t key_type, uint8_t pin_length) argument 976 btif_storage_add_ble_bonding_key(bt_bdaddr_t *remote_bd_addr, char *key, UINT8 key_type, UINT8 key_length) argument 1022 btif_storage_get_ble_bonding_key(bt_bdaddr_t *remote_bd_addr, UINT8 key_type, char *key_value, int key_length) argument 1098 btif_storage_add_ble_local_key(char *key, uint8_t key_type, uint8_t key_length) argument 1135 btif_storage_get_ble_local_key(UINT8 key_type, char *key_value, int key_length) argument [all...] |
H A D | btif_dm.c | 1106 if ((p_auth_cmpl->key_type < HCI_LKEY_TYPE_DEBUG_COMB) || 1107 (p_auth_cmpl->key_type == HCI_LKEY_TYPE_AUTH_COMB) || 1108 (p_auth_cmpl->key_type == HCI_LKEY_TYPE_CHANGED_COMB) || 1109 (p_auth_cmpl->key_type == HCI_LKEY_TYPE_AUTH_COMB_P_256) || 1113 BTIF_TRACE_DEBUG("%s: Storing link key. key_type=0x%x, bond_type=%d", 1114 __FUNCTION__, p_auth_cmpl->key_type, pairing_cb.bond_type); 1116 p_auth_cmpl->key, p_auth_cmpl->key_type, 1122 BTIF_TRACE_DEBUG("%s: Temporary key. Not storing. key_type=0x%x, bond_type=%d", 1123 __FUNCTION__, p_auth_cmpl->key_type, pairing_cb.bond_type); 1842 BTIF_TRACE_DEBUG("BTA_DM_BLE_KEY_EVT key_type [all...] |
/system/tpm/attestation/client/ |
H A D | dbus_proxy_test.cc | 55 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); 125 EXPECT_EQ(KEY_TYPE_ECC, reply.key_type()); 147 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); 183 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); 225 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type()); 268 EXPECT_EQ(KEY_TYPE_ECC, request_proto.key_type());
|
/system/bt/stack/gatt/ |
H A D | gatt_auth.c | 323 UINT8 key_type; local 378 btm_ble_get_enc_key_type(p_tcb->peer_bda, &key_type); 380 if ( (key_type & BTM_LE_KEY_LCSRK) &&
|
/system/tpm/trunks/ |
H A D | tpm_utility.h | 175 // This method imports an external RSA key of |key_type| into the TPM. 179 virtual TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, 187 // This method uses the TPM to generates an RSA key of type |key_type|. 202 virtual TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type,
|
H A D | tpm_utility_impl.h | 90 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, 97 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type, 165 // template for a key. It takes a valid |key_type| tp construct the
|
H A D | trunks_factory_for_test.cc | 241 TPM_RC ImportRSAKey(AsymmetricKeyUsage key_type, 248 return target_->ImportRSAKey(key_type, modulus, public_exponent, 252 TPM_RC CreateRSAKeyPair(AsymmetricKeyUsage key_type, 262 return target_->CreateRSAKeyPair(key_type, modulus_bits, public_exponent,
|
/system/bt/stack/smp/ |
H A D | smp_act.c | 108 static void smp_update_key_mask (tSMP_CB *p_cb, UINT8 key_type, BOOLEAN recv) argument 115 ((key_type == SMP_SEC_KEY_TYPE_ENC) || (key_type == SMP_SEC_KEY_TYPE_LK))) 119 p_cb->local_i_key &= ~key_type; 120 p_cb->local_r_key &= ~key_type; 126 p_cb->local_i_key &= ~key_type; 128 p_cb->local_r_key &= ~key_type; 133 p_cb->local_r_key &= ~key_type; 135 p_cb->local_i_key &= ~key_type; 1138 UINT8 key_type local [all...] |
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 366 const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params, 377 } else if (key_type == TYPE_DSA) { 381 } else if (key_type == TYPE_EC) { 385 } else if (key_type == TYPE_RSA) { 390 ALOGW("Unsupported key type %d", key_type); 365 openssl_generate_keypair( const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params, uint8_t** keyBlob, size_t* keyBlobLength) argument
|
/system/bt/bta/dm/ |
H A D | bta_dm_api.c | 450 UINT8 key_type, tBTA_IO_CAP io_cap, UINT8 pin_length) 463 p_msg->key_type = key_type; 635 ** key_type - LE SMP key type. 641 void BTA_DmAddBleKey (BD_ADDR bd_addr, tBTA_LE_KEY_VALUE *p_le_key, tBTA_LE_KEY_TYPE key_type) argument 649 p_msg->key_type = key_type; 448 BTA_DmAddDevice(BD_ADDR bd_addr, DEV_CLASS dev_class, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, BOOLEAN is_trusted, UINT8 key_type, tBTA_IO_CAP io_cap, UINT8 pin_length) argument
|