Searched defs:key_id (Results 1 - 10 of 10) sorted by relevance

/system/keymaster/
H A Doperation.h95 void set_key_id(uint64_t key_id) { key_id_ = key_id; } argument
96 uint64_t key_id() const { return key_id_; } function in class:keymaster::Operation
H A Dkeymaster_enforcement_test.cpp91 static const km_id_t key_id = 0xa; member in class:keymaster::test::KeymasterBaseTest
102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set);
115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set));
118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set);
140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set));
143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set));
155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set);
168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set);
182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_se
866 km_id_t key_id = 0; local
[all...]
H A Dandroid_keymaster.cpp268 km_id_t key_id; local
270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id))
272 operation->set_key_id(key_id);
274 request.purpose, key_id, key->authorizations(), request.additional_params,
301 operation->purpose(), operation->key_id(), operation->authorizations(),
330 operation->purpose(), operation->key_id(), operation->authorizations(),
/system/security/keystore-engine/
H A Ddsa_meth.cpp53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local
54 if (key_id == NULL) {
55 ALOGE("key had no key_id!");
72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument
126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
H A Decdsa_meth.cpp58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local
60 if (key_id == NULL) {
61 ALOGE("key had no key_id!");
78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst,
124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument
127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
H A Drsa_meth.cpp76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
77 if (key_id == NULL) {
78 ALOGE("key had no key_id!");
93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(),
120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local
121 if (key_id == NULL) {
122 ALOGE("key had no key_id!");
139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from,
212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument
214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
[all...]
H A Deng_keystore.cpp93 * Called to initialize RSA's ex_data for the key_id handle. This should
101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method, argument
107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data);
121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen);
142 dsa_pkey_setup(e, pkey.get(), key_id);
146 rsa_pkey_setup(e, pkey.get(), key_id);
150 ecdsa_pkey_setup(e, pkey.get(), key_id);
H A Dandroid_engine.cpp57 char *key_id = reinterpret_cast<char *>(*from_d); local
58 if (key_id != NULL) {
59 *from_d = strdup(key_id);
71 char *key_id = reinterpret_cast<char *>(ptr); local
72 free(key_id);
142 const char *key_id = rsa_get_key_id(rsa); local
143 if (key_id == NULL) {
144 ALOGE("key had no key_id!");
159 int32_t ret = service->sign(String16(key_id), in, len, &reply, &reply_len);
239 const char *key_id local
323 wrap_rsa(const char *key_id, const RSA *public_rsa) argument
359 wrap_ecdsa(const char *key_id, const EC_KEY *public_ecdsa) argument
401 EVP_PKEY_from_keystore(const char* key_id) argument
[all...]
/system/connectivity/shill/
H A Deap_credentials_unittest.cc88 void SetKeyId(const string& key_id) { argument
89 eap_.key_id_ = key_id;
411 SetKeyId("key_id");
422 // Test that EAP engine parameters are set if key_id is set and the
/system/bt/stack/smp/
H A Dsmp_keys.c1498 UINT8 key_id[4] = {0x65, 0x6c, 0x74, 0x62}; local
1528 if (!smp_calculate_f5_mackey_or_long_term_key(t, counter_mac_key, key_id, n1, n2, a1, a2,
1539 if (!smp_calculate_f5_mackey_or_long_term_key(t, counter_ltk, key_id, n1, n2, a1, a2,
1586 UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1, UINT8 *a2,
1607 p_prnt = key_id;
1633 ARRAY_TO_STREAM(p, key_id, 4);
1585 smp_calculate_f5_mackey_or_long_term_key(UINT8 *t, UINT8 *counter, UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1, UINT8 *a2, UINT8 *length, UINT8 *mac) argument

Completed in 507 milliseconds