/system/keymaster/ |
H A D | operation.h | 95 void set_key_id(uint64_t key_id) { key_id_ = key_id; } argument 96 uint64_t key_id() const { return key_id_; } function in class:keymaster::Operation
|
H A D | keymaster_enforcement_test.cpp | 91 static const km_id_t key_id = 0xa; member in class:keymaster::test::KeymasterBaseTest 102 keymaster_error_t kmer = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, single_auth_set); 115 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 118 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 128 keymaster_error_t kmer_valid_time = kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 140 ASSERT_EQ(KM_ERROR_KEY_EXPIRED, kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set)); 143 ASSERT_EQ(KM_ERROR_OK, kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set)); 155 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_set); 168 kmen.AuthorizeOperation(KM_PURPOSE_SIGN, key_id, auth_set); 182 kmen.AuthorizeOperation(KM_PURPOSE_VERIFY, key_id, auth_se 866 km_id_t key_id = 0; local [all...] |
H A D | android_keymaster.cpp | 268 km_id_t key_id; local 270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) 272 operation->set_key_id(key_id); 274 request.purpose, key_id, key->authorizations(), request.additional_params, 301 operation->purpose(), operation->key_id(), operation->authorizations(), 330 operation->purpose(), operation->key_id(), operation->authorizations(),
|
/system/security/keystore-engine/ |
H A D | dsa_meth.cpp | 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); local 54 if (key_id == NULL) { 55 ALOGE("key had no key_id!"); 72 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) {
|
H A D | ecdsa_meth.cpp | 58 uint8_t* key_id = reinterpret_cast<uint8_t*>(EC_KEY_get_key_method_data(eckey, local 60 if (key_id == NULL) { 61 ALOGE("key had no key_id!"); 78 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), dgst, 124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 127 reinterpret_cast<void*>(strdup(key_id)), ex_data_dup, ex_data_free,
|
H A D | rsa_meth.cpp | 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 77 if (key_id == NULL) { 78 ALOGE("key had no key_id!"); 93 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), padded.get(), 120 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); local 121 if (key_id == NULL) { 122 ALOGE("key had no key_id!"); 139 int32_t ret = service->sign(String16(reinterpret_cast<const char*>(key_id)), from, 212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 214 if (!RSA_set_ex_data(rsa.get(), rsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) { [all...] |
H A D | eng_keystore.cpp | 93 * Called to initialize RSA's ex_data for the key_id handle. This should 101 static EVP_PKEY* keystore_loadkey(ENGINE* e, const char* key_id, UI_METHOD* ui_method, argument 107 ALOGV("keystore_loadkey(%p, \"%s\", %p, %p)", e, key_id, ui_method, callback_data); 121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen); 142 dsa_pkey_setup(e, pkey.get(), key_id); 146 rsa_pkey_setup(e, pkey.get(), key_id); 150 ecdsa_pkey_setup(e, pkey.get(), key_id);
|
H A D | android_engine.cpp | 57 char *key_id = reinterpret_cast<char *>(*from_d); local 58 if (key_id != NULL) { 59 *from_d = strdup(key_id); 71 char *key_id = reinterpret_cast<char *>(ptr); local 72 free(key_id); 142 const char *key_id = rsa_get_key_id(rsa); local 143 if (key_id == NULL) { 144 ALOGE("key had no key_id!"); 159 int32_t ret = service->sign(String16(key_id), in, len, &reply, &reply_len); 239 const char *key_id local 323 wrap_rsa(const char *key_id, const RSA *public_rsa) argument 359 wrap_ecdsa(const char *key_id, const EC_KEY *public_ecdsa) argument 401 EVP_PKEY_from_keystore(const char* key_id) argument [all...] |
/system/connectivity/shill/ |
H A D | eap_credentials_unittest.cc | 88 void SetKeyId(const string& key_id) { argument 89 eap_.key_id_ = key_id; 411 SetKeyId("key_id"); 422 // Test that EAP engine parameters are set if key_id is set and the
|
/system/bt/stack/smp/ |
H A D | smp_keys.c | 1498 UINT8 key_id[4] = {0x65, 0x6c, 0x74, 0x62}; local 1528 if (!smp_calculate_f5_mackey_or_long_term_key(t, counter_mac_key, key_id, n1, n2, a1, a2, 1539 if (!smp_calculate_f5_mackey_or_long_term_key(t, counter_ltk, key_id, n1, n2, a1, a2, 1586 UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1, UINT8 *a2, 1607 p_prnt = key_id; 1633 ARRAY_TO_STREAM(p, key_id, 4); 1585 smp_calculate_f5_mackey_or_long_term_key(UINT8 *t, UINT8 *counter, UINT8 *key_id, UINT8 *n1, UINT8 *n2, UINT8 *a1, UINT8 *a2, UINT8 *length, UINT8 *mac) argument
|