Searched defs:key_type (Results 1 - 23 of 23) sorted by relevance

/system/core/include/utils/
H A DKeyedVector.h37 typedef KEY key_type; typedef in class:android::KeyedVector
/system/core/libutils/include/utils/
H A DKeyedVector.h37 typedef KEY key_type; typedef in class:android::KeyedVector
/system/keymaster/
H A Doperation.cpp69 KeyType key_type = registry_key(); local
71 if (!is_public_key_algorithm(key_type.algorithm))
74 switch (key_type.purpose) {
H A Dandroid_keymaster_test_utils.h393 const keymaster_keypair_t key_type, const void* key_params,
396 int result = device(dev)->generate_keypair(device(dev), key_type, key_params, key_blob,
392 counting_generate_keypair(const struct keymaster0_device* dev, const keymaster_keypair_t key_type, const void* key_params, uint8_t** key_blob, size_t* key_blob_length) argument
/system/bt/stack/btm/
H A Dbtm_dev.cc64 uint8_t key_type, tBTM_IO_CAP io_cap,
66 BTM_TRACE_API("%s: link key type:%x", __func__, key_type);
125 p_dev_rec->link_key_type = key_type;
128 if (pin_length >= 16 || key_type == BTM_LKEY_TYPE_AUTH_COMB ||
129 key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256) {
138 if (key_type < BTM_MAX_PRE_SM4_LKEY_TYPE)
61 BTM_SecAddDevice(const RawAddress& bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, uint8_t* features, uint32_t trusted_mask[], LINK_KEY link_key, uint8_t key_type, tBTM_IO_CAP io_cap, uint8_t pin_length) argument
H A Dbtm_ble.cc125 * key_type - LE SMP key type.
131 tBTM_LE_KEY_TYPE key_type) {
136 (key_type != BTM_LE_KEY_PENC && key_type != BTM_LE_KEY_PID &&
137 key_type != BTM_LE_KEY_PCSRK && key_type != BTM_LE_KEY_LENC &&
138 key_type != BTM_LE_KEY_LCSRK && key_type != BTM_LE_KEY_LID)) {
141 << ", Type: " << key_type; local
145 VLOG(1) << __func__ << " BDA: " << bd_addr << ", Type: " << key_type; local
130 BTM_SecAddBleKey(const RawAddress& bd_addr, tBTM_LE_KEY_VALUE* p_le_key, tBTM_LE_KEY_TYPE key_type) argument
171 BTM_BleLoadLocalKeys(uint8_t key_type, tBTM_BLE_LOCAL_KEYS* p_key) argument
1270 btm_sec_save_le_key(const RawAddress& bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE* p_keys, bool pass_to_application) argument
2375 btm_notify_new_key(uint8_t key_type) argument
[all...]
H A Dbtm_sec.cc4127 p_dev_rec->ble.key_type = BTM_LE_KEY_NONE;
4695 uint8_t key_type) {
4700 VLOG(2) << __func__ << " BDA: " << p_bda << ", TYPE: " << +key_type; local
4702 if ((key_type >= BTM_LTK_DERIVED_LKEY_OFFSET + BTM_LKEY_TYPE_COMBINATION) &&
4703 (key_type <=
4706 key_type -= BTM_LTK_DERIVED_LKEY_OFFSET;
4711 if (key_type != BTM_LKEY_TYPE_CHANGED_COMB)
4712 p_dev_rec->link_key_type = key_type;
4741 BTM_TRACE_DEBUG("%s() Save LTK derived LK (key_type = %d)", __func__,
4764 VLOG(2) << __func__ << " Delayed BDA: " << p_bda << " Type:" << +key_type; local
4694 btm_sec_link_key_notification(const RawAddress& p_bda, uint8_t* p_link_key, uint8_t key_type) argument
[all...]
H A Dbtm_int_types.h473 tBTM_LE_KEY_TYPE key_type; /* bit mask of valid key types in record */ member in struct:__anon880
/system/bt/stack/gatt/
H A Dgatt_auth.cc275 uint8_t key_type; local
321 btm_ble_get_enc_key_type(p_tcb->peer_bda, &key_type);
323 if ((key_type & BTM_LE_KEY_LCSRK) &&
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp360 const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params,
371 } else if (key_type == TYPE_DSA) {
375 } else if (key_type == TYPE_EC) {
379 } else if (key_type == TYPE_RSA) {
384 ALOGW("Unsupported key type %d", key_type);
359 openssl_generate_keypair( const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params, uint8_t** keyBlob, size_t* keyBlobLength) argument
/system/tpm/attestation/server/
H A Dpkcs11_key_store.cc218 KeyType key_type,
225 if (key_type != KEY_TYPE_RSA) {
216 Register(const std::string& username, const std::string& label, KeyType key_type, KeyUsage key_usage, const std::string& private_key_blob, const std::string& public_key_der, const std::string& certificate) argument
H A Dattestation_service.cc125 if (!CreateKey(request.username(), request.key_label(), request.key_type(),
180 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(),
186 result->set_key_type(key.key_type());
213 if (request.key_type() != KEY_TYPE_RSA) {
230 request.key_type(),
260 if (request.key_type() != KEY_TYPE_RSA) {
272 request.key_type(),
313 if (request.key_type() != KEY_TYPE_RSA) {
356 if (!CreateKey(request.username(), request.key_label(), request.key_type(),
362 if (!GetSubjectPublicKeyInfo(key.key_type(), ke
672 CreateKey(const std::string& username, const std::string& key_label, KeyType key_type, KeyUsage key_usage, CertifiedKey* key) argument
857 GetSubjectPublicKeyInfo( KeyType key_type, const std::string& public_key, std::string* public_key_info) const argument
[all...]
/system/bt/bta/dm/
H A Dbta_dm_api.cc432 bool is_trusted, uint8_t key_type, tBTA_IO_CAP io_cap,
445 p_msg->key_type = key_type;
610 * key_type - LE SMP key type.
617 tBTA_LE_KEY_TYPE key_type) {
622 p_msg->key_type = key_type;
430 BTA_DmAddDevice(const RawAddress& bd_addr, DEV_CLASS dev_class, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, bool is_trusted, uint8_t key_type, tBTA_IO_CAP io_cap, uint8_t pin_length) argument
616 BTA_DmAddBleKey(const RawAddress& bd_addr, tBTA_LE_KEY_VALUE* p_le_key, tBTA_LE_KEY_TYPE key_type) argument
H A Dbta_dm_act.cc73 LINK_KEY key, uint8_t key_type);
113 static void bta_dm_ble_id_key_cback(uint8_t key_type,
803 trusted_services_mask, p_lc, p_dev->key_type,
2528 uint8_t key_type) {
2536 if (key_type != HCI_LKEY_TYPE_AMP_WIFI && key_type != HCI_LKEY_TYPE_AMP_UWB) {
2546 p_auth_cmpl->key_type = key_type;
4073 sec_event.ble_key.key_type = p_data->key.key_type;
2525 bta_dm_new_link_key_cback(const RawAddress& bd_addr, UNUSED_ATTR DEV_CLASS dev_class, BD_NAME bd_name, LINK_KEY key, uint8_t key_type) argument
4120 bta_dm_ble_id_key_cback(uint8_t key_type, tBTM_BLE_LOCAL_KEYS* p_key) argument
[all...]
H A Dbta_dm_int.h293 uint8_t key_type; member in struct:__anon94
329 tBTA_LE_KEY_TYPE key_type; member in struct:__anon98
/system/bt/stack/smp/
H A Dsmp_act.cc61 static void smp_update_key_mask(tSMP_CB* p_cb, uint8_t key_type, bool recv) { argument
67 ((key_type == SMP_SEC_KEY_TYPE_ENC) ||
68 (key_type == SMP_SEC_KEY_TYPE_LK))) {
71 p_cb->local_i_key &= ~key_type;
72 p_cb->local_r_key &= ~key_type;
75 p_cb->local_i_key &= ~key_type;
77 p_cb->local_r_key &= ~key_type;
80 p_cb->local_r_key &= ~key_type;
82 p_cb->local_i_key &= ~key_type;
1029 uint8_t key_type local
[all...]
H A Dsmp_int.h217 uint8_t key_type; member in struct:__anon1265
/system/tpm/attestation/common/
H A Dtpm_utility_v1.cc163 bool TpmUtilityV1::CreateCertifiedKey(KeyType key_type, argument
177 if (key_type != KEY_TYPE_RSA) {
/system/bt/btif/src/
H A Dbtif_storage.cc472 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, argument
482 if (btif_storage_get_ble_bonding_key(&bd_addr, key_type, buffer, key_len) ==
490 BTIF_TRACE_DEBUG("%s() Adding key type %d for %s", __func__, key_type,
492 BTA_DmAddBleKey(bd_addr, (tBTA_LE_KEY_VALUE*)buffer, key_type);
733 LINK_KEY link_key, uint8_t key_type,
737 int ret = btif_config_set_int(bdstr, "LinkKeyType", (int)key_type);
929 char* key, uint8_t key_type,
932 switch (key_type) {
971 uint8_t key_type, char* key_value,
974 switch (key_type) {
732 btif_storage_add_bonded_device(RawAddress* remote_bd_addr, LINK_KEY link_key, uint8_t key_type, uint8_t pin_length) argument
928 btif_storage_add_ble_bonding_key(RawAddress* remote_bd_addr, char* key, uint8_t key_type, uint8_t key_length) argument
970 btif_storage_get_ble_bonding_key(RawAddress* remote_bd_addr, uint8_t key_type, char* key_value, int key_length) argument
1041 btif_storage_add_ble_local_key(char* key, uint8_t key_type, uint8_t key_length) argument
1076 btif_storage_get_ble_local_key(uint8_t key_type, char* key_value, int key_length) argument
[all...]
/system/bt/stack/btu/
H A Dbtu_hcif.cc1364 uint8_t key_type; local
1368 STREAM_TO_UINT8(key_type, p);
1370 btm_sec_link_key_notification(bda, key, key_type);
/system/tpm/trunks/
H A Dtpm_utility_impl.cc748 TPM_RC TpmUtilityImpl::ImportRSAKey(AsymmetricKeyUsage key_type, argument
772 switch (key_type) {
828 TPM_RC TpmUtilityImpl::CreateRSAKeyPair(AsymmetricKeyUsage key_type, argument
858 switch (key_type) {
1709 << ": Unrecognized key_type. Not filling parameters.";
/system/bt/bta/include/
H A Dbta_api.h510 tBTM_LE_KEY_TYPE key_type; member in struct:__anon270
520 uint8_t key_type; /* The type of Link Key */ member in struct:__anon271
1289 bool is_trusted, uint8_t key_type,
1501 * key_type - LE SMP key type.
1508 tBTA_LE_KEY_TYPE key_type);
/system/bt/stack/include/
H A Dbtm_api_types.h1349 uint8_t key_type);
1693 tBTM_LE_KEY_TYPE key_type; member in struct:__anon1076
1733 typedef void(tBTM_LE_KEY_CALLBACK)(uint8_t key_type,

Completed in 2281 milliseconds