/system/core/include/utils/ |
H A D | KeyedVector.h | 37 typedef KEY key_type; typedef in class:android::KeyedVector
|
/system/core/libutils/include/utils/ |
H A D | KeyedVector.h | 37 typedef KEY key_type; typedef in class:android::KeyedVector
|
/system/keymaster/ |
H A D | operation.cpp | 69 KeyType key_type = registry_key(); local 71 if (!is_public_key_algorithm(key_type.algorithm)) 74 switch (key_type.purpose) {
|
H A D | android_keymaster_test_utils.h | 393 const keymaster_keypair_t key_type, const void* key_params, 396 int result = device(dev)->generate_keypair(device(dev), key_type, key_params, key_blob, 392 counting_generate_keypair(const struct keymaster0_device* dev, const keymaster_keypair_t key_type, const void* key_params, uint8_t** key_blob, size_t* key_blob_length) argument
|
/system/bt/stack/btm/ |
H A D | btm_dev.cc | 64 uint8_t key_type, tBTM_IO_CAP io_cap, 66 BTM_TRACE_API("%s: link key type:%x", __func__, key_type); 125 p_dev_rec->link_key_type = key_type; 128 if (pin_length >= 16 || key_type == BTM_LKEY_TYPE_AUTH_COMB || 129 key_type == BTM_LKEY_TYPE_AUTH_COMB_P_256) { 138 if (key_type < BTM_MAX_PRE_SM4_LKEY_TYPE) 61 BTM_SecAddDevice(const RawAddress& bd_addr, DEV_CLASS dev_class, BD_NAME bd_name, uint8_t* features, uint32_t trusted_mask[], LINK_KEY link_key, uint8_t key_type, tBTM_IO_CAP io_cap, uint8_t pin_length) argument
|
H A D | btm_ble.cc | 125 * key_type - LE SMP key type. 131 tBTM_LE_KEY_TYPE key_type) { 136 (key_type != BTM_LE_KEY_PENC && key_type != BTM_LE_KEY_PID && 137 key_type != BTM_LE_KEY_PCSRK && key_type != BTM_LE_KEY_LENC && 138 key_type != BTM_LE_KEY_LCSRK && key_type != BTM_LE_KEY_LID)) { 141 << ", Type: " << key_type; local 145 VLOG(1) << __func__ << " BDA: " << bd_addr << ", Type: " << key_type; local 130 BTM_SecAddBleKey(const RawAddress& bd_addr, tBTM_LE_KEY_VALUE* p_le_key, tBTM_LE_KEY_TYPE key_type) argument 171 BTM_BleLoadLocalKeys(uint8_t key_type, tBTM_BLE_LOCAL_KEYS* p_key) argument 1270 btm_sec_save_le_key(const RawAddress& bd_addr, tBTM_LE_KEY_TYPE key_type, tBTM_LE_KEY_VALUE* p_keys, bool pass_to_application) argument 2375 btm_notify_new_key(uint8_t key_type) argument [all...] |
H A D | btm_sec.cc | 4127 p_dev_rec->ble.key_type = BTM_LE_KEY_NONE; 4695 uint8_t key_type) { 4700 VLOG(2) << __func__ << " BDA: " << p_bda << ", TYPE: " << +key_type; local 4702 if ((key_type >= BTM_LTK_DERIVED_LKEY_OFFSET + BTM_LKEY_TYPE_COMBINATION) && 4703 (key_type <= 4706 key_type -= BTM_LTK_DERIVED_LKEY_OFFSET; 4711 if (key_type != BTM_LKEY_TYPE_CHANGED_COMB) 4712 p_dev_rec->link_key_type = key_type; 4741 BTM_TRACE_DEBUG("%s() Save LTK derived LK (key_type = %d)", __func__, 4764 VLOG(2) << __func__ << " Delayed BDA: " << p_bda << " Type:" << +key_type; local 4694 btm_sec_link_key_notification(const RawAddress& p_bda, uint8_t* p_link_key, uint8_t key_type) argument [all...] |
H A D | btm_int_types.h | 473 tBTM_LE_KEY_TYPE key_type; /* bit mask of valid key types in record */ member in struct:__anon880
|
/system/bt/stack/gatt/ |
H A D | gatt_auth.cc | 275 uint8_t key_type; local 321 btm_ble_get_enc_key_type(p_tcb->peer_bda, &key_type); 323 if ((key_type & BTM_LE_KEY_LCSRK) &&
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 360 const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params, 371 } else if (key_type == TYPE_DSA) { 375 } else if (key_type == TYPE_EC) { 379 } else if (key_type == TYPE_RSA) { 384 ALOGW("Unsupported key type %d", key_type); 359 openssl_generate_keypair( const keymaster0_device_t*, const keymaster_keypair_t key_type, const void* key_params, uint8_t** keyBlob, size_t* keyBlobLength) argument
|
/system/tpm/attestation/server/ |
H A D | pkcs11_key_store.cc | 218 KeyType key_type, 225 if (key_type != KEY_TYPE_RSA) { 216 Register(const std::string& username, const std::string& label, KeyType key_type, KeyUsage key_usage, const std::string& private_key_blob, const std::string& public_key_der, const std::string& certificate) argument
|
H A D | attestation_service.cc | 125 if (!CreateKey(request.username(), request.key_label(), request.key_type(), 180 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), 186 result->set_key_type(key.key_type()); 213 if (request.key_type() != KEY_TYPE_RSA) { 230 request.key_type(), 260 if (request.key_type() != KEY_TYPE_RSA) { 272 request.key_type(), 313 if (request.key_type() != KEY_TYPE_RSA) { 356 if (!CreateKey(request.username(), request.key_label(), request.key_type(), 362 if (!GetSubjectPublicKeyInfo(key.key_type(), ke 672 CreateKey(const std::string& username, const std::string& key_label, KeyType key_type, KeyUsage key_usage, CertifiedKey* key) argument 857 GetSubjectPublicKeyInfo( KeyType key_type, const std::string& public_key, std::string* public_key_info) const argument [all...] |
/system/bt/bta/dm/ |
H A D | bta_dm_api.cc | 432 bool is_trusted, uint8_t key_type, tBTA_IO_CAP io_cap, 445 p_msg->key_type = key_type; 610 * key_type - LE SMP key type. 617 tBTA_LE_KEY_TYPE key_type) { 622 p_msg->key_type = key_type; 430 BTA_DmAddDevice(const RawAddress& bd_addr, DEV_CLASS dev_class, LINK_KEY link_key, tBTA_SERVICE_MASK trusted_mask, bool is_trusted, uint8_t key_type, tBTA_IO_CAP io_cap, uint8_t pin_length) argument 616 BTA_DmAddBleKey(const RawAddress& bd_addr, tBTA_LE_KEY_VALUE* p_le_key, tBTA_LE_KEY_TYPE key_type) argument
|
H A D | bta_dm_act.cc | 73 LINK_KEY key, uint8_t key_type); 113 static void bta_dm_ble_id_key_cback(uint8_t key_type, 803 trusted_services_mask, p_lc, p_dev->key_type, 2528 uint8_t key_type) { 2536 if (key_type != HCI_LKEY_TYPE_AMP_WIFI && key_type != HCI_LKEY_TYPE_AMP_UWB) { 2546 p_auth_cmpl->key_type = key_type; 4073 sec_event.ble_key.key_type = p_data->key.key_type; 2525 bta_dm_new_link_key_cback(const RawAddress& bd_addr, UNUSED_ATTR DEV_CLASS dev_class, BD_NAME bd_name, LINK_KEY key, uint8_t key_type) argument 4120 bta_dm_ble_id_key_cback(uint8_t key_type, tBTM_BLE_LOCAL_KEYS* p_key) argument [all...] |
H A D | bta_dm_int.h | 293 uint8_t key_type; member in struct:__anon94 329 tBTA_LE_KEY_TYPE key_type; member in struct:__anon98
|
/system/bt/stack/smp/ |
H A D | smp_act.cc | 61 static void smp_update_key_mask(tSMP_CB* p_cb, uint8_t key_type, bool recv) { argument 67 ((key_type == SMP_SEC_KEY_TYPE_ENC) || 68 (key_type == SMP_SEC_KEY_TYPE_LK))) { 71 p_cb->local_i_key &= ~key_type; 72 p_cb->local_r_key &= ~key_type; 75 p_cb->local_i_key &= ~key_type; 77 p_cb->local_r_key &= ~key_type; 80 p_cb->local_r_key &= ~key_type; 82 p_cb->local_i_key &= ~key_type; 1029 uint8_t key_type local [all...] |
H A D | smp_int.h | 217 uint8_t key_type; member in struct:__anon1265
|
/system/tpm/attestation/common/ |
H A D | tpm_utility_v1.cc | 163 bool TpmUtilityV1::CreateCertifiedKey(KeyType key_type, argument 177 if (key_type != KEY_TYPE_RSA) {
|
/system/bt/btif/src/ |
H A D | btif_storage.cc | 472 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, argument 482 if (btif_storage_get_ble_bonding_key(&bd_addr, key_type, buffer, key_len) == 490 BTIF_TRACE_DEBUG("%s() Adding key type %d for %s", __func__, key_type, 492 BTA_DmAddBleKey(bd_addr, (tBTA_LE_KEY_VALUE*)buffer, key_type); 733 LINK_KEY link_key, uint8_t key_type, 737 int ret = btif_config_set_int(bdstr, "LinkKeyType", (int)key_type); 929 char* key, uint8_t key_type, 932 switch (key_type) { 971 uint8_t key_type, char* key_value, 974 switch (key_type) { 732 btif_storage_add_bonded_device(RawAddress* remote_bd_addr, LINK_KEY link_key, uint8_t key_type, uint8_t pin_length) argument 928 btif_storage_add_ble_bonding_key(RawAddress* remote_bd_addr, char* key, uint8_t key_type, uint8_t key_length) argument 970 btif_storage_get_ble_bonding_key(RawAddress* remote_bd_addr, uint8_t key_type, char* key_value, int key_length) argument 1041 btif_storage_add_ble_local_key(char* key, uint8_t key_type, uint8_t key_length) argument 1076 btif_storage_get_ble_local_key(uint8_t key_type, char* key_value, int key_length) argument [all...] |
/system/bt/stack/btu/ |
H A D | btu_hcif.cc | 1364 uint8_t key_type; local 1368 STREAM_TO_UINT8(key_type, p); 1370 btm_sec_link_key_notification(bda, key, key_type);
|
/system/tpm/trunks/ |
H A D | tpm_utility_impl.cc | 748 TPM_RC TpmUtilityImpl::ImportRSAKey(AsymmetricKeyUsage key_type, argument 772 switch (key_type) { 828 TPM_RC TpmUtilityImpl::CreateRSAKeyPair(AsymmetricKeyUsage key_type, argument 858 switch (key_type) { 1709 << ": Unrecognized key_type. Not filling parameters.";
|
/system/bt/bta/include/ |
H A D | bta_api.h | 510 tBTM_LE_KEY_TYPE key_type; member in struct:__anon270 520 uint8_t key_type; /* The type of Link Key */ member in struct:__anon271 1289 bool is_trusted, uint8_t key_type, 1501 * key_type - LE SMP key type. 1508 tBTA_LE_KEY_TYPE key_type);
|
/system/bt/stack/include/ |
H A D | btm_api_types.h | 1349 uint8_t key_type); 1693 tBTM_LE_KEY_TYPE key_type; member in struct:__anon1076 1733 typedef void(tBTM_LE_KEY_CALLBACK)(uint8_t key_type,
|