/system/security/keystore/include/keystore/ |
H A D | keystore_client.h | 62 // decryption. If a key identified by |key_name| does not already exist it 65 // have |key_name| as a prefix. 66 virtual bool encryptWithAuthentication(const std::string& key_name, const std::string& data, 70 // EncryptWithAuthentication using the key(s) identified by |key_name|. On 72 virtual bool decryptWithAuthentication(const std::string& key_name, 77 // |key_name|, |input_parameters|, and |output_parameters| are as in 81 virtual bool oneShotOperation(KeyPurpose purpose, const std::string& key_name, 93 // the given |key_name|. The [hardware|software]_enforced_characteristics of 97 virtual KeyStoreNativeReturnCode generateKey(const std::string& key_name, 103 // identified by |key_name| [all...] |
H A D | keystore_client_mock.h | 33 bool(const std::string& key_name, const std::string& data, 36 bool(const std::string& key_name, const std::string& encrypted_data, 39 bool(keymaster_purpose_t purpose, const std::string& key_name, 45 int32_t(const std::string& key_name, 50 int32_t(const std::string& key_name, 54 int32_t(const std::string& key_name, 60 const std::string& key_name, std::string* export_data)); 61 MOCK_METHOD1(deleteKey, int32_t(const std::string& key_name)); 63 MOCK_METHOD5(beginOperation, int32_t(keymaster_purpose_t purpose, const std::string& key_name, 78 MOCK_METHOD1(doesKeyExist, bool(const std::string& key_name)); [all...] |
H A D | keystore_client_impl.h | 37 bool encryptWithAuthentication(const std::string& key_name, const std::string& data, 39 bool decryptWithAuthentication(const std::string& key_name, const std::string& encrypted_data, 41 bool oneShotOperation(KeyPurpose purpose, const std::string& key_name, 47 KeyStoreNativeReturnCode generateKey(const std::string& key_name, 52 getKeyCharacteristics(const std::string& key_name, 55 KeyStoreNativeReturnCode importKey(const std::string& key_name, 60 KeyStoreNativeReturnCode exportKey(KeyFormat export_format, const std::string& key_name, 62 KeyStoreNativeReturnCode deleteKey(const std::string& key_name) override; 64 KeyStoreNativeReturnCode beginOperation(KeyPurpose purpose, const std::string& key_name, 79 bool doesKeyExist(const std::string& key_name) overrid [all...] |
/system/security/keystore/ |
H A D | keystore_client_impl.cpp | 62 bool KeystoreClientImpl::encryptWithAuthentication(const std::string& key_name, argument 69 std::string encryption_key_name = key_name + kEncryptSuffix; 73 std::string authentication_key_name = key_name + kAuthenticateSuffix; 116 bool KeystoreClientImpl::decryptWithAuthentication(const std::string& key_name, argument 124 std::string authentication_key_name = key_name + kAuthenticateSuffix; 135 std::string encryption_key_name = key_name + kEncryptSuffix; 150 bool KeystoreClientImpl::oneShotOperation(KeyPurpose purpose, const std::string& key_name, argument 158 beginOperation(purpose, key_name, input_parameters, output_parameters, &handle); 185 KeyStoreNativeReturnCode KeystoreClientImpl::generateKey(const std::string& key_name, argument 189 String16 key_name16(key_name 204 getKeyCharacteristics(const std::string& key_name, AuthorizationSet* hardware_enforced_characteristics, AuthorizationSet* software_enforced_characteristics) argument 220 importKey(const std::string& key_name, const AuthorizationSet& key_parameters, KeyFormat key_format, const std::string& key_data, AuthorizationSet* hardware_enforced_characteristics, AuthorizationSet* software_enforced_characteristics) argument 240 exportKey(KeyFormat export_format, const std::string& key_name, std::string* export_data) argument 250 deleteKey(const std::string& key_name) argument 259 beginOperation(KeyPurpose purpose, const std::string& key_name, const AuthorizationSet& input_parameters, AuthorizationSet* output_parameters, uint64_t* handle) argument 339 doesKeyExist(const std::string& key_name) argument 364 createOrVerifyEncryptionKey(const std::string& key_name) argument 402 createOrVerifyAuthenticationKey(const std::string& key_name) argument 440 verifyEncryptionKeyAttributes(const std::string& key_name, bool* verified) argument 481 verifyAuthenticationKeyAttributes(const std::string& key_name, bool* verified) argument [all...] |
H A D | keystore_cli_v2.cpp | 46 " generate --name=<key_name>\n" 47 " get-chars --name=<key_name>\n" 48 " export --name=<key_name>\n" 49 " delete --name=<key_name>\n" 51 " exists --name=<key_name>\n" 53 " sign-verify --name=<key_name>\n" 54 " [en|de]crypt --name=<key_name> --in=<file> --out=<file>\n"); 342 for (const auto& key_name : key_list) { 343 printf(" %s\n", key_name.c_str()); 406 int Encrypt(const std::string& key_name, cons argument 419 Decrypt(const std::string& key_name, const std::string& input_filename, const std::string& output_filename) argument [all...] |
/system/tpm/attestation/server/ |
H A D | pkcs11_key_store.h | 52 const std::string& key_name, 55 const std::string& key_name, 58 const std::string& key_name) override; 73 base::Callback<bool(const std::string& key_name, 79 const std::string& key_name); 94 std::string* key_name); 97 // object identified by |object_handle| if |key_name| matches |key_prefix|. 101 const std::string& key_name,
|
H A D | pkcs11_key_store.cc | 95 const std::string& key_name, 107 CK_OBJECT_HANDLE key_handle = FindObject(session.handle(), key_name); 109 LOG(WARNING) << "Pkcs11KeyStore: Key does not exist: " << key_name; 116 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 123 LOG(ERROR) << "Pkcs11KeyStore: Failed to read key data: " << key_name; 131 const std::string& key_name, 134 if (!Delete(username, key_name)) { 147 std::string mutable_key_name(key_name); 166 LOG(ERROR) << "Pkcs11KeyStore: Failed to write key data: " << key_name; 173 const std::string& key_name) { 94 Read(const std::string& username, const std::string& key_name, std::string* key_data) argument 130 Write(const std::string& username, const std::string& key_name, const std::string& key_data) argument 172 Delete(const std::string& username, const std::string& key_name) argument 412 FindObject(CK_SESSION_HANDLE session_handle, const std::string& key_name) argument 509 std::string key_name; local 528 GetKeyName(CK_SESSION_HANDLE session_handle, CK_OBJECT_HANDLE object_handle, std::string* key_name) argument 547 DeleteIfMatchesPrefix(CK_SESSION_HANDLE session_handle, const std::string& key_prefix, const std::string& key_name, CK_OBJECT_HANDLE object_handle) argument [all...] |
H A D | pkcs11_key_store_test.cc | 576 std::string key_name = std::string("prefix") + base::IntToString(i); local 577 key_store.Write(kDefaultUser, key_name, std::string(key_name)); 584 std::string key_name = std::string("prefix") + base::IntToString(i); local 585 EXPECT_FALSE(key_store.Read(kDefaultUser, key_name, &blob));
|
H A D | attestation_service.cc | 663 if (database_pb.device_keys(i).key_name() == key_label) { 740 if (database_pb->device_keys(i).key_name() == key_label) { 755 if (database_pb->device_keys(i).key_name() == key_label) {
|
/system/tpm/trunks/ |
H A D | tpm_generated_test.cc | 243 TPM2B_NAME key_name; local 249 &creation_ticket, &key_name, &authorization); 259 EXPECT_EQ(key_name.size, 3); 260 EXPECT_EQ(key_name.name[0], 'K'); 261 EXPECT_EQ(key_name.name[1], 'E'); 262 EXPECT_EQ(key_name.name[2], 'Y');
|
H A D | tpm_utility_impl.cc | 444 std::string key_name; local 445 result = ComputeKeyName(public_area, &key_name); 455 result = factory_.GetTpm()->RSA_EncryptSync(key_handle, key_name, in_message, 511 std::string key_name; local 512 result = ComputeKeyName(public_area, &key_name); 522 result = factory_.GetTpm()->RSA_DecryptSync(key_handle, key_name, in_message, 578 std::string key_name; local 579 result = ComputeKeyName(public_area, &key_name); 592 factory_.GetTpm()->SignSync(key_handle, key_name, tpm_digest, in_scheme, 650 std::string key_name; local 709 std::string key_name; local 950 TPM2B_NAME key_name; local 1662 TPM2B_NAME key_name; local [all...] |
H A D | tpm_utility_test.cc | 604 std::string key_name; local 642 std::string key_name; local
|
/system/bt/stack/smp/ |
H A D | smp_cmac.cc | 46 void print128(BT_OCTET16 x, const uint8_t* key_name) { argument 51 SMP_TRACE_WARNING("%s(MSB ~ LSB) = ", key_name);
|
H A D | smp_int.h | 535 const char* key_name, 543 extern void print128(BT_OCTET16 x, const uint8_t* key_name);
|
H A D | smp_keys.cc | 55 void smp_debug_print_nbyte_little_endian(uint8_t* p, const char* key_name, argument 63 SMP_TRACE_DEBUG("%s(LSB ~ MSB):", key_name); 78 void smp_debug_print_nbyte_big_endian(uint8_t* p, const char* key_name, argument 83 SMP_TRACE_DEBUG("%s(MSB ~ LSB):", key_name);
|