Home
last modified time | relevance | path

Searched refs:key_data (Results 1 – 15 of 15) sorted by relevance

/system/keymaster/
Dopenssl_utils.cpp36 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, in convert_pkcs8_blob_to_evp() argument
39 if (key_data == NULL || key_length <= 0) in convert_pkcs8_blob_to_evp()
43 d2i_PKCS8_PRIV_KEY_INFO(NULL, &key_data, key_length)); in convert_pkcs8_blob_to_evp()
Dandroid_keymaster_messages.cpp283 delete[] key_data; in SetKeyMaterial()
284 key_data = dup_buffer(key_material, length); in SetKeyMaterial()
296 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); in Serialize()
300 delete[] key_data; in Deserialize()
301 key_data = NULL; in Deserialize()
307 key_data = deserialized_key_material.release(); in Deserialize()
352 delete[] key_data; in SetKeyMaterial()
353 key_data = dup_buffer(key_material, length); in SetKeyMaterial()
362 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); in NonErrorSerialize()
366 delete[] key_data; in NonErrorDeserialize()
[all …]
Dhmac_operation.cpp70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest, in CreateOperation()
91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, in HmacOperation() argument
138 HMAC_Init_ex(&ctx_, key_data, key_data_size, md, NULL /* engine */); in HmacOperation()
Dandroid_keymaster_test.cpp884 uint8_t key_data[] = { in TEST_P() local
912 string key = make_string(key_data); in TEST_P()
991 uint8_t key_data[25] = { in TEST_P() local
995 string key = make_string(key_data); in TEST_P()
1826 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; in TEST_P() local
1827 string key(key_data, sizeof(key_data)); in TEST_P()
1845 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; in TEST_P() local
1846 string key(key_data, sizeof(key_data)); in TEST_P()
1848 .HmacKey(sizeof(key_data) * 8) in TEST_P()
3186 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); in TEST_P() local
[all …]
Dopenssl_utils.h72 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
Dhmac_operation.h28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
Dsymmetric_key.h67 const uint8_t* key_data() const { return key_data_.get(); } in key_data() function
Dkey_blob_test.cpp38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; variable
44 key_material_(key_data, array_length(key_data)) { in KeyBlobTest()
Dsoft_keymaster_device.cpp342 memcpy(*x509_data, rsp.key_data, *x509_data_length); in get_keypair_public()
724 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() argument
726 if (!params || !key_data) in import_key()
737 request.SetKeyMaterial(key_data->data, key_data->data_length); in import_key()
789 memcpy(tmp, response.key_data, export_data->data_length); in export_key()
Dkeymaster0_engine.cpp165 static keymaster_key_blob_t* duplicate_blob(const uint8_t* key_data, size_t key_data_size) { in duplicate_blob() argument
166 unique_ptr<uint8_t[]> key_material_copy(dup_buffer(key_data, key_data_size)); in duplicate_blob()
Dandroid_keymaster.cpp357 response->key_data = out_key.release(); in ExportKey()
373 keymaster_key_blob_t key_material = {request.key_data, request.key_data_length}; in ImportKey()
Dandroid_keymaster_messages_test.cpp385 EXPECT_EQ(0, memcmp(msg.key_data, deserialized->key_data, msg.key_data_length)); in TEST()
430 EXPECT_EQ(0, memcmp("foo", deserialized->key_data, 3)); in TEST()
Daes_operation.cpp136 symmetric_key->key_data(), symmetric_key->key_data_size()); in CreateOperation()
140 AesEvpDecryptOperation(block_mode, padding, tag_length, symmetric_key->key_data(), in CreateOperation()
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h400 : KeymasterMessage(ver), key_data(NULL) {} in KeymasterMessage()
401 ~ImportKeyRequest() { delete[] key_data; } in ~ImportKeyRequest()
414 uint8_t* key_data; member
462 : KeymasterResponse(ver), key_data(NULL) {} in KeymasterResponse()
463 ~ExportKeyResponse() { delete[] key_data; } in ~ExportKeyResponse()
474 uint8_t* key_data; member
Dsoft_keymaster_device.h146 const keymaster_blob_t* key_data,