Home
last modified time | relevance | path

Searched refs:keymaster_blob_t (Results 1 – 25 of 25) sorted by relevance

/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h144 const keymaster_blob_t* client_id,
145 const keymaster_blob_t* app_data,
150 const keymaster_blob_t* key_data,
156 const keymaster_blob_t* client_id,
157 const keymaster_blob_t* app_data,
158 keymaster_blob_t* export_data);
170 const keymaster_blob_t* input, size_t* input_consumed,
172 keymaster_blob_t* output);
176 const keymaster_blob_t* signature,
178 keymaster_blob_t* output);
[all …]
Dkeymaster_tags.h88 template <> struct TagValueType<KM_BYTES> { typedef keymaster_blob_t value_type; };
89 template <> struct TagValueType<KM_BIGNUM> { typedef keymaster_blob_t value_type; };
239 const keymaster_blob_t& blob) {
251 const keymaster_blob_t& blob) {
Dauthorization_set.h337 bool GetTagValue(TypedTag<KM_BYTES, Tag> tag, keymaster_blob_t* val) const { in GetTagValue()
346 bool GetTagValue(TypedTag<KM_BIGNUM, Tag> tag, keymaster_blob_t* val) const { in GetTagValue()
411 bool push_back(TypedTag<KM_BYTES, Tag> tag, const keymaster_blob_t& blob) { in push_back()
461 bool GetTagValueBlob(keymaster_tag_t tag, keymaster_blob_t* val) const;
Dkeymaster_context.h180 const keymaster_blob_t& application_id,
Dsoft_keymaster_context.h88 const keymaster_blob_t& application_id,
/system/keymaster/
Dkeymaster1_engine.cpp108 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey()
266 const keymaster_blob_t& input, in Keymaster1Finish()
267 keymaster_blob_t* output) { in Keymaster1Finish()
297 keymaster_blob_t input = {in, in_len}; in rsa_sign_raw()
298 keymaster_blob_t output; in rsa_sign_raw()
322 keymaster_blob_t input = {in, in_len}; in rsa_decrypt()
323 keymaster_blob_t output; in rsa_decrypt()
346 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign()
347 keymaster_blob_t output; in ecdsa_sign()
361 keymaster_blob_t client_id = {nullptr, 0}; in GetKeymaster1PublicKey()
[all …]
Dattestation_record.h56 keymaster_blob_t* attestation_challenge,
59 keymaster_blob_t* unique_id);
Dandroid_keymaster_test_utils.cpp217 keymaster_blob_t key = {reinterpret_cast<const uint8_t*>(key_material.c_str()), in ImportKey()
267 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation()
268 keymaster_blob_t out_tmp; in UpdateOperation()
283 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation()
284 keymaster_blob_t out_tmp; in UpdateOperation()
311 keymaster_blob_t inp = {reinterpret_cast<const uint8_t*>(input.c_str()), input.length()}; in FinishOperation()
312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation()
314 keymaster_blob_t out_tmp; in FinishOperation()
470 keymaster_blob_t nonce_blob; in EncryptMessage()
501 keymaster_blob_t nonce_blob; in EncryptMessage()
[all …]
Dsoft_keymaster_device.cpp359 void AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in AddClientAndAppData()
863 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics()
907 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics()
938 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
985 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
1015 const keymaster_blob_t* client_id, in export_key()
1016 const keymaster_blob_t* app_data, in export_key()
1017 keymaster_blob_t* export_data) { in export_key()
1055 const keymaster_blob_t* client_id, in export_key()
1056 const keymaster_blob_t* app_data, in export_key()
[all …]
Dattestation_record_test.cpp90 const keymaster_blob_t& /* application_id */, in GenerateUniqueId() argument
128 keymaster_blob_t attestation_challenge = {}; in TEST()
129 keymaster_blob_t unique_id = {}; in TEST()
Dkeymaster1_engine.h95 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
96 keymaster_blob_t* output);
Dsoft_keymaster_context.cpp806 chain->entries = new keymaster_blob_t[kCertificateChainLength]; in AttestationChain()
854 uint64_t /* creation_date_time */, const keymaster_blob_t& /* application_id */, in GenerateUniqueId() argument
866 keymaster_blob_t client_id = {nullptr, 0}; in ParseKeymaster1HwBlob()
867 keymaster_blob_t app_data = {nullptr, 0}; in ParseKeymaster1HwBlob()
868 keymaster_blob_t* client_id_ptr = nullptr; in ParseKeymaster1HwBlob()
869 keymaster_blob_t* app_data_ptr = nullptr; in ParseKeymaster1HwBlob()
986 keymaster_blob_t entry; in BuildHiddenAuthorizations()
Dattestation_record.cpp522 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_attestation_record()
529 keymaster_blob_t attestation_app_id; in build_attestation_record()
567 keymaster_blob_t application_id = {nullptr, 0}; in build_attestation_record()
792 keymaster_blob_t* attestation_challenge, in parse_attestation_record()
795 keymaster_blob_t* unique_id) { in parse_attestation_record()
Dopenssl_utils.cpp65 void convert_bn_to_blob(BIGNUM* bn, keymaster_blob_t* blob) { in convert_bn_to_blob()
Dasymmetric_key.cpp203 static keymaster_error_t get_certificate_blob(X509* certificate, keymaster_blob_t* blob) { in get_certificate_blob()
230 chain->entries = new keymaster_blob_t[entry_count]; in allocate_cert_chain()
Daes_operation.cpp348 keymaster_blob_t iv_blob; in GetIv()
382 keymaster_blob_t aad; in HandleAad()
439 void AesEvpOperation::FillBufferedAadBlock(keymaster_blob_t* aad) { in FillBufferedAadBlock()
Daes_operation.h85 void FillBufferedAadBlock(keymaster_blob_t* aad);
Dkeymaster_enforcement.cpp449 keymaster_blob_t auth_token_blob; in AuthTokenMatches()
Dauthorization_set_test.cpp92 keymaster_blob_t blob_val; in TEST()
549 keymaster_blob_t val; in TEST()
Dandroid_keymaster.cpp405 keymaster_blob_t attestation_application_id; in AttestKey()
Dauthorization_set.cpp634 bool AuthorizationSet::GetTagValueBlob(keymaster_tag_t tag, keymaster_blob_t* val) const { in GetTagValueBlob()
Dandroid_keymaster_test_utils.h323 keymaster_blob_t client_id_ = {.data = reinterpret_cast<const uint8_t*>("app_id"),
Dandroid_keymaster_messages.cpp481 certificate_chain.entries = new keymaster_blob_t[entry_count]; in AllocateChain()
Dandroid_keymaster_test.cpp3405 static X509* parse_cert_blob(const keymaster_blob_t& blob) { in parse_cert_blob()
3412 keymaster_blob_t& key_cert_blob = chain.entries[i]; in verify_chain()
3413 keymaster_blob_t& signing_cert_blob = chain.entries[i + 1]; in verify_chain()
3461 const keymaster_blob_t& attestation_cert) { in verify_attestation_record()
3479 keymaster_blob_t att_challenge = {}; in verify_attestation_record()
3480 keymaster_blob_t att_unique_id = {}; in verify_attestation_record()
/system/security/keystore/
Dlegacy_keymaster_device_wrapper.cpp121 inline static keymaster_blob_t hidlVec2KmBlob(const hidl_vec<uint8_t>& blob) { in hidlVec2KmBlob()
138 inline static hidl_vec<uint8_t> kmBlob2hidlVec(const keymaster_blob_t& blob) { in kmBlob2hidlVec()
320 keymaster_blob_t out_blob = {}; in exportKey()
470 keymaster_blob_t out_blob = {}; in update()
503 keymaster_blob_t out_blob = {}; in finish()