/system/keymaster/ |
H A D | auth_encrypted_key_blob.h | 25 class Buffer; 31 const Buffer& nonce, const Buffer& tag, 37 AuthorizationSet* sw_enforced, Buffer* nonce, 38 Buffer* tag);
|
H A D | ocb_utils.h | 37 const KeymasterKeyBlob& plaintext, const Buffer& nonce, 38 KeymasterKeyBlob* ciphertext, Buffer* tag); 43 const KeymasterKeyBlob& ciphertext, const Buffer& nonce, 44 const Buffer& tag, KeymasterKeyBlob* plaintext);
|
H A D | hkdf.h | 41 Rfc5869HmacSha256Kdf(Buffer& secret, Buffer& salt, Buffer& info, size_t key_bytes_to_generate, 48 bool secret_key(Buffer* buf) const {
|
H A D | hmac.h | 35 bool Init(const Buffer& key); 40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const; 49 bool Verify(const Buffer& data, const Buffer& digest) const;
|
H A D | aes_operation.h | 68 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 69 AuthorizationSet* output_params, Buffer* output, 71 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 72 AuthorizationSet* output_params, Buffer* output) override; 81 bool HandleAad(const AuthorizationSet& input_params, const Buffer& input, 86 bool InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, 114 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 115 AuthorizationSet* output_params, Buffer* output) override; 132 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 133 AuthorizationSet* output_params, Buffer* outpu [all...] |
H A D | ecdsa_operation.h | 40 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 47 Buffer data_; 56 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 57 AuthorizationSet* output_params, Buffer* output, 59 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 60 AuthorizationSet* output_params, Buffer* output) override; 69 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 70 AuthorizationSet* output_params, Buffer* output, 72 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 73 AuthorizationSet* output_params, Buffer* outpu [all...] |
H A D | rsa_operation.h | 44 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 45 AuthorizationSet* output_params, Buffer* output, 56 keymaster_error_t StoreData(const Buffer& input, size_t* input_consumed); 62 Buffer data_; 95 keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 96 AuthorizationSet* output_params, Buffer* output, 98 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 99 AuthorizationSet* output_params, Buffer* output) override; 102 keymaster_error_t SignUndigested(Buffer* output); 103 keymaster_error_t SignDigested(Buffer* outpu [all...] |
H A D | serializable.cpp | 70 bool Buffer::reserve(size_t size) { 86 bool Buffer::Reinitialize(size_t size) { 97 bool Buffer::Reinitialize(const void* data, size_t data_len) { 111 size_t Buffer::available_write() const { 116 size_t Buffer::available_read() const { 122 bool Buffer::write(const uint8_t* src, size_t write_length) { 130 bool Buffer::read(uint8_t* dest, size_t read_length) { 138 size_t Buffer::SerializedSize() const { 142 uint8_t* Buffer::Serialize(uint8_t* buf, const uint8_t* end) const { 146 bool Buffer [all...] |
H A D | hmac_operation.h | 34 virtual keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input, 35 AuthorizationSet* output_params, Buffer* output, 39 const Buffer& signature, AuthorizationSet* output_params, 40 Buffer* output);
|
H A D | auth_encrypted_key_blob.cpp | 33 const Buffer& nonce, const Buffer& tag, 60 AuthorizationSet* sw_enforced, Buffer* nonce, 61 Buffer* tag) { 85 AuthorizationSet* sw_enforced, Buffer* nonce, 86 Buffer* tag) {
|
H A D | hmac.cpp | 34 bool HmacSha256::Init(const Buffer& key) { 50 bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const { 72 bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const {
|
H A D | integrity_assured_key_blob.h | 25 class Buffer;
|
H A D | hmac_test.cpp | 67 Buffer key_buffer(key.data(), key.size()); 72 Buffer digest_buffer(reinterpret_cast<uint8_t*>(digest_copy), sizeof(digest_copy)); 74 Buffer data_buffer(test.data, strlen(test.data));
|
H A D | ecdsa_operation.cpp | 98 keymaster_error_t EcdsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { 126 const Buffer& input, 128 Buffer* /* output */, size_t* input_consumed) { 139 const Buffer& /* signature */, 141 Buffer* output) { 187 const Buffer& input, 189 Buffer* /* output */, size_t* input_consumed) { 200 const Buffer& signature, 202 Buffer* /* output */) {
|
H A D | operation.h | 105 virtual keymaster_error_t Update(const AuthorizationSet& input_params, const Buffer& input, 106 AuthorizationSet* output_params, Buffer* output, 108 virtual keymaster_error_t Finish(const AuthorizationSet& input_params, const Buffer& signature, 109 AuthorizationSet* output_params, Buffer* output) = 0;
|
H A D | rsa_operation.cpp | 146 const Buffer& input, AuthorizationSet* /* output_params */, 147 Buffer* /* output */, size_t* input_consumed) { 160 keymaster_error_t RsaOperation::StoreData(const Buffer& input, size_t* input_consumed) { 272 const Buffer& input, AuthorizationSet* output_params, 273 Buffer* output, size_t* input_consumed) { 286 const Buffer& /* signature */, 287 AuthorizationSet* /* output_params */, Buffer* output) { 296 static keymaster_error_t zero_pad_left(UniquePtr<uint8_t[]>* dest, size_t padded_len, Buffer& src) { 311 keymaster_error_t RsaSignOperation::SignUndigested(Buffer* output) { 359 keymaster_error_t RsaSignOperation::SignDigested(Buffer* outpu [all...] |
H A D | hkdf.cpp | 31 Rfc5869HmacSha256Kdf::Rfc5869HmacSha256Kdf(Buffer& secret, Buffer& salt, Buffer& info,
|
H A D | hmac_operation.cpp | 151 const Buffer& input, AuthorizationSet* /* output_params */, 152 Buffer* /* output */, size_t* input_consumed) { 164 const Buffer& signature, 165 AuthorizationSet* /* output_params */, Buffer* output) {
|
H A D | aes_operation.cpp | 196 const Buffer& input, 197 AuthorizationSet* /* output_params */, Buffer* output, 217 const Buffer& /* signature */, 218 AuthorizationSet* /* output_params */, Buffer* output) { 378 bool AesEvpOperation::HandleAad(const AuthorizationSet& input_params, const Buffer& input, 448 bool AesEvpOperation::InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output, 493 const Buffer& signature, 494 AuthorizationSet* output_params, Buffer* output) { 545 const Buffer& input, 547 Buffer* outpu [all...] |
H A D | ecdsa_keymaster1_operation.h | 72 keymaster_error_t Finish(const AuthorizationSet& input_params, const Buffer& signature, 73 AuthorizationSet* output_params, Buffer* output) override {
|
H A D | rsa_keymaster1_operation.h | 72 keymaster_error_t Finish(const AuthorizationSet& input_params, const Buffer& signature, 73 AuthorizationSet* output_params, Buffer* output) override {
|
H A D | hkdf_test.cpp | 82 Buffer secret_key;
|
H A D | ocb_utils.cpp | 121 const KeymasterKeyBlob& plaintext, const Buffer& nonce, 122 KeymasterKeyBlob* ciphertext, Buffer* tag) { 157 const KeymasterKeyBlob& ciphertext, const Buffer& nonce, 158 const Buffer& tag, KeymasterKeyBlob* plaintext) {
|
/system/keymaster/include/keymaster/ |
H A D | serializable.h | 191 class Buffer : public Serializable { class in namespace:keymaster 193 Buffer() : buffer_(NULL), buffer_size_(0), read_position_(0), write_position_(0) {} function in class:keymaster::Buffer 194 Buffer(size_t size) : buffer_(NULL) { Reinitialize(size); } function in class:keymaster::Buffer 195 Buffer(const void* buf, size_t size) : buffer_(NULL) { Reinitialize(buf, size); } function in class:keymaster::Buffer 204 bool Reinitialize(const Buffer& buffer) { 242 void operator=(const Buffer& other); 243 Buffer(const Buffer&);
|
/system/bt/test/bluedroidtest/ |
H A D | bluedroidtest.c | 297 void get_str(char **p, char *Buffer) argument 303 *Buffer = **p; 305 Buffer++; 308 *Buffer = 0;
|