/system/keymaster/ |
H A D | ecdsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 34 if (!key_data) 56 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, 63 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 64 if (!key_data) { 68 key_data->op_handle = operation_handle_; 69 key_data->finish_params.Reinitialize(input_params); 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local 80 if (!key_data) 82 return key_data [all...] |
H A D | rsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local 34 if (!key_data) 62 key_data->expected_openssl_padding = RSA_NO_PADDING; 68 key_data->expected_openssl_padding = RSA_PKCS1_PADDING; 72 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local 80 if (!key_data) { 84 key_data->op_handle = operation_handle_; 85 key_data->finish_params.Reinitialize(input_params); 95 Keymaster1Engine::KeyData* key_data local [all...] |
H A D | keymaster1_engine.cpp | 146 KeyData* key_data = new KeyData(blob, additional_params); local 147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { 149 delete key_data; 155 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error)); 188 KeyData* key_data = new KeyData(blob, additional_params); local 189 if (!EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, key_data)) { 191 delete key_data; 269 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data, argument 272 if (key_data 291 KeyData* key_data = instance_->GetData(rsa); local 316 KeyData* key_data = instance_->GetData(rsa); local 341 KeyData* key_data = instance_->GetData(ec_key); local [all...] |
H A D | openssl_utils.cpp | 82 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, argument 85 if (key_data == NULL || key_length <= 0) 89 d2i_PKCS8_PRIV_KEY_INFO(NULL, &key_data, key_length)); 118 int key_data_size = i2d_PrivateKey(pkey, NULL /* key_data*/);
|
H A D | android_keymaster_messages.cpp | 308 delete[] key_data; 309 key_data = dup_buffer(key_material, length); 321 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); 325 delete[] key_data; 326 key_data = NULL; 332 key_data = deserialized_key_material.release(); 377 delete[] key_data; 378 key_data = dup_buffer(key_material, length); 387 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); 391 delete[] key_data; [all...] |
H A D | hmac_operation.cpp | 70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest, 91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, argument 138 HMAC_Init_ex(&ctx_, key_data, key_data_size, md, NULL /* engine */);
|
H A D | hmac_operation.h | 28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
|
H A D | symmetric_key.h | 67 const uint8_t* key_data() const { return key_data_.get(); } function in class:keymaster::SymmetricKey
|
H A D | openssl_utils.h | 85 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
|
H A D | keymaster1_engine.h | 95 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
|
H A D | key_blob_test.cpp | 38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test 44 key_material_(key_data, array_length(key_data)) { 103 // key_data shouldn't be anywhere in the blob, ciphertext should.
|
H A D | android_keymaster_test.cpp | 860 uint8_t key_data[] = { local 888 string key = make_string(key_data); 975 uint8_t key_data[25] = { local 979 string key = make_string(key_data); 1905 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local 1906 string key(key_data, sizeof(key_data)); 1924 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; local 1925 string key(key_data, sizeof(key_data)); 3334 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3351 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3368 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); local 3388 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3404 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3432 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local 3454 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); local [all...] |
H A D | soft_keymaster_device.cpp | 915 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, 917 if (!params || !key_data) 930 return km1_dev->import_key(km1_dev, params, key_format, key_data, key_blob, 937 request.SetKeyMaterial(key_data->data, key_data->data_length); 962 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, 975 error = import_key(&sk_dev->km1_device_, params, key_format, key_data, key_blob, 982 error = import_key(&sk_dev->km1_device_, params, key_format, key_data, key_blob, nullptr); 1023 memcpy(tmp, response.key_data, export_data->data_length); 913 import_key( const keymaster1_device_t* dev, const keymaster_key_param_set_t* params, keymaster_key_format_t key_format, const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, keymaster_key_characteristics_t** characteristics) argument 960 import_key( const keymaster2_device_t* dev, const keymaster_key_param_set_t* params, keymaster_key_format_t key_format, const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, keymaster_key_characteristics_t* characteristics) argument
|
/system/tpm/attestation/server/ |
H A D | key_store.h | 35 // |username|. On success true is returned and |key_data| is populated. 38 std::string* key_data) = 0; 45 const std::string& key_data) = 0;
|
H A D | mock_key_store.h | 36 std::string* key_data)); 39 const std::string& key_data));
|
H A D | pkcs11_key_store.h | 53 std::string* key_data) override; 56 const std::string& key_data) override;
|
H A D | pkcs11_key_store.cc | 100 std::string* key_data) { 124 key_data->resize(attribute.ulValueLen); 125 attribute.pValue = string_as_array(key_data); 132 key_data->resize(attribute.ulValueLen); 138 const std::string& key_data) { 154 std::string mutable_key_data(key_data); 98 Read(const std::string& username, const std::string& key_name, std::string* key_data) argument 136 Write(const std::string& username, const std::string& key_name, const std::string& key_data) argument
|
H A D | attestation_service.cc | 707 std::string key_data; local 708 if (!key_store_->Read(username, key_label, &key_data)) { 712 if (key && !key->ParseFromString(key_data)) { 770 std::string key_data; local 771 if (!key.SerializeToString(&key_data)) { 775 if (!key_store_->Write(username, key_label, key_data)) {
|
/system/webservd/webservd/ |
H A D | server.cc | 66 std::string key_data; 67 if (!encryptor->DecryptWithAuthentication(encrypted_key_data, &key_data)) 69 brillo::SecureBlob key{key_data};
|
/system/security/keystore/include/keystore/ |
H A D | keystore_client.h | 105 // Imports |key_data| in the given |key_format|, applies the given 112 keymaster_key_format_t key_format, const std::string& key_data,
|
H A D | keystore_client_mock.h | 56 keymaster_key_format_t key_format, const std::string& key_data,
|
H A D | keystore_client_impl.h | 57 keymaster_key_format_t key_format, const std::string& key_data,
|
/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_device.h | 149 const keymaster_blob_t* key_data, 198 const keymaster_blob_t* key_data,
|
H A D | android_keymaster_messages.h | 447 : KeymasterMessage(ver), key_data(nullptr) {} 448 ~ImportKeyRequest() { delete[] key_data; } 461 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest 509 : KeymasterResponse(ver), key_data(nullptr) {} 510 ~ExportKeyResponse() { delete[] key_data; } 521 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse
|
/system/security/keystore/ |
H A D | keystore_client_impl.cpp | 234 const std::string& key_data, 242 keystore_->importKey(key_name16, key_arguments, key_format, StringAsByteArray(key_data), 243 key_data.size(), kDefaultUID, KEYSTORE_FLAG_NONE, &characteristics); 231 importKey(const std::string& key_name, const AuthorizationSet& key_parameters, keymaster_key_format_t key_format, const std::string& key_data, AuthorizationSet* hardware_enforced_characteristics, AuthorizationSet* software_enforced_characteristics) argument
|