/system/keymaster/include/keymaster/ |
H A D | android_keymaster_utils.h | 224 key_material_size = 0; 228 key_material_size = 0; 231 key_material_size = size; 235 key_material_size = 0; 238 key_material_size = size; 242 key_material_size = 0; 243 key_material = dup_buffer(blob.key_material, blob.key_material_size); 245 key_material_size = blob.key_material_size; 249 key_material_size 267 memset_s(const_cast<uint8_t*>(key_material), 0, key_material_size); local [all...] |
H A D | android_keymaster_messages.h | 276 key_blob.key_material_size = 0; 293 key_blob.key_material_size = 0; 299 SetKeyMaterial(blob.key_material, blob.key_material_size); 324 key_blob.key_material_size = 0; 330 SetKeyMaterial(blob.key_material, blob.key_material_size); 453 SetKeyMaterial(blob.key_material, blob.key_material_size); 469 key_blob.key_material_size = 0; 475 SetKeyMaterial(blob.key_material, blob.key_material_size); 490 key_blob.key_material_size = 0; 496 SetKeyMaterial(blob.key_material, blob.key_material_size); [all...] |
/system/keymaster/ |
H A D | auth_encrypted_key_blob.cpp | 43 const uint8_t* end = key_blob->key_material + key_blob->key_material_size; 51 if (buf != key_blob->key_material + key_blob->key_material_size) 64 const uint8_t* end = tmp + key_blob.key_material_size; 87 if (!key_blob.key_material || key_blob.key_material_size == 0) 92 const uint8_t* end = tmp + key_blob.key_material_size;
|
H A D | symmetric_key.cpp | 79 key_size_bits = input_key_material.key_material_size * 8; 93 if (key_size_bits != input_key_material.key_material_size * 8) { 95 input_key_material.key_material_size * 8); 117 uint8_t* tmp = dup_buffer(key_material.key_material, key_material.key_material_size); 120 key_data_size_ = key_material.key_material_size;
|
H A D | ocb_utils.cpp | 103 AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key)) 137 if (!ciphertext->Reset(plaintext.key_material_size)) 141 plaintext.key_material_size, NULL /* additional data */, 150 assert(ae_err == static_cast<int>(plaintext.key_material_size)); 173 if (!plaintext->Reset(ciphertext.key_material_size)) 177 ciphertext.key_material_size, NULL /* additional data */, 190 assert(ae_err == static_cast<int>(ciphertext.key_material_size));
|
H A D | keymaster0_engine.cpp | 88 &key_material->key_material_size) < 0) { 93 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size); 104 &key_material->key_material_size) < 0) { 109 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size); 122 to_import.key_material_size, &key_blob, 123 &imported_key->key_material_size) < 0) { 128 imported_key->key_material = dup_buffer(key_blob, imported_key->key_material_size); 136 blob.key_material_size) == 0); 153 blob_copy->key_material_size = key_data_size; 159 return duplicate_blob(blob.key_material, blob.key_material_size); [all...] |
H A D | android_keymaster_messages_test.cpp | 144 rsp.key_blob.key_material_size = array_length(TEST_DATA); 159 rsp.key_blob.key_material_size = array_length(TEST_DATA); 166 EXPECT_EQ(0U, deserialized->key_blob.key_material_size); 178 EXPECT_EQ(3U, deserialized->key_blob.key_material_size); 205 EXPECT_EQ(3U, deserialized->key_blob.key_material_size); 409 EXPECT_EQ(msg.key_blob.key_material_size, deserialized->key_blob.key_material_size); 411 msg.key_blob.key_material_size)); 427 EXPECT_EQ(3U, deserialized->key_blob.key_material_size); 450 EXPECT_EQ(3U, deserialized->key_blob.key_material_size); [all...] |
H A D | asymmetric_key_factory.cpp | 53 d2i_PrivateKey(evp_key_type(), NULL /* pkey */, &tmp, key_material.key_material_size);
|
H A D | keymaster1_engine.cpp | 92 key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); 93 key_blob->key_material_size = blob.key_material_size; 109 input_key_material.key_material_size}; 117 output_key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); 118 output_key_blob->key_material_size = blob.key_material_size;
|
H A D | key_blob_test.cpp | 123 ASSERT_EQ(key_material_.key_material_size, plaintext.key_material_size); 124 EXPECT_EQ(0, memcmp(plaintext.begin(), key_material_.begin(), plaintext.key_material_size)); 333 EXPECT_EQ(0U, key_blob.key_material_size); 347 blob.key_material_size = 16 * 1024 * 1024 + 1; 350 EXPECT_EQ(0U, key_blob.key_material_size);
|
H A D | openssl_utils.cpp | 107 return convert_pkcs8_blob_to_evp(key_material.key_material, key_material.key_material_size,
|
H A D | soft_keymaster_device.cpp | 761 key_blob->key_material_size = response.key_blob.key_material_size; 762 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(key_blob->key_material_size)); 765 memcpy(tmp, response.key_blob.key_material, response.key_blob.key_material_size); 843 key_blob->key_material_size = response.key_blob.key_material_size; 844 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(key_blob->key_material_size)); 847 memcpy(tmp, response.key_blob.key_material, response.key_blob.key_material_size); 965 key_blob->key_material_size = response.key_blob.key_material_size; [all...] |
H A D | android_keymaster_messages.cpp | 29 key_blob->key_material_size = length; 33 return sizeof(uint32_t) /* key size */ + key_blob.key_material_size; 38 return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size); 46 if (!copy_size_and_data_from_buf(buf_ptr, end, &key_blob->key_material_size,
|
H A D | integrity_assured_key_blob.cpp | 115 keymaster_error_t error = ComputeHmac(key_blob.begin(), key_blob.key_material_size - HMAC_SIZE,
|
H A D | keymaster_enforcement.cpp | 410 EVP_DigestUpdate(ctx.get(), key_blob.key_material, key_blob.key_material_size) &&
|
H A D | android_keymaster_test_utils.h | 315 blob_.key_material_size = key_length;
|
H A D | android_keymaster_test_utils.cpp | 671 ++tmp[blob_.key_material_size / 2];
|
H A D | soft_keymaster_context.cpp | 555 const uint8_t* end = blob.key_material + blob.key_material_size;
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_device.cpp | 233 key_blob->key_material_size = response.key_blob.key_material_size; 235 DuplicateBuffer(response.key_blob.key_material, response.key_blob.key_material_size); 308 key_blob->key_material_size = response.key_blob.key_material_size; 310 DuplicateBuffer(response.key_blob.key_material, response.key_blob.key_material_size); 451 upgraded_key->key_material_size = response.upgraded_key.key_material_size; 453 response.upgraded_key.key_material_size);
|
/system/vold/tests/ |
H A D | CryptfsScryptHidlizationEquivalence_test.cpp | 192 key_size = key_blob.key_material_size;
|
/system/security/keystore/ |
H A D | legacy_keymaster_device_wrapper.cpp | 135 result.setToExternal(const_cast<unsigned char*>(blob.key_material), blob.key_material_size);
|