Searched refs:key_material_size (Results 1 - 21 of 21) sorted by relevance

/system/keymaster/include/keymaster/
H A Dandroid_keymaster_utils.h224 key_material_size = 0;
228 key_material_size = 0;
231 key_material_size = size;
235 key_material_size = 0;
238 key_material_size = size;
242 key_material_size = 0;
243 key_material = dup_buffer(blob.key_material, blob.key_material_size);
245 key_material_size = blob.key_material_size;
249 key_material_size
267 memset_s(const_cast<uint8_t*>(key_material), 0, key_material_size); local
[all...]
H A Dandroid_keymaster_messages.h276 key_blob.key_material_size = 0;
293 key_blob.key_material_size = 0;
299 SetKeyMaterial(blob.key_material, blob.key_material_size);
324 key_blob.key_material_size = 0;
330 SetKeyMaterial(blob.key_material, blob.key_material_size);
453 SetKeyMaterial(blob.key_material, blob.key_material_size);
469 key_blob.key_material_size = 0;
475 SetKeyMaterial(blob.key_material, blob.key_material_size);
490 key_blob.key_material_size = 0;
496 SetKeyMaterial(blob.key_material, blob.key_material_size);
[all...]
/system/keymaster/
H A Dauth_encrypted_key_blob.cpp43 const uint8_t* end = key_blob->key_material + key_blob->key_material_size;
51 if (buf != key_blob->key_material + key_blob->key_material_size)
64 const uint8_t* end = tmp + key_blob.key_material_size;
87 if (!key_blob.key_material || key_blob.key_material_size == 0)
92 const uint8_t* end = tmp + key_blob.key_material_size;
H A Dsymmetric_key.cpp79 key_size_bits = input_key_material.key_material_size * 8;
93 if (key_size_bits != input_key_material.key_material_size * 8) {
95 input_key_material.key_material_size * 8);
117 uint8_t* tmp = dup_buffer(key_material.key_material, key_material.key_material_size);
120 key_data_size_ = key_material.key_material_size;
H A Docb_utils.cpp103 AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key))
137 if (!ciphertext->Reset(plaintext.key_material_size))
141 plaintext.key_material_size, NULL /* additional data */,
150 assert(ae_err == static_cast<int>(plaintext.key_material_size));
173 if (!plaintext->Reset(ciphertext.key_material_size))
177 ciphertext.key_material_size, NULL /* additional data */,
190 assert(ae_err == static_cast<int>(ciphertext.key_material_size));
H A Dkeymaster0_engine.cpp88 &key_material->key_material_size) < 0) {
93 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size);
104 &key_material->key_material_size) < 0) {
109 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size);
122 to_import.key_material_size, &key_blob,
123 &imported_key->key_material_size) < 0) {
128 imported_key->key_material = dup_buffer(key_blob, imported_key->key_material_size);
136 blob.key_material_size) == 0);
153 blob_copy->key_material_size = key_data_size;
159 return duplicate_blob(blob.key_material, blob.key_material_size);
[all...]
H A Dandroid_keymaster_messages_test.cpp144 rsp.key_blob.key_material_size = array_length(TEST_DATA);
159 rsp.key_blob.key_material_size = array_length(TEST_DATA);
166 EXPECT_EQ(0U, deserialized->key_blob.key_material_size);
178 EXPECT_EQ(3U, deserialized->key_blob.key_material_size);
205 EXPECT_EQ(3U, deserialized->key_blob.key_material_size);
409 EXPECT_EQ(msg.key_blob.key_material_size, deserialized->key_blob.key_material_size);
411 msg.key_blob.key_material_size));
427 EXPECT_EQ(3U, deserialized->key_blob.key_material_size);
450 EXPECT_EQ(3U, deserialized->key_blob.key_material_size);
[all...]
H A Dasymmetric_key_factory.cpp53 d2i_PrivateKey(evp_key_type(), NULL /* pkey */, &tmp, key_material.key_material_size);
H A Dkeymaster1_engine.cpp92 key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size);
93 key_blob->key_material_size = blob.key_material_size;
109 input_key_material.key_material_size};
117 output_key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size);
118 output_key_blob->key_material_size = blob.key_material_size;
H A Dkey_blob_test.cpp123 ASSERT_EQ(key_material_.key_material_size, plaintext.key_material_size);
124 EXPECT_EQ(0, memcmp(plaintext.begin(), key_material_.begin(), plaintext.key_material_size));
333 EXPECT_EQ(0U, key_blob.key_material_size);
347 blob.key_material_size = 16 * 1024 * 1024 + 1;
350 EXPECT_EQ(0U, key_blob.key_material_size);
H A Dopenssl_utils.cpp107 return convert_pkcs8_blob_to_evp(key_material.key_material, key_material.key_material_size,
H A Dsoft_keymaster_device.cpp761 key_blob->key_material_size = response.key_blob.key_material_size;
762 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(key_blob->key_material_size));
765 memcpy(tmp, response.key_blob.key_material, response.key_blob.key_material_size);
843 key_blob->key_material_size = response.key_blob.key_material_size;
844 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(key_blob->key_material_size));
847 memcpy(tmp, response.key_blob.key_material, response.key_blob.key_material_size);
965 key_blob->key_material_size = response.key_blob.key_material_size;
[all...]
H A Dandroid_keymaster_messages.cpp29 key_blob->key_material_size = length;
33 return sizeof(uint32_t) /* key size */ + key_blob.key_material_size;
38 return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size);
46 if (!copy_size_and_data_from_buf(buf_ptr, end, &key_blob->key_material_size,
H A Dintegrity_assured_key_blob.cpp115 keymaster_error_t error = ComputeHmac(key_blob.begin(), key_blob.key_material_size - HMAC_SIZE,
H A Dkeymaster_enforcement.cpp410 EVP_DigestUpdate(ctx.get(), key_blob.key_material, key_blob.key_material_size) &&
H A Dandroid_keymaster_test_utils.h315 blob_.key_material_size = key_length;
H A Dandroid_keymaster_test_utils.cpp671 ++tmp[blob_.key_material_size / 2];
H A Dsoft_keymaster_context.cpp555 const uint8_t* end = blob.key_material + blob.key_material_size;
/system/core/trusty/keymaster/
H A Dtrusty_keymaster_device.cpp233 key_blob->key_material_size = response.key_blob.key_material_size;
235 DuplicateBuffer(response.key_blob.key_material, response.key_blob.key_material_size);
308 key_blob->key_material_size = response.key_blob.key_material_size;
310 DuplicateBuffer(response.key_blob.key_material, response.key_blob.key_material_size);
451 upgraded_key->key_material_size = response.upgraded_key.key_material_size;
453 response.upgraded_key.key_material_size);
/system/vold/tests/
H A DCryptfsScryptHidlizationEquivalence_test.cpp192 key_size = key_blob.key_material_size;
/system/security/keystore/
H A Dlegacy_keymaster_device_wrapper.cpp135 result.setToExternal(const_cast<unsigned char*>(blob.key_material), blob.key_material_size);

Completed in 200 milliseconds