Searched refs:key_data (Results 1 - 25 of 34) sorted by relevance

12

/system/keymaster/
H A Decdsa_keymaster1_operation.cpp33 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local
34 if (!key_data)
56 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material,
63 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local
64 if (!key_data) {
68 key_data->op_handle = operation_handle_;
69 key_data->finish_params.Reinitialize(input_params);
79 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); local
80 if (!key_data)
82 return key_data
[all...]
H A Drsa_keymaster1_operation.cpp33 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local
34 if (!key_data)
62 key_data->expected_openssl_padding = RSA_NO_PADDING;
68 key_data->expected_openssl_padding = RSA_PKCS1_PADDING;
72 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material,
79 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); local
80 if (!key_data) {
84 key_data->op_handle = operation_handle_;
85 key_data->finish_params.Reinitialize(input_params);
95 Keymaster1Engine::KeyData* key_data local
[all...]
H A Dkeymaster1_engine.cpp146 KeyData* key_data = new KeyData(blob, additional_params); local
147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) {
149 delete key_data;
155 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error));
186 KeyData* key_data = new KeyData(blob, additional_params); local
187 if (!EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, key_data)) {
189 delete key_data;
265 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data, argument
268 if (key_data
287 KeyData* key_data = instance_->GetData(rsa); local
312 KeyData* key_data = instance_->GetData(rsa); local
337 KeyData* key_data = instance_->GetData(ec_key); local
[all...]
H A Dopenssl_utils.cpp76 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, argument
79 if (key_data == NULL || key_length <= 0)
83 d2i_PKCS8_PRIV_KEY_INFO(NULL, &key_data, key_length));
112 int key_data_size = i2d_PrivateKey(pkey, NULL /* key_data*/);
H A Dandroid_keymaster_messages.cpp308 delete[] key_data;
309 key_data = dup_buffer(key_material, length);
321 return append_size_and_data_to_buf(buf, end, key_data, key_data_length);
325 delete[] key_data;
326 key_data = NULL;
332 key_data = deserialized_key_material.release();
377 delete[] key_data;
378 key_data = dup_buffer(key_material, length);
387 return append_size_and_data_to_buf(buf, end, key_data, key_data_length);
391 delete[] key_data;
[all...]
H A Dhmac_operation.cpp70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest,
91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, argument
138 HMAC_Init_ex(&ctx_, key_data, key_data_size, md, NULL /* engine */);
H A Dhmac_operation.h28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
H A Dsymmetric_key.h67 const uint8_t* key_data() const { return key_data_.get(); } function in class:keymaster::SymmetricKey
H A Dkeymaster1_engine.h95 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
H A Dopenssl_utils.h85 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
H A Dkey_blob_test.cpp38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; member in namespace:keymaster::test
44 key_material_(key_data, array_length(key_data)) {
103 // key_data shouldn't be anywhere in the blob, ciphertext should.
/system/extras/verity/
H A Dgenerate_verity_key.c36 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; local
44 if (!android_pubkey_encode(private_key, key_data, sizeof(key_data)))
51 BIO_write(bfile, key_data, sizeof(key_data));
/system/tpm/attestation/server/
H A Dkey_store.h35 // |username|. On success true is returned and |key_data| is populated.
38 std::string* key_data) = 0;
45 const std::string& key_data) = 0;
H A Dmock_key_store.h37 std::string* key_data));
41 const std::string& key_data));
H A Dpkcs11_key_store.h53 std::string* key_data) override;
56 const std::string& key_data) override;
H A Dpkcs11_key_store.cc96 std::string* key_data) {
119 key_data->resize(attribute.ulValueLen);
120 attribute.pValue = string_as_array(key_data);
126 key_data->resize(attribute.ulValueLen);
132 const std::string& key_data) {
148 std::string mutable_key_data(key_data);
94 Read(const std::string& username, const std::string& key_name, std::string* key_data) argument
130 Write(const std::string& username, const std::string& key_name, const std::string& key_data) argument
H A Dattestation_service.cc650 std::string key_data; local
651 if (!key_store_->Read(username, key_label, &key_data)) {
655 if (key && !key->ParseFromString(key_data)) {
707 std::string key_data; local
708 if (!key.SerializeToString(&key_data)) {
712 if (!key_store_->Write(username, key_label, key_data)) {
/system/core/trusty/keymaster/
H A Dtrusty_keymaster_device.h57 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob,
108 const keymaster_blob_t* key_data,
H A Dtrusty_keymaster_device.cpp281 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob,
288 if (!params || !key_data) {
300 request.SetKeyMaterial(key_data->data, key_data->data_length);
355 export_data->data = DuplicateBuffer(response.key_data, response.key_data_length);
685 keymaster_key_format_t key_format, const keymaster_blob_t* key_data,
687 return convert_device(dev)->import_key(params, key_format, key_data, key_blob, characteristics);
279 import_key( const keymaster_key_param_set_t* params, keymaster_key_format_t key_format, const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, keymaster_key_characteristics_t* characteristics) argument
683 import_key( const keymaster2_device_t* dev, const keymaster_key_param_set_t* params, keymaster_key_format_t key_format, const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, keymaster_key_characteristics_t* characteristics) argument
/system/core/libcrypto_utils/tests/
H A Dandroid_pubkey_test.cpp126 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; local
127 ASSERT_TRUE(android_pubkey_encode(key_.get(), key_data, sizeof(key_data)));
128 ASSERT_EQ(0, memcmp(kKey2048, key_data, sizeof(kKey2048)));
/system/security/keystore/include/keystore/
H A Dkeystore_client.h110 // Imports |key_data| in the given |key_format|, applies the given
117 KeyFormat key_format, const std::string& key_data,
H A Dkeystore_client_mock.h56 keymaster_key_format_t key_format, const std::string& key_data,
H A Dkeystore_client_impl.h57 KeyFormat key_format, const std::string& key_data,
/system/keymaster/include/keymaster/
H A Dsoft_keymaster_device.h150 const keymaster_blob_t* key_data,
199 const keymaster_blob_t* key_data,
H A Dandroid_keymaster_messages.h448 : KeymasterMessage(ver), key_data(nullptr) {}
449 ~ImportKeyRequest() { delete[] key_data; }
462 uint8_t* key_data; member in struct:keymaster::ImportKeyRequest
510 : KeymasterResponse(ver), key_data(nullptr) {}
511 ~ExportKeyResponse() { delete[] key_data; }
522 uint8_t* key_data; member in struct:keymaster::ExportKeyResponse

Completed in 645 milliseconds

12