/system/keymaster/legacy_support/ |
D | keymaster1_engine.cpp | 145 KeyData* key_data = new KeyData(blob, additional_params); in BuildRsaKey() local 146 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { in BuildRsaKey() 148 delete key_data; in BuildRsaKey() 154 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error)); in BuildRsaKey() 185 KeyData* key_data = new KeyData(blob, additional_params); in BuildEcKey() local 186 if (!EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, key_data)) { in BuildEcKey() 188 delete key_data; in BuildEcKey() 264 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data, in Keymaster1Finish() argument 267 if (key_data->op_handle == 0) in Keymaster1Finish() 274 device()->update(device(), key_data->op_handle, &key_data->finish_params, &input, in Keymaster1Finish() [all …]
|
D | ecdsa_keymaster1_operation.cpp | 32 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in Begin() local 33 if (!key_data) in Begin() 55 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, in Begin() 62 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in PrepareFinish() local 63 if (!key_data) { in PrepareFinish() 67 key_data->op_handle = operation_handle_; in PrepareFinish() 68 key_data->finish_params.Reinitialize(input_params); in PrepareFinish() 78 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in GetError() local 79 if (!key_data) in GetError() 81 return key_data->error; in GetError()
|
D | rsa_keymaster1_operation.cpp | 32 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); in Begin() local 33 if (!key_data) in Begin() 66 key_data->expected_openssl_padding = RSA_NO_PADDING; in Begin() 72 key_data->expected_openssl_padding = RSA_PKCS1_PADDING; in Begin() 76 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, in Begin() 83 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); in PrepareFinish() local 84 if (!key_data) { in PrepareFinish() 88 key_data->op_handle = operation_handle_; in PrepareFinish() 89 key_data->finish_params.Reinitialize(input_params); in PrepareFinish() 99 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa in GetError() local [all …]
|
D | keymaster0_engine.cpp | 145 static keymaster_key_blob_t* duplicate_blob(const uint8_t* key_data, size_t key_data_size) { in duplicate_blob() argument 146 unique_ptr<uint8_t[]> key_material_copy(dup_buffer(key_data, key_data_size)); in duplicate_blob()
|
/system/core/libcrypto_utils/tests/ |
D | android_pubkey_test.cpp | 126 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; in TEST_F() local 127 ASSERT_TRUE(android_pubkey_encode(key_.get(), key_data, sizeof(key_data))); in TEST_F() 128 ASSERT_EQ(0, memcmp(kKey2048, key_data, sizeof(kKey2048))); in TEST_F()
|
/system/extras/verity/ |
D | generate_verity_key.c | 36 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; in write_public_keyfile() local 44 if (!android_pubkey_encode(private_key, key_data, sizeof(key_data))) in write_public_keyfile() 51 BIO_write(bfile, key_data, sizeof(key_data)); in write_public_keyfile()
|
/system/keymaster/km_openssl/ |
D | openssl_utils.cpp | 77 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, in convert_pkcs8_blob_to_evp() argument 80 if (key_data == nullptr || key_length <= 0) in convert_pkcs8_blob_to_evp() 84 d2i_PKCS8_PRIV_KEY_INFO(nullptr, &key_data, key_length)); in convert_pkcs8_blob_to_evp()
|
/system/keymaster/android_keymaster/ |
D | android_keymaster_messages.cpp | 326 delete[] key_data; in SetKeyMaterial() 327 key_data = dup_buffer(key_material, length); in SetKeyMaterial() 339 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); in Serialize() 343 delete[] key_data; in Deserialize() 344 key_data = nullptr; in Deserialize() 350 key_data = deserialized_key_material.release(); in Deserialize() 395 delete[] key_data; in SetKeyMaterial() 396 key_data = dup_buffer(key_material, length); in SetKeyMaterial() 405 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); in NonErrorSerialize() 409 delete[] key_data; in NonErrorDeserialize() [all …]
|
D | android_keymaster.cpp | 385 response->key_data = out_key.release(); in ExportKey() 441 keymaster_key_blob_t key_material = {request.key_data, request.key_data_length}; in ImportKey()
|
/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
D | trusty_keymaster_device.h | 58 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, 111 const keymaster_blob_t* key_data,
|
/system/core/trusty/keymaster/legacy/ |
D | trusty_keymaster_device.cpp | 248 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, in import_key() argument 255 if (!params || !key_data) { in import_key() 267 request.SetKeyMaterial(key_data->data, key_data->data_length); in import_key() 322 export_data->data = DuplicateBuffer(response.key_data, response.key_data_length); in export_key() 682 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() argument 684 return convert_device(dev)->import_key(params, key_format, key_data, key_blob, characteristics); in import_key()
|
/system/core/fs_mgr/libfs_avb/tests/ |
D | fs_avb_test_util.cpp | 263 std::string key_data; in ExtractPublicKeyAvbBlob() local 264 EXPECT_TRUE(base::ReadFileToString(tmp_path, &key_data)); in ExtractPublicKeyAvbBlob() 265 return key_data; in ExtractPublicKeyAvbBlob()
|
D | avb_util_test.cpp | 423 uint8_t key_data[key_size]; in TEST_F() local 424 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F() 428 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F() 430 key_data[10] ^= 0x80; // toggles a bit and expects a failure in TEST_F() 431 EXPECT_FALSE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F() 432 key_data[10] ^= 0x80; // toggles the bit again, should pass in TEST_F() 433 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F() 441 uint8_t key_data[key_size]; in TEST_F() local 442 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F() 445 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F()
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.cpp | 94 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; in load_key() local 102 if (!fread(key_data, sizeof(key_data), 1, f.get())) { in load_key() 108 if (!android_pubkey_decode(key_data, sizeof(key_data), &key)) { in load_key()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | openssl_utils.h | 86 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 149 const keymaster_blob_t* key_data, 198 const keymaster_blob_t* key_data,
|
D | android_keymaster_messages.h | 456 : KeymasterMessage(ver), key_data(nullptr) {} in KeymasterMessage() 457 ~ImportKeyRequest() { delete[] key_data; } in ~ImportKeyRequest() 470 uint8_t* key_data; member 518 : KeymasterResponse(ver), key_data(nullptr) {} in KeymasterResponse() 519 ~ExportKeyResponse() { delete[] key_data; } in ~ExportKeyResponse() 530 uint8_t* key_data; member
|
/system/keymaster/tests/ |
D | key_blob_test.cpp | 38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; variable 44 key_material_(key_data, array_length(key_data)) { in KeyBlobTest()
|
D | android_keymaster_messages_test.cpp | 395 EXPECT_EQ(0, memcmp(msg.key_data, deserialized->key_data, msg.key_data_length)); in TEST() 440 EXPECT_EQ(0, memcmp("foo", deserialized->key_data, 3)); in TEST()
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster1_engine.h | 95 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
|
/system/security/keystore/include/keystore/ |
D | keystore_client_mock.h | 56 keymaster_key_format_t key_format, const std::string& key_data,
|
D | keystore_client.h | 116 KeyFormat key_format, const std::string& key_data,
|
D | keystore_client_impl.h | 59 KeyFormat key_format, const std::string& key_data,
|
/system/keymaster/contexts/ |
D | soft_keymaster_device.cpp | 937 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() argument 939 if (!params || !key_data) in import_key() 952 return km1_dev->import_key(km1_dev, params, key_format, key_data, key_blob, in import_key() 959 request.SetKeyMaterial(key_data->data, key_data->data_length); in import_key() 984 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() argument 997 error = import_key(&sk_dev->km1_device_, params, key_format, key_data, key_blob, in import_key() 1004 error = import_key(&sk_dev->km1_device_, params, key_format, key_data, key_blob, nullptr); in import_key() 1045 memcpy(tmp, response.key_data, export_data->data_length); in export_key()
|
/system/security/keystore/ |
D | keystore_client_impl.cpp | 259 KeyFormat key_format, const std::string& key_data, in importKey() argument 263 auto hidlKeyData = blob2hidlVec(key_data); in importKey()
|