/system/keymaster/include/keymaster/ |
D | serializable.h | 201 explicit Buffer(size_t size) : buffer_(nullptr) { Reinitialize(size); } in Buffer() 202 Buffer(const void* buf, size_t size) : buffer_(nullptr) { Reinitialize(buf, size); } in Buffer() 225 bool Reinitialize(size_t size); 226 bool Reinitialize(const void* buf, size_t size); 229 bool Reinitialize(const Buffer& buffer) { in Reinitialize() function 230 return Reinitialize(buffer.peek_read(), buffer.available_read()); in Reinitialize()
|
D | authorization_set.h | 60 Reinitialize(elems, count); in AuthorizationSet() 67 Reinitialize(set.params, set.length); in AuthorizationSet() 93 Reinitialize(set.elems_, set.elems_size_); in AuthorizationSet() 102 Reinitialize(set.elems_, set.elems_size_); 125 bool Reinitialize(const keymaster_key_param_t* elems, size_t count); 127 bool Reinitialize(const AuthorizationSet& set) { in Reinitialize() function 128 return Reinitialize(set.elems_, set.elems_size_); in Reinitialize() 131 bool Reinitialize(const keymaster_key_param_set_t& set) { in Reinitialize() function 132 return Reinitialize(set.params, set.length); in Reinitialize()
|
/system/keymaster/km_openssl/ |
D | ecies_kem.cpp | 106 z.Reinitialize(output_encrypted_key->peek_read(), output_encrypted_key->available_read()); in Encrypt() 118 output_clear_key->Reinitialize(key_bytes_to_generate_); in Encrypt() 161 z.Reinitialize(public_value.peek_read(), public_value.available_read()); in Decrypt() 174 output_key->Reinitialize(key_bytes_to_generate_); in Decrypt()
|
D | nist_curve_key_exchange.cpp | 119 out_result->Reinitialize(result.get(), shared_secret_len_); in CalculateSharedKey() 125 return public_value->Reinitialize(public_key_.get(), public_key_len_); in public_value()
|
D | ecdsa_operation.cpp | 148 output->Reinitialize(ECDSA_size(ecdsa.get())); in Finish() 157 if (!output->Reinitialize(siglen)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in Finish()
|
D | rsa_operation.cpp | 334 if (!output->Reinitialize(RSA_size(rsa.get()))) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in SignUndigested() 378 if (!output->Reinitialize(siglen)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in SignDigested() 551 if (!output->Reinitialize(outlen)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in Finish() 594 if (!output->Reinitialize(outlen)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in Finish()
|
/system/keymaster/ng/ |
D | AndroidKeymaster3Device.cpp | 269 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 280 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 321 request.key_description.Reinitialize(KmParamSet(params)); in importKey() 365 request.attest_params.Reinitialize(KmParamSet(attestParams)); in attestKey() 385 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 429 request.additional_params.Reinitialize(KmParamSet(inParams)); in begin() 448 request.input.Reinitialize(input.data(), input.size()); in update() 449 request.additional_params.Reinitialize(KmParamSet(inParams)); in update() 473 request.input.Reinitialize(input.data(), input.size()); in finish() 474 request.signature.Reinitialize(signature.data(), signature.size()); in finish() [all …]
|
D | AndroidKeyMintOperation.cpp | 74 request.input.Reinitialize(input.data(), input.size()); in update() 103 if (input) request.input.Reinitialize(input->data(), input->size()); in finish() 104 if (signature) request.signature.Reinitialize(signature->data(), signature->size()); in finish()
|
D | AndroidKeymaster4Device.cpp | 282 request.parameters_to_verify.Reinitialize(KmParamSet(parametersToVerify)); in verifyAuthorization() 308 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 319 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 360 request.key_description.Reinitialize(KmParamSet(params)); in importKey() 387 request.additional_params.Reinitialize(KmParamSet(unwrappingParams)); in importWrappedKey() 431 request.attest_params.Reinitialize(KmParamSet(attestParams)); in attestKey() 451 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 495 request.additional_params.Reinitialize(KmParamSet(inParams)); in begin() 519 request.input.Reinitialize(input.data(), input.size()); in update() 520 request.additional_params.Reinitialize(KmParamSet(inParams)); in update() [all …]
|
D | AndroidKeyMintDevice.cpp | 244 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 257 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 261 request.attest_key_params.Reinitialize(KmParamSet(attestationKey->attestKeyParams)); in generateKey() 295 request.key_description.Reinitialize(KmParamSet(keyParams)); in importKey() 301 request.attest_key_params.Reinitialize(KmParamSet(attestationKey->attestKeyParams)); in importKey() 333 request.additional_params.Reinitialize(KmParamSet(unwrappingParams)); in importWrappedKey() 358 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 402 request.additional_params.Reinitialize(KmParamSet(params)); in begin()
|
D | AndroidKeymaster41Device.cpp | 47 serializableToken.parameters_verified.Reinitialize( in deviceLocked()
|
/system/core/trusty/keymaster/3.0/ |
D | TrustyKeymaster3Device.cpp | 225 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 236 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 277 request.key_description.Reinitialize(KmParamSet(params)); in importKey() 321 request.attest_params.Reinitialize(KmParamSet(attestParams)); in attestKey() 339 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 380 request.additional_params.Reinitialize(KmParamSet(inParams)); in begin() 404 request.additional_params.Reinitialize(KmParamSet(inParams)); in update() 415 request.input.Reinitialize(input.data(), inp_size); in update() 436 request.input.Reinitialize(input.data(), input.size()); in finish() 437 request.signature.Reinitialize(signature.data(), signature.size()); in finish() [all …]
|
/system/keymaster/tests/ |
D | android_keymaster_messages_test.cpp | 81 req.key_description.Reinitialize(params, array_length(params)); in TEST() 84 req.attest_key_params.Reinitialize(params, array_length(params)); in TEST() 109 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 149 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 255 req.additional_params.Reinitialize(params, array_length(params)); in TEST() 269 msg.enforced.Reinitialize(params, array_length(params)); in TEST() 270 msg.unenforced.Reinitialize(params, array_length(params)); in TEST() 283 msg.additional_params.Reinitialize(params, array_length(params)); in TEST() 349 msg.input.Reinitialize("foo", 3); in TEST() 374 msg.output.Reinitialize("foo", 3); in TEST() [all …]
|
D | hmac_test.cpp | 78 digest_buffer.Reinitialize(reinterpret_cast<uint8_t*>(digest_copy), sizeof(digest_copy)); in TEST()
|
/system/core/trusty/keymaster/keymint/ |
D | TrustyKeyMintDevice.cpp | 110 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 122 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 126 request.attest_key_params.Reinitialize(KmParamSet(attestationKey->attestKeyParams)); in generateKey() 167 request.key_description.Reinitialize(KmParamSet(keyParams)); in importKey() 173 request.attest_key_params.Reinitialize(KmParamSet(attestationKey->attestKeyParams)); in importKey() 204 request.additional_params.Reinitialize(KmParamSet(unwrappingParams)); in importWrappedKey() 228 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 271 request.additional_params.Reinitialize(KmParamSet(params)); in begin()
|
D | TrustyKeyMintOperation.cpp | 94 request.input.Reinitialize(input_pos, to_send); in update() 134 if (signature) request.signature.Reinitialize(signature->data(), signature->size()); in finish() 151 request.input.Reinitialize(input->data() + (input->size() - max_chunk_size), in finish() 154 request.input.Reinitialize(input->data(), input->size()); in finish()
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.h | 52 if (rc == KM_ERROR_OK && output_params) output_params->Reinitialize(out_params); in Begin() 66 if (output) output->Reinitialize(out.data, out.data_length); in Update() 67 if (output_params) output_params->Reinitialize(out_params); in Update()
|
D | keymaster_passthrough_operation.cpp | 105 if (output) output->Reinitialize(out.data, out.data_length); in Finish() 106 if (output_params) output_params->Reinitialize(out_params); in Finish()
|
D | ecdsa_keymaster1_operation.cpp | 66 key_data->finish_params.Reinitialize(input_params); in PrepareFinish()
|
/system/core/trusty/keymaster/4.0/ |
D | TrustyKeymaster4Device.cpp | 314 request.parameters_to_verify.Reinitialize(KmParamSet(parametersToVerify)); in verifyAuthorization() 340 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 351 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 392 request.key_description.Reinitialize(KmParamSet(params)); in importKey() 418 request.additional_params.Reinitialize(KmParamSet(unwrappingParams)); in importWrappedKey() 462 request.attest_params.Reinitialize(KmParamSet(attestParams)); in attestKey() 480 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 522 request.additional_params.Reinitialize(KmParamSet(extendedParams)); in begin() 551 request.additional_params.Reinitialize(KmParamSet(extendedParams)); in update() 562 request.input.Reinitialize(input.data(), inp_size); in update() [all …]
|
/system/keymaster/tests/fuzzers/ |
D | buffer_fuzz.cpp | 46 buf->Reinitialize(fdp->ConsumeIntegralInRange<size_t>(kMinBufferSize, kMaxBufferSize)); in __anon10ed34010602() 51 buf->Reinitialize(in_buf.get(), buf_size); in __anon10ed34010702()
|
/system/keymaster/contexts/ |
D | keymaster2_passthrough_context.cpp | 94 hw_enforced.Reinitialize(characteristics.hw_enforced); in ParseKeyBlob() 95 sw_enforced.Reinitialize(characteristics.sw_enforced); in ParseKeyBlob()
|
D | soft_keymaster_device.cpp | 590 request.random_data.Reinitialize(data, data_length); in add_rng_entropy() 692 request.key_description.Reinitialize(*params); in generate_key() 737 request.key_description.Reinitialize(*params); in generate_key() 874 request.key_description.Reinitialize(*params); in import_key() 998 request.attest_params.Reinitialize(*attest_params); in attest_key() 1051 request.upgrade_params.Reinitialize(*upgrade_params); in upgrade_key() 1156 request.additional_params.Reinitialize(*in_params); in begin() 1220 if (input) request.input.Reinitialize(input->data, input->data_length); in update() 1221 if (in_params) request.additional_params.Reinitialize(*in_params); in update() 1294 request.signature.Reinitialize(signature->data, signature->data_length); in finish() [all …]
|
D | keymaster1_passthrough_context.cpp | 136 hw_enforced->Reinitialize(characteristics->hw_enforced); in parseKeymaster1HwBlob() 137 sw_enforced->Reinitialize(characteristics->sw_enforced); in parseKeymaster1HwBlob()
|
/system/keymaster/android_keymaster/ |
D | serializable.cpp | 90 bool Buffer::Reinitialize(size_t size) { in Reinitialize() function in keymaster::Buffer 100 bool Buffer::Reinitialize(const void* data, size_t data_len) { in Reinitialize() function in keymaster::Buffer
|