Home
last modified time | relevance | path

Searched refs:keymaster_blob_t (Results 1 – 25 of 48) sorted by relevance

12

/system/core/trusty/keymaster/include/trusty_keymaster/legacy/
Dtrusty_keymaster_device.h53 const keymaster_blob_t* client_id,
54 const keymaster_blob_t* app_data,
58 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob,
62 const keymaster_blob_t* client_id,
63 const keymaster_blob_t* app_data, keymaster_blob_t* export_data);
76 const keymaster_blob_t* input, size_t* input_consumed,
77 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
80 const keymaster_blob_t* input, const keymaster_blob_t* signature,
81 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
105 const keymaster_blob_t* client_id,
[all …]
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h135 const keymaster_blob_t* client_id,
136 const keymaster_blob_t* app_data,
141 const keymaster_blob_t* key_data,
147 const keymaster_blob_t* client_id,
148 const keymaster_blob_t* app_data,
149 keymaster_blob_t* export_data);
161 const keymaster_blob_t* input, size_t* input_consumed,
163 keymaster_blob_t* output);
167 const keymaster_blob_t* signature,
169 keymaster_blob_t* output);
[all …]
Dandroid_keymaster_utils.h96 inline const uint8_t* const& accessBlobData(const keymaster_blob_t* blob) { in accessBlobData()
99 inline const uint8_t*& accessBlobData(keymaster_blob_t* blob) { in accessBlobData()
102 inline const size_t& accessBlobSize(const keymaster_blob_t* blob) { in accessBlobSize()
105 inline size_t& accessBlobSize(keymaster_blob_t* blob) { in accessBlobSize()
230 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob;
264 entries = new (std::nothrow) keymaster_blob_t[length];
289 retval.entries = new (std::nothrow) keymaster_blob_t[retval.entry_count]; in clone()
310 keymaster_blob_t* begin() { return entries; } in begin()
311 const keymaster_blob_t* begin() const { return entries; } in begin()
312 keymaster_blob_t* end() { return entries + entry_count; } in end()
[all …]
Dattestation_context.h62 const keymaster_blob_t& /*application_id*/, in GenerateUniqueId() argument
69 keymaster_blob_t verified_boot_key;
70 keymaster_blob_t verified_boot_hash;
Dkeymaster_tags.h88 template <> struct TagValueType<KM_BYTES> { typedef keymaster_blob_t value_type; };
89 template <> struct TagValueType<KM_BIGNUM> { typedef keymaster_blob_t value_type; };
259 const keymaster_blob_t& blob) {
271 const keymaster_blob_t& blob) {
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp95 keymaster_error_t hmacSha256(const keymaster_key_blob_t& key, const keymaster_blob_t data_chunks[], in hmacSha256()
125 template <typename T> inline keymaster_blob_t toBlob(const T& t) { in toBlob()
128 inline keymaster_blob_t toBlob(const char* str) { in toBlob()
134 inline bool operator==(const keymaster_blob_t& a, const keymaster_blob_t& b) { in operator ==()
150 UniquePtr<keymaster_blob_t[]> context_chunks(new (std::nothrow) keymaster_blob_t[num_chunks]); in ComputeSharedHmac()
172 keymaster_blob_t data = {reinterpret_cast<const uint8_t*>(kMacVerificationString), in ComputeSharedHmac()
174 keymaster_blob_t data_chunks[] = {data}; in ComputeSharedHmac()
188 keymaster_blob_t data_chunks[] = { in VerifyAuthorization()
203 keymaster_blob_t data_chunks[] = { in GenerateTimestampToken()
Dattestation_record.cpp66 static cppbor::Bstr blob_to_bstr(const keymaster_blob_t& blob) { in blob_to_bstr()
70 static keymaster_error_t bstr_to_blob(const cppbor::Bstr* bstr, keymaster_blob_t* blob) { in bstr_to_blob()
190 keymaster_error_t imei_to_ueid(const keymaster_blob_t& imei_blob, cppbor::Bstr* out) { in imei_to_ueid()
206 keymaster_error_t ueid_to_imei_blob(const cppbor::Bstr* ueid, keymaster_blob_t* out) { in ueid_to_imei_blob()
252 bool is_valid_attestation_challenge(const keymaster_blob_t& attestation_challenge) { in is_valid_attestation_challenge()
271 keymaster_blob_t application_id = {nullptr, 0}; in generate_unique_id()
872 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_eat_record()
883 keymaster_blob_t attestation_app_id; in build_eat_record()
890 keymaster_blob_t existing_app_id; in build_eat_record()
946 keymaster_blob_t application_id = {nullptr, 0}; in build_eat_record()
[all …]
Dcertificate_utils.cpp83 keymaster_error_t make_name_from_der(const keymaster_blob_t& name, X509_NAME_Ptr* name_out) { in make_name_from_der()
118 keymaster_blob_t serial_blob{.data = nullptr, .data_length = 0}; in get_certificate_params()
167 keymaster_blob_t subject{}; in get_certificate_params()
389 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* blob) { in encode_certificate()
/system/keymaster/contexts/
Dsoft_attestation_cert.cpp166 static keymaster_blob_t kRsaAttestChainBlobs[] = {
170 static const keymaster_cert_chain_t kRsaAttestChain = {(keymaster_blob_t*)&kRsaAttestChainBlobs, 2};
273 static keymaster_blob_t kEcAttestChainBlobs[] = {
277 static const keymaster_cert_chain_t kEcAttestChain = {(keymaster_blob_t*)&kEcAttestChainBlobs, 2};
Dkeymaster2_passthrough_context.cpp75 keymaster_blob_t clientId; in ParseKeyBlob()
76 keymaster_blob_t applicationData; in ParseKeyBlob()
77 keymaster_blob_t* clientIdPtr = &clientId; in ParseKeyBlob()
78 keymaster_blob_t* applicationDataPtr = &applicationData; in ParseKeyBlob()
Dsoft_keymaster_device.cpp324 void AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in AddClientAndAppData()
795 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics()
836 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics()
864 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
906 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
934 const keymaster_blob_t* client_id, in export_key()
935 const keymaster_blob_t* app_data, in export_key()
936 keymaster_blob_t* export_data) { in export_key()
971 const keymaster_blob_t* client_id, in export_key()
972 const keymaster_blob_t* app_data, in export_key()
[all …]
Dkeymaster1_passthrough_context.cpp120 keymaster_blob_t client_id = {nullptr, 0}; in parseKeymaster1HwBlob()
121 keymaster_blob_t app_data = {nullptr, 0}; in parseKeymaster1HwBlob()
122 keymaster_blob_t* client_id_ptr = nullptr; in parseKeymaster1HwBlob()
123 keymaster_blob_t* app_data_ptr = nullptr; in parseKeymaster1HwBlob()
Dsoft_keymaster_context.cpp341 keymaster_blob_t client_id = {nullptr, 0}; in ParseKeymaster1HwBlob()
342 keymaster_blob_t app_data = {nullptr, 0}; in ParseKeymaster1HwBlob()
343 keymaster_blob_t* client_id_ptr = nullptr; in ParseKeymaster1HwBlob()
344 keymaster_blob_t* app_data_ptr = nullptr; in ParseKeymaster1HwBlob()
/system/keymaster/legacy_support/
Dkeymaster_passthrough_operation.cpp29 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish()
30 keymaster_blob_t out = {}; in Finish()
66 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish()
98 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish()
99 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish()
100 keymaster_blob_t out = {}; in Finish()
Dkeymaster1_engine.cpp103 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey()
254 const keymaster_blob_t& input, in Keymaster1Finish()
255 keymaster_blob_t* output) { in Keymaster1Finish()
282 keymaster_blob_t input = {in, in_len}; in rsa_sign_raw()
283 keymaster_blob_t output; in rsa_sign_raw()
305 keymaster_blob_t input = {in, in_len}; in rsa_decrypt()
306 keymaster_blob_t output; in rsa_decrypt()
326 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign()
327 keymaster_blob_t output; in ecdsa_sign()
340 keymaster_blob_t client_id = {nullptr, 0}; in GetKeymaster1PublicKey()
[all …]
Dkeymaster_passthrough_key.cpp55 keymaster_blob_t km_app_data = {}; in formatted_key_material()
61 keymaster_blob_t km_client_id = {}; in formatted_key_material()
72 keymaster_blob_t export_blob = export_data.release(); in formatted_key_material()
Dkeymaster_passthrough_operation.h60 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Update()
61 keymaster_blob_t out = {}; in Update()
Dkeymaster_passthrough_engine.cpp96 keymaster_blob_t my_export_data = {}; in ExportKey()
252 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey()
277 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey()
/system/keymaster/tests/
Dattestation_record_test.cpp46 const keymaster_blob_t& application_id, bool /* reset_since_rotation */, in GenerateUniqueId()
61 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust()
121 keymaster_blob_t attestation_challenge = {}; in TEST()
122 keymaster_blob_t unique_id = {}; in TEST()
157 keymaster_blob_t verified_boot_key; in TEST()
201 keymaster_blob_t attestation_challenge = {}; in TEST()
202 keymaster_blob_t unique_id = {}; in TEST()
203 keymaster_blob_t verified_boot_key = {}; in TEST()
297 keymaster_blob_t attestation_challenge = {}; in TEST()
298 keymaster_blob_t unique_id = {}; in TEST()
[all …]
Dandroid_keymaster_test_utils.cpp218 keymaster_blob_t key = {reinterpret_cast<const uint8_t*>(key_material.c_str()), in ImportKey()
268 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation()
269 keymaster_blob_t out_tmp; in UpdateOperation()
284 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation()
285 keymaster_blob_t out_tmp; in UpdateOperation()
311 keymaster_blob_t inp = {reinterpret_cast<const uint8_t*>(input.c_str()), input.length()}; in FinishOperation()
312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation()
314 keymaster_blob_t out_tmp; in FinishOperation()
472 keymaster_blob_t nonce_blob; in EncryptMessage()
511 keymaster_blob_t nonce_blob; in EncryptMessage()
[all …]
/system/keymaster/include/keymaster/km_openssl/
Dckdf.h29 const keymaster_blob_t* context_chunks, size_t num_chunks,
37 const keymaster_blob_t& context_chunks, KeymasterKeyBlob* output) { in ckdf()
Dcertificate_utils.h33 keymaster_error_t make_name_from_der(const keymaster_blob_t& name, X509_NAME_Ptr* name_out);
75 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* derCert);
Dattestation_record.h355 keymaster_blob_t* attestation_challenge,
358 keymaster_blob_t* unique_id);
364 keymaster_blob_t* verified_boot_key,
376 keymaster_security_level_t* keymaster_security_level, keymaster_blob_t* attestation_challenge,
378 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster1_engine.h93 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
94 keymaster_blob_t* output);
Dkeymaster_passthrough_engine.h35 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob;

12