/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
D | trusty_keymaster_device.h | 53 const keymaster_blob_t* client_id, 54 const keymaster_blob_t* app_data, 58 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, 62 const keymaster_blob_t* client_id, 63 const keymaster_blob_t* app_data, keymaster_blob_t* export_data); 76 const keymaster_blob_t* input, size_t* input_consumed, 77 keymaster_key_param_set_t* out_params, keymaster_blob_t* output); 80 const keymaster_blob_t* input, const keymaster_blob_t* signature, 81 keymaster_key_param_set_t* out_params, keymaster_blob_t* output); 105 const keymaster_blob_t* client_id, [all …]
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 135 const keymaster_blob_t* client_id, 136 const keymaster_blob_t* app_data, 141 const keymaster_blob_t* key_data, 147 const keymaster_blob_t* client_id, 148 const keymaster_blob_t* app_data, 149 keymaster_blob_t* export_data); 161 const keymaster_blob_t* input, size_t* input_consumed, 163 keymaster_blob_t* output); 167 const keymaster_blob_t* signature, 169 keymaster_blob_t* output); [all …]
|
D | android_keymaster_utils.h | 96 inline const uint8_t* const& accessBlobData(const keymaster_blob_t* blob) { in accessBlobData() 99 inline const uint8_t*& accessBlobData(keymaster_blob_t* blob) { in accessBlobData() 102 inline const size_t& accessBlobSize(const keymaster_blob_t* blob) { in accessBlobSize() 105 inline size_t& accessBlobSize(keymaster_blob_t* blob) { in accessBlobSize() 230 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob; 264 entries = new (std::nothrow) keymaster_blob_t[length]; 289 retval.entries = new (std::nothrow) keymaster_blob_t[retval.entry_count]; in clone() 310 keymaster_blob_t* begin() { return entries; } in begin() 311 const keymaster_blob_t* begin() const { return entries; } in begin() 312 keymaster_blob_t* end() { return entries + entry_count; } in end() [all …]
|
D | attestation_context.h | 62 const keymaster_blob_t& /*application_id*/, in GenerateUniqueId() argument 69 keymaster_blob_t verified_boot_key; 70 keymaster_blob_t verified_boot_hash;
|
D | keymaster_tags.h | 88 template <> struct TagValueType<KM_BYTES> { typedef keymaster_blob_t value_type; }; 89 template <> struct TagValueType<KM_BIGNUM> { typedef keymaster_blob_t value_type; }; 259 const keymaster_blob_t& blob) { 271 const keymaster_blob_t& blob) {
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 95 keymaster_error_t hmacSha256(const keymaster_key_blob_t& key, const keymaster_blob_t data_chunks[], in hmacSha256() 125 template <typename T> inline keymaster_blob_t toBlob(const T& t) { in toBlob() 128 inline keymaster_blob_t toBlob(const char* str) { in toBlob() 134 inline bool operator==(const keymaster_blob_t& a, const keymaster_blob_t& b) { in operator ==() 150 UniquePtr<keymaster_blob_t[]> context_chunks(new (std::nothrow) keymaster_blob_t[num_chunks]); in ComputeSharedHmac() 172 keymaster_blob_t data = {reinterpret_cast<const uint8_t*>(kMacVerificationString), in ComputeSharedHmac() 174 keymaster_blob_t data_chunks[] = {data}; in ComputeSharedHmac() 188 keymaster_blob_t data_chunks[] = { in VerifyAuthorization() 203 keymaster_blob_t data_chunks[] = { in GenerateTimestampToken()
|
D | attestation_record.cpp | 66 static cppbor::Bstr blob_to_bstr(const keymaster_blob_t& blob) { in blob_to_bstr() 70 static keymaster_error_t bstr_to_blob(const cppbor::Bstr* bstr, keymaster_blob_t* blob) { in bstr_to_blob() 190 keymaster_error_t imei_to_ueid(const keymaster_blob_t& imei_blob, cppbor::Bstr* out) { in imei_to_ueid() 206 keymaster_error_t ueid_to_imei_blob(const cppbor::Bstr* ueid, keymaster_blob_t* out) { in ueid_to_imei_blob() 252 bool is_valid_attestation_challenge(const keymaster_blob_t& attestation_challenge) { in is_valid_attestation_challenge() 271 keymaster_blob_t application_id = {nullptr, 0}; in generate_unique_id() 872 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_eat_record() 883 keymaster_blob_t attestation_app_id; in build_eat_record() 890 keymaster_blob_t existing_app_id; in build_eat_record() 946 keymaster_blob_t application_id = {nullptr, 0}; in build_eat_record() [all …]
|
D | certificate_utils.cpp | 83 keymaster_error_t make_name_from_der(const keymaster_blob_t& name, X509_NAME_Ptr* name_out) { in make_name_from_der() 118 keymaster_blob_t serial_blob{.data = nullptr, .data_length = 0}; in get_certificate_params() 167 keymaster_blob_t subject{}; in get_certificate_params() 389 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* blob) { in encode_certificate()
|
/system/keymaster/contexts/ |
D | soft_attestation_cert.cpp | 166 static keymaster_blob_t kRsaAttestChainBlobs[] = { 170 static const keymaster_cert_chain_t kRsaAttestChain = {(keymaster_blob_t*)&kRsaAttestChainBlobs, 2}; 273 static keymaster_blob_t kEcAttestChainBlobs[] = { 277 static const keymaster_cert_chain_t kEcAttestChain = {(keymaster_blob_t*)&kEcAttestChainBlobs, 2};
|
D | keymaster2_passthrough_context.cpp | 75 keymaster_blob_t clientId; in ParseKeyBlob() 76 keymaster_blob_t applicationData; in ParseKeyBlob() 77 keymaster_blob_t* clientIdPtr = &clientId; in ParseKeyBlob() 78 keymaster_blob_t* applicationDataPtr = &applicationData; in ParseKeyBlob()
|
D | soft_keymaster_device.cpp | 324 void AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in AddClientAndAppData() 795 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics() 836 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics() 864 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() 906 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() 934 const keymaster_blob_t* client_id, in export_key() 935 const keymaster_blob_t* app_data, in export_key() 936 keymaster_blob_t* export_data) { in export_key() 971 const keymaster_blob_t* client_id, in export_key() 972 const keymaster_blob_t* app_data, in export_key() [all …]
|
D | keymaster1_passthrough_context.cpp | 120 keymaster_blob_t client_id = {nullptr, 0}; in parseKeymaster1HwBlob() 121 keymaster_blob_t app_data = {nullptr, 0}; in parseKeymaster1HwBlob() 122 keymaster_blob_t* client_id_ptr = nullptr; in parseKeymaster1HwBlob() 123 keymaster_blob_t* app_data_ptr = nullptr; in parseKeymaster1HwBlob()
|
D | soft_keymaster_context.cpp | 341 keymaster_blob_t client_id = {nullptr, 0}; in ParseKeymaster1HwBlob() 342 keymaster_blob_t app_data = {nullptr, 0}; in ParseKeymaster1HwBlob() 343 keymaster_blob_t* client_id_ptr = nullptr; in ParseKeymaster1HwBlob() 344 keymaster_blob_t* app_data_ptr = nullptr; in ParseKeymaster1HwBlob()
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.cpp | 29 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish() 30 keymaster_blob_t out = {}; in Finish() 66 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish() 98 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish() 99 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish() 100 keymaster_blob_t out = {}; in Finish()
|
D | keymaster1_engine.cpp | 103 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey() 254 const keymaster_blob_t& input, in Keymaster1Finish() 255 keymaster_blob_t* output) { in Keymaster1Finish() 282 keymaster_blob_t input = {in, in_len}; in rsa_sign_raw() 283 keymaster_blob_t output; in rsa_sign_raw() 305 keymaster_blob_t input = {in, in_len}; in rsa_decrypt() 306 keymaster_blob_t output; in rsa_decrypt() 326 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign() 327 keymaster_blob_t output; in ecdsa_sign() 340 keymaster_blob_t client_id = {nullptr, 0}; in GetKeymaster1PublicKey() [all …]
|
D | keymaster_passthrough_key.cpp | 55 keymaster_blob_t km_app_data = {}; in formatted_key_material() 61 keymaster_blob_t km_client_id = {}; in formatted_key_material() 72 keymaster_blob_t export_blob = export_data.release(); in formatted_key_material()
|
D | keymaster_passthrough_operation.h | 60 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Update() 61 keymaster_blob_t out = {}; in Update()
|
D | keymaster_passthrough_engine.cpp | 96 keymaster_blob_t my_export_data = {}; in ExportKey() 252 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey() 277 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey()
|
/system/keymaster/tests/ |
D | attestation_record_test.cpp | 46 const keymaster_blob_t& application_id, bool /* reset_since_rotation */, in GenerateUniqueId() 61 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust() 121 keymaster_blob_t attestation_challenge = {}; in TEST() 122 keymaster_blob_t unique_id = {}; in TEST() 157 keymaster_blob_t verified_boot_key; in TEST() 201 keymaster_blob_t attestation_challenge = {}; in TEST() 202 keymaster_blob_t unique_id = {}; in TEST() 203 keymaster_blob_t verified_boot_key = {}; in TEST() 297 keymaster_blob_t attestation_challenge = {}; in TEST() 298 keymaster_blob_t unique_id = {}; in TEST() [all …]
|
D | android_keymaster_test_utils.cpp | 218 keymaster_blob_t key = {reinterpret_cast<const uint8_t*>(key_material.c_str()), in ImportKey() 268 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation() 269 keymaster_blob_t out_tmp; in UpdateOperation() 284 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation() 285 keymaster_blob_t out_tmp; in UpdateOperation() 311 keymaster_blob_t inp = {reinterpret_cast<const uint8_t*>(input.c_str()), input.length()}; in FinishOperation() 312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation() 314 keymaster_blob_t out_tmp; in FinishOperation() 472 keymaster_blob_t nonce_blob; in EncryptMessage() 511 keymaster_blob_t nonce_blob; in EncryptMessage() [all …]
|
/system/keymaster/include/keymaster/km_openssl/ |
D | ckdf.h | 29 const keymaster_blob_t* context_chunks, size_t num_chunks, 37 const keymaster_blob_t& context_chunks, KeymasterKeyBlob* output) { in ckdf()
|
D | certificate_utils.h | 33 keymaster_error_t make_name_from_der(const keymaster_blob_t& name, X509_NAME_Ptr* name_out); 75 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* derCert);
|
D | attestation_record.h | 355 keymaster_blob_t* attestation_challenge, 358 keymaster_blob_t* unique_id); 364 keymaster_blob_t* verified_boot_key, 376 keymaster_security_level_t* keymaster_security_level, keymaster_blob_t* attestation_challenge, 378 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster1_engine.h | 93 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input, 94 keymaster_blob_t* output);
|
D | keymaster_passthrough_engine.h | 35 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob;
|