/system/keymaster/ |
D | ecdsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in Begin() local 63 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in PrepareFinish() local 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in GetError() local
|
D | rsa_keymaster1_operation.cpp | 33 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); in Begin() local 79 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); in PrepareFinish() local 95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa in GetError() local
|
D | keymaster1_engine.cpp | 146 KeyData* key_data = new KeyData(blob, additional_params); in BuildRsaKey() local 188 KeyData* key_data = new KeyData(blob, additional_params); in BuildEcKey() local 269 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data, in Keymaster1Finish() 291 KeyData* key_data = instance_->GetData(rsa); in rsa_sign_raw() local 316 KeyData* key_data = instance_->GetData(rsa); in rsa_decrypt() local 341 KeyData* key_data = instance_->GetData(ec_key); in ecdsa_sign() local
|
D | symmetric_key.h | 67 const uint8_t* key_data() const { return key_data_.get(); } in key_data() function
|
D | openssl_utils.cpp | 82 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, in convert_pkcs8_blob_to_evp()
|
D | hmac_operation.cpp | 91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, in HmacOperation()
|
D | android_keymaster_test.cpp | 860 uint8_t key_data[] = { in TEST_P() local 975 uint8_t key_data[25] = { in TEST_P() local 1905 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; in TEST_P() local 1924 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; in TEST_P() local 3334 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); in TEST_P() local 3351 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); in TEST_P() local 3368 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); in TEST_P() local 3388 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); in TEST_P() local 3404 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); in TEST_P() local 3432 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km0_sw.length())); in TEST_P() local [all …]
|
D | key_blob_test.cpp | 38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; variable
|
D | keymaster0_engine.cpp | 163 static keymaster_key_blob_t* duplicate_blob(const uint8_t* key_data, size_t key_data_size) { in duplicate_blob()
|
D | soft_keymaster_device.cpp | 915 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() 962 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
|
D | android_keymaster_test_utils.cpp | 832 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
|
/system/webservd/webservd/ |
D | server.cc | 66 std::string key_data; in LoadAndValidatePrivateKey() local
|
/system/tpm/attestation/server/ |
D | pkcs11_key_store.cc | 100 std::string* key_data) { in Read() 138 const std::string& key_data) { in Write()
|
D | attestation_service.cc | 707 std::string key_data; in FindKeyByLabel() local 770 std::string key_data; in SaveKey() local
|
/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 461 uint8_t* key_data; member 521 uint8_t* key_data; member
|
/system/security/keystore/ |
D | keystore_client_impl.cpp | 234 const std::string& key_data, in importKey()
|