Home
last modified time | relevance | path

Searched refs:key_data (Results 1 – 25 of 30) sorted by relevance

12

/system/keymaster/
Dkeymaster1_engine.cpp146 KeyData* key_data = new KeyData(blob, additional_params); in BuildRsaKey() local
147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { in BuildRsaKey()
149 delete key_data; in BuildRsaKey()
155 GetKeymaster1PublicKey(key_data->key_material, key_data->begin_params, error)); in BuildRsaKey()
188 KeyData* key_data = new KeyData(blob, additional_params); in BuildEcKey() local
189 if (!EC_KEY_set_ex_data(ec_key.get(), ec_key_index_, key_data)) { in BuildEcKey()
191 delete key_data; in BuildEcKey()
269 keymaster_error_t Keymaster1Engine::Keymaster1Finish(const KeyData* key_data, in Keymaster1Finish() argument
272 if (key_data->op_handle == 0) in Keymaster1Finish()
279 device()->update(device(), key_data->op_handle, &key_data->finish_params, &input, in Keymaster1Finish()
[all …]
Decdsa_keymaster1_operation.cpp33 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in Begin() local
34 if (!key_data) in Begin()
56 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, in Begin()
63 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in PrepareFinish() local
64 if (!key_data) { in PrepareFinish()
68 key_data->op_handle = operation_handle_; in PrepareFinish()
69 key_data->finish_params.Reinitialize(input_params); in PrepareFinish()
79 Keymaster1Engine::KeyData* key_data = engine_->GetData(ecdsa_key); in GetError() local
80 if (!key_data) in GetError()
82 return key_data->error; in GetError()
Drsa_keymaster1_operation.cpp33 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); in Begin() local
34 if (!key_data) in Begin()
62 key_data->expected_openssl_padding = RSA_NO_PADDING; in Begin()
68 key_data->expected_openssl_padding = RSA_PKCS1_PADDING; in Begin()
72 return engine_->device()->begin(engine_->device(), purpose_, &key_data->key_material, in Begin()
79 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); in PrepareFinish() local
80 if (!key_data) { in PrepareFinish()
84 key_data->op_handle = operation_handle_; in PrepareFinish()
85 key_data->finish_params.Reinitialize(input_params); in PrepareFinish()
95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa in GetError() local
[all …]
Dopenssl_utils.cpp82 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, in convert_pkcs8_blob_to_evp() argument
85 if (key_data == NULL || key_length <= 0) in convert_pkcs8_blob_to_evp()
89 d2i_PKCS8_PRIV_KEY_INFO(NULL, &key_data, key_length)); in convert_pkcs8_blob_to_evp()
Dandroid_keymaster_messages.cpp308 delete[] key_data; in SetKeyMaterial()
309 key_data = dup_buffer(key_material, length); in SetKeyMaterial()
321 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); in Serialize()
325 delete[] key_data; in Deserialize()
326 key_data = NULL; in Deserialize()
332 key_data = deserialized_key_material.release(); in Deserialize()
377 delete[] key_data; in SetKeyMaterial()
378 key_data = dup_buffer(key_material, length); in SetKeyMaterial()
387 return append_size_and_data_to_buf(buf, end, key_data, key_data_length); in NonErrorSerialize()
391 delete[] key_data; in NonErrorDeserialize()
[all …]
Dhmac_operation.cpp70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest, in CreateOperation()
91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, in HmacOperation() argument
138 HMAC_Init_ex(&ctx_, key_data, key_data_size, md, NULL /* engine */); in HmacOperation()
Dandroid_keymaster_test.cpp860 uint8_t key_data[] = { in TEST_P() local
888 string key = make_string(key_data); in TEST_P()
975 uint8_t key_data[25] = { in TEST_P() local
979 string key = make_string(key_data); in TEST_P()
1905 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; in TEST_P() local
1906 string key(key_data, sizeof(key_data)); in TEST_P()
1924 char key_data[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; in TEST_P() local
1925 string key(key_data, sizeof(key_data)); in TEST_P()
1927 .HmacKey(sizeof(key_data) * 8) in TEST_P()
3334 uint8_t* key_data = reinterpret_cast<uint8_t*>(malloc(km1_sw.length())); in TEST_P() local
[all …]
Dsymmetric_key.h67 const uint8_t* key_data() const { return key_data_.get(); } in key_data() function
Dhmac_operation.h28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
Dopenssl_utils.h85 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
Dkey_blob_test.cpp38 const uint8_t key_data[5] = {21, 22, 23, 24, 25}; variable
44 key_material_(key_data, array_length(key_data)) { in KeyBlobTest()
Dkeymaster1_engine.h95 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
Dsoft_keymaster_device.cpp915 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() argument
917 if (!params || !key_data) in import_key()
930 return km1_dev->import_key(km1_dev, params, key_format, key_data, key_blob, in import_key()
937 request.SetKeyMaterial(key_data->data, key_data->data_length); in import_key()
962 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() argument
975 error = import_key(&sk_dev->km1_device_, params, key_format, key_data, key_blob, in import_key()
982 error = import_key(&sk_dev->km1_device_, params, key_format, key_data, key_blob, nullptr); in import_key()
1023 memcpy(tmp, response.key_data, export_data->data_length); in export_key()
Dkeymaster0_engine.cpp163 static keymaster_key_blob_t* duplicate_blob(const uint8_t* key_data, size_t key_data_size) { in duplicate_blob() argument
164 unique_ptr<uint8_t[]> key_material_copy(dup_buffer(key_data, key_data_size)); in duplicate_blob()
/system/tpm/attestation/server/
Dmock_key_store.h36 std::string* key_data));
39 const std::string& key_data));
Dkey_store.h38 std::string* key_data) = 0;
45 const std::string& key_data) = 0;
Dpkcs11_key_store.h53 std::string* key_data) override;
56 const std::string& key_data) override;
Dpkcs11_key_store.cc100 std::string* key_data) { in Read() argument
124 key_data->resize(attribute.ulValueLen); in Read()
125 attribute.pValue = string_as_array(key_data); in Read()
132 key_data->resize(attribute.ulValueLen); in Read()
138 const std::string& key_data) { in Write() argument
154 std::string mutable_key_data(key_data); in Write()
Dattestation_service.cc707 std::string key_data; in FindKeyByLabel() local
708 if (!key_store_->Read(username, key_label, &key_data)) { in FindKeyByLabel()
712 if (key && !key->ParseFromString(key_data)) { in FindKeyByLabel()
770 std::string key_data; in SaveKey() local
771 if (!key.SerializeToString(&key_data)) { in SaveKey()
775 if (!key_store_->Write(username, key_label, key_data)) { in SaveKey()
/system/webservd/webservd/
Dserver.cc66 std::string key_data; in LoadAndValidatePrivateKey() local
67 if (!encryptor->DecryptWithAuthentication(encrypted_key_data, &key_data)) in LoadAndValidatePrivateKey()
69 brillo::SecureBlob key{key_data}; in LoadAndValidatePrivateKey()
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h447 : KeymasterMessage(ver), key_data(nullptr) {} in KeymasterMessage()
448 ~ImportKeyRequest() { delete[] key_data; } in ~ImportKeyRequest()
461 uint8_t* key_data; member
509 : KeymasterResponse(ver), key_data(nullptr) {} in KeymasterResponse()
510 ~ExportKeyResponse() { delete[] key_data; } in ~ExportKeyResponse()
521 uint8_t* key_data; member
Dsoft_keymaster_device.h149 const keymaster_blob_t* key_data,
198 const keymaster_blob_t* key_data,
/system/security/keystore/include/keystore/
Dkeystore_client_mock.h56 keymaster_key_format_t key_format, const std::string& key_data,
Dkeystore_client.h112 keymaster_key_format_t key_format, const std::string& key_data,
Dkeystore_client_impl.h57 keymaster_key_format_t key_format, const std::string& key_data,

12