Home
last modified time | relevance | path

Searched refs:keymaster_blob_t (Results 1 – 25 of 44) sorted by relevance

12

/system/core/trusty/keymaster/include/trusty_keymaster/legacy/
Dtrusty_keymaster_device.h53 const keymaster_blob_t* client_id,
54 const keymaster_blob_t* app_data,
58 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob,
62 const keymaster_blob_t* client_id,
63 const keymaster_blob_t* app_data, keymaster_blob_t* export_data);
76 const keymaster_blob_t* input, size_t* input_consumed,
77 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
80 const keymaster_blob_t* input, const keymaster_blob_t* signature,
81 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
105 const keymaster_blob_t* client_id,
[all …]
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h143 const keymaster_blob_t* client_id,
144 const keymaster_blob_t* app_data,
149 const keymaster_blob_t* key_data,
155 const keymaster_blob_t* client_id,
156 const keymaster_blob_t* app_data,
157 keymaster_blob_t* export_data);
169 const keymaster_blob_t* input, size_t* input_consumed,
171 keymaster_blob_t* output);
175 const keymaster_blob_t* signature,
177 keymaster_blob_t* output);
[all …]
Dattestation_record.h218 const keymaster_blob_t& /*application_id*/, in GenerateUniqueId() argument
230 GetVerifiedBootParams(keymaster_blob_t* /* verified_boot_key */, in GetVerifiedBootParams() argument
231 keymaster_blob_t* /* verified_boot_hash */, in GetVerifiedBootParams()
280 keymaster_blob_t* attestation_challenge,
283 keymaster_blob_t* unique_id);
289 keymaster_blob_t* verified_boot_key,
Dkeymaster_tags.h88 template <> struct TagValueType<KM_BYTES> { typedef keymaster_blob_t value_type; };
89 template <> struct TagValueType<KM_BIGNUM> { typedef keymaster_blob_t value_type; };
247 const keymaster_blob_t& blob) {
259 const keymaster_blob_t& blob) {
Dandroid_keymaster_utils.h258 const uint8_t* const & accessBlobData(const keymaster_blob_t* blob) { in accessBlobData()
262 const uint8_t*& accessBlobData(keymaster_blob_t* blob) { in accessBlobData()
266 const size_t & accessBlobSize(const keymaster_blob_t* blob) { in accessBlobSize()
270 size_t& accessBlobSize(keymaster_blob_t* blob) { in accessBlobSize()
401 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob;
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp95 keymaster_error_t hmacSha256(const keymaster_key_blob_t& key, const keymaster_blob_t data_chunks[], in hmacSha256()
125 template <typename T> inline keymaster_blob_t toBlob(const T& t) { in toBlob()
128 inline keymaster_blob_t toBlob(const char* str) { in toBlob()
134 inline bool operator==(const keymaster_blob_t& a, const keymaster_blob_t& b) { in operator ==()
150 UniquePtr<keymaster_blob_t[]> context_chunks(new (std::nothrow) keymaster_blob_t[num_chunks]); in ComputeSharedHmac()
172 keymaster_blob_t data = {reinterpret_cast<const uint8_t*>(kMacVerificationString), in ComputeSharedHmac()
174 keymaster_blob_t data_chunks[] = {data}; in ComputeSharedHmac()
188 keymaster_blob_t data_chunks[] = { in VerifyAuthorization()
Dattestation_utils.cpp48 inline keymaster_blob_t certBlobifier(const emptyCert&, bool*){ return {}; } in certBlobifier()
50 inline keymaster_blob_t certBlobifier(const uint8_t (&cert)[N], bool* fail){ in certBlobifier()
51 keymaster_blob_t result = { dup_array(cert), N }; in certBlobifier()
58 inline keymaster_blob_t certBlobifier(const keymaster_blob_t& blob, bool* fail){ in certBlobifier()
60 keymaster_blob_t result = { dup_array(blob.data, blob.data_length), blob.data_length }; in certBlobifier()
67 inline keymaster_blob_t certBlobifier(keymaster_blob_t&& blob, bool*){ in certBlobifier()
69 keymaster_blob_t result = blob; in certBlobifier()
73 inline keymaster_blob_t certBlobifier(X509* certificate, bool* fail){ in certBlobifier()
92 inline bool certCopier(keymaster_blob_t** out, const keymaster_cert_chain_t& chain, in certCopier()
101 inline bool certCopier(keymaster_blob_t** out, keymaster_cert_chain_t&& chain, bool* fail) { in certCopier()
[all …]
Dattestation_record.cpp402 keymaster_blob_t verified_boot_key; in build_attestation_record()
403 keymaster_blob_t verified_boot_hash; in build_attestation_record()
432 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_attestation_record()
443 keymaster_blob_t attestation_app_id; in build_attestation_record()
487 keymaster_blob_t application_id = {nullptr, 0}; in build_attestation_record()
756 keymaster_blob_t* attestation_challenge, in parse_attestation_record()
759 keymaster_blob_t* unique_id) { in parse_attestation_record()
788 keymaster_blob_t* verified_boot_key, in parse_root_of_trust()
/system/keymaster/contexts/
Dsoft_attestation_cert.cpp167 static keymaster_blob_t kRsaAttestChainBlobs[] = {
172 static const keymaster_cert_chain_t kRsaAttestChain = { (keymaster_blob_t*)&kRsaAttestChainBlobs, 2…
277 static keymaster_blob_t kEcAttestChainBlobs[] = {
282 static const keymaster_cert_chain_t kEcAttestChain = { (keymaster_blob_t*)&kEcAttestChainBlobs, 2 };
Dkeymaster2_passthrough_context.cpp72 keymaster_blob_t clientId; in ParseKeyBlob()
73 keymaster_blob_t applicationData; in ParseKeyBlob()
74 keymaster_blob_t* clientIdPtr = &clientId; in ParseKeyBlob()
75 keymaster_blob_t* applicationDataPtr = &applicationData; in ParseKeyBlob()
136 **cert_chain = { new keymaster_blob_t[cchain.entry_count], cchain.entry_count }; in GenerateAttestation()
Dsoft_keymaster_device.cpp359 void AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in AddClientAndAppData()
862 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics()
906 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics()
937 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
984 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
1014 const keymaster_blob_t* client_id, in export_key()
1015 const keymaster_blob_t* app_data, in export_key()
1016 keymaster_blob_t* export_data) { in export_key()
1054 const keymaster_blob_t* client_id, in export_key()
1055 const keymaster_blob_t* app_data, in export_key()
[all …]
Dsoft_keymaster_context.cpp401 keymaster_blob_t client_id = {nullptr, 0}; in ParseKeymaster1HwBlob()
402 keymaster_blob_t app_data = {nullptr, 0}; in ParseKeymaster1HwBlob()
403 keymaster_blob_t* client_id_ptr = nullptr; in ParseKeymaster1HwBlob()
404 keymaster_blob_t* app_data_ptr = nullptr; in ParseKeymaster1HwBlob()
480 keymaster_blob_t* verified_boot_key, keymaster_blob_t* verified_boot_hash, in GetVerifiedBootParams()
Dkeymaster1_passthrough_context.cpp116 keymaster_blob_t client_id = {nullptr, 0}; in parseKeymaster1HwBlob()
117 keymaster_blob_t app_data = {nullptr, 0}; in parseKeymaster1HwBlob()
118 keymaster_blob_t* client_id_ptr = nullptr; in parseKeymaster1HwBlob()
119 keymaster_blob_t* app_data_ptr = nullptr; in parseKeymaster1HwBlob()
/system/keymaster/legacy_support/
Dkeymaster_passthrough_operation.cpp31 keymaster_blob_t in{ input.peek_read(), input.available_read() }; in Finish()
32 keymaster_blob_t out = {}; in Finish()
67 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish()
99 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish()
100 keymaster_blob_t in{ input.peek_read(), input.available_read() }; in Finish()
101 keymaster_blob_t out = {}; in Finish()
Dkeymaster1_engine.cpp107 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey()
265 const keymaster_blob_t& input, in Keymaster1Finish()
266 keymaster_blob_t* output) { in Keymaster1Finish()
296 keymaster_blob_t input = {in, in_len}; in rsa_sign_raw()
297 keymaster_blob_t output; in rsa_sign_raw()
321 keymaster_blob_t input = {in, in_len}; in rsa_decrypt()
322 keymaster_blob_t output; in rsa_decrypt()
345 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign()
346 keymaster_blob_t output; in ecdsa_sign()
360 keymaster_blob_t client_id = {nullptr, 0}; in GetKeymaster1PublicKey()
[all …]
Dkeymaster_passthrough_key.cpp60 keymaster_blob_t km_app_data = {}; in formatted_key_material()
66 keymaster_blob_t km_client_id = {}; in formatted_key_material()
77 keymaster_blob_t export_blob = export_data.release(); in formatted_key_material()
Dkeymaster_passthrough_operation.h60 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Update()
61 keymaster_blob_t out = {}; in Update()
/system/keymaster/tests/
Dattestation_record_test.cpp35 const keymaster_blob_t& application_id, in GenerateUniqueId()
42 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key, in GetVerifiedBootParams()
52 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust()
102 keymaster_blob_t attestation_challenge = {}; in TEST()
103 keymaster_blob_t unique_id = {}; in TEST()
134 keymaster_blob_t verified_boot_key; in TEST()
Dandroid_keymaster_test_utils.cpp217 keymaster_blob_t key = {reinterpret_cast<const uint8_t*>(key_material.c_str()), in ImportKey()
267 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation()
268 keymaster_blob_t out_tmp; in UpdateOperation()
283 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation()
284 keymaster_blob_t out_tmp; in UpdateOperation()
311 keymaster_blob_t inp = {reinterpret_cast<const uint8_t*>(input.c_str()), input.length()}; in FinishOperation()
312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation()
314 keymaster_blob_t out_tmp; in FinishOperation()
473 keymaster_blob_t nonce_blob; in EncryptMessage()
504 keymaster_blob_t nonce_blob; in EncryptMessage()
[all …]
/system/keymaster/include/keymaster/km_openssl/
Dckdf.h29 const keymaster_blob_t* context_chunks, size_t num_chunks,
37 const keymaster_blob_t& context_chunks, KeymasterKeyBlob* output) { in ckdf()
/system/keymaster/include/keymaster/contexts/
Dpure_soft_keymaster_context.h99 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key,
100 keymaster_blob_t* verified_boot_hash,
Dsoft_keymaster_context.h111 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key,
112 keymaster_blob_t* verified_boot_hash,
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster1_engine.h95 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
96 keymaster_blob_t* output);
Dkeymaster_passthrough_engine.h36 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob;
/system/security/keystore/
Dlegacy_keymaster_device_wrapper.cpp122 inline static keymaster_blob_t hidlVec2KmBlob(const hidl_vec<uint8_t>& blob) { in hidlVec2KmBlob()
141 inline static hidl_vec<uint8_t> kmBlob2hidlVec(const keymaster_blob_t& blob) { in kmBlob2hidlVec()
324 keymaster_blob_t out_blob = {}; in exportKey()
474 keymaster_blob_t out_blob = {}; in update()
507 keymaster_blob_t out_blob = {}; in finish()

12