/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
D | trusty_keymaster_device.h | 53 const keymaster_blob_t* client_id, 54 const keymaster_blob_t* app_data, 58 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, 62 const keymaster_blob_t* client_id, 63 const keymaster_blob_t* app_data, keymaster_blob_t* export_data); 76 const keymaster_blob_t* input, size_t* input_consumed, 77 keymaster_key_param_set_t* out_params, keymaster_blob_t* output); 80 const keymaster_blob_t* input, const keymaster_blob_t* signature, 81 keymaster_key_param_set_t* out_params, keymaster_blob_t* output); 105 const keymaster_blob_t* client_id, [all …]
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 143 const keymaster_blob_t* client_id, 144 const keymaster_blob_t* app_data, 149 const keymaster_blob_t* key_data, 155 const keymaster_blob_t* client_id, 156 const keymaster_blob_t* app_data, 157 keymaster_blob_t* export_data); 169 const keymaster_blob_t* input, size_t* input_consumed, 171 keymaster_blob_t* output); 175 const keymaster_blob_t* signature, 177 keymaster_blob_t* output); [all …]
|
D | attestation_record.h | 218 const keymaster_blob_t& /*application_id*/, in GenerateUniqueId() argument 230 GetVerifiedBootParams(keymaster_blob_t* /* verified_boot_key */, in GetVerifiedBootParams() argument 231 keymaster_blob_t* /* verified_boot_hash */, in GetVerifiedBootParams() 280 keymaster_blob_t* attestation_challenge, 283 keymaster_blob_t* unique_id); 289 keymaster_blob_t* verified_boot_key,
|
D | keymaster_tags.h | 88 template <> struct TagValueType<KM_BYTES> { typedef keymaster_blob_t value_type; }; 89 template <> struct TagValueType<KM_BIGNUM> { typedef keymaster_blob_t value_type; }; 247 const keymaster_blob_t& blob) { 259 const keymaster_blob_t& blob) {
|
D | android_keymaster_utils.h | 258 const uint8_t* const & accessBlobData(const keymaster_blob_t* blob) { in accessBlobData() 262 const uint8_t*& accessBlobData(keymaster_blob_t* blob) { in accessBlobData() 266 const size_t & accessBlobSize(const keymaster_blob_t* blob) { in accessBlobSize() 270 size_t& accessBlobSize(keymaster_blob_t* blob) { in accessBlobSize() 401 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob;
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 95 keymaster_error_t hmacSha256(const keymaster_key_blob_t& key, const keymaster_blob_t data_chunks[], in hmacSha256() 125 template <typename T> inline keymaster_blob_t toBlob(const T& t) { in toBlob() 128 inline keymaster_blob_t toBlob(const char* str) { in toBlob() 134 inline bool operator==(const keymaster_blob_t& a, const keymaster_blob_t& b) { in operator ==() 150 UniquePtr<keymaster_blob_t[]> context_chunks(new (std::nothrow) keymaster_blob_t[num_chunks]); in ComputeSharedHmac() 172 keymaster_blob_t data = {reinterpret_cast<const uint8_t*>(kMacVerificationString), in ComputeSharedHmac() 174 keymaster_blob_t data_chunks[] = {data}; in ComputeSharedHmac() 188 keymaster_blob_t data_chunks[] = { in VerifyAuthorization()
|
D | attestation_utils.cpp | 48 inline keymaster_blob_t certBlobifier(const emptyCert&, bool*){ return {}; } in certBlobifier() 50 inline keymaster_blob_t certBlobifier(const uint8_t (&cert)[N], bool* fail){ in certBlobifier() 51 keymaster_blob_t result = { dup_array(cert), N }; in certBlobifier() 58 inline keymaster_blob_t certBlobifier(const keymaster_blob_t& blob, bool* fail){ in certBlobifier() 60 keymaster_blob_t result = { dup_array(blob.data, blob.data_length), blob.data_length }; in certBlobifier() 67 inline keymaster_blob_t certBlobifier(keymaster_blob_t&& blob, bool*){ in certBlobifier() 69 keymaster_blob_t result = blob; in certBlobifier() 73 inline keymaster_blob_t certBlobifier(X509* certificate, bool* fail){ in certBlobifier() 92 inline bool certCopier(keymaster_blob_t** out, const keymaster_cert_chain_t& chain, in certCopier() 101 inline bool certCopier(keymaster_blob_t** out, keymaster_cert_chain_t&& chain, bool* fail) { in certCopier() [all …]
|
D | attestation_record.cpp | 402 keymaster_blob_t verified_boot_key; in build_attestation_record() 403 keymaster_blob_t verified_boot_hash; in build_attestation_record() 432 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_attestation_record() 443 keymaster_blob_t attestation_app_id; in build_attestation_record() 487 keymaster_blob_t application_id = {nullptr, 0}; in build_attestation_record() 756 keymaster_blob_t* attestation_challenge, in parse_attestation_record() 759 keymaster_blob_t* unique_id) { in parse_attestation_record() 788 keymaster_blob_t* verified_boot_key, in parse_root_of_trust()
|
/system/keymaster/contexts/ |
D | soft_attestation_cert.cpp | 167 static keymaster_blob_t kRsaAttestChainBlobs[] = { 172 static const keymaster_cert_chain_t kRsaAttestChain = { (keymaster_blob_t*)&kRsaAttestChainBlobs, 2… 277 static keymaster_blob_t kEcAttestChainBlobs[] = { 282 static const keymaster_cert_chain_t kEcAttestChain = { (keymaster_blob_t*)&kEcAttestChainBlobs, 2 };
|
D | keymaster2_passthrough_context.cpp | 72 keymaster_blob_t clientId; in ParseKeyBlob() 73 keymaster_blob_t applicationData; in ParseKeyBlob() 74 keymaster_blob_t* clientIdPtr = &clientId; in ParseKeyBlob() 75 keymaster_blob_t* applicationDataPtr = &applicationData; in ParseKeyBlob() 136 **cert_chain = { new keymaster_blob_t[cchain.entry_count], cchain.entry_count }; in GenerateAttestation()
|
D | soft_keymaster_device.cpp | 359 void AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in AddClientAndAppData() 862 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics() 906 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics() 937 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() 984 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() 1014 const keymaster_blob_t* client_id, in export_key() 1015 const keymaster_blob_t* app_data, in export_key() 1016 keymaster_blob_t* export_data) { in export_key() 1054 const keymaster_blob_t* client_id, in export_key() 1055 const keymaster_blob_t* app_data, in export_key() [all …]
|
D | soft_keymaster_context.cpp | 401 keymaster_blob_t client_id = {nullptr, 0}; in ParseKeymaster1HwBlob() 402 keymaster_blob_t app_data = {nullptr, 0}; in ParseKeymaster1HwBlob() 403 keymaster_blob_t* client_id_ptr = nullptr; in ParseKeymaster1HwBlob() 404 keymaster_blob_t* app_data_ptr = nullptr; in ParseKeymaster1HwBlob() 480 keymaster_blob_t* verified_boot_key, keymaster_blob_t* verified_boot_hash, in GetVerifiedBootParams()
|
D | keymaster1_passthrough_context.cpp | 116 keymaster_blob_t client_id = {nullptr, 0}; in parseKeymaster1HwBlob() 117 keymaster_blob_t app_data = {nullptr, 0}; in parseKeymaster1HwBlob() 118 keymaster_blob_t* client_id_ptr = nullptr; in parseKeymaster1HwBlob() 119 keymaster_blob_t* app_data_ptr = nullptr; in parseKeymaster1HwBlob()
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.cpp | 31 keymaster_blob_t in{ input.peek_read(), input.available_read() }; in Finish() 32 keymaster_blob_t out = {}; in Finish() 67 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish() 99 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish() 100 keymaster_blob_t in{ input.peek_read(), input.available_read() }; in Finish() 101 keymaster_blob_t out = {}; in Finish()
|
D | keymaster1_engine.cpp | 107 const keymaster_blob_t input_key = {input_key_material.key_material, in ImportKey() 265 const keymaster_blob_t& input, in Keymaster1Finish() 266 keymaster_blob_t* output) { in Keymaster1Finish() 296 keymaster_blob_t input = {in, in_len}; in rsa_sign_raw() 297 keymaster_blob_t output; in rsa_sign_raw() 321 keymaster_blob_t input = {in, in_len}; in rsa_decrypt() 322 keymaster_blob_t output; in rsa_decrypt() 345 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign() 346 keymaster_blob_t output; in ecdsa_sign() 360 keymaster_blob_t client_id = {nullptr, 0}; in GetKeymaster1PublicKey() [all …]
|
D | keymaster_passthrough_key.cpp | 60 keymaster_blob_t km_app_data = {}; in formatted_key_material() 66 keymaster_blob_t km_client_id = {}; in formatted_key_material() 77 keymaster_blob_t export_blob = export_data.release(); in formatted_key_material()
|
D | keymaster_passthrough_operation.h | 60 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Update() 61 keymaster_blob_t out = {}; in Update()
|
/system/keymaster/tests/ |
D | attestation_record_test.cpp | 35 const keymaster_blob_t& application_id, in GenerateUniqueId() 42 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key, in GetVerifiedBootParams() 52 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust() 102 keymaster_blob_t attestation_challenge = {}; in TEST() 103 keymaster_blob_t unique_id = {}; in TEST() 134 keymaster_blob_t verified_boot_key; in TEST()
|
D | android_keymaster_test_utils.cpp | 217 keymaster_blob_t key = {reinterpret_cast<const uint8_t*>(key_material.c_str()), in ImportKey() 267 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation() 268 keymaster_blob_t out_tmp; in UpdateOperation() 283 keymaster_blob_t input = {reinterpret_cast<const uint8_t*>(message.c_str()), message.length()}; in UpdateOperation() 284 keymaster_blob_t out_tmp; in UpdateOperation() 311 keymaster_blob_t inp = {reinterpret_cast<const uint8_t*>(input.c_str()), input.length()}; in FinishOperation() 312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation() 314 keymaster_blob_t out_tmp; in FinishOperation() 473 keymaster_blob_t nonce_blob; in EncryptMessage() 504 keymaster_blob_t nonce_blob; in EncryptMessage() [all …]
|
/system/keymaster/include/keymaster/km_openssl/ |
D | ckdf.h | 29 const keymaster_blob_t* context_chunks, size_t num_chunks, 37 const keymaster_blob_t& context_chunks, KeymasterKeyBlob* output) { in ckdf()
|
/system/keymaster/include/keymaster/contexts/ |
D | pure_soft_keymaster_context.h | 99 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key, 100 keymaster_blob_t* verified_boot_hash,
|
D | soft_keymaster_context.h | 111 keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key, 112 keymaster_blob_t* verified_boot_hash,
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster1_engine.h | 95 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input, 96 keymaster_blob_t* output);
|
D | keymaster_passthrough_engine.h | 36 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob;
|
/system/security/keystore/ |
D | legacy_keymaster_device_wrapper.cpp | 122 inline static keymaster_blob_t hidlVec2KmBlob(const hidl_vec<uint8_t>& blob) { in hidlVec2KmBlob() 141 inline static hidl_vec<uint8_t> kmBlob2hidlVec(const keymaster_blob_t& blob) { in kmBlob2hidlVec() 324 keymaster_blob_t out_blob = {}; in exportKey() 474 keymaster_blob_t out_blob = {}; in update() 507 keymaster_blob_t out_blob = {}; in finish()
|