/system/keymaster/include/keymaster/ |
D | serializable.h | 208 explicit Buffer(size_t size) : buffer_(nullptr) { Reinitialize(size); } in Buffer() 209 Buffer(const void* buf, size_t size) : buffer_(nullptr) { Reinitialize(buf, size); } in Buffer() 214 bool Reinitialize(size_t size); 215 bool Reinitialize(const void* buf, size_t size); 218 bool Reinitialize(const Buffer& buffer) { in Reinitialize() function 219 return Reinitialize(buffer.peek_read(), buffer.available_read()); in Reinitialize()
|
D | authorization_set.h | 61 Reinitialize(elems, count); in AuthorizationSet() 68 Reinitialize(set.params, set.length); in AuthorizationSet() 94 Reinitialize(set.elems_, set.elems_size_); in AuthorizationSet() 104 Reinitialize(set.elems_, set.elems_size_); 127 bool Reinitialize(const keymaster_key_param_t* elems, size_t count); 129 bool Reinitialize(const AuthorizationSet& set) { in Reinitialize() function 130 return Reinitialize(set.elems_, set.elems_size_); in Reinitialize() 133 bool Reinitialize(const keymaster_key_param_set_t& set) { in Reinitialize() function 134 return Reinitialize(set.params, set.length); in Reinitialize()
|
/system/keymaster/tests/ |
D | android_keymaster_messages_test.cpp | 133 req.key_description.Reinitialize(params, array_length(params)); in TEST() 145 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 160 rsp.enforced.Reinitialize(params, array_length(params)); in TEST() 173 req.additional_params.Reinitialize(params, array_length(params)); in TEST() 187 msg.enforced.Reinitialize(params, array_length(params)); in TEST() 188 msg.unenforced.Reinitialize(params, array_length(params)); in TEST() 201 msg.additional_params.Reinitialize(params, array_length(params)); in TEST() 265 msg.input.Reinitialize("foo", 3); in TEST() 289 msg.output.Reinitialize("foo", 3); in TEST() 334 msg.signature.Reinitialize("bar", 3); in TEST() [all …]
|
D | hmac_test.cpp | 78 digest_buffer.Reinitialize(reinterpret_cast<uint8_t*>(digest_copy), sizeof(digest_copy)); in TEST()
|
D | attestation_record_test.cpp | 39 unique_id->Reinitialize(application_id.data, application_id.data_length); in GenerateUniqueId()
|
/system/keymaster/km_openssl/ |
D | ecies_kem.cpp | 106 z.Reinitialize(output_encrypted_key->peek_read(), output_encrypted_key->available_read()); in Encrypt() 118 output_clear_key->Reinitialize(key_bytes_to_generate_); in Encrypt() 161 z.Reinitialize(public_value.peek_read(), public_value.available_read()); in Decrypt() 174 output_key->Reinitialize(key_bytes_to_generate_); in Decrypt()
|
D | nist_curve_key_exchange.cpp | 119 out_result->Reinitialize(result.get(), shared_secret_len_); in CalculateSharedKey() 125 return public_value->Reinitialize(public_key_.get(), public_key_len_); in public_value()
|
D | ecdsa_operation.cpp | 155 output->Reinitialize(ECDSA_size(ecdsa.get())); in Finish() 164 if (!output->Reinitialize(siglen)) in Finish()
|
D | rsa_operation.cpp | 331 if (!output->Reinitialize(RSA_size(rsa.get()))) in SignUndigested() 379 if (!output->Reinitialize(siglen)) in SignDigested() 555 if (!output->Reinitialize(outlen)) in Finish() 608 if (!output->Reinitialize(outlen)) in Finish()
|
/system/core/trusty/keymaster/3.0/ |
D | TrustyKeymaster3Device.cpp | 225 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 236 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 277 request.key_description.Reinitialize(KmParamSet(params)); in importKey() 321 request.attest_params.Reinitialize(KmParamSet(attestParams)); in attestKey() 339 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 380 request.additional_params.Reinitialize(KmParamSet(inParams)); in begin() 404 request.additional_params.Reinitialize(KmParamSet(inParams)); in update() 415 request.input.Reinitialize(input.data(), inp_size); in update() 436 request.input.Reinitialize(input.data(), input.size()); in finish() 437 request.signature.Reinitialize(signature.data(), signature.size()); in finish() [all …]
|
/system/keymaster/ng/ |
D | AndroidKeymaster3Device.cpp | 268 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 279 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 319 request.key_description.Reinitialize(KmParamSet(params)); in importKey() 363 request.attest_params.Reinitialize(KmParamSet(attestParams)); in attestKey() 383 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 426 request.additional_params.Reinitialize(KmParamSet(inParams)); in begin() 445 request.input.Reinitialize(input.data(), input.size()); in update() 446 request.additional_params.Reinitialize(KmParamSet(inParams)); in update() 469 request.input.Reinitialize(input.data(), input.size()); in finish() 470 request.signature.Reinitialize(signature.data(), signature.size()); in finish() [all …]
|
D | AndroidKeymaster4Device.cpp | 285 request.parameters_to_verify.Reinitialize(KmParamSet(parametersToVerify)); in verifyAuthorization() 312 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 323 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 364 request.key_description.Reinitialize(KmParamSet(params)); in importKey() 391 request.additional_params.Reinitialize(KmParamSet(unwrappingParams)); in importWrappedKey() 435 request.attest_params.Reinitialize(KmParamSet(attestParams)); in attestKey() 455 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 499 request.additional_params.Reinitialize(KmParamSet(inParams)); in begin() 523 request.input.Reinitialize(input.data(), input.size()); in update() 524 request.additional_params.Reinitialize(KmParamSet(inParams)); in update() [all …]
|
D | AndroidKeymaster41Device.cpp | 47 serializableToken.parameters_verified.Reinitialize( in deviceLocked()
|
/system/core/trusty/keymaster/4.0/ |
D | TrustyKeymaster4Device.cpp | 314 request.parameters_to_verify.Reinitialize(KmParamSet(parametersToVerify)); in verifyAuthorization() 340 request.random_data.Reinitialize(data.data(), data.size()); in addRngEntropy() 351 request.key_description.Reinitialize(KmParamSet(keyParams)); in generateKey() 392 request.key_description.Reinitialize(KmParamSet(params)); in importKey() 418 request.additional_params.Reinitialize(KmParamSet(unwrappingParams)); in importWrappedKey() 462 request.attest_params.Reinitialize(KmParamSet(attestParams)); in attestKey() 480 request.upgrade_params.Reinitialize(KmParamSet(upgradeParams)); in upgradeKey() 522 request.additional_params.Reinitialize(KmParamSet(extendedParams)); in begin() 551 request.additional_params.Reinitialize(KmParamSet(extendedParams)); in update() 562 request.input.Reinitialize(input.data(), inp_size); in update() [all …]
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.h | 52 if (rc == KM_ERROR_OK && output_params) output_params->Reinitialize(out_params); in Begin() 66 if (output) output->Reinitialize(out.data, out.data_length); in Update() 67 if (output_params) output_params->Reinitialize(out_params); in Update()
|
D | keymaster_passthrough_operation.cpp | 105 if (output) output->Reinitialize(out.data, out.data_length); in Finish() 106 if (output_params) output_params->Reinitialize(out_params); in Finish()
|
D | ecdsa_keymaster1_operation.cpp | 68 key_data->finish_params.Reinitialize(input_params); in PrepareFinish()
|
D | keymaster_passthrough_engine.cpp | 205 hw_enforced->Reinitialize(characteristics.hw_enforced); in ConvertCharacteristics() 207 sw_enforced->Reinitialize(characteristics.sw_enforced); in ConvertCharacteristics()
|
D | rsa_keymaster1_operation.cpp | 89 key_data->finish_params.Reinitialize(input_params); in PrepareFinish()
|
/system/keymaster/android_keymaster/ |
D | serializable.cpp | 94 bool Buffer::Reinitialize(size_t size) { in Reinitialize() function in keymaster::Buffer 105 bool Buffer::Reinitialize(const void* data, size_t data_len) { in Reinitialize() function in keymaster::Buffer
|
/system/keymaster/contexts/ |
D | keymaster2_passthrough_context.cpp | 91 hw_enforced.Reinitialize(characteristics.hw_enforced); in ParseKeyBlob() 92 sw_enforced.Reinitialize(characteristics.sw_enforced); in ParseKeyBlob()
|
D | soft_keymaster_device.cpp | 642 request.random_data.Reinitialize(data, data_length); in add_rng_entropy() 751 request.key_description.Reinitialize(*params); in generate_key() 801 request.key_description.Reinitialize(*params); in generate_key() 948 request.key_description.Reinitialize(*params); in import_key() 1083 request.attest_params.Reinitialize(*attest_params); in attest_key() 1140 request.upgrade_params.Reinitialize(*upgrade_params); in upgrade_key() 1254 request.additional_params.Reinitialize(*in_params); in begin() 1323 request.input.Reinitialize(input->data, input->data_length); in update() 1325 request.additional_params.Reinitialize(*in_params); in update() 1402 request.signature.Reinitialize(signature->data, signature->data_length); in finish() [all …]
|
D | keymaster1_passthrough_context.cpp | 135 hw_enforced->Reinitialize(characteristics->hw_enforced); in parseKeymaster1HwBlob() 136 sw_enforced->Reinitialize(characteristics->sw_enforced); in parseKeymaster1HwBlob()
|
D | pure_soft_keymaster_context.cpp | 348 if (!input.Reinitialize(transit_key.key_material, transit_key.key_material_size)) { in UnwrapKey() 407 if (!plaintext.Reinitialize(secure_key.key_material_size + tag.data_length)) { in UnwrapKey() 410 if (!encrypted_key.Reinitialize(secure_key.key_material_size + tag.data_length)) { in UnwrapKey()
|
D | soft_keymaster_context.cpp | 421 hw_enforced->Reinitialize(characteristics->hw_enforced); in ParseKeymaster1HwBlob() 422 sw_enforced->Reinitialize(characteristics->sw_enforced); in ParseKeymaster1HwBlob()
|