HomeSort by relevance Sort by last modified time
    Searched refs:keyBlob (Results 1 - 9 of 9) sorted by null

  /system/security/softkeymaster/include/keymaster/
softkeymaster.h 24 uint8_t** keyBlob, size_t* keyBlobLength);
36 const uint8_t* keyBlob, const size_t keyBlobLength,
42 const uint8_t* keyBlob, const size_t keyBlobLength,
  /system/security/keystore/
keystore.cpp 995 ResponseCode get(const char* filename, Blob* keyBlob, const BlobType type, uid_t uid) {
997 ResponseCode rc = keyBlob->readBlob(filename, userState->getDecryptionKey(),
1003 const uint8_t version = keyBlob->getVersion();
1009 if (upgradeBlob(filename, keyBlob, version, type, uid)) {
1010 if ((rc = this->put(filename, keyBlob, uid)) != NO_ERROR
1011 || (rc = keyBlob->readBlob(filename, userState->getDecryptionKey(),
1024 && keyBlob->isFallback()) {
1025 ResponseCode imported = importKey(keyBlob->getValue(), keyBlob->getLength(), filename,
1026 uid, keyBlob->isEncrypted() ? KEYSTORE_FLAG_ENCRYPTED : KEYSTORE_FLAG_NONE)
    [all...]
  /system/core/libutils/
BlobCache.cpp 87 sp<Blob> keyBlob(new Blob(key, keySize, true));
103 mCacheEntries.add(CacheEntry(keyBlob, valueBlob));
170 sp<Blob> keyBlob = e.getKey();
173 size += sizeof(EntryHeader) + keyBlob->getSize() +
196 sp<Blob> keyBlob = e.getKey();
198 size_t keySize = keyBlob->getSize();
212 memcpy(eheader->mData, keyBlob->getData(), keySize);
  /system/security/softkeymaster/
keymaster_openssl.cpp 109 static int wrap_key(EVP_PKEY* pkey, int type, uint8_t** keyBlob, size_t* keyBlobLength) {
155 *keyBlob = derData.release();
160 static EVP_PKEY* unwrap_key(const uint8_t* keyBlob, const size_t keyBlobLength) {
163 const uint8_t* p = keyBlob;
164 const uint8_t *const end = keyBlob + keyBlobLength;
166 if (keyBlob == NULL) {
383 uint8_t** keyBlob, size_t* keyBlobLength) {
410 if (wrap_key(pkey.get(), EVP_PKEY_type(pkey->type), keyBlob, keyBlobLength)) {
592 const uint8_t* keyBlob, const size_t keyBlobLength,
603 Unique_EVP_PKEY pkey(unwrap_key(keyBlob, keyBlobLength))
    [all...]
  /hardware/samsung_slsi/exynos5/libkeymaster/
keymaster_mobicore.cpp 97 uint8_t** keyBlob, size_t* keyBlobLength) {
131 *keyBlob = keyDataPtr.release();
333 const uint8_t* keyBlob, const size_t keyBlobLength,
366 ret = TEE_RSASign(keyBlob, keyBlobLength, (const uint8_t *)tmpData, dataLength, signedDataPtr.get(),
381 const uint8_t* keyBlob, const size_t keyBlobLength,
408 ret = TEE_RSAVerify(keyBlob, keyBlobLength, (const uint8_t*)tmpSignedData, signedDataLength, (const uint8_t *)tmpSig,
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 102 const uint8_t* keyBlob, const size_t keyBlobLength,
105 struct qcom_km_key_blob * keyblob_ptr = (struct qcom_km_key_blob *)keyBlob;
112 if (keyBlob == NULL) {
117 // Should be large enough for keyblob data:
316 uint8_t** keyBlob, size_t* keyBlobLength) {
330 if (keyBlob == NULL || keyBlobLength == NULL) {
377 *keyBlob = keydata.release();
385 uint8_t** keyBlob, size_t* keyBlobLength)
395 } else if (keyBlob == NULL || keyBlobLength == NULL) {
460 *keyBlob = keydata.release()
    [all...]
  /device/asus/grouper/keymaster/
keymaster_grouper.cpp 302 static int keyblob_restore(const CryptoSession* session, const uint8_t* keyBlob,
304 if (keyBlob == NULL) {
316 const uint8_t* p = keyBlob;
826 const uint8_t* keyBlob, const size_t keyBlobLength,
829 ALOGV("tee_verify_data(%p, %p, %llu, %p, %llu, %p, %llu)", dev, keyBlob,
843 if (keyblob_restore(&session, keyBlob, keyBlobLength, &publicKey, &privateKey)) {
  /device/asus/grouper/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 302 static int keyblob_restore(const CryptoSession* session, const uint8_t* keyBlob,
304 if (keyBlob == NULL) {
316 const uint8_t* p = keyBlob;
826 const uint8_t* keyBlob, const size_t keyBlobLength,
829 ALOGV("tee_verify_data(%p, %p, %llu, %p, %llu, %p, %llu)", dev, keyBlob,
843 if (keyblob_restore(&session, keyBlob, keyBlobLength, &publicKey, &privateKey)) {
  /device/asus/tilapia/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 302 static int keyblob_restore(const CryptoSession* session, const uint8_t* keyBlob,
304 if (keyBlob == NULL) {
316 const uint8_t* p = keyBlob;
826 const uint8_t* keyBlob, const size_t keyBlobLength,
829 ALOGV("tee_verify_data(%p, %p, %llu, %p, %llu, %p, %llu)", dev, keyBlob,
843 if (keyblob_restore(&session, keyBlob, keyBlobLength, &publicKey, &privateKey)) {

Completed in 1452 milliseconds