Home | History | Annotate | Download | only in keymaster

Lines Matching refs:sDevice

343         ASSERT_EQ(0, keymaster_open(mod, &sDevice))
349 ASSERT_TRUE(sDevice->generate_keypair != NULL)
352 ASSERT_TRUE(sDevice->import_keypair != NULL)
355 ASSERT_TRUE(sDevice->get_keypair_public != NULL)
358 ASSERT_TRUE(sDevice->sign_data != NULL)
361 ASSERT_TRUE(sDevice->verify_data != NULL)
366 ASSERT_EQ(0, keymaster_close(sDevice));
370 static keymaster_device_t* sDevice;
373 keymaster_device_t* KeymasterBaseTest::sDevice = NULL;
405 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
407 UniqueKey key(&sDevice, key_blob, key_blob_length);
412 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
452 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
454 UniqueKey key(&sDevice, key_blob, key_blob_length);
459 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
496 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length))
511 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length))
520 sDevice->import_keypair(sDevice, TEST_RSA_KEY_1, sizeof(TEST_RSA_KEY_1),
523 UniqueKey key(&sDevice, key_blob, key_blob_length);
528 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
556 sDevice->import_keypair(sDevice, TEST_EC_KEY_1, sizeof(TEST_EC_KEY_1),
559 UniqueKey key(&sDevice, key_blob, key_blob_length);
564 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
592 sDevice->import_keypair(sDevice, BOGUS_KEY_1, sizeof(BOGUS_KEY_1),
602 sDevice->import_keypair(sDevice, NULL, 0,
615 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
618 UniqueKey key(&sDevice, key_blob, key_blob_length);
623 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
637 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
640 UniqueKey key(&sDevice, key_blob, key_blob_length);
645 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
658 sDevice->get_keypair_public(sDevice, NULL, 0,
672 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
675 UniqueKey key(&sDevice, key_blob, key_blob_length);
678 sDevice->get_keypair_public(sDevice, key.get(), key.length(),
691 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
694 UniqueKey key(&sDevice, key_blob, key_blob_length);
697 sDevice->get_keypair_public(sDevice, key.get(), key.length(),
710 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
713 UniqueKey key(&sDevice, key_blob, key_blob_length);
727 if (sDevice->delete_keypair != NULL) {
729 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
734 ASSERT_EQ(0, sDevice->delete_keypair(sDevice, key_blob, key_blob_length))
737 ASSERT_EQ(-1, sDevice->delete_keypair(sDevice, key_blob, key_blob_length))
747 if (sDevice->delete_keypair != NULL) {
748 ASSERT_EQ(-1, sDevice->delete_keypair(sDevice, NULL, 0))
860 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
863 UniqueKey key(&sDevice, key_blob, key_blob_length);
877 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
900 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
903 UniqueKey key(&sDevice, key_blob, key_blob_length);
916 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
925 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
948 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
951 UniqueKey key(&sDevice, key_blob, key_blob_length);
965 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
984 sDevice->sign_data(sDevice, &params, NULL, 0,
998 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1001 UniqueKey key(&sDevice, key_blob, key_blob_length);
1012 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
1026 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1029 UniqueKey key(&sDevice, key_blob, key_blob_length);
1043 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
1057 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1060 UniqueKey key(&sDevice, key_blob, key_blob_length);
1074 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1088 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1091 UniqueKey key(&sDevice, key_blob, key_blob_length);
1104 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
1111 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1125 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1128 UniqueKey key(&sDevice, key_blob, key_blob_length);
1136 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1150 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1153 UniqueKey key(&sDevice, key_blob, key_blob_length);
1160 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1179 sDevice->verify_data(sDevice, &params, NULL, 0,
1190 sDevice->import_keypair(sDevice, TEST_SIGN_RSA_KEY_1, sizeof(TEST_SIGN_RSA_KEY_1),
1193 UniqueKey key(&sDevice, key_blob, key_blob_length);
1204 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1218 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1221 UniqueKey key(&sDevice, key_blob, key_blob_length);
1232 sDevice->verify_data(sDevice, &params, key.get(), key.length(),
1243 if (sDevice->delete_all == NULL) {
1251 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1254 UniqueKey key1(&sDevice, key1_blob, key1_blob_length);
1260 sDevice->import_keypair(sDevice, testKey2.get(), testKey2.length(),
1263 UniqueKey key2(&sDevice, key2_blob, key2_blob_length);
1265 ASSERT_EQ(0, sDevice->delete_all(sDevice))
1273 sDevice->get_keypair_public(sDevice, key1_blob, key1_blob_length,
1278 sDevice->get_keypair_public(sDevice, key2_blob, key2_blob_length,