/system/security/keystore/ |
keyblob_utils.cpp | 22 * to a hardware keymaster implementation, the first 4 bytes of the key_blob 45 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length) { 50 memcpy(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC)); 52 return key_blob + sizeof(SOFT_KEY_MAGIC); 55 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length) { 60 return !memcmp(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
|
/system/keymaster/ |
google_keymaster_messages.cpp | 63 delete[] key_blob.key_material; 67 return sizeof(uint32_t) /* key size */ + key_blob.key_material_size + 72 buf = append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size); 78 delete[] key_blob.key_material; 79 key_blob.key_material = NULL; 81 if (!copy_size_and_data_from_buf(buf_ptr, end, &key_blob.key_material_size, 85 key_blob.key_material = deserialized_key_material.release(); 90 delete[] key_blob.key_material; 94 delete[] key_blob.key_material [all...] |
google_keymaster_messages_test.cpp | 125 rsp.key_blob.key_material = dup_array(TEST_DATA); 126 rsp.key_blob.key_material_size = array_length(TEST_DATA); 138 rsp.key_blob.key_material = dup_array(TEST_DATA); 139 rsp.key_blob.key_material_size = array_length(TEST_DATA); 146 EXPECT_EQ(0U, deserialized->key_blob.key_material_size); 156 EXPECT_EQ(3U, deserialized->key_blob.key_material_size); 157 EXPECT_EQ(0, memcmp(deserialized->key_blob.key_material, "foo", 3)); 179 EXPECT_EQ(3U, deserialized->key_blob.key_material_size); 180 EXPECT_EQ(0, memcmp(deserialized->key_blob.key_material, "foo", 3)); 269 EXPECT_EQ(msg.key_blob.key_material_size, deserialized->key_blob.key_material_size) [all...] |
google_keymaster_test.cpp | 367 req.SetKeyMaterial(gen_rsp.key_blob); 406 SignMessage(generate_response_.key_blob, message, size); 409 void SignMessage(const keymaster_key_blob_t& key_blob, const void* message, size_t size) { 412 begin_request.SetKeyMaterial(key_blob); 438 const keymaster_key_blob_t& key_blob() { return generate_response_.key_blob; } function in class:keymaster::test::SigningOperationsTest 441 uint8_t* tmp = const_cast<uint8_t*>(generate_response_.key_blob.key_material); 442 ++tmp[generate_response_.key_blob.key_material_size / 2]; 443 return generate_response_.key_blob; 463 begin_request.SetKeyMaterial(key_blob()); [all...] |
Android.mk | 34 key_blob.cpp \ 54 key_blob.cpp \
|
dsa_operation.h | 24 #include <keymaster/key_blob.h>
|
ecdsa_operation.h | 24 #include <keymaster/key_blob.h>
|
rsa_operation.h | 22 #include <keymaster/key_blob.h>
|
google_keymaster.cpp | 29 #include <keymaster/key_blob.h> 170 response->error = SerializeKey(key.get(), origin(), &response->key_blob, &response->enforced, 181 LoadKeyBlob(request.key_blob, request.additional_params, &(response->error))); 196 UniquePtr<Key> key(LoadKey(request.key_blob, request.additional_params, &response->error)); 273 LoadKey(request.key_blob, request.additional_params, &response->error)); 295 response->error = SerializeKey(key.get(), KM_ORIGIN_IMPORTED, &response->key_blob,
|
key_blob.cpp | 23 #include <keymaster/key_blob.h> 103 KeyBlob::KeyBlob(const uint8_t* key_blob, size_t blob_size) 111 if (!Deserialize(&key_blob, key_blob + blob_size))
|
Makefile | 40 key_blob.cpp \ 109 key_blob.o \ 132 key_blob.o \
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 164 } key_blob; local 167 key_blob.hdr.bType = PLAINTEXTKEYBLOB; 168 key_blob.hdr.bVersion = CUR_BLOB_VERSION; 169 key_blob.hdr.reserved = 0; 170 key_blob.hdr.aiKeyAlg = CALG_DES; 171 key_blob.len = 8; 177 key_blob.key[i] = (tmp >> i) | next | 1; 180 key_blob.key[i] = next | 1; 189 if (!CryptImportKey(prov, (BYTE *) &key_blob, sizeof(key_blob), 0, 0 243 } key_blob; local 361 } key_blob; local 516 } key_blob; local [all...] |
/system/security/keystore/include/keystore/ |
keystore.h | 67 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length); 72 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length);
|
/external/chromium_org/net/http/ |
des.cc | 186 KeyBlob key_blob; local 187 key_blob.header.bType = PLAINTEXTKEYBLOB; 188 key_blob.header.bVersion = CUR_BLOB_VERSION; 189 key_blob.header.reserved = 0; 190 key_blob.header.aiKeyAlg = CALG_DES; 191 key_blob.key_size = 8; // 64 bits 192 memcpy(key_blob.key_data, key, 8); 196 reinterpret_cast<BYTE*>(&key_blob), 197 sizeof key_blob, 0, 0, key.receive()); 199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data) [all...] |
/hardware/libhardware/include/hardware/ |
keymaster.h | 204 uint8_t** key_blob, size_t* key_blob_length); 216 uint8_t** key_blob, size_t* key_blob_length); 226 const uint8_t* key_blob, const size_t key_blob_length, 238 const uint8_t* key_blob, const size_t key_blob_length); 259 const uint8_t* key_blob, const size_t key_blob_length, 271 const uint8_t* key_blob, const size_t key_blob_length,
|
/system/security/softkeymaster/include/keymaster/ |
softkeymaster.h | 26 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length); 28 int openssl_get_keypair_public(const struct keymaster_device* dev, const uint8_t* key_blob,
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 83 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 98 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 101 * key_blob : key blob data 107 qcom_km_key_blob_t key_blob; member in struct:keymaster_gen_keypair_resp 118 * "key_blob" and is opaque 133 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 136 * key_blob : key blob data 142 qcom_km_key_blob_t key_blob; member in struct:keymaster_import_keypair_resp 155 * key_blob : Key data information (in shared buffer) 162 qcom_km_key_blob_t key_blob; member in struct:keymaster_sign_data_cmd 201 qcom_km_key_blob_t key_blob; member in struct:keymaster_verify_data_cmd [all...] |
/system/keymaster/include/keymaster/ |
google_keymaster_messages.h | 121 key_blob.key_material = NULL; 122 key_blob.key_material_size = 0; 130 keymaster_key_blob_t key_blob; member in struct:keymaster::GenerateKeyResponse 136 GetKeyCharacteristicsRequest() { key_blob.key_material = NULL; } 148 keymaster_key_blob_t key_blob; member in struct:keymaster::GetKeyCharacteristicsRequest 162 BeginOperationRequest() { key_blob.key_material = NULL; } 163 ~BeginOperationRequest() { delete[] key_blob.key_material; } 175 keymaster_key_blob_t key_blob; member in struct:keymaster::BeginOperationRequest 246 ImportKeyResponse() { key_blob.key_material = NULL; } 247 ~ImportKeyResponse() { delete[] key_blob.key_material; 258 keymaster_key_blob_t key_blob; member in struct:keymaster::ImportKeyResponse 278 keymaster_key_blob_t key_blob; member in struct:keymaster::ExportKeyRequest [all...] |
key_blob.h | 76 * even keeping it. The KeyBlob does *not* take ownership of key_blob. 80 KeyBlob(const uint8_t* key_blob, size_t blob_size);
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 402 uint8_t* key_blob; local 406 sDevice->generate_keypair(sDevice, key_type, ¶ms, &key_blob, &key_blob_length)) 408 UniqueKey key(&sDevice, key_blob, key_blob_length); 413 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length, 449 uint8_t* key_blob; local 453 sDevice->generate_keypair(sDevice, key_type, ¶ms, &key_blob, &key_blob_length)) 455 UniqueKey key(&sDevice, key_blob, key_blob_length); 460 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length, 493 uint8_t* key_blob; local 497 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length) 508 uint8_t* key_blob; local 517 uint8_t* key_blob; local 553 uint8_t* key_blob; local 589 uint8_t* key_blob; local 599 uint8_t* key_blob; local 609 uint8_t* key_blob; local 631 uint8_t* key_blob; local 653 uint8_t* key_blob; local 666 uint8_t* key_blob; local 685 uint8_t* key_blob; local 704 uint8_t* key_blob; local 718 uint8_t* key_blob; local 854 uint8_t* key_blob; local 894 uint8_t* key_blob; local 942 uint8_t* key_blob; local 992 uint8_t* key_blob; local 1020 uint8_t* key_blob; local 1051 uint8_t* key_blob; local 1082 uint8_t* key_blob; local 1119 uint8_t* key_blob; local 1144 uint8_t* key_blob; local 1187 uint8_t* key_blob; local 1212 uint8_t* key_blob; local [all...] |
/external/chromium_org/crypto/ |
hmac_win.cc | 145 KeyBlob* key_blob = reinterpret_cast<KeyBlob*>(&key_blob_storage[0]); local 146 key_blob->header.bType = PLAINTEXTKEYBLOB; 147 key_blob->header.bVersion = CUR_BLOB_VERSION; 148 key_blob->header.reserved = 0; 149 key_blob->header.aiKeyAlg = CALG_RC2; 150 key_blob->key_size = static_cast<DWORD>(key_length); 151 memcpy(key_blob->key_data, key, key_length); 161 SecureZeroMemory(key_blob->key_data, key_length);
|
/device/asus/grouper/keymaster/ |
keymaster_grouper.cpp | 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) { 263 *key_blob = handleBlob->get(); 332 uint8_t** key_blob, size_t* key_blob_length) { 406 return keyblob_save(objId.get(), key_blob, key_blob_length); 411 uint8_t** key_blob, size_t* key_blob_length) { 610 return keyblob_save(objId.get(), key_blob, key_blob_length); 614 const uint8_t* key_blob, const size_t key_blob_length, 622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) { 726 const uint8_t* key_blob, const size_t key_blob_length) { 733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) [all...] |
/device/asus/grouper/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) { 263 *key_blob = handleBlob->get(); 332 uint8_t** key_blob, size_t* key_blob_length) { 406 return keyblob_save(objId.get(), key_blob, key_blob_length); 411 uint8_t** key_blob, size_t* key_blob_length) { 610 return keyblob_save(objId.get(), key_blob, key_blob_length); 614 const uint8_t* key_blob, const size_t key_blob_length, 622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) { 726 const uint8_t* key_blob, const size_t key_blob_length) { 733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) [all...] |
/device/asus/tilapia/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) { 263 *key_blob = handleBlob->get(); 332 uint8_t** key_blob, size_t* key_blob_length) { 406 return keyblob_save(objId.get(), key_blob, key_blob_length); 411 uint8_t** key_blob, size_t* key_blob_length) { 610 return keyblob_save(objId.get(), key_blob, key_blob_length); 614 const uint8_t* key_blob, const size_t key_blob_length, 622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) { 726 const uint8_t* key_blob, const size_t key_blob_length) { 733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) [all...] |
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 138 uint8_t** key_blob, size_t* key_blob_length) { 147 } else if (key_blob == NULL || key_blob_length == NULL) { 227 *key_blob = outPtr.release(); 233 const uint8_t* key_blob, const size_t key_blob_length, 259 ret = TEE_GetPubKey(key_blob, key_blob_length, binModPtr.get(), &bin_mod_len, binExpPtr.get(),
|