HomeSort by relevance Sort by last modified time
    Searched refs:keyBlob (Results 1 - 9 of 9) sorted by null

  /system/security/softkeymaster/include/keymaster/
softkeymaster.h 23 const void* key_params, uint8_t** keyBlob, size_t* keyBlobLength);
32 int openssl_sign_data(const keymaster_device_t* dev, const void* params, const uint8_t* keyBlob,
36 int openssl_verify_data(const keymaster_device_t* dev, const void* params, const uint8_t* keyBlob,
  /system/security/keystore/
keystore.cpp 1082 ResponseCode get(const char* filename, Blob* keyBlob, const BlobType type, uid_t uid) {
1084 ResponseCode rc = keyBlob->readBlob(filename, userState->getDecryptionKey(),
1090 const uint8_t version = keyBlob->getVersion();
1096 if (upgradeBlob(filename, keyBlob, version, type, uid)) {
1097 if ((rc = this->put(filename, keyBlob, uid)) != NO_ERRO
    [all...]
  /system/core/libutils/
BlobCache.cpp 88 sp<Blob> keyBlob(new Blob(key, keySize, true));
104 mCacheEntries.add(CacheEntry(keyBlob, valueBlob));
171 sp<Blob> keyBlob = e.getKey();
173 size += align4(sizeof(EntryHeader) + keyBlob->getSize() +
196 sp<Blob> keyBlob = e.getKey();
198 size_t keySize = keyBlob->getSize();
213 memcpy(eheader->mData, keyBlob->getData(), keySize);
  /system/security/softkeymaster/
keymaster_openssl.cpp 124 static int wrap_key(EVP_PKEY* pkey, int type, uint8_t** keyBlob, size_t* keyBlobLength) {
172 *keyBlob = derData.release();
177 static EVP_PKEY* unwrap_key(const uint8_t* keyBlob, const size_t keyBlobLength) {
180 const uint8_t* p = keyBlob;
181 const uint8_t* const end = keyBlob + keyBlobLength;
183 if (keyBlob == NULL) {
383 uint8_t** keyBlob, size_t* keyBlobLength) {
410 if (wrap_key(pkey.get(), EVP_PKEY_type(pkey->type), keyBlob, keyBlobLength)) {
589 const keymaster_device_t*, const void* params, const uint8_t* keyBlob,
600 Unique_EVP_PKEY pkey(unwrap_key(keyBlob, keyBlobLength))
    [all...]
  /hardware/samsung_slsi/exynos5/libkeymaster/
keymaster_mobicore.cpp 97 uint8_t** keyBlob, size_t* keyBlobLength) {
131 *keyBlob = keyDataPtr.release();
333 const uint8_t* keyBlob, const size_t keyBlobLength,
366 ret = TEE_RSASign(keyBlob, keyBlobLength, (const uint8_t *)tmpData, dataLength, signedDataPtr.get(),
381 const uint8_t* keyBlob, const size_t keyBlobLength,
408 ret = TEE_RSAVerify(keyBlob, keyBlobLength, (const uint8_t*)tmpSignedData, signedDataLength, (const uint8_t *)tmpSig,
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 103 const uint8_t* keyBlob, const size_t keyBlobLength,
106 struct qcom_km_key_blob * keyblob_ptr = (struct qcom_km_key_blob *)keyBlob;
113 if (keyBlob == NULL) {
118 // Should be large enough for keyblob data:
317 uint8_t** keyBlob, size_t* keyBlobLength) {
331 if (keyBlob == NULL || keyBlobLength == NULL) {
378 *keyBlob = keydata.release();
386 uint8_t** keyBlob, size_t* keyBlobLength)
396 } else if (keyBlob == NULL || keyBlobLength == NULL) {
461 *keyBlob = keydata.release()
    [all...]
  /device/asus/grouper/keymaster/
keymaster_grouper.cpp 302 static int keyblob_restore(const CryptoSession* session, const uint8_t* keyBlob,
304 if (keyBlob == NULL) {
316 const uint8_t* p = keyBlob;
826 const uint8_t* keyBlob, const size_t keyBlobLength,
829 ALOGV("tee_verify_data(%p, %p, %llu, %p, %llu, %p, %llu)", dev, keyBlob,
843 if (keyblob_restore(&session, keyBlob, keyBlobLength, &publicKey, &privateKey)) {
  /device/asus/grouper/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 302 static int keyblob_restore(const CryptoSession* session, const uint8_t* keyBlob,
304 if (keyBlob == NULL) {
316 const uint8_t* p = keyBlob;
826 const uint8_t* keyBlob, const size_t keyBlobLength,
829 ALOGV("tee_verify_data(%p, %p, %llu, %p, %llu, %p, %llu)", dev, keyBlob,
843 if (keyblob_restore(&session, keyBlob, keyBlobLength, &publicKey, &privateKey)) {
  /device/asus/tilapia/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 302 static int keyblob_restore(const CryptoSession* session, const uint8_t* keyBlob,
304 if (keyBlob == NULL) {
316 const uint8_t* p = keyBlob;
826 const uint8_t* keyBlob, const size_t keyBlobLength,
829 ALOGV("tee_verify_data(%p, %p, %llu, %p, %llu, %p, %llu)", dev, keyBlob,
843 if (keyblob_restore(&session, keyBlob, keyBlobLength, &publicKey, &privateKey)) {

Completed in 2635 milliseconds