HomeSort by relevance Sort by last modified time
    Searched refs:key_blob (Results 1 - 25 of 30) sorted by null

1 2

  /system/security/keystore/
keyblob_utils.cpp 22 * to a hardware keymaster implementation, the first 4 bytes of the key_blob
45 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length) {
50 memcpy(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
52 return key_blob + sizeof(SOFT_KEY_MAGIC);
55 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length) {
60 return !memcmp(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
  /system/keymaster/
google_keymaster_messages.cpp 63 delete[] key_blob.key_material;
67 return sizeof(uint32_t) /* key size */ + key_blob.key_material_size +
72 buf = append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size);
78 delete[] key_blob.key_material;
79 key_blob.key_material = NULL;
81 if (!copy_size_and_data_from_buf(buf_ptr, end, &key_blob.key_material_size,
85 key_blob.key_material = deserialized_key_material.release();
90 delete[] key_blob.key_material;
94 delete[] key_blob.key_material
    [all...]
google_keymaster_messages_test.cpp 125 rsp.key_blob.key_material = dup_array(TEST_DATA);
126 rsp.key_blob.key_material_size = array_length(TEST_DATA);
138 rsp.key_blob.key_material = dup_array(TEST_DATA);
139 rsp.key_blob.key_material_size = array_length(TEST_DATA);
146 EXPECT_EQ(0U, deserialized->key_blob.key_material_size);
156 EXPECT_EQ(3U, deserialized->key_blob.key_material_size);
157 EXPECT_EQ(0, memcmp(deserialized->key_blob.key_material, "foo", 3));
179 EXPECT_EQ(3U, deserialized->key_blob.key_material_size);
180 EXPECT_EQ(0, memcmp(deserialized->key_blob.key_material, "foo", 3));
269 EXPECT_EQ(msg.key_blob.key_material_size, deserialized->key_blob.key_material_size)
    [all...]
google_keymaster_test.cpp 367 req.SetKeyMaterial(gen_rsp.key_blob);
406 SignMessage(generate_response_.key_blob, message, size);
409 void SignMessage(const keymaster_key_blob_t& key_blob, const void* message, size_t size) {
412 begin_request.SetKeyMaterial(key_blob);
438 const keymaster_key_blob_t& key_blob() { return generate_response_.key_blob; } function in class:keymaster::test::SigningOperationsTest
441 uint8_t* tmp = const_cast<uint8_t*>(generate_response_.key_blob.key_material);
442 ++tmp[generate_response_.key_blob.key_material_size / 2];
443 return generate_response_.key_blob;
463 begin_request.SetKeyMaterial(key_blob());
    [all...]
Android.mk 34 key_blob.cpp \
54 key_blob.cpp \
dsa_operation.h 24 #include <keymaster/key_blob.h>
ecdsa_operation.h 24 #include <keymaster/key_blob.h>
rsa_operation.h 22 #include <keymaster/key_blob.h>
google_keymaster.cpp 29 #include <keymaster/key_blob.h>
170 response->error = SerializeKey(key.get(), origin(), &response->key_blob, &response->enforced,
181 LoadKeyBlob(request.key_blob, request.additional_params, &(response->error)));
196 UniquePtr<Key> key(LoadKey(request.key_blob, request.additional_params, &response->error));
273 LoadKey(request.key_blob, request.additional_params, &response->error));
295 response->error = SerializeKey(key.get(), KM_ORIGIN_IMPORTED, &response->key_blob,
key_blob.cpp 23 #include <keymaster/key_blob.h>
103 KeyBlob::KeyBlob(const uint8_t* key_blob, size_t blob_size)
111 if (!Deserialize(&key_blob, key_blob + blob_size))
Makefile 40 key_blob.cpp \
109 key_blob.o \
132 key_blob.o \
  /external/wpa_supplicant_8/src/crypto/
crypto_cryptoapi.c 164 } key_blob; local
167 key_blob.hdr.bType = PLAINTEXTKEYBLOB;
168 key_blob.hdr.bVersion = CUR_BLOB_VERSION;
169 key_blob.hdr.reserved = 0;
170 key_blob.hdr.aiKeyAlg = CALG_DES;
171 key_blob.len = 8;
177 key_blob.key[i] = (tmp >> i) | next | 1;
180 key_blob.key[i] = next | 1;
189 if (!CryptImportKey(prov, (BYTE *) &key_blob, sizeof(key_blob), 0, 0
243 } key_blob; local
361 } key_blob; local
516 } key_blob; local
    [all...]
  /system/security/keystore/include/keystore/
keystore.h 67 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length);
72 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length);
  /external/chromium_org/net/http/
des.cc 186 KeyBlob key_blob; local
187 key_blob.header.bType = PLAINTEXTKEYBLOB;
188 key_blob.header.bVersion = CUR_BLOB_VERSION;
189 key_blob.header.reserved = 0;
190 key_blob.header.aiKeyAlg = CALG_DES;
191 key_blob.key_size = 8; // 64 bits
192 memcpy(key_blob.key_data, key, 8);
196 reinterpret_cast<BYTE*>(&key_blob),
197 sizeof key_blob, 0, 0, key.receive());
199 SecureZeroMemory(key_blob.key_data, sizeof key_blob.key_data)
    [all...]
  /hardware/libhardware/include/hardware/
keymaster.h 204 uint8_t** key_blob, size_t* key_blob_length);
216 uint8_t** key_blob, size_t* key_blob_length);
226 const uint8_t* key_blob, const size_t key_blob_length,
238 const uint8_t* key_blob, const size_t key_blob_length);
259 const uint8_t* key_blob, const size_t key_blob_length,
271 const uint8_t* key_blob, const size_t key_blob_length,
  /system/security/softkeymaster/include/keymaster/
softkeymaster.h 26 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length);
28 int openssl_get_keypair_public(const struct keymaster_device* dev, const uint8_t* key_blob,
  /hardware/qcom/keymaster/
keymaster_qcom.h 83 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
98 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
101 * key_blob : key blob data
107 qcom_km_key_blob_t key_blob; member in struct:keymaster_gen_keypair_resp
118 * "key_blob" and is opaque
133 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
136 * key_blob : key blob data
142 qcom_km_key_blob_t key_blob; member in struct:keymaster_import_keypair_resp
155 * key_blob : Key data information (in shared buffer)
162 qcom_km_key_blob_t key_blob; member in struct:keymaster_sign_data_cmd
201 qcom_km_key_blob_t key_blob; member in struct:keymaster_verify_data_cmd
    [all...]
  /system/keymaster/include/keymaster/
google_keymaster_messages.h 121 key_blob.key_material = NULL;
122 key_blob.key_material_size = 0;
130 keymaster_key_blob_t key_blob; member in struct:keymaster::GenerateKeyResponse
136 GetKeyCharacteristicsRequest() { key_blob.key_material = NULL; }
148 keymaster_key_blob_t key_blob; member in struct:keymaster::GetKeyCharacteristicsRequest
162 BeginOperationRequest() { key_blob.key_material = NULL; }
163 ~BeginOperationRequest() { delete[] key_blob.key_material; }
175 keymaster_key_blob_t key_blob; member in struct:keymaster::BeginOperationRequest
246 ImportKeyResponse() { key_blob.key_material = NULL; }
247 ~ImportKeyResponse() { delete[] key_blob.key_material;
258 keymaster_key_blob_t key_blob; member in struct:keymaster::ImportKeyResponse
278 keymaster_key_blob_t key_blob; member in struct:keymaster::ExportKeyRequest
    [all...]
key_blob.h 76 * even keeping it. The KeyBlob does *not* take ownership of key_blob.
80 KeyBlob(const uint8_t* key_blob, size_t blob_size);
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 402 uint8_t* key_blob; local
406 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
408 UniqueKey key(&sDevice, key_blob, key_blob_length);
413 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
449 uint8_t* key_blob; local
453 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
455 UniqueKey key(&sDevice, key_blob, key_blob_length);
460 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
493 uint8_t* key_blob; local
497 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length)
508 uint8_t* key_blob; local
517 uint8_t* key_blob; local
553 uint8_t* key_blob; local
589 uint8_t* key_blob; local
599 uint8_t* key_blob; local
609 uint8_t* key_blob; local
631 uint8_t* key_blob; local
653 uint8_t* key_blob; local
666 uint8_t* key_blob; local
685 uint8_t* key_blob; local
704 uint8_t* key_blob; local
718 uint8_t* key_blob; local
854 uint8_t* key_blob; local
894 uint8_t* key_blob; local
942 uint8_t* key_blob; local
992 uint8_t* key_blob; local
1020 uint8_t* key_blob; local
1051 uint8_t* key_blob; local
1082 uint8_t* key_blob; local
1119 uint8_t* key_blob; local
1144 uint8_t* key_blob; local
1187 uint8_t* key_blob; local
1212 uint8_t* key_blob; local
    [all...]
  /external/chromium_org/crypto/
hmac_win.cc 145 KeyBlob* key_blob = reinterpret_cast<KeyBlob*>(&key_blob_storage[0]); local
146 key_blob->header.bType = PLAINTEXTKEYBLOB;
147 key_blob->header.bVersion = CUR_BLOB_VERSION;
148 key_blob->header.reserved = 0;
149 key_blob->header.aiKeyAlg = CALG_RC2;
150 key_blob->key_size = static_cast<DWORD>(key_length);
151 memcpy(key_blob->key_data, key, key_length);
161 SecureZeroMemory(key_blob->key_data, key_length);
  /device/asus/grouper/keymaster/
keymaster_grouper.cpp 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) {
263 *key_blob = handleBlob->get();
332 uint8_t** key_blob, size_t* key_blob_length) {
406 return keyblob_save(objId.get(), key_blob, key_blob_length);
411 uint8_t** key_blob, size_t* key_blob_length) {
610 return keyblob_save(objId.get(), key_blob, key_blob_length);
614 const uint8_t* key_blob, const size_t key_blob_length,
622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) {
726 const uint8_t* key_blob, const size_t key_blob_length) {
733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey))
    [all...]
  /device/asus/grouper/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) {
263 *key_blob = handleBlob->get();
332 uint8_t** key_blob, size_t* key_blob_length) {
406 return keyblob_save(objId.get(), key_blob, key_blob_length);
411 uint8_t** key_blob, size_t* key_blob_length) {
610 return keyblob_save(objId.get(), key_blob, key_blob_length);
614 const uint8_t* key_blob, const size_t key_blob_length,
622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) {
726 const uint8_t* key_blob, const size_t key_blob_length) {
733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey))
    [all...]
  /device/asus/tilapia/self-extractors/nvidia/staging/keymaster/
keymaster_grouper.cpp 250 static int keyblob_save(ByteArray* objId, uint8_t** key_blob, size_t* key_blob_length) {
263 *key_blob = handleBlob->get();
332 uint8_t** key_blob, size_t* key_blob_length) {
406 return keyblob_save(objId.get(), key_blob, key_blob_length);
411 uint8_t** key_blob, size_t* key_blob_length) {
610 return keyblob_save(objId.get(), key_blob, key_blob_length);
614 const uint8_t* key_blob, const size_t key_blob_length,
622 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey)) {
726 const uint8_t* key_blob, const size_t key_blob_length) {
733 if (keyblob_restore(&session, key_blob, key_blob_length, &publicKey, &privateKey))
    [all...]
  /hardware/samsung_slsi/exynos5/libkeymaster/
keymaster_mobicore.cpp 138 uint8_t** key_blob, size_t* key_blob_length) {
147 } else if (key_blob == NULL || key_blob_length == NULL) {
227 *key_blob = outPtr.release();
233 const uint8_t* key_blob, const size_t key_blob_length,
259 ret = TEE_GetPubKey(key_blob, key_blob_length, binModPtr.get(), &bin_mod_len, binExpPtr.get(),

Completed in 573 milliseconds

1 2