Home | History | Annotate | Download | only in keymaster

Lines Matching refs:sDevice

344         ASSERT_EQ(0, keymaster0_open(mod, &sDevice))
350 ASSERT_TRUE(sDevice->generate_keypair != NULL)
353 ASSERT_TRUE(sDevice->import_keypair != NULL)
356 ASSERT_TRUE(sDevice->get_keypair_public != NULL)
359 ASSERT_TRUE(sDevice->sign_data != NULL)
362 ASSERT_TRUE(sDevice->verify_data != NULL)
367 ASSERT_EQ(0, keymaster0_close(sDevice));
371 static keymaster0_device_t* sDevice;
374 keymaster0_device_t* KeymasterBaseTest::sDevice = NULL;
406 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
408 UniqueKey key(&sDevice, key_blob, key_blob_length);
413 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
453 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
455 UniqueKey key(&sDevice, key_blob, key_blob_length);
460 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
497 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length))
512 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length))
521 sDevice->import_keypair(sDevice, TEST_RSA_KEY_1, sizeof(TEST_RSA_KEY_1),
524 UniqueKey key(&sDevice, key_blob, key_blob_length);
529 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
557 sDevice->import_keypair(sDevice, TEST_EC_KEY_1, sizeof(TEST_EC_KEY_1),
560 UniqueKey key(&sDevice, key_blob, key_blob_length);
565 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
593 sDevice->import_keypair(sDevice, BOGUS_KEY_1, sizeof(BOGUS_KEY_1),
603 sDevice->import_keypair(sDevice, NULL, 0,
616 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
619 UniqueKey key(&sDevice, key_blob, key_blob_length);
624 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
638 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
641 UniqueKey key(&sDevice, key_blob, key_blob_length);
646 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
659 sDevice->get_keypair_public(sDevice, NULL, 0,
673 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
676 UniqueKey key(&sDevice, key_blob, key_blob_length);
679 sDevice->get_keypair_public(sDevice, key.get(), key.length(),
692 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
695 UniqueKey key(&sDevice, key_blob, key_blob_length);
698 sDevice->get_keypair_public(sDevice, key.get(), key.length(),
711 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
714 UniqueKey key(&sDevice, key_blob, key_blob_length);
728 if (sDevice->delete_keypair != NULL) {
730 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
735 ASSERT_EQ(0, sDevice->delete_keypair(sDevice, key_blob, key_blob_length))
738 ASSERT_EQ(-1, sDevice->delete_keypair(sDevice, key_blob, key_blob_length))
748 if (sDevice->delete_keypair != NULL) {
749 ASSERT_EQ(-1, sDevice->delete_keypair(sDevice, NULL, 0))
861 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
864 UniqueKey key(&sDevice, key_blob, key_blob_length);
878 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
901 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
904 UniqueKey key(&sDevice, key_blob, key_blob_length);
917 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
926 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
949 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
952 UniqueKey key(&sDevice, key_blob, key_blob_length);
966 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
985 sDevice->sign_data(sDevice, &params, NULL, 0,
999 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1002 UniqueKey key(&sDevice, key_blob, key_blob_length);
1013 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
1027 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1030 UniqueKey key(&sDevice, key_blob, key_blob_length);
1044 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
1058 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1061 UniqueKey key(&sDevice, key_blob, key_blob_length);
1075 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1089 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1092 UniqueKey key(&sDevice, key_blob, key_blob_length);
1105 sDevice->sign_data(sDevice, &params, key_blob, key_blob_length,
1112 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1126 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1129 UniqueKey key(&sDevice, key_blob, key_blob_length);
1137 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1151 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1154 UniqueKey key(&sDevice, key_blob, key_blob_length);
1161 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1180 sDevice->verify_data(sDevice, &params, NULL, 0,
1191 sDevice->import_keypair(sDevice, TEST_SIGN_RSA_KEY_1, sizeof(TEST_SIGN_RSA_KEY_1),
1194 UniqueKey key(&sDevice, key_blob, key_blob_length);
1205 sDevice->verify_data(sDevice, &params, key_blob, key_blob_length,
1219 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1222 UniqueKey key(&sDevice, key_blob, key_blob_length);
1233 sDevice->verify_data(sDevice, &params, key.get(), key.length(),
1244 if (sDevice->delete_all == NULL) {
1252 sDevice->import_keypair(sDevice, testKey.get(), testKey.length(),
1255 UniqueKey key1(&sDevice, key1_blob, key1_blob_length);
1261 sDevice->import_keypair(sDevice, testKey2.get(), testKey2.length(),
1264 UniqueKey key2(&sDevice, key2_blob, key2_blob_length);
1266 ASSERT_EQ(0, sDevice->delete_all(sDevice))
1274 sDevice->get_keypair_public(sDevice, key1_blob, key1_blob_length,
1279 sDevice->get_keypair_public(sDevice, key2_blob, key2_blob_length,