/system/keymaster/ |
symmetric_key.cpp | 51 KeymasterKeyBlob key_material(key_data_size); 52 if (!key_material.key_material) 55 error = context_->GenerateRandom(key_material.writable_data(), key_data_size); 61 return context_->CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob, 110 SymmetricKey::SymmetricKey(const KeymasterKeyBlob& key_material, 117 uint8_t* tmp = dup_buffer(key_material.key_material, key_material.key_material_size); 120 key_data_size_ = key_material.key_material_size 131 keymaster_error_t SymmetricKey::key_material(UniquePtr<uint8_t[]>* key_material, function in class:keymaster::SymmetricKey [all...] |
integrity_assured_key_blob.h | 28 keymaster_error_t SerializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_material, 36 KeymasterKeyBlob* key_material,
|
aes_key.h | 35 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material, 52 AesKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced, 54 : SymmetricKey(key_material, hw_enforced, sw_enforced, error) {}
|
hmac_key.h | 30 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material, 48 HmacKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced, 50 : SymmetricKey(key_material, hw_enforced, sw_enforced, error) {}
|
asymmetric_key_factory.cpp | 41 keymaster_error_t AsymmetricKeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 50 const uint8_t* tmp = key_material.key_material; 52 d2i_PrivateKey(evp_key_type(), NULL /* pkey */, &tmp, key_material.key_material_size);
|
openssl_utils.cpp | 61 const KeymasterKeyBlob& key_material, 67 return convert_pkcs8_blob_to_evp(key_material.key_material, key_material.key_material_size,
|
ec_keymaster0_key.cpp | 53 KeymasterKeyBlob key_material; local 54 if (!engine_->GenerateEcKey(key_size, &key_material)) 63 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 99 keymaster_error_t EcdsaKeymaster0KeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 107 return super::LoadKey(key_material, hw_enforced, sw_enforced, key); 109 unique_ptr<EC_KEY, EC_Delete> ec_key(engine_->BlobToEcKey(key_material)); 128 keymaster_error_t EcKeymaster0Key::key_material(UniquePtr<uint8_t[]>* material, function in class:keymaster::EcKeymaster0Key 131 return super::key_material(material, size); 138 material->reset(dup_buffer(blob->key_material, *size));
|
rsa_keymaster0_key.cpp | 61 KeymasterKeyBlob key_material; local 62 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material)) 72 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 111 keymaster_error_t RsaKeymaster0KeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 119 return super::LoadKey(key_material, hw_enforced, sw_enforced, key); 121 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material)); 142 keymaster_error_t RsaKeymaster0Key::key_material(UniquePtr<uint8_t[]>* material, function in class:keymaster::RsaKeymaster0Key 145 return super::key_material(material, size); 152 material->reset(dup_buffer(blob->key_material, *size));
|
key.h | 34 virtual keymaster_error_t key_material(UniquePtr<uint8_t[]>*, size_t* size) const = 0;
|
symmetric_key.h | 61 virtual keymaster_error_t key_material(UniquePtr<uint8_t[]>* key_material, size_t* size) const; 71 SymmetricKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced,
|
keymaster0_engine.cpp | 113 KeymasterKeyBlob* key_material) const { 114 assert(key_material); 121 &key_material->key_material_size) < 0) { 126 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size); 130 bool Keymaster0Engine::GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const { 131 assert(key_material); 137 &key_material->key_material_size) < 0) { 142 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size) [all...] |
auth_encrypted_key_blob.cpp | 43 const uint8_t* end = key_blob->key_material + key_blob->key_material_size; 51 if (buf != key_blob->key_material + key_blob->key_material_size) 62 const uint8_t* tmp = key_blob.key_material; 87 if (!key_blob.key_material || key_blob.key_material_size == 0) 90 const uint8_t* tmp = key_blob.key_material;
|
integrity_assured_key_blob.cpp | 80 keymaster_error_t SerializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_material, 86 key_material.SerializedSize() + // 96 p = key_material.Serialize(p, key_blob->end()); 100 return ComputeHmac(key_blob->key_material, p - key_blob->key_material, hidden, p); 105 KeymasterKeyBlob* key_material, 127 if (!key_material->Deserialize(&p, end) || //
|
android_keymaster_messages.cpp | 26 static void set_key_blob(keymaster_key_blob_t* key_blob, const void* key_material, size_t length) { 27 delete[] key_blob->key_material; 28 key_blob->key_material = dup_buffer(key_material, length); 38 return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size); 43 delete[] key_blob->key_material; 44 key_blob->key_material = 0; 49 key_blob->key_material = deserialized_key_material.release(); 76 delete[] key_blob.key_material; 95 delete[] key_blob.key_material; [all...] |
asymmetric_key.h | 32 keymaster_error_t key_material(UniquePtr<uint8_t[]>* material, size_t* size) const override;
|
aes_key.cpp | 44 keymaster_error_t AesKeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 64 key->reset(new (std::nothrow) AesKey(key_material, hw_enforced, sw_enforced, &error));
|
ec_keymaster0_key.h | 51 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material, 69 keymaster_error_t key_material(UniquePtr<uint8_t[]>* material, size_t* size) const override;
|
hmac_key.cpp | 42 keymaster_error_t HmacKeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 57 key->reset(new (std::nothrow) HmacKey(key_material, hw_enforced, sw_enforced, &error));
|
rsa_keymaster0_key.h | 51 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material, 69 keymaster_error_t key_material(UniquePtr<uint8_t[]>* material, size_t* size) const override;
|
soft_keymaster_context.cpp | 160 const KeymasterKeyBlob& key_material, 173 return SerializeIntegrityAssuredBlob(key_material, hidden, *hw_enforced, *sw_enforced, blob); 178 KeymasterKeyBlob* key_material, 192 nonce, tag, key_material); 201 const KeymasterKeyBlob& blob, KeymasterKeyBlob* key_material, AuthorizationSet* hw_enforced, 205 const uint8_t* p = blob.key_material; 206 const uint8_t* end = blob.key_material + blob.key_material_size; 265 if (!key_material->Reset(privateLen)) 267 memcpy(key_material->writable_data(), key_start, privateLen); 274 KeymasterKeyBlob* key_material, [all...] |
/system/keymaster/include/keymaster/ |
android_keymaster_utils.h | 216 key_material = nullptr; 222 key_material = dup_buffer(data, size); 223 if (key_material) 229 key_material = new (std::nothrow) uint8_t[size]; 230 if (key_material) 236 key_material = dup_buffer(blob.key_material, blob.key_material_size); 237 if (key_material) 243 key_material = dup_buffer(blob.key_material, blob.key_material_size) [all...] |
soft_keymaster_context.h | 44 const KeymasterKeyBlob& key_material, KeymasterKeyBlob* blob, 50 KeymasterKeyBlob* key_material, AuthorizationSet* hw_enforced, 62 KeymasterKeyBlob* key_material,
|
android_keymaster_messages.h | 228 key_blob.key_material = NULL; 245 key_blob.key_material = NULL; 250 void SetKeyMaterial(const void* key_material, size_t length); 252 SetKeyMaterial(blob.key_material, blob.key_material_size); 276 key_blob.key_material = NULL; 279 ~BeginOperationRequest() { delete[] key_blob.key_material; } 281 void SetKeyMaterial(const void* key_material, size_t length); 283 SetKeyMaterial(blob.key_material, blob.key_material_size); 403 void SetKeyMaterial(const void* key_material, size_t length); 405 SetKeyMaterial(blob.key_material, blob.key_material_size) [all...] |
asymmetric_key_factory.h | 32 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
|
keymaster_context.h | 81 const KeymasterKeyBlob& key_material, 94 KeymasterKeyBlob* key_material,
|