/system/keymaster/ |
symmetric_key.cpp | 51 KeymasterKeyBlob key_material(key_data_size); 52 if (!key_material.key_material) 55 error = context_->GenerateRandom(key_material.writable_data(), key_data_size); 61 return context_->CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob, 110 SymmetricKey::SymmetricKey(const KeymasterKeyBlob& key_material, 117 uint8_t* tmp = dup_buffer(key_material.key_material, key_material.key_material_size); 120 key_data_size_ = key_material.key_material_size 131 keymaster_error_t SymmetricKey::key_material(UniquePtr<uint8_t[]>* key_material, function in class:keymaster::SymmetricKey [all...] |
integrity_assured_key_blob.h | 28 keymaster_error_t SerializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_material, 36 KeymasterKeyBlob* key_material, 41 KeymasterKeyBlob* key_material,
|
aes_key.h | 35 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material, 53 AesKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced, 55 : SymmetricKey(key_material, hw_enforced, sw_enforced, error) {}
|
hmac_key.h | 30 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material, 49 HmacKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced, 51 : SymmetricKey(key_material, hw_enforced, sw_enforced, error) {}
|
asymmetric_key_factory.cpp | 41 keymaster_error_t AsymmetricKeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 51 const uint8_t* tmp = key_material.key_material; 53 d2i_PrivateKey(evp_key_type(), NULL /* pkey */, &tmp, key_material.key_material_size);
|
integrity_assured_key_blob.cpp | 80 keymaster_error_t SerializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_material, 86 key_material.SerializedSize() + // 96 p = key_material.Serialize(p, key_blob->end()); 100 return ComputeHmac(key_blob->key_material, p - key_blob->key_material, hidden, p); 105 KeymasterKeyBlob* key_material, 123 return DeserializeIntegrityAssuredBlob_NoHmacCheck(key_blob, key_material, hw_enforced, 128 KeymasterKeyBlob* key_material, 141 if (!key_material->Deserialize(&p, end) || //
|
ec_keymaster0_key.cpp | 53 KeymasterKeyBlob key_material; local 54 if (!engine_->GenerateEcKey(key_size, &key_material)) 64 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 100 keymaster_error_t EcdsaKeymaster0KeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 109 return super::LoadKey(key_material, additional_params, hw_enforced, sw_enforced, key); 111 unique_ptr<EC_KEY, EC_KEY_Delete> ec_key(engine_->BlobToEcKey(key_material));
|
rsa_keymaster0_key.cpp | 55 KeymasterKeyBlob key_material; local 56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material)) 66 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 101 keymaster_error_t RsaKeymaster0KeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 110 return super::LoadKey(key_material, additional_params, hw_enforced, sw_enforced, key); 112 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material));
|
keymaster0_engine.cpp | 98 KeymasterKeyBlob* key_material) const { 99 assert(key_material); 106 &key_material->key_material_size) < 0) { 111 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size); 115 bool Keymaster0Engine::GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const { 116 assert(key_material); 122 &key_material->key_material_size) < 0) { 127 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size) [all...] |
android_keymaster_messages.cpp | 26 static void set_key_blob(keymaster_key_blob_t* key_blob, const void* key_material, size_t length) { 27 delete[] key_blob->key_material; 28 key_blob->key_material = dup_buffer(key_material, length); 38 return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size); 43 delete[] key_blob->key_material; 44 key_blob->key_material = 0; 49 key_blob->key_material = deserialized_key_material.release(); 76 delete[] key_blob.key_material; 95 delete[] key_blob.key_material; [all...] |
symmetric_key.h | 61 virtual keymaster_error_t key_material(UniquePtr<uint8_t[]>* key_material, size_t* size) const; 71 SymmetricKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced,
|
auth_encrypted_key_blob.cpp | 43 const uint8_t* end = key_blob->key_material + key_blob->key_material_size; 51 if (buf != key_blob->key_material + key_blob->key_material_size) 62 const uint8_t* tmp = key_blob.key_material; 87 if (!key_blob.key_material || key_blob.key_material_size == 0) 90 const uint8_t* tmp = key_blob.key_material;
|
openssl_utils.cpp | 107 const KeymasterKeyBlob& key_material, 113 return convert_pkcs8_blob_to_evp(key_material.key_material, key_material.key_material_size,
|
aes_key.cpp | 44 keymaster_error_t AesKeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 65 key->reset(new (std::nothrow) AesKey(key_material, hw_enforced, sw_enforced, &error));
|
hmac_key.cpp | 42 keymaster_error_t HmacKeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 58 key->reset(new (std::nothrow) HmacKey(key_material, hw_enforced, sw_enforced, &error));
|
rsa_key_factory.cpp | 90 KeymasterKeyBlob key_material; 91 keymaster_error_t error = EvpKeyToKeyMaterial(pkey.get(), &key_material); 95 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_GENERATED, key_material, key_blob, 122 const KeymasterKeyBlob& key_material, 131 KeyMaterialToEvpKey(key_format, key_material, keymaster_key_type(), &pkey);
|
keymaster1_engine.h | 47 KeymasterKeyBlob* key_material, AuthorizationSet* hw_enforced, 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), 66 KeymasterKeyBlob key_material; member in struct:keymaster::Keymaster1Engine::KeyData
|
ec_keymaster0_key.h | 51 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
|
rsa_keymaster0_key.h | 51 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
|
/system/keymaster/include/keymaster/ |
android_keymaster_utils.h | 218 key_material = nullptr; 224 key_material = dup_buffer(data, size); 225 if (key_material) 231 key_material = new (std::nothrow) uint8_t[size]; 232 if (key_material) 238 key_material = dup_buffer(blob.key_material, blob.key_material_size); 239 if (key_material) 245 key_material = dup_buffer(blob.key_material, blob.key_material_size) [all...] |
asymmetric_key_factory.h | 32 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
|
keymaster_context.h | 105 const KeymasterKeyBlob& key_material, 126 KeymasterKeyBlob* key_material,
|
soft_keymaster_context.h | 68 const KeymasterKeyBlob& key_material, KeymasterKeyBlob* blob, 76 KeymasterKeyBlob* key_material, AuthorizationSet* hw_enforced, 100 KeymasterKeyBlob* key_material, 105 KeymasterKeyBlob* key_material, 109 KeymasterKeyBlob* key_material,
|
android_keymaster_messages.h | 274 key_blob.key_material = nullptr; 291 key_blob.key_material = nullptr; 296 void SetKeyMaterial(const void* key_material, size_t length); 298 SetKeyMaterial(blob.key_material, blob.key_material_size); 322 key_blob.key_material = nullptr; 325 ~BeginOperationRequest() { delete[] key_blob.key_material; } 327 void SetKeyMaterial(const void* key_material, size_t length); 329 SetKeyMaterial(blob.key_material, blob.key_material_size); 450 void SetKeyMaterial(const void* key_material, size_t length); 452 SetKeyMaterial(blob.key_material, blob.key_material_size) [all...] |
key_factory.h | 51 virtual keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
|