HomeSort by relevance Sort by last modified time
    Searched refs:key_material (Results 1 - 25 of 52) sorted by null

1 2 3

  /system/keymaster/
symmetric_key.cpp 51 KeymasterKeyBlob key_material(key_data_size);
52 if (!key_material.key_material)
55 error = context_->GenerateRandom(key_material.writable_data(), key_data_size);
61 return context_->CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob,
110 SymmetricKey::SymmetricKey(const KeymasterKeyBlob& key_material,
117 uint8_t* tmp = dup_buffer(key_material.key_material, key_material.key_material_size);
120 key_data_size_ = key_material.key_material_size
131 keymaster_error_t SymmetricKey::key_material(UniquePtr<uint8_t[]>* key_material, function in class:keymaster::SymmetricKey
    [all...]
integrity_assured_key_blob.h 28 keymaster_error_t SerializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_material,
36 KeymasterKeyBlob* key_material,
41 KeymasterKeyBlob* key_material,
aes_key.h 35 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
53 AesKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced,
55 : SymmetricKey(key_material, hw_enforced, sw_enforced, error) {}
hmac_key.h 30 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
49 HmacKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced,
51 : SymmetricKey(key_material, hw_enforced, sw_enforced, error) {}
asymmetric_key_factory.cpp 41 keymaster_error_t AsymmetricKeyFactory::LoadKey(const KeymasterKeyBlob& key_material,
51 const uint8_t* tmp = key_material.key_material;
53 d2i_PrivateKey(evp_key_type(), NULL /* pkey */, &tmp, key_material.key_material_size);
integrity_assured_key_blob.cpp 80 keymaster_error_t SerializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_material,
86 key_material.SerializedSize() + //
96 p = key_material.Serialize(p, key_blob->end());
100 return ComputeHmac(key_blob->key_material, p - key_blob->key_material, hidden, p);
105 KeymasterKeyBlob* key_material,
123 return DeserializeIntegrityAssuredBlob_NoHmacCheck(key_blob, key_material, hw_enforced,
128 KeymasterKeyBlob* key_material,
141 if (!key_material->Deserialize(&p, end) || //
ec_keymaster0_key.cpp 53 KeymasterKeyBlob key_material; local
54 if (!engine_->GenerateEcKey(key_size, &key_material))
64 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob,
100 keymaster_error_t EcdsaKeymaster0KeyFactory::LoadKey(const KeymasterKeyBlob& key_material,
109 return super::LoadKey(key_material, additional_params, hw_enforced, sw_enforced, key);
111 unique_ptr<EC_KEY, EC_KEY_Delete> ec_key(engine_->BlobToEcKey(key_material));
rsa_keymaster0_key.cpp 55 KeymasterKeyBlob key_material; local
56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material))
66 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob,
101 keymaster_error_t RsaKeymaster0KeyFactory::LoadKey(const KeymasterKeyBlob& key_material,
110 return super::LoadKey(key_material, additional_params, hw_enforced, sw_enforced, key);
112 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material));
keymaster0_engine.cpp 98 KeymasterKeyBlob* key_material) const {
99 assert(key_material);
106 &key_material->key_material_size) < 0) {
111 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size);
115 bool Keymaster0Engine::GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const {
116 assert(key_material);
122 &key_material->key_material_size) < 0) {
127 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size)
    [all...]
android_keymaster_messages.cpp 26 static void set_key_blob(keymaster_key_blob_t* key_blob, const void* key_material, size_t length) {
27 delete[] key_blob->key_material;
28 key_blob->key_material = dup_buffer(key_material, length);
38 return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size);
43 delete[] key_blob->key_material;
44 key_blob->key_material = 0;
49 key_blob->key_material = deserialized_key_material.release();
76 delete[] key_blob.key_material;
95 delete[] key_blob.key_material;
    [all...]
symmetric_key.h 61 virtual keymaster_error_t key_material(UniquePtr<uint8_t[]>* key_material, size_t* size) const;
71 SymmetricKey(const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced,
auth_encrypted_key_blob.cpp 43 const uint8_t* end = key_blob->key_material + key_blob->key_material_size;
51 if (buf != key_blob->key_material + key_blob->key_material_size)
62 const uint8_t* tmp = key_blob.key_material;
87 if (!key_blob.key_material || key_blob.key_material_size == 0)
90 const uint8_t* tmp = key_blob.key_material;
openssl_utils.cpp 107 const KeymasterKeyBlob& key_material,
113 return convert_pkcs8_blob_to_evp(key_material.key_material, key_material.key_material_size,
aes_key.cpp 44 keymaster_error_t AesKeyFactory::LoadKey(const KeymasterKeyBlob& key_material,
65 key->reset(new (std::nothrow) AesKey(key_material, hw_enforced, sw_enforced, &error));
hmac_key.cpp 42 keymaster_error_t HmacKeyFactory::LoadKey(const KeymasterKeyBlob& key_material,
58 key->reset(new (std::nothrow) HmacKey(key_material, hw_enforced, sw_enforced, &error));
rsa_key_factory.cpp 90 KeymasterKeyBlob key_material;
91 keymaster_error_t error = EvpKeyToKeyMaterial(pkey.get(), &key_material);
95 return context_->CreateKeyBlob(authorizations, KM_ORIGIN_GENERATED, key_material, key_blob,
122 const KeymasterKeyBlob& key_material,
131 KeyMaterialToEvpKey(key_format, key_material, keymaster_key_type(), &pkey);
keymaster1_engine.h 47 KeymasterKeyBlob* key_material, AuthorizationSet* hw_enforced,
60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK),
66 KeymasterKeyBlob key_material; member in struct:keymaster::Keymaster1Engine::KeyData
ec_keymaster0_key.h 51 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
rsa_keymaster0_key.h 51 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
  /system/keymaster/include/keymaster/
android_keymaster_utils.h 218 key_material = nullptr;
224 key_material = dup_buffer(data, size);
225 if (key_material)
231 key_material = new (std::nothrow) uint8_t[size];
232 if (key_material)
238 key_material = dup_buffer(blob.key_material, blob.key_material_size);
239 if (key_material)
245 key_material = dup_buffer(blob.key_material, blob.key_material_size)
    [all...]
asymmetric_key_factory.h 32 keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,
keymaster_context.h 105 const KeymasterKeyBlob& key_material,
126 KeymasterKeyBlob* key_material,
soft_keymaster_context.h 68 const KeymasterKeyBlob& key_material, KeymasterKeyBlob* blob,
76 KeymasterKeyBlob* key_material, AuthorizationSet* hw_enforced,
100 KeymasterKeyBlob* key_material,
105 KeymasterKeyBlob* key_material,
109 KeymasterKeyBlob* key_material,
android_keymaster_messages.h 274 key_blob.key_material = nullptr;
291 key_blob.key_material = nullptr;
296 void SetKeyMaterial(const void* key_material, size_t length);
298 SetKeyMaterial(blob.key_material, blob.key_material_size);
322 key_blob.key_material = nullptr;
325 ~BeginOperationRequest() { delete[] key_blob.key_material; }
327 void SetKeyMaterial(const void* key_material, size_t length);
329 SetKeyMaterial(blob.key_material, blob.key_material_size);
450 void SetKeyMaterial(const void* key_material, size_t length);
452 SetKeyMaterial(blob.key_material, blob.key_material_size)
    [all...]
key_factory.h 51 virtual keymaster_error_t LoadKey(const KeymasterKeyBlob& key_material,

Completed in 507 milliseconds

1 2 3