HomeSort by relevance Sort by last modified time
    Searched refs:key_blob (Results 1 - 25 of 71) sorted by null

1 2 3

  /system/security/keystore/
keyblob_utils.cpp 26 * to a hardware keymaster implementation, the first 4 bytes of the key_blob
49 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length) {
54 memcpy(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
56 return key_blob + sizeof(SOFT_KEY_MAGIC);
59 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length) {
64 return !memcmp(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
  /system/keymaster/
auth_encrypted_key_blob.cpp 34 KeymasterKeyBlob* key_blob) {
39 if (!key_blob->Reset(size))
42 uint8_t* buf = key_blob->writable_data();
43 const uint8_t* end = key_blob->key_material + key_blob->key_material_size;
51 if (buf != key_blob->key_material + key_blob->key_material_size)
57 static keymaster_error_t DeserializeUnversionedBlob(const KeymasterKeyBlob& key_blob,
62 const uint8_t* tmp = key_blob.key_material;
64 const uint8_t* end = tmp + key_blob.key_material_size
    [all...]
integrity_assured_key_blob.cpp 84 KeymasterKeyBlob* key_blob) {
91 if (!key_blob->Reset(size))
94 uint8_t* p = key_blob->writable_data();
96 p = key_material.Serialize(p, key_blob->end());
97 p = hw_enforced.Serialize(p, key_blob->end());
98 p = sw_enforced.Serialize(p, key_blob->end());
100 return ComputeHmac(key_blob->key_material, p - key_blob->key_material, hidden, p);
103 keymaster_error_t DeserializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_blob,
108 const uint8_t* p = key_blob.begin()
    [all...]
integrity_assured_key_blob.h 32 KeymasterKeyBlob* key_blob);
34 keymaster_error_t DeserializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_blob,
40 keymaster_error_t DeserializeIntegrityAssuredBlob_NoHmacCheck(const KeymasterKeyBlob& key_blob,
auth_encrypted_key_blob.h 32 KeymasterKeyBlob* key_blob);
34 keymaster_error_t DeserializeAuthEncryptedBlob(const KeymasterKeyBlob& key_blob,
android_keymaster_messages.cpp 26 static void set_key_blob(keymaster_key_blob_t* key_blob, const void* key_material, size_t length) {
27 delete[] key_blob->key_material;
28 key_blob->key_material = dup_buffer(key_material, length);
29 key_blob->key_material_size = length;
32 static size_t key_blob_size(const keymaster_key_blob_t& key_blob) {
33 return sizeof(uint32_t) /* key size */ + key_blob.key_material_size;
36 static uint8_t* serialize_key_blob(const keymaster_key_blob_t& key_blob, uint8_t* buf,
38 return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size);
41 static bool deserialize_key_blob(keymaster_key_blob_t* key_blob, const uint8_t** buf_ptr
    [all...]
keymaster0_engine.cpp 86 uint8_t* key_blob = 0; local
87 if (keymaster0_device_->generate_keypair(keymaster0_device_, TYPE_RSA, &params, &key_blob,
92 unique_ptr<uint8_t, Malloc_Delete> key_blob_deleter(key_blob);
93 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size);
102 uint8_t* key_blob = 0; local
103 if (keymaster0_device_->generate_keypair(keymaster0_device_, TYPE_EC, &params, &key_blob,
108 unique_ptr<uint8_t, Malloc_Delete> key_blob_deleter(key_blob);
109 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size);
120 uint8_t* key_blob = 0;
122 to_import.key_material_size, &key_blob,
301 const keymaster_key_blob_t* key_blob = RsaKeyToBlob(rsa); local
345 const keymaster_key_blob_t* key_blob = EcKeyToBlob(ec_key); local
    [all...]
ec_keymaster0_key.cpp 37 KeymasterKeyBlob* key_blob,
40 if (!key_blob || !hw_enforced || !sw_enforced)
44 return super::GenerateKey(key_description, key_blob, hw_enforced, sw_enforced);
64 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob,
key_blob_test.cpp 307 KeymasterKeyBlob key_blob(blob);
311 DeserializeIntegrityAssuredBlob(key_blob, hidden_, &key_material_, &hw_enforced_,
316 key_blob, &ciphertext_, &hw_enforced_, &sw_enforced_, &nonce_, &tag_);
331 KeymasterKeyBlob key_blob(blob);
332 EXPECT_NE(nullptr, key_blob.key_material);
333 EXPECT_EQ(0U, key_blob.key_material_size);
336 DeserializeIntegrityAssuredBlob(key_blob, hidden_, &key_material_, &hw_enforced_,
340 DeserializeAuthEncryptedBlob(key_blob, &ciphertext_, &hw_enforced_, &sw_enforced_,
348 KeymasterKeyBlob key_blob(blob);
349 EXPECT_EQ(nullptr, key_blob.key_material)
    [all...]
  /hardware/libhardware/include/hardware/
keymaster0.h 57 uint8_t** key_blob, size_t* key_blob_length);
69 uint8_t** key_blob, size_t* key_blob_length);
79 const uint8_t* key_blob, const size_t key_blob_length,
91 const uint8_t* key_blob, const size_t key_blob_length);
112 const uint8_t* key_blob, const size_t key_blob_length,
124 const uint8_t* key_blob, const size_t key_blob_length,
keymaster1.h 57 const void* key_params, uint8_t** key_blob, size_t* key_blob_length);
67 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length);
76 int (*get_keypair_public)(const struct keymaster1_device* dev, const uint8_t* key_blob,
88 int (*delete_keypair)(const struct keymaster1_device* dev, const uint8_t* key_blob,
109 const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* data,
119 const uint8_t* key_blob, const size_t key_blob_length,
274 * \param[out] key_blob returns the generated key. \p key_blob must not be NULL. The caller
275 * assumes ownership key_blob->key_material and must free() it.
284 keymaster_key_blob_t* key_blob,
    [all...]
keymaster2.h 104 * \param[out] key_blob returns the generated key. \p key_blob must not be NULL. The caller
105 * assumes ownership key_blob->key_material and must free() it.
114 keymaster_key_blob_t* key_blob,
119 * key_blob is invalid (implementations must fully validate the integrity of the key).
130 * \param[in] key_blob The key to retreive characteristics from.
140 const keymaster_key_blob_t* key_blob,
178 * \param[out] key_blob Used to return the opaque key blob. Must be non-NULL. The caller
190 keymaster_key_blob_t* key_blob,
  /system/security/keystore/include/keystore/
keystore.h 79 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length);
84 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length);
  /system/tpm/trunks/
blob_parser.cc 28 std::string* key_blob) {
29 CHECK(key_blob) << "KeyBlob not defined.";
30 key_blob->clear();
34 TPM_RC result = Serialize_TPM2B_PUBLIC(public_info, key_blob);
39 result = Serialize_TPM2B_PRIVATE(private_info, key_blob);
47 bool BlobParser::ParseKeyBlob(const std::string& key_blob,
52 if (key_blob.empty()) {
57 std::string mutable_key_blob = key_blob;
blob_parser.h 32 // This method is used to construct a |key_blob| given the associated key's
37 std::string* key_blob);
40 // |key_blob|. Returns true on success, else false.
41 virtual bool ParseKeyBlob(const std::string& key_blob,
  /system/core/trusty/keymaster/
trusty_keymaster_device.h 50 uint8_t** key_blob, size_t* key_blob_length);
51 int import_keypair(const uint8_t* key, const size_t key_length, uint8_t** key_blob,
53 int get_keypair_public(const uint8_t* key_blob, const size_t key_blob_length,
55 int sign_data(const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length,
58 int verify_data(const void* signing_params, const uint8_t* key_blob,
90 keymaster_error_t StoreSigningParams(const void* signing_params, const uint8_t* key_blob,
104 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length);
105 static int get_keypair_public(const keymaster0_device_t* dev, const uint8_t* key_blob,
109 const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* data,
113 const uint8_t* key_blob, const size_t key_blob_length
    [all...]
trusty_keymaster_device.cpp 136 const void* key_params, uint8_t** key_blob,
179 *key_blob_length = rsp.key_blob.key_material_size;
180 *key_blob = static_cast<uint8_t*>(malloc(*key_blob_length));
181 memcpy(*key_blob, rsp.key_blob.key_material, *key_blob_length);
196 uint8_t** key_blob, size_t* key_blob_length) {
204 if (!key_blob || !key_blob_length)
222 *key_blob_length = response.key_blob.key_material_size;
223 *key_blob = static_cast<uint8_t*>(malloc(*key_blob_length));
224 memcpy(*key_blob, response.key_blob.key_material, *key_blob_length)
    [all...]
  /external/vboot_reference/firmware/lib/cryptolib/include/
rsa.h 45 * [key_blob] or RSAPublicKey structure [key]. One of [key_blob] or [key] must
55 int RSAVerifyBinary_f(const uint8_t* key_blob,
64 int RSAVerifyBinaryWithDigest_f(const uint8_t* key_blob,
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 83 int RSAVerifyBinary_f(const uint8_t* key_blob,
101 if (key_blob && !key)
102 verification_key = RSAPublicKeyFromBuf(key_blob, key_size);
103 else if (!key_blob && key)
124 int RSAVerifyBinaryWithDigest_f(const uint8_t* key_blob,
140 if (key_blob && !key)
141 verification_key = RSAPublicKeyFromBuf(key_blob, key_size);
142 else if (!key_blob && key)
  /system/security/softkeymaster/include/keymaster/
softkeymaster.h 26 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length);
28 int openssl_get_keypair_public(const struct keymaster0_device* dev, const uint8_t* key_blob,
  /hardware/qcom/keymaster/
keymaster_qcom.h 83 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
98 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
101 * key_blob : key blob data
107 qcom_km_key_blob_t key_blob; member in struct:keymaster_gen_keypair_resp
118 * "key_blob" and is opaque
133 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque
136 * key_blob : key blob data
142 qcom_km_key_blob_t key_blob; member in struct:keymaster_import_keypair_resp
155 * key_blob : Key data information (in shared buffer)
162 qcom_km_key_blob_t key_blob; member in struct:keymaster_sign_data_cmd
201 qcom_km_key_blob_t key_blob; member in struct:keymaster_verify_data_cmd
    [all...]
  /system/tpm/attestation/common/
tpm_utility.h 54 // |public_key_tpm_format| with the public key of |key_blob| in TPM_PUBKEY
61 std::string* key_blob,
79 // Unbinds |bound_data| with the key loaded from |key_blob| by decrypting
83 virtual bool Unbind(const std::string& key_blob,
87 // Signs |data_to_sign| with the key loaded from |key_blob| using the
90 virtual bool Sign(const std::string& key_blob,
tpm_utility_v1.h 52 std::string* key_blob,
60 bool Unbind(const std::string& key_blob,
63 bool Sign(const std::string& key_blob,
89 // Loads a key in the TPM given a |key_blob| and a |parent_key_handle|. The
92 bool LoadKeyFromBlob(const std::string& key_blob,
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 402 uint8_t* key_blob; local
406 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
408 UniqueKey key(&sDevice, key_blob, key_blob_length);
413 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
449 uint8_t* key_blob; local
453 sDevice->generate_keypair(sDevice, key_type, &params, &key_blob, &key_blob_length))
455 UniqueKey key(&sDevice, key_blob, key_blob_length);
460 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length,
493 uint8_t* key_blob; local
497 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length)
508 uint8_t* key_blob; local
517 uint8_t* key_blob; local
553 uint8_t* key_blob; local
589 uint8_t* key_blob; local
599 uint8_t* key_blob; local
609 uint8_t* key_blob; local
631 uint8_t* key_blob; local
653 uint8_t* key_blob; local
666 uint8_t* key_blob; local
685 uint8_t* key_blob; local
704 uint8_t* key_blob; local
718 uint8_t* key_blob; local
854 uint8_t* key_blob; local
894 uint8_t* key_blob; local
942 uint8_t* key_blob; local
992 uint8_t* key_blob; local
1020 uint8_t* key_blob; local
1051 uint8_t* key_blob; local
1082 uint8_t* key_blob; local
1119 uint8_t* key_blob; local
1144 uint8_t* key_blob; local
1187 uint8_t* key_blob; local
1212 uint8_t* key_blob; local
    [all...]
  /external/vboot_reference/utility/
load_kernel_test.c 84 uint8_t* key_blob = NULL; local
150 key_blob = ReadFile(argv[optind+1], &key_size);
151 if (!key_blob) {
169 if (key_blob) {
172 Memcpy((uint8_t*)gbb + gbb->rootkey_offset, key_blob, key_size);
187 if (key_blob) {
188 if (0 != VbSharedDataSetKernelKey(shared, (VbPublicKey*)key_blob)) {
195 free(key_blob);

Completed in 1254 milliseconds

1 2 3