/system/security/keystore/ |
keyblob_utils.cpp | 26 * to a hardware keymaster implementation, the first 4 bytes of the key_blob 49 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length) { 54 memcpy(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC)); 56 return key_blob + sizeof(SOFT_KEY_MAGIC); 59 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length) { 64 return !memcmp(key_blob, SOFT_KEY_MAGIC, sizeof(SOFT_KEY_MAGIC));
|
/system/keymaster/ |
auth_encrypted_key_blob.cpp | 34 KeymasterKeyBlob* key_blob) { 39 if (!key_blob->Reset(size)) 42 uint8_t* buf = key_blob->writable_data(); 43 const uint8_t* end = key_blob->key_material + key_blob->key_material_size; 51 if (buf != key_blob->key_material + key_blob->key_material_size) 57 static keymaster_error_t DeserializeUnversionedBlob(const KeymasterKeyBlob& key_blob, 62 const uint8_t* tmp = key_blob.key_material; 64 const uint8_t* end = tmp + key_blob.key_material_size [all...] |
integrity_assured_key_blob.cpp | 84 KeymasterKeyBlob* key_blob) { 91 if (!key_blob->Reset(size)) 94 uint8_t* p = key_blob->writable_data(); 96 p = key_material.Serialize(p, key_blob->end()); 97 p = hw_enforced.Serialize(p, key_blob->end()); 98 p = sw_enforced.Serialize(p, key_blob->end()); 100 return ComputeHmac(key_blob->key_material, p - key_blob->key_material, hidden, p); 103 keymaster_error_t DeserializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_blob, 108 const uint8_t* p = key_blob.begin() [all...] |
integrity_assured_key_blob.h | 32 KeymasterKeyBlob* key_blob); 34 keymaster_error_t DeserializeIntegrityAssuredBlob(const KeymasterKeyBlob& key_blob, 40 keymaster_error_t DeserializeIntegrityAssuredBlob_NoHmacCheck(const KeymasterKeyBlob& key_blob,
|
auth_encrypted_key_blob.h | 32 KeymasterKeyBlob* key_blob); 34 keymaster_error_t DeserializeAuthEncryptedBlob(const KeymasterKeyBlob& key_blob,
|
android_keymaster_messages.cpp | 26 static void set_key_blob(keymaster_key_blob_t* key_blob, const void* key_material, size_t length) { 27 delete[] key_blob->key_material; 28 key_blob->key_material = dup_buffer(key_material, length); 29 key_blob->key_material_size = length; 32 static size_t key_blob_size(const keymaster_key_blob_t& key_blob) { 33 return sizeof(uint32_t) /* key size */ + key_blob.key_material_size; 36 static uint8_t* serialize_key_blob(const keymaster_key_blob_t& key_blob, uint8_t* buf, 38 return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size); 41 static bool deserialize_key_blob(keymaster_key_blob_t* key_blob, const uint8_t** buf_ptr [all...] |
keymaster0_engine.cpp | 86 uint8_t* key_blob = 0; local 87 if (keymaster0_device_->generate_keypair(keymaster0_device_, TYPE_RSA, ¶ms, &key_blob, 92 unique_ptr<uint8_t, Malloc_Delete> key_blob_deleter(key_blob); 93 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size); 102 uint8_t* key_blob = 0; local 103 if (keymaster0_device_->generate_keypair(keymaster0_device_, TYPE_EC, ¶ms, &key_blob, 108 unique_ptr<uint8_t, Malloc_Delete> key_blob_deleter(key_blob); 109 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size); 120 uint8_t* key_blob = 0; 122 to_import.key_material_size, &key_blob, 301 const keymaster_key_blob_t* key_blob = RsaKeyToBlob(rsa); local 345 const keymaster_key_blob_t* key_blob = EcKeyToBlob(ec_key); local [all...] |
ec_keymaster0_key.cpp | 37 KeymasterKeyBlob* key_blob, 40 if (!key_blob || !hw_enforced || !sw_enforced) 44 return super::GenerateKey(key_description, key_blob, hw_enforced, sw_enforced); 64 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob,
|
key_blob_test.cpp | 307 KeymasterKeyBlob key_blob(blob); 311 DeserializeIntegrityAssuredBlob(key_blob, hidden_, &key_material_, &hw_enforced_, 316 key_blob, &ciphertext_, &hw_enforced_, &sw_enforced_, &nonce_, &tag_); 331 KeymasterKeyBlob key_blob(blob); 332 EXPECT_NE(nullptr, key_blob.key_material); 333 EXPECT_EQ(0U, key_blob.key_material_size); 336 DeserializeIntegrityAssuredBlob(key_blob, hidden_, &key_material_, &hw_enforced_, 340 DeserializeAuthEncryptedBlob(key_blob, &ciphertext_, &hw_enforced_, &sw_enforced_, 348 KeymasterKeyBlob key_blob(blob); 349 EXPECT_EQ(nullptr, key_blob.key_material) [all...] |
/hardware/libhardware/include/hardware/ |
keymaster0.h | 57 uint8_t** key_blob, size_t* key_blob_length); 69 uint8_t** key_blob, size_t* key_blob_length); 79 const uint8_t* key_blob, const size_t key_blob_length, 91 const uint8_t* key_blob, const size_t key_blob_length); 112 const uint8_t* key_blob, const size_t key_blob_length, 124 const uint8_t* key_blob, const size_t key_blob_length,
|
keymaster1.h | 57 const void* key_params, uint8_t** key_blob, size_t* key_blob_length); 67 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length); 76 int (*get_keypair_public)(const struct keymaster1_device* dev, const uint8_t* key_blob, 88 int (*delete_keypair)(const struct keymaster1_device* dev, const uint8_t* key_blob, 109 const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* data, 119 const uint8_t* key_blob, const size_t key_blob_length, 274 * \param[out] key_blob returns the generated key. \p key_blob must not be NULL. The caller 275 * assumes ownership key_blob->key_material and must free() it. 284 keymaster_key_blob_t* key_blob, [all...] |
keymaster2.h | 104 * \param[out] key_blob returns the generated key. \p key_blob must not be NULL. The caller 105 * assumes ownership key_blob->key_material and must free() it. 114 keymaster_key_blob_t* key_blob, 119 * key_blob is invalid (implementations must fully validate the integrity of the key). 130 * \param[in] key_blob The key to retreive characteristics from. 140 const keymaster_key_blob_t* key_blob, 178 * \param[out] key_blob Used to return the opaque key blob. Must be non-NULL. The caller 190 keymaster_key_blob_t* key_blob,
|
/system/security/keystore/include/keystore/ |
keystore.h | 79 uint8_t* add_softkey_header(uint8_t* key_blob, size_t key_blob_length); 84 bool is_softkey(const uint8_t* key_blob, const size_t key_blob_length);
|
/system/tpm/trunks/ |
blob_parser.cc | 28 std::string* key_blob) { 29 CHECK(key_blob) << "KeyBlob not defined."; 30 key_blob->clear(); 34 TPM_RC result = Serialize_TPM2B_PUBLIC(public_info, key_blob); 39 result = Serialize_TPM2B_PRIVATE(private_info, key_blob); 47 bool BlobParser::ParseKeyBlob(const std::string& key_blob, 52 if (key_blob.empty()) { 57 std::string mutable_key_blob = key_blob;
|
blob_parser.h | 32 // This method is used to construct a |key_blob| given the associated key's 37 std::string* key_blob); 40 // |key_blob|. Returns true on success, else false. 41 virtual bool ParseKeyBlob(const std::string& key_blob,
|
/system/core/trusty/keymaster/ |
trusty_keymaster_device.h | 50 uint8_t** key_blob, size_t* key_blob_length); 51 int import_keypair(const uint8_t* key, const size_t key_length, uint8_t** key_blob, 53 int get_keypair_public(const uint8_t* key_blob, const size_t key_blob_length, 55 int sign_data(const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, 58 int verify_data(const void* signing_params, const uint8_t* key_blob, 90 keymaster_error_t StoreSigningParams(const void* signing_params, const uint8_t* key_blob, 104 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length); 105 static int get_keypair_public(const keymaster0_device_t* dev, const uint8_t* key_blob, 109 const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* data, 113 const uint8_t* key_blob, const size_t key_blob_length [all...] |
trusty_keymaster_device.cpp | 136 const void* key_params, uint8_t** key_blob, 179 *key_blob_length = rsp.key_blob.key_material_size; 180 *key_blob = static_cast<uint8_t*>(malloc(*key_blob_length)); 181 memcpy(*key_blob, rsp.key_blob.key_material, *key_blob_length); 196 uint8_t** key_blob, size_t* key_blob_length) { 204 if (!key_blob || !key_blob_length) 222 *key_blob_length = response.key_blob.key_material_size; 223 *key_blob = static_cast<uint8_t*>(malloc(*key_blob_length)); 224 memcpy(*key_blob, response.key_blob.key_material, *key_blob_length) [all...] |
/external/vboot_reference/firmware/lib/cryptolib/include/ |
rsa.h | 45 * [key_blob] or RSAPublicKey structure [key]. One of [key_blob] or [key] must 55 int RSAVerifyBinary_f(const uint8_t* key_blob, 64 int RSAVerifyBinaryWithDigest_f(const uint8_t* key_blob,
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa_utility.c | 83 int RSAVerifyBinary_f(const uint8_t* key_blob, 101 if (key_blob && !key) 102 verification_key = RSAPublicKeyFromBuf(key_blob, key_size); 103 else if (!key_blob && key) 124 int RSAVerifyBinaryWithDigest_f(const uint8_t* key_blob, 140 if (key_blob && !key) 141 verification_key = RSAPublicKeyFromBuf(key_blob, key_size); 142 else if (!key_blob && key)
|
/system/security/softkeymaster/include/keymaster/ |
softkeymaster.h | 26 const size_t key_length, uint8_t** key_blob, size_t* key_blob_length); 28 int openssl_get_keypair_public(const struct keymaster0_device* dev, const uint8_t* key_blob,
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 83 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 98 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 101 * key_blob : key blob data 107 qcom_km_key_blob_t key_blob; member in struct:keymaster_gen_keypair_resp 118 * "key_blob" and is opaque 133 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 136 * key_blob : key blob data 142 qcom_km_key_blob_t key_blob; member in struct:keymaster_import_keypair_resp 155 * key_blob : Key data information (in shared buffer) 162 qcom_km_key_blob_t key_blob; member in struct:keymaster_sign_data_cmd 201 qcom_km_key_blob_t key_blob; member in struct:keymaster_verify_data_cmd [all...] |
/system/tpm/attestation/common/ |
tpm_utility.h | 54 // |public_key_tpm_format| with the public key of |key_blob| in TPM_PUBKEY 61 std::string* key_blob, 79 // Unbinds |bound_data| with the key loaded from |key_blob| by decrypting 83 virtual bool Unbind(const std::string& key_blob, 87 // Signs |data_to_sign| with the key loaded from |key_blob| using the 90 virtual bool Sign(const std::string& key_blob,
|
tpm_utility_v1.h | 52 std::string* key_blob, 60 bool Unbind(const std::string& key_blob, 63 bool Sign(const std::string& key_blob, 89 // Loads a key in the TPM given a |key_blob| and a |parent_key_handle|. The 92 bool LoadKeyFromBlob(const std::string& key_blob,
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 402 uint8_t* key_blob; local 406 sDevice->generate_keypair(sDevice, key_type, ¶ms, &key_blob, &key_blob_length)) 408 UniqueKey key(&sDevice, key_blob, key_blob_length); 413 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length, 449 uint8_t* key_blob; local 453 sDevice->generate_keypair(sDevice, key_type, ¶ms, &key_blob, &key_blob_length)) 455 UniqueKey key(&sDevice, key_blob, key_blob_length); 460 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length, 493 uint8_t* key_blob; local 497 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length) 508 uint8_t* key_blob; local 517 uint8_t* key_blob; local 553 uint8_t* key_blob; local 589 uint8_t* key_blob; local 599 uint8_t* key_blob; local 609 uint8_t* key_blob; local 631 uint8_t* key_blob; local 653 uint8_t* key_blob; local 666 uint8_t* key_blob; local 685 uint8_t* key_blob; local 704 uint8_t* key_blob; local 718 uint8_t* key_blob; local 854 uint8_t* key_blob; local 894 uint8_t* key_blob; local 942 uint8_t* key_blob; local 992 uint8_t* key_blob; local 1020 uint8_t* key_blob; local 1051 uint8_t* key_blob; local 1082 uint8_t* key_blob; local 1119 uint8_t* key_blob; local 1144 uint8_t* key_blob; local 1187 uint8_t* key_blob; local 1212 uint8_t* key_blob; local [all...] |
/external/vboot_reference/utility/ |
load_kernel_test.c | 84 uint8_t* key_blob = NULL; local 150 key_blob = ReadFile(argv[optind+1], &key_size); 151 if (!key_blob) { 169 if (key_blob) { 172 Memcpy((uint8_t*)gbb + gbb->rootkey_offset, key_blob, key_size); 187 if (key_blob) { 188 if (0 != VbSharedDataSetKernelKey(shared, (VbPublicKey*)key_blob)) { 195 free(key_blob);
|