/external/vboot_reference/utility/ |
load_kernel_test.c | 84 uint8_t* key_blob = NULL; local 150 key_blob = ReadFile(argv[optind+1], &key_size); 151 if (!key_blob) { 169 if (key_blob) { 172 Memcpy((uint8_t*)gbb + gbb->rootkey_offset, key_blob, key_size); 187 if (key_blob) { 188 if (0 != VbSharedDataSetKernelKey(shared, (VbPublicKey*)key_blob)) { 195 free(key_blob);
|
/system/keymaster/ |
keymaster0_engine.cpp | 86 uint8_t* key_blob = 0; local 87 if (keymaster0_device_->generate_keypair(keymaster0_device_, TYPE_RSA, ¶ms, &key_blob, 92 unique_ptr<uint8_t, Malloc_Delete> key_blob_deleter(key_blob); 93 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size); 102 uint8_t* key_blob = 0; local 103 if (keymaster0_device_->generate_keypair(keymaster0_device_, TYPE_EC, ¶ms, &key_blob, 108 unique_ptr<uint8_t, Malloc_Delete> key_blob_deleter(key_blob); 109 key_material->key_material = dup_buffer(key_blob, key_material->key_material_size); 120 uint8_t* key_blob = 0; 122 to_import.key_material_size, &key_blob, 301 const keymaster_key_blob_t* key_blob = RsaKeyToBlob(rsa); local 345 const keymaster_key_blob_t* key_blob = EcKeyToBlob(ec_key); local [all...] |
android_keymaster.cpp | 198 KeymasterKeyBlob key_blob; local 201 response->error = factory->GenerateKey(request.key_description, &key_blob, 204 response->key_blob = key_blob.release(); 215 context_->ParseKeyBlob(KeymasterKeyBlob(request.key_blob), request.additional_params, 247 response->error = LoadKey(request.key_blob, request.additional_params, &hw_enforced, 270 if (!context_->enforcement_policy()->CreateKeyId(request.key_blob, &key_id)) 366 context_->ParseKeyBlob(KeymasterKeyBlob(request.key_blob), request.additional_params, 400 response->error = LoadKey(request.key_blob, request.attest_params, &tee_enforced, &sw_enforced, 420 response->error = context_->UpgradeKeyBlob(KeymasterKeyBlob(request.key_blob), 439 KeymasterKeyBlob key_blob; local [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 83 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 98 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 101 * key_blob : key blob data 107 qcom_km_key_blob_t key_blob; member in struct:keymaster_gen_keypair_resp 118 * "key_blob" and is opaque 133 * (by secure app) is in shared buffer at offset of "key_blob" and is opaque 136 * key_blob : key blob data 142 qcom_km_key_blob_t key_blob; member in struct:keymaster_import_keypair_resp 155 * key_blob : Key data information (in shared buffer) 162 qcom_km_key_blob_t key_blob; member in struct:keymaster_sign_data_cmd 201 qcom_km_key_blob_t key_blob; member in struct:keymaster_verify_data_cmd [all...] |
/system/vold/tests/ |
CryptfsScryptHidlizationEquivalence_test.cpp | 181 keymaster_key_blob_t key_blob; local 183 &key_blob, 191 key = (uint8_t*)key_blob.key_material; 192 key_size = key_blob.key_material_size;
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 402 uint8_t* key_blob; local 406 sDevice->generate_keypair(sDevice, key_type, ¶ms, &key_blob, &key_blob_length)) 408 UniqueKey key(&sDevice, key_blob, key_blob_length); 413 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length, 449 uint8_t* key_blob; local 453 sDevice->generate_keypair(sDevice, key_type, ¶ms, &key_blob, &key_blob_length)) 455 UniqueKey key(&sDevice, key_blob, key_blob_length); 460 sDevice->get_keypair_public(sDevice, key_blob, key_blob_length, 493 uint8_t* key_blob; local 497 sDevice->generate_keypair(sDevice, key_type, NULL, &key_blob, &key_blob_length) 508 uint8_t* key_blob; local 517 uint8_t* key_blob; local 553 uint8_t* key_blob; local 589 uint8_t* key_blob; local 599 uint8_t* key_blob; local 609 uint8_t* key_blob; local 631 uint8_t* key_blob; local 653 uint8_t* key_blob; local 666 uint8_t* key_blob; local 685 uint8_t* key_blob; local 704 uint8_t* key_blob; local 718 uint8_t* key_blob; local 854 uint8_t* key_blob; local 894 uint8_t* key_blob; local 942 uint8_t* key_blob; local 992 uint8_t* key_blob; local 1020 uint8_t* key_blob; local 1051 uint8_t* key_blob; local 1082 uint8_t* key_blob; local 1119 uint8_t* key_blob; local 1144 uint8_t* key_blob; local 1187 uint8_t* key_blob; local 1212 uint8_t* key_blob; local [all...] |
/system/security/keystore/ |
legacy_keymaster_device_wrapper.cpp | 219 keymaster_key_blob_t key_blob{nullptr, 0}; 225 auto rc = keymaster_device_->generate_key(keymaster_device_, &kmParams, &key_blob, 230 resultKeyBlob = kmBlob2hidlVec(key_blob); 239 if (key_blob.key_material) free(const_cast<uint8_t*>(key_blob.key_material)); 284 keymaster_key_blob_t key_blob{nullptr, 0}; 292 &key_blob, &key_characteristics); 296 resultKeyBlob = kmBlob2hidlVec(key_blob); 304 if (key_blob.key_material) free(const_cast<uint8_t*>(key_blob.key_material)) 398 keymaster_key_blob_t key_blob = {}; local [all...] |
/system/tpm/attestation/server/ |
attestation_service.cc | 393 if (!tpm_utility_->Unbind(key.key_blob(), request.encrypted_data(), &data)) { 419 if (!tpm_utility_->Sign(key.key_blob(), request.data_to_sign(), &signature)) { 448 key.key_type(), key.key_usage(), key.key_blob(), 682 std::string key_blob; local 690 nonce, &key_blob, &public_key, &public_key_tpm_format, &key_info, 694 key->set_key_blob(key_blob);
|
/system/tpm/trunks/ |
tpm_utility_test.cc | 1069 std::string key_blob; local 1106 std::string key_blob; local 1127 std::string key_blob; local 1223 std::string key_blob; local 1239 std::string key_blob; local 1266 std::string key_blob; local 1285 std::string key_blob; local 1312 std::string key_blob; local 1324 std::string key_blob; local 1333 std::string key_blob; local 1345 std::string key_blob; local 1361 std::string key_blob; local 1372 std::string key_blob; local 1380 std::string key_blob; local 1387 std::string key_blob; local [all...] |
trunks_client_test.cc | 107 std::string key_blob; local 111 kNoCreationPCR, session->GetDelegate(), &key_blob, nullptr); 117 result = utility->LoadKey(key_blob, session->GetDelegate(), &signing_key); 148 std::string key_blob; local 152 kNoCreationPCR, session->GetDelegate(), &key_blob, nullptr); 158 result = utility->LoadKey(key_blob, session->GetDelegate(), &decrypt_key); 177 std::string key_blob; local 181 prime_factor, key_authorization, session->GetDelegate(), &key_blob); 187 result = utility->LoadKey(key_blob, session->GetDelegate(), &key_handle); 205 std::string key_blob; local 245 std::string key_blob; local 427 std::string key_blob; local 552 std::string key_blob; local 732 std::string key_blob; local 1065 std::string key_blob; local [all...] |
/external/openssh/ |
monitor.c | 172 static u_char *key_blob = NULL; variable 538 if (key_blob == NULL || key_bloblen != bloblen || 539 timingsafe_bcmp(key_blob, blob, key_bloblen)) 548 free(key_blob); 551 key_blob = NULL; 1194 key_blob = blob; [all...] |
/system/keymaster/include/keymaster/ |
android_keymaster_messages.h | 275 key_blob.key_material = nullptr; 276 key_blob.key_material_size = 0; 284 keymaster_key_blob_t key_blob; member in struct:keymaster::GenerateKeyResponse 292 key_blob.key_material = nullptr; 293 key_blob.key_material_size = 0; 306 keymaster_key_blob_t key_blob; member in struct:keymaster::GetKeyCharacteristicsRequest 323 key_blob.key_material = nullptr; 324 key_blob.key_material_size = 0; 326 ~BeginOperationRequest() { delete[] key_blob.key_material; } 338 keymaster_key_blob_t key_blob; member in struct:keymaster::BeginOperationRequest 482 keymaster_key_blob_t key_blob; member in struct:keymaster::ImportKeyResponse 505 keymaster_key_blob_t key_blob; member in struct:keymaster::ExportKeyRequest 542 keymaster_key_blob_t key_blob; member in struct:keymaster::DeleteKeyRequest 606 keymaster_key_blob_t key_blob; member in struct:keymaster::AttestKeyRequest 641 keymaster_key_blob_t key_blob; member in struct:keymaster::UpgradeKeyRequest [all...] |
/hardware/interfaces/keymaster/3.0/vts/functional/ |
keymaster_hidl_hal_test.cpp | 461 ErrorCode GenerateKey(const AuthorizationSet& key_desc, HidlBuf* key_blob, 463 EXPECT_NE(key_blob, nullptr); 465 EXPECT_EQ(0U, key_blob->size()); 473 *key_blob = hidl_key_blob; 479 EXPECT_EQ(0U, key_blob->size()); 491 const string& key_material, HidlBuf* key_blob, 499 *key_blob = hidl_key_blob; 505 EXPECT_EQ(0U, key_blob->size()); 517 ErrorCode ExportKey(KeyFormat format, const HidlBuf& key_blob, const HidlBuf& client_id, 522 ->exportKey(format, key_blob, client_id, app_data 1107 HidlBuf key_blob; local 1155 HidlBuf key_blob; local 1253 HidlBuf key_blob; local [all...] |