Home | History | Annotate | Download | only in keystore

Lines Matching refs:blob

169     Blob keyBlob;
197 Blob keyBlob(&item[0], item.size(), NULL, 0, ::TYPE_GENERIC);
711 Blob keyBlob;
809 Blob keyBlob(&hidlKeyBlob[0], hidlKeyBlob.size(), NULL, 0, ::TYPE_KEYMASTER_10);
877 Blob charBlob(reinterpret_cast<const uint8_t*>(kc_buf.data()), kc_buf.size(), NULL, 0,
906 Blob keyBlob;
913 * If we fail reading the blob because the master key is missing we try to retrieve the
1040 Blob ksBlob(&keyBlob[0], keyBlob.size(), NULL, 0, ::TYPE_KEYMASTER_10);
1115 Blob charBlob(reinterpret_cast<const uint8_t*>(kcBuf.data()), kcBuf.size(), NULL, 0,
1139 Blob keyBlob;
1215 Blob keyBlob;
1242 Blob charBlob;
1630 Blob keyBlob;
1785 Blob wrappingKeyBlob;
1819 Blob ksBlob(&keyBlob[0], keyBlob.size(), NULL, 0, ::TYPE_KEYMASTER_10);
1854 Blob charBlob(reinterpret_cast<const uint8_t*>(kcBuf.data()), kcBuf.size(), NULL, 0,
2231 Blob* blob) {
2232 // Read the blob rather than assuming the caller provided the right name/uid/blob triplet.
2235 mKeyStore->getKeyForName(blob, name8, uid, TYPE_KEYMASTER_10);
2241 auto hidlKey = blob2hidlVec(*blob);
2242 auto dev = mKeyStore->getDevice(*blob);
2256 ALOGI("trying to upgrade a non existing blob");
2265 Blob newBlob(&upgradedKeyBlob[0], upgradedKeyBlob.size(), nullptr /* info */,
2267 newBlob.setSecurityLevel(blob->getSecurityLevel());
2268 newBlob.setEncrypted(blob->isEncrypted());
2269 newBlob.setSuperEncrypted(blob->isSuperEncrypted());
2270 newBlob.setCriticalToDeviceEncryption(blob->isCriticalToDeviceEncryption());
2278 // Re-read blob for caller. We can't use newBlob because writing it modified it.
2279 error = mKeyStore->getKeyForName(blob, name8, uid, TYPE_KEYMASTER_10);