Home
last modified time | relevance | path

Searched refs:key_data (Results 1 – 8 of 8) sorted by relevance

/aosp14/system/core/libcrypto_utils/tests/
H A Dandroid_pubkey_test.cpp126 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; in TEST_F() local
127 ASSERT_TRUE(android_pubkey_encode(key_.get(), key_data, sizeof(key_data))); in TEST_F()
128 ASSERT_EQ(0, memcmp(kKey2048, key_data, sizeof(kKey2048))); in TEST_F()
/aosp14/system/core/trusty/keymaster/set_attestation_key/
H A Dset_attestation_key.cpp76 size_t SerializedSize() const override { return sizeof(uint32_t) + key_data.SerializedSize(); } in SerializedSize()
79 return key_data.Serialize(buf, end); in Serialize()
83 key_data.Deserialize(buf_ptr, end); in Deserialize()
87 keymaster::Buffer key_data; member
119 const void* key_data, size_t key_data_size) { in set_attestation_key_or_cert_bin() argument
124 req.key_data.Reinitialize(key_data, key_data_size); in set_attestation_key_or_cert_bin()
/aosp14/system/core/trusty/keymaster/include/trusty_keymaster/legacy/
H A Dtrusty_keymaster_device.h58 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob,
111 const keymaster_blob_t* key_data,
/aosp14/system/core/fs_mgr/libfs_avb/tests/
H A Dfs_avb_test_util.cpp264 std::string key_data; in ExtractPublicKeyAvbBlob() local
265 EXPECT_TRUE(base::ReadFileToString(tmp_path, &key_data)); in ExtractPublicKeyAvbBlob()
266 return key_data; in ExtractPublicKeyAvbBlob()
H A Davb_util_test.cpp428 uint8_t key_data[key_size]; in TEST_F() local
429 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F()
433 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F()
435 key_data[10] ^= 0x80; // toggles a bit and expects a failure in TEST_F()
436 EXPECT_FALSE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F()
437 key_data[10] ^= 0x80; // toggles the bit again, should pass in TEST_F()
438 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F()
446 uint8_t key_data[key_size]; in TEST_F() local
447 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F()
450 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F()
/aosp14/system/core/trusty/keymaster/keymint/
H A DTrustyKeyMintDevice.cpp169 request.key_data = KeymasterKeyBlob(keyData.data(), keyData.size()); in importKey()
318 if (response.key_data) { in convertStorageKeyToEphemeral()
319 *ephemeralKeyBlob = {response.key_data, response.key_data + response.key_data_length}; in convertStorageKeyToEphemeral()
/aosp14/system/core/trusty/keymaster/3.0/
H A DTrustyKeymaster3Device.cpp280 request.key_data = KeymasterKeyBlob(keyData.data(), keyData.size()); in importKey()
311 resultKeyBlob.setToExternal(response.key_data, response.key_data_length); in exportKey()
/aosp14/system/core/trusty/keymaster/4.0/
H A DTrustyKeymaster4Device.cpp395 request.key_data = KeymasterKeyBlob(keyData.data(), keyData.size()); in importKey()
452 resultKeyBlob.setToExternal(response.key_data, response.key_data_length); in exportKey()