Searched refs:key_data (Results 1 – 8 of 8) sorted by relevance
/aosp14/system/core/libcrypto_utils/tests/ |
H A D | android_pubkey_test.cpp | 126 uint8_t key_data[ANDROID_PUBKEY_ENCODED_SIZE]; in TEST_F() local 127 ASSERT_TRUE(android_pubkey_encode(key_.get(), key_data, sizeof(key_data))); in TEST_F() 128 ASSERT_EQ(0, memcmp(kKey2048, key_data, sizeof(kKey2048))); in TEST_F()
|
/aosp14/system/core/trusty/keymaster/set_attestation_key/ |
H A D | set_attestation_key.cpp | 76 size_t SerializedSize() const override { return sizeof(uint32_t) + key_data.SerializedSize(); } in SerializedSize() 79 return key_data.Serialize(buf, end); in Serialize() 83 key_data.Deserialize(buf_ptr, end); in Deserialize() 87 keymaster::Buffer key_data; member 119 const void* key_data, size_t key_data_size) { in set_attestation_key_or_cert_bin() argument 124 req.key_data.Reinitialize(key_data, key_data_size); in set_attestation_key_or_cert_bin()
|
/aosp14/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
H A D | trusty_keymaster_device.h | 58 const keymaster_blob_t* key_data, keymaster_key_blob_t* key_blob, 111 const keymaster_blob_t* key_data,
|
/aosp14/system/core/fs_mgr/libfs_avb/tests/ |
H A D | fs_avb_test_util.cpp | 264 std::string key_data; in ExtractPublicKeyAvbBlob() local 265 EXPECT_TRUE(base::ReadFileToString(tmp_path, &key_data)); in ExtractPublicKeyAvbBlob() 266 return key_data; in ExtractPublicKeyAvbBlob()
|
H A D | avb_util_test.cpp | 428 uint8_t key_data[key_size]; in TEST_F() local 429 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F() 433 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F() 435 key_data[10] ^= 0x80; // toggles a bit and expects a failure in TEST_F() 436 EXPECT_FALSE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F() 437 key_data[10] ^= 0x80; // toggles the bit again, should pass in TEST_F() 438 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F() 446 uint8_t key_data[key_size]; in TEST_F() local 447 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F() 450 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F()
|
/aosp14/system/core/trusty/keymaster/keymint/ |
H A D | TrustyKeyMintDevice.cpp | 169 request.key_data = KeymasterKeyBlob(keyData.data(), keyData.size()); in importKey() 318 if (response.key_data) { in convertStorageKeyToEphemeral() 319 *ephemeralKeyBlob = {response.key_data, response.key_data + response.key_data_length}; in convertStorageKeyToEphemeral()
|
/aosp14/system/core/trusty/keymaster/3.0/ |
H A D | TrustyKeymaster3Device.cpp | 280 request.key_data = KeymasterKeyBlob(keyData.data(), keyData.size()); in importKey() 311 resultKeyBlob.setToExternal(response.key_data, response.key_data_length); in exportKey()
|
/aosp14/system/core/trusty/keymaster/4.0/ |
H A D | TrustyKeymaster4Device.cpp | 395 request.key_data = KeymasterKeyBlob(keyData.data(), keyData.size()); in importKey() 452 resultKeyBlob.setToExternal(response.key_data, response.key_data_length); in exportKey()
|