Lines Matching refs:uint8_t

80     uint8_t reserved[EIC_SHA256_CONTEXT_SIZE];
85 uint8_t reserved[EIC_HMAC_SHA256_CONTEXT_SIZE];
117 void eicHexdump(const char* message, const uint8_t* data, size_t dataSize);
119 inline void eicHexdump(const char*, const uint8_t*, size_t) {} in eicHexdump() argument
130 void eicCborPrettyPrint(const uint8_t* cborData, size_t cborDataSize, size_t maxBStrSize);
132 inline void eicCborPrettyPrint(const uint8_t*, size_t, size_t) {} in eicCborPrettyPrint() argument
152 bool eicOpsRandom(uint8_t* buf, size_t numBytes);
158 const uint8_t* eicOpsGetHardwareBoundKey(bool testCredential);
164 const uint8_t* key, // Must be 16 bytes
165 const uint8_t* nonce, // Must be 12 bytes
166 const uint8_t* data, // May be NULL if size is 0
168 const uint8_t* additionalAuthenticationData, // May be NULL if size is 0
169 size_t additionalAuthenticationDataSize, uint8_t* encryptedData);
176 bool eicOpsDecryptAes128Gcm(const uint8_t* key, // Must be 16 bytes
177 const uint8_t* encryptedData, size_t encryptedDataSize,
178 const uint8_t* additionalAuthenticationData,
179 size_t additionalAuthenticationDataSize, uint8_t* data);
184 bool eicOpsCreateEcKey(uint8_t privateKey[EIC_P256_PRIV_KEY_SIZE],
185 uint8_t publicKey[EIC_P256_PUB_KEY_SIZE]);
202 bool eicOpsCreateCredentialKey(uint8_t privateKey[EIC_P256_PRIV_KEY_SIZE], const uint8_t* challenge,
203 size_t challengeSize, const uint8_t* applicationId,
204 size_t applicationIdSize, bool testCredential, uint8_t* cert,
216 bool eicOpsSignEcKey(const uint8_t publicKey[EIC_P256_PUB_KEY_SIZE],
217 const uint8_t signingKey[EIC_P256_PRIV_KEY_SIZE], unsigned int serial,
219 time_t validityNotAfter, const uint8_t* proofOfBinding,
220 size_t proofOfBindingSize, uint8_t* cert, size_t* certSize); // inout
225 bool eicOpsEcDsa(const uint8_t privateKey[EIC_P256_PRIV_KEY_SIZE],
226 const uint8_t digestOfData[EIC_SHA256_DIGEST_SIZE],
227 uint8_t signature[EIC_ECDSA_P256_SIGNATURE_SIZE]);
231 bool eicOpsEcdh(const uint8_t publicKey[EIC_P256_PUB_KEY_SIZE],
232 const uint8_t privateKey[EIC_P256_PRIV_KEY_SIZE],
233 uint8_t sharedSecret[EIC_P256_COORDINATE_SIZE]);
237 bool eicOpsHkdf(const uint8_t* sharedSecret, size_t sharedSecretSize, const uint8_t* salt,
238 size_t saltSize, const uint8_t* info, size_t infoSize, uint8_t* output,
243 void eicOpsSha256Update(EicSha256Ctx* ctx, const uint8_t* data, size_t len);
244 void eicOpsSha256Final(EicSha256Ctx* ctx, uint8_t digest[EIC_SHA256_DIGEST_SIZE]);
247 void eicOpsHmacSha256Init(EicHmacSha256Ctx* ctx, const uint8_t* key, size_t keySize);
248 void eicOpsHmacSha256Update(EicHmacSha256Ctx* ctx, const uint8_t* data, size_t len);
249 void eicOpsHmacSha256Final(EicHmacSha256Ctx* ctx, uint8_t digest[EIC_SHA256_DIGEST_SIZE]);
263 bool eicOpsX509GetPublicKey(const uint8_t* x509Cert, size_t x509CertSize, uint8_t* publicKey,
270 bool eicOpsX509CertSignedByPublicKey(const uint8_t* x509Cert, size_t x509CertSize,
271 const uint8_t* publicKey, size_t publicKeySize);
285 bool eicOpsEcDsaVerifyWithPublicKey(const uint8_t* digest, size_t digestSize,
286 const uint8_t* signature, size_t signatureSize,
287 const uint8_t* publicKey, size_t publicKeySize);
292 int hardwareAuthenticatorType, uint64_t timeStamp, const uint8_t* mac,
296 const uint8_t* verificationTokenMac, size_t verificationTokenMacSize);