/aosp12/system/keymaster/legacy_support/ |
H A D | keymaster_passthrough_engine.cpp | 216 key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); in GenerateKey() 217 key_blob->key_material_size = blob.key_material_size; in GenerateKey() 236 key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); in GenerateKey() 237 key_blob->key_material_size = blob.key_material_size; in GenerateKey() 253 input_key_material.key_material_size}; in ImportKey() 278 input_key_material.key_material_size}; in ImportKey() 286 output_key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); in ImportKey() 287 output_key_blob->key_material_size = blob.key_material_size; in ImportKey()
|
H A D | keymaster1_engine.cpp | 87 key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); in GenerateKey() 88 key_blob->key_material_size = blob.key_material_size; in GenerateKey() 104 input_key_material.key_material_size}; in ImportKey() 111 output_key_blob->key_material = dup_buffer(blob.key_material, blob.key_material_size); in ImportKey() 112 output_key_blob->key_material_size = blob.key_material_size; in ImportKey()
|
/aosp12/system/keymaster/key_blob_utils/ |
H A D | ocb_utils.cpp | 97 AES_set_encrypt_key(master_key.key_material, master_key.key_material_size * 8, &aes_key)) in InitializeKeyWrappingContext() 129 if (!ciphertext->Reset(plaintext.key_material_size)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in OcbEncryptKey() 132 plaintext.key_material_size, nullptr /* additional data */, in OcbEncryptKey() 140 assert(ae_err == static_cast<int>(plaintext.key_material_size)); in OcbEncryptKey() 161 if (!plaintext->Reset(ciphertext.key_material_size)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in OcbDecryptKey() 164 ciphertext.key_material_size, nullptr /* additional data */, in OcbDecryptKey() 177 assert(ae_err == static_cast<int>(ciphertext.key_material_size)); in OcbDecryptKey()
|
H A D | auth_encrypted_key_blob.cpp | 89 master_key.key_material_size, nullptr /* salt */, 0 /* salt_len */)) { in DeriveAesGcmKeyEncryptionKey() 242 if (!key_blob.key_material || key_blob.key_material_size == 0) { in DeserializeAuthEncryptedBlob() 249 const uint8_t* end = tmp + key_blob.key_material_size; in DeserializeAuthEncryptedBlob()
|
H A D | integrity_assured_key_blob.cpp | 108 keymaster_error_t error = ComputeHmac(key_blob.begin(), key_blob.key_material_size - HMAC_SIZE, in DeserializeIntegrityAssuredBlob()
|
H A D | software_keyblobs.cpp | 172 const uint8_t* end = blob.key_material + blob.key_material_size; in ParseOldSoftkeymasterBlob()
|
/aosp12/system/keymaster/km_openssl/ |
H A D | ckdf.cpp | 46 const uint32_t blocks = div_round_up(output->key_material_size, AES_BLOCK_SIZE); in DEFINE_OPENSSL_OBJECT_POINTER() 47 const uint32_t L = output->key_material_size * 8; // bits in DEFINE_OPENSSL_OBJECT_POINTER() 54 switch (key.key_material_size) { in DEFINE_OPENSSL_OBJECT_POINTER() 65 if (!CMAC_Init(ctx.get(), key.key_material, key.key_material_size, algo, in DEFINE_OPENSSL_OBJECT_POINTER() 71 memset(output_pos, 0, output->key_material_size); in DEFINE_OPENSSL_OBJECT_POINTER()
|
H A D | symmetric_key.cpp | 80 key_bits = key_size_bits(input_key_material.key_material_size); in ImportKey() 89 if (key_bits != key_size_bits(input_key_material.key_material_size)) { in ImportKey() 91 key_size_bits(input_key_material.key_material_size)); in ImportKey()
|
H A D | wrapped_key.cpp | 49 transit_key.key_material_size) || in build_wrapped_key() 52 secure_key.key_material_size) || in build_wrapped_key() 93 d2i_KM_WRAPPED_KEY(nullptr, &tmp, wrapped_key.key_material_size)); in parse_wrapped_key()
|
H A D | soft_keymaster_enforcement.cpp | 69 EVP_DigestUpdate(ctx.get(), key_blob.key_material, key_blob.key_material_size) && in CreateKeyId() 103 if (!HMAC_Init_ex(ctx.get(), key.key_material, key.key_material_size, EVP_sha256(), in hmacSha256()
|
H A D | asymmetric_key_factory.cpp | 54 asym_key->key_material().key_material_size); in LoadKey()
|
H A D | hmac_operation.cpp | 138 HMAC_Init_ex(&ctx_, blob.key_material, blob.key_material_size, md, nullptr /* engine */); in HmacOperation()
|
H A D | openssl_utils.cpp | 106 return convert_pkcs8_blob_to_evp(key_material.key_material, key_material.key_material_size, in KeyMaterialToEvpKey()
|
H A D | attestation_utils.cpp | 230 d2i_AutoPrivateKey(nullptr /* Allocate key */, &p, signing_key_blob.key_material_size)); in get_attestation_key()
|
/aosp12/system/keymaster/tests/ |
H A D | android_keymaster_messages_test.cpp | 108 rsp.key_blob.key_material_size = array_length(TEST_DATA); in TEST() 148 rsp.key_blob.key_material_size = array_length(TEST_DATA); in TEST() 155 EXPECT_EQ(0U, deserialized->key_blob.key_material_size); in TEST() 174 rsp.key_blob.key_material_size = array_length(TEST_DATA); in TEST() 182 EXPECT_EQ(deserialized->key_blob.key_material_size, rsp.key_blob.key_material_size); in TEST() 260 EXPECT_EQ(3U, deserialized->key_blob.key_material_size); in TEST() 487 EXPECT_EQ(msg.key_data.key_material_size, deserialized->key_data.key_material_size); in TEST() 489 msg.key_data.key_material_size)); in TEST() 525 EXPECT_EQ(msg.key_blob.key_material_size, deserialized->key_blob.key_material_size); in TEST() 527 msg.key_blob.key_material_size)); in TEST() [all …]
|
H A D | key_blob_test.cpp | 339 EXPECT_EQ(0U, key_blob.key_material_size); in TEST_F() 353 blob.key_material_size = 16 * 1024 * 1024 + 1; in TEST_F() 356 EXPECT_EQ(0U, key_blob.key_material_size); in TEST_F()
|
H A D | wrapped_key_test.cpp | 62 string s(reinterpret_cast<const char*>(blob.key_material), blob.key_material_size); in keyblob2string()
|
/aosp12/system/keymaster/contexts/ |
H A D | pure_soft_keymaster_context.cpp | 449 if (!input.Reinitialize(transit_key.key_material, transit_key.key_material_size)) { in UnwrapKey() 461 if (key_material.key_material_size != masking_key.key_material_size) { in UnwrapKey() 464 for (size_t i = 0; i < key_material.key_material_size; i++) { in UnwrapKey() 508 if (!plaintext.Reinitialize(secure_key.key_material_size + tag.data_length)) { in UnwrapKey() 511 if (!encrypted_key.Reinitialize(secure_key.key_material_size + tag.data_length)) { in UnwrapKey() 514 if (!encrypted_key.write(secure_key.key_material, secure_key.key_material_size)) { in UnwrapKey()
|
H A D | soft_keymaster_device.cpp | 702 key_blob->key_material_size = response.key_blob.key_material_size; in generate_key() 703 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(key_blob->key_material_size)); in generate_key() 705 memcpy(tmp, response.key_blob.key_material, response.key_blob.key_material_size); in generate_key() 778 key_blob->key_material_size = response.key_blob.key_material_size; in generate_key() 779 uint8_t* tmp = reinterpret_cast<uint8_t*>(malloc(key_blob->key_material_size)); in generate_key() 781 memcpy(tmp, response.key_blob.key_material, response.key_blob.key_material_size); in generate_key() 890 key_blob->key_material_size = response.key_blob.key_material_size; in import_key() 891 key_blob->key_material = reinterpret_cast<uint8_t*>(malloc(key_blob->key_material_size)); in import_key() 894 response.key_blob.key_material_size); in import_key() 1057 upgraded_key->key_material_size = response.upgraded_key.key_material_size; in upgrade_key() [all …]
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | android_keymaster_messages.h | 426 key_blob.key_material_size = 0; in GetKeyCharacteristicsRequest() 432 SetKeyMaterial(blob.key_material, blob.key_material_size); in SetKeyMaterial() 457 key_blob.key_material_size = 0; in BeginOperationRequest() 463 SetKeyMaterial(blob.key_material, blob.key_material_size); in SetKeyMaterial() 582 SetKeyMaterial(blob.key_material, blob.key_material_size); in SetKeyMaterial() 598 key_blob.key_material_size = 0; in ExportKeyRequest() 604 SetKeyMaterial(blob.key_material, blob.key_material_size); in SetKeyMaterial() 622 SetKeyMaterial(blob.key_material, blob.key_material_size); in SetKeyMaterial() 636 key_blob.key_material_size = 0; in DeleteKeyRequest() 642 SetKeyMaterial(blob.key_material, blob.key_material_size); in SetKeyMaterial() [all …]
|
H A D | android_keymaster_utils.h | 90 return blob->key_material_size; in accessBlobSize() 93 return blob->key_material_size; in accessBlobSize()
|
/aosp12/system/keymaster/ng/include/ |
H A D | KeyMintUtils.h | 88 vector<uint8_t> result(blob.key_material, blob.key_material + blob.key_material_size); in kmBlob2vector()
|
/aosp12/system/keymaster/android_keymaster/ |
H A D | android_keymaster_messages.cpp | 31 key_blob->key_material_size = length; in set_key_blob() 35 return sizeof(uint32_t) /* key size */ + key_blob.key_material_size; in key_blob_size() 40 return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size); in serialize_key_blob() 48 if (!copy_size_and_data_from_buf(buf_ptr, end, &key_blob->key_material_size, in deserialize_key_blob()
|
H A D | android_keymaster.cpp | 328 if (request.attestation_signing_key_blob.key_material_size) { in GenerateKey() 777 if (request.attestation_signing_key_blob.key_material_size) { in ImportKey()
|
/aosp12/hardware/libhardware/include/hardware/ |
H A D | keymaster_defs.h | 387 size_t key_material_size; member
|