/aosp12/system/core/trusty/keymaster/include/trusty_keymaster/legacy/ |
H A D | trusty_keymaster_device.h | 62 const keymaster_blob_t* client_id, 63 const keymaster_blob_t* app_data, keymaster_blob_t* export_data); 80 const keymaster_blob_t* input, const keymaster_blob_t* signature, 111 const keymaster_blob_t* key_data, 117 const keymaster_blob_t* client_id, 118 const keymaster_blob_t* app_data, 119 keymaster_blob_t* export_data); 141 keymaster_blob_t* output); 145 const keymaster_blob_t* input, 146 const keymaster_blob_t* signature, [all …]
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | soft_keymaster_device.h | 141 const keymaster_blob_t* key_data, 148 const keymaster_blob_t* app_data, 149 keymaster_blob_t* export_data); 163 keymaster_blob_t* output); 167 const keymaster_blob_t* signature, 169 keymaster_blob_t* output); 198 keymaster_blob_t* export_data); 220 keymaster_blob_t* output); 224 const keymaster_blob_t* input, 225 const keymaster_blob_t* signature, [all …]
|
H A D | android_keymaster_utils.h | 96 inline const uint8_t* const& accessBlobData(const keymaster_blob_t* blob) { in accessBlobData() 99 inline const uint8_t*& accessBlobData(keymaster_blob_t* blob) { in accessBlobData() 102 inline const size_t& accessBlobSize(const keymaster_blob_t* blob) { in accessBlobSize() 105 inline size_t& accessBlobSize(keymaster_blob_t* blob) { in accessBlobSize() 230 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob; 264 entries = new (std::nothrow) keymaster_blob_t[length]; 310 keymaster_blob_t* begin() { return entries; } in begin() 311 const keymaster_blob_t* begin() const { return entries; } in begin() 312 keymaster_blob_t* end() { return entries + entry_count; } in end() 317 bool push_front(const keymaster_blob_t& new_entry) { in push_front() [all …]
|
H A D | attestation_context.h | 62 const keymaster_blob_t& /*application_id*/, in GenerateUniqueId() argument 69 keymaster_blob_t verified_boot_key; 70 keymaster_blob_t verified_boot_hash;
|
H A D | keymaster_tags.h | 88 template <> struct TagValueType<KM_BYTES> { typedef keymaster_blob_t value_type; }; 89 template <> struct TagValueType<KM_BIGNUM> { typedef keymaster_blob_t value_type; }; 259 const keymaster_blob_t& blob) { 271 const keymaster_blob_t& blob) {
|
/aosp12/hardware/libhardware/include/hardware/ |
H A D | keymaster2.h | 141 const keymaster_blob_t* client_id, 142 const keymaster_blob_t* app_data, 189 const keymaster_blob_t* key_data, 216 const keymaster_blob_t* client_id, 217 const keymaster_blob_t* app_data, 218 keymaster_blob_t* export_data); 379 const keymaster_blob_t* input, size_t* input_consumed, 380 keymaster_key_param_set_t* out_params, keymaster_blob_t* output); 408 const keymaster_blob_t* input, const keymaster_blob_t* signature, 409 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
|
H A D | keymaster1.h | 311 const keymaster_blob_t* client_id, 312 const keymaster_blob_t* app_data, 360 const keymaster_blob_t* key_data, 380 const keymaster_blob_t* client_id, 381 const keymaster_blob_t* app_data, 382 keymaster_blob_t* export_data); 498 const keymaster_blob_t* input, size_t* input_consumed, 499 keymaster_key_param_set_t* out_params, keymaster_blob_t* output); 524 const keymaster_blob_t* signature, 525 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
|
/aosp12/system/keymaster/km_openssl/ |
H A D | soft_keymaster_enforcement.cpp | 95 keymaster_error_t hmacSha256(const keymaster_key_blob_t& key, const keymaster_blob_t data_chunks[], in hmacSha256() 125 template <typename T> inline keymaster_blob_t toBlob(const T& t) { in toBlob() 128 inline keymaster_blob_t toBlob(const char* str) { in toBlob() 134 inline bool operator==(const keymaster_blob_t& a, const keymaster_blob_t& b) { in operator ==() 150 UniquePtr<keymaster_blob_t[]> context_chunks(new (std::nothrow) keymaster_blob_t[num_chunks]); in ComputeSharedHmac() 172 keymaster_blob_t data = {reinterpret_cast<const uint8_t*>(kMacVerificationString), in ComputeSharedHmac() 174 keymaster_blob_t data_chunks[] = {data}; in ComputeSharedHmac() 188 keymaster_blob_t data_chunks[] = { in VerifyAuthorization() 203 keymaster_blob_t data_chunks[] = { in GenerateTimestampToken()
|
H A D | attestation_record.cpp | 67 static cppbor::Bstr blob_to_bstr(const keymaster_blob_t& blob) { in blob_to_bstr() 253 bool is_valid_attestation_challenge(const keymaster_blob_t& attestation_challenge) { in is_valid_attestation_challenge() 852 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_eat_record() 863 keymaster_blob_t attestation_app_id; in build_eat_record() 870 keymaster_blob_t existing_app_id; in build_eat_record() 1016 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_attestation_record() 1030 keymaster_blob_t attestation_app_id; in build_attestation_record() 1403 keymaster_blob_t* unique_id) { in parse_attestation_record() 1430 keymaster_blob_t* verified_boot_key, in parse_root_of_trust() 1465 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key, in parse_eat_record() [all …]
|
H A D | certificate_utils.cpp | 83 keymaster_error_t make_name_from_der(const keymaster_blob_t& name, X509_NAME_Ptr* name_out) { in make_name_from_der() 118 keymaster_blob_t serial_blob{.data = nullptr, .data_length = 0}; in get_certificate_params() 167 keymaster_blob_t subject{}; in get_certificate_params() 391 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* blob) { in encode_certificate()
|
/aosp12/system/keymaster/legacy_support/ |
H A D | keymaster1_engine.cpp | 282 keymaster_blob_t input = {in, in_len}; in rsa_sign_raw() 283 keymaster_blob_t output; in rsa_sign_raw() 305 keymaster_blob_t input = {in, in_len}; in rsa_decrypt() 306 keymaster_blob_t output; in rsa_decrypt() 326 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign() 327 keymaster_blob_t output; in ecdsa_sign() 340 keymaster_blob_t client_id = {nullptr, 0}; in GetKeymaster1PublicKey() 341 keymaster_blob_t app_data = {nullptr, 0}; in GetKeymaster1PublicKey() 342 keymaster_blob_t* client_id_ptr = nullptr; in GetKeymaster1PublicKey() 343 keymaster_blob_t* app_data_ptr = nullptr; in GetKeymaster1PublicKey() [all …]
|
H A D | keymaster_passthrough_operation.cpp | 29 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish() 30 keymaster_blob_t out = {}; in Finish() 66 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish() 98 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish() 99 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish() 100 keymaster_blob_t out = {}; in Finish()
|
H A D | keymaster_passthrough_key.cpp | 55 keymaster_blob_t km_app_data = {}; in formatted_key_material() 61 keymaster_blob_t km_client_id = {}; in formatted_key_material() 72 keymaster_blob_t export_blob = export_data.release(); in formatted_key_material()
|
H A D | keymaster_passthrough_operation.h | 60 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Update() 61 keymaster_blob_t out = {}; in Update()
|
/aosp12/system/keymaster/tests/ |
H A D | attestation_record_test.cpp | 46 const keymaster_blob_t& application_id, bool /* reset_since_rotation */, in GenerateUniqueId() 61 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust() 127 keymaster_blob_t attestation_challenge = {}; in TEST() 128 keymaster_blob_t unique_id = {}; in TEST() 166 keymaster_blob_t verified_boot_key; in TEST() 218 keymaster_blob_t attestation_challenge = {}; in TEST() 219 keymaster_blob_t unique_id = {}; in TEST() 220 keymaster_blob_t verified_boot_key = {}; in TEST() 325 keymaster_blob_t attestation_challenge = {}; in TEST() 326 keymaster_blob_t unique_id = {}; in TEST() [all …]
|
H A D | android_keymaster_test_utils.cpp | 269 keymaster_blob_t out_tmp; in UpdateOperation() 285 keymaster_blob_t out_tmp; in UpdateOperation() 314 keymaster_blob_t out_tmp; in FinishOperation() 472 keymaster_blob_t nonce_blob; in EncryptMessage() 511 keymaster_blob_t nonce_blob; in EncryptMessage() 530 keymaster_blob_t nonce_blob; in EncryptMessage() 549 keymaster_blob_t nonce_blob; in EncryptMessage() 653 keymaster_blob_t export_tmp; in ExportKey() 882 const keymaster_blob_t* app_data, in get_key_characteristics() 926 keymaster_blob_t* output) { in update() [all …]
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_attestation_cert.cpp | 166 static keymaster_blob_t kRsaAttestChainBlobs[] = { 170 static const keymaster_cert_chain_t kRsaAttestChain = {(keymaster_blob_t*)&kRsaAttestChainBlobs, 2}; 273 static keymaster_blob_t kEcAttestChainBlobs[] = { 277 static const keymaster_cert_chain_t kEcAttestChain = {(keymaster_blob_t*)&kEcAttestChainBlobs, 2};
|
H A D | soft_keymaster_device.cpp | 324 void AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in AddClientAndAppData() 795 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics() 836 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics() 864 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() 906 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key() 1000 keymaster_blob_t attestation_challenge = {}; in attest_key() 1014 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( in attest_key() 1194 keymaster_blob_t* output) { in update() 1353 keymaster_blob_t mutable_input = *input; in finish() 1357 keymaster_blob_t update_output = {}; in finish() [all …]
|
H A D | keymaster2_passthrough_context.cpp | 75 keymaster_blob_t clientId; in ParseKeyBlob() 76 keymaster_blob_t applicationData; in ParseKeyBlob() 77 keymaster_blob_t* clientIdPtr = &clientId; in ParseKeyBlob() 78 keymaster_blob_t* applicationDataPtr = &applicationData; in ParseKeyBlob()
|
H A D | keymaster1_passthrough_context.cpp | 120 keymaster_blob_t client_id = {nullptr, 0}; in parseKeymaster1HwBlob() 121 keymaster_blob_t app_data = {nullptr, 0}; in parseKeymaster1HwBlob() 122 keymaster_blob_t* client_id_ptr = nullptr; in parseKeymaster1HwBlob() 123 keymaster_blob_t* app_data_ptr = nullptr; in parseKeymaster1HwBlob()
|
H A D | soft_keymaster_context.cpp | 341 keymaster_blob_t client_id = {nullptr, 0}; in ParseKeymaster1HwBlob() 342 keymaster_blob_t app_data = {nullptr, 0}; in ParseKeymaster1HwBlob() 343 keymaster_blob_t* client_id_ptr = nullptr; in ParseKeymaster1HwBlob() 344 keymaster_blob_t* app_data_ptr = nullptr; in ParseKeymaster1HwBlob()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | attestation_record.h | 351 const keymaster_blob_t& application_id, 356 const keymaster_blob_t& application_id, bool reset_since_rotation); 367 keymaster_blob_t* attestation_challenge, 370 keymaster_blob_t* unique_id); 376 keymaster_blob_t* verified_boot_key, 388 keymaster_security_level_t* keymaster_security_level, keymaster_blob_t* attestation_challenge, 390 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
|
H A D | ckdf.h | 29 const keymaster_blob_t* context_chunks, size_t num_chunks, 37 const keymaster_blob_t& context_chunks, KeymasterKeyBlob* output) { in ckdf()
|
H A D | certificate_utils.h | 33 keymaster_error_t make_name_from_der(const keymaster_blob_t& name, X509_NAME_Ptr* name_out); 75 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* derCert);
|
/aosp12/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster1_engine.h | 93 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input, 94 keymaster_blob_t* output);
|