Home
last modified time | relevance | path

Searched refs:keymaster_blob_t (Results 1 – 25 of 52) sorted by relevance

123

/aosp12/system/core/trusty/keymaster/include/trusty_keymaster/legacy/
H A Dtrusty_keymaster_device.h62 const keymaster_blob_t* client_id,
63 const keymaster_blob_t* app_data, keymaster_blob_t* export_data);
80 const keymaster_blob_t* input, const keymaster_blob_t* signature,
111 const keymaster_blob_t* key_data,
117 const keymaster_blob_t* client_id,
118 const keymaster_blob_t* app_data,
119 keymaster_blob_t* export_data);
141 keymaster_blob_t* output);
145 const keymaster_blob_t* input,
146 const keymaster_blob_t* signature,
[all …]
/aosp12/system/keymaster/include/keymaster/
H A Dsoft_keymaster_device.h141 const keymaster_blob_t* key_data,
148 const keymaster_blob_t* app_data,
149 keymaster_blob_t* export_data);
163 keymaster_blob_t* output);
167 const keymaster_blob_t* signature,
169 keymaster_blob_t* output);
198 keymaster_blob_t* export_data);
220 keymaster_blob_t* output);
224 const keymaster_blob_t* input,
225 const keymaster_blob_t* signature,
[all …]
H A Dandroid_keymaster_utils.h96 inline const uint8_t* const& accessBlobData(const keymaster_blob_t* blob) { in accessBlobData()
99 inline const uint8_t*& accessBlobData(keymaster_blob_t* blob) { in accessBlobData()
102 inline const size_t& accessBlobSize(const keymaster_blob_t* blob) { in accessBlobSize()
105 inline size_t& accessBlobSize(keymaster_blob_t* blob) { in accessBlobSize()
230 typedef TKeymasterBlob<keymaster_blob_t> KeymasterBlob;
264 entries = new (std::nothrow) keymaster_blob_t[length];
310 keymaster_blob_t* begin() { return entries; } in begin()
311 const keymaster_blob_t* begin() const { return entries; } in begin()
312 keymaster_blob_t* end() { return entries + entry_count; } in end()
317 bool push_front(const keymaster_blob_t& new_entry) { in push_front()
[all …]
H A Dattestation_context.h62 const keymaster_blob_t& /*application_id*/, in GenerateUniqueId() argument
69 keymaster_blob_t verified_boot_key;
70 keymaster_blob_t verified_boot_hash;
H A Dkeymaster_tags.h88 template <> struct TagValueType<KM_BYTES> { typedef keymaster_blob_t value_type; };
89 template <> struct TagValueType<KM_BIGNUM> { typedef keymaster_blob_t value_type; };
259 const keymaster_blob_t& blob) {
271 const keymaster_blob_t& blob) {
/aosp12/hardware/libhardware/include/hardware/
H A Dkeymaster2.h141 const keymaster_blob_t* client_id,
142 const keymaster_blob_t* app_data,
189 const keymaster_blob_t* key_data,
216 const keymaster_blob_t* client_id,
217 const keymaster_blob_t* app_data,
218 keymaster_blob_t* export_data);
379 const keymaster_blob_t* input, size_t* input_consumed,
380 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
408 const keymaster_blob_t* input, const keymaster_blob_t* signature,
409 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
H A Dkeymaster1.h311 const keymaster_blob_t* client_id,
312 const keymaster_blob_t* app_data,
360 const keymaster_blob_t* key_data,
380 const keymaster_blob_t* client_id,
381 const keymaster_blob_t* app_data,
382 keymaster_blob_t* export_data);
498 const keymaster_blob_t* input, size_t* input_consumed,
499 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
524 const keymaster_blob_t* signature,
525 keymaster_key_param_set_t* out_params, keymaster_blob_t* output);
/aosp12/system/keymaster/km_openssl/
H A Dsoft_keymaster_enforcement.cpp95 keymaster_error_t hmacSha256(const keymaster_key_blob_t& key, const keymaster_blob_t data_chunks[], in hmacSha256()
125 template <typename T> inline keymaster_blob_t toBlob(const T& t) { in toBlob()
128 inline keymaster_blob_t toBlob(const char* str) { in toBlob()
134 inline bool operator==(const keymaster_blob_t& a, const keymaster_blob_t& b) { in operator ==()
150 UniquePtr<keymaster_blob_t[]> context_chunks(new (std::nothrow) keymaster_blob_t[num_chunks]); in ComputeSharedHmac()
172 keymaster_blob_t data = {reinterpret_cast<const uint8_t*>(kMacVerificationString), in ComputeSharedHmac()
174 keymaster_blob_t data_chunks[] = {data}; in ComputeSharedHmac()
188 keymaster_blob_t data_chunks[] = { in VerifyAuthorization()
203 keymaster_blob_t data_chunks[] = { in GenerateTimestampToken()
H A Dattestation_record.cpp67 static cppbor::Bstr blob_to_bstr(const keymaster_blob_t& blob) { in blob_to_bstr()
253 bool is_valid_attestation_challenge(const keymaster_blob_t& attestation_challenge) { in is_valid_attestation_challenge()
852 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_eat_record()
863 keymaster_blob_t attestation_app_id; in build_eat_record()
870 keymaster_blob_t existing_app_id; in build_eat_record()
1016 keymaster_blob_t attestation_challenge = {nullptr, 0}; in build_attestation_record()
1030 keymaster_blob_t attestation_app_id; in build_attestation_record()
1403 keymaster_blob_t* unique_id) { in parse_attestation_record()
1430 keymaster_blob_t* verified_boot_key, in parse_root_of_trust()
1465 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key, in parse_eat_record()
[all …]
H A Dcertificate_utils.cpp83 keymaster_error_t make_name_from_der(const keymaster_blob_t& name, X509_NAME_Ptr* name_out) { in make_name_from_der()
118 keymaster_blob_t serial_blob{.data = nullptr, .data_length = 0}; in get_certificate_params()
167 keymaster_blob_t subject{}; in get_certificate_params()
391 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* blob) { in encode_certificate()
/aosp12/system/keymaster/legacy_support/
H A Dkeymaster1_engine.cpp282 keymaster_blob_t input = {in, in_len}; in rsa_sign_raw()
283 keymaster_blob_t output; in rsa_sign_raw()
305 keymaster_blob_t input = {in, in_len}; in rsa_decrypt()
306 keymaster_blob_t output; in rsa_decrypt()
326 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign()
327 keymaster_blob_t output; in ecdsa_sign()
340 keymaster_blob_t client_id = {nullptr, 0}; in GetKeymaster1PublicKey()
341 keymaster_blob_t app_data = {nullptr, 0}; in GetKeymaster1PublicKey()
342 keymaster_blob_t* client_id_ptr = nullptr; in GetKeymaster1PublicKey()
343 keymaster_blob_t* app_data_ptr = nullptr; in GetKeymaster1PublicKey()
[all …]
H A Dkeymaster_passthrough_operation.cpp29 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish()
30 keymaster_blob_t out = {}; in Finish()
66 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish()
98 keymaster_blob_t sig{signature.peek_read(), signature.available_read()}; in Finish()
99 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Finish()
100 keymaster_blob_t out = {}; in Finish()
H A Dkeymaster_passthrough_key.cpp55 keymaster_blob_t km_app_data = {}; in formatted_key_material()
61 keymaster_blob_t km_client_id = {}; in formatted_key_material()
72 keymaster_blob_t export_blob = export_data.release(); in formatted_key_material()
H A Dkeymaster_passthrough_operation.h60 keymaster_blob_t in{input.peek_read(), input.available_read()}; in Update()
61 keymaster_blob_t out = {}; in Update()
/aosp12/system/keymaster/tests/
H A Dattestation_record_test.cpp46 const keymaster_blob_t& application_id, bool /* reset_since_rotation */, in GenerateUniqueId()
61 void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key, in VerifyRootOfTrust()
127 keymaster_blob_t attestation_challenge = {}; in TEST()
128 keymaster_blob_t unique_id = {}; in TEST()
166 keymaster_blob_t verified_boot_key; in TEST()
218 keymaster_blob_t attestation_challenge = {}; in TEST()
219 keymaster_blob_t unique_id = {}; in TEST()
220 keymaster_blob_t verified_boot_key = {}; in TEST()
325 keymaster_blob_t attestation_challenge = {}; in TEST()
326 keymaster_blob_t unique_id = {}; in TEST()
[all …]
H A Dandroid_keymaster_test_utils.cpp269 keymaster_blob_t out_tmp; in UpdateOperation()
285 keymaster_blob_t out_tmp; in UpdateOperation()
314 keymaster_blob_t out_tmp; in FinishOperation()
472 keymaster_blob_t nonce_blob; in EncryptMessage()
511 keymaster_blob_t nonce_blob; in EncryptMessage()
530 keymaster_blob_t nonce_blob; in EncryptMessage()
549 keymaster_blob_t nonce_blob; in EncryptMessage()
653 keymaster_blob_t export_tmp; in ExportKey()
882 const keymaster_blob_t* app_data, in get_key_characteristics()
926 keymaster_blob_t* output) { in update()
[all …]
/aosp12/system/keymaster/contexts/
H A Dsoft_attestation_cert.cpp166 static keymaster_blob_t kRsaAttestChainBlobs[] = {
170 static const keymaster_cert_chain_t kRsaAttestChain = {(keymaster_blob_t*)&kRsaAttestChainBlobs, 2};
273 static keymaster_blob_t kEcAttestChainBlobs[] = {
277 static const keymaster_cert_chain_t kEcAttestChain = {(keymaster_blob_t*)&kEcAttestChainBlobs, 2};
H A Dsoft_keymaster_device.cpp324 void AddClientAndAppData(const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in AddClientAndAppData()
795 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics()
836 const keymaster_blob_t* client_id, const keymaster_blob_t* app_data, in get_key_characteristics()
864 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
906 keymaster_key_format_t key_format, const keymaster_blob_t* key_data, in import_key()
1000 keymaster_blob_t attestation_challenge = {}; in attest_key()
1014 cert_chain->entries = reinterpret_cast<keymaster_blob_t*>( in attest_key()
1194 keymaster_blob_t* output) { in update()
1353 keymaster_blob_t mutable_input = *input; in finish()
1357 keymaster_blob_t update_output = {}; in finish()
[all …]
H A Dkeymaster2_passthrough_context.cpp75 keymaster_blob_t clientId; in ParseKeyBlob()
76 keymaster_blob_t applicationData; in ParseKeyBlob()
77 keymaster_blob_t* clientIdPtr = &clientId; in ParseKeyBlob()
78 keymaster_blob_t* applicationDataPtr = &applicationData; in ParseKeyBlob()
H A Dkeymaster1_passthrough_context.cpp120 keymaster_blob_t client_id = {nullptr, 0}; in parseKeymaster1HwBlob()
121 keymaster_blob_t app_data = {nullptr, 0}; in parseKeymaster1HwBlob()
122 keymaster_blob_t* client_id_ptr = nullptr; in parseKeymaster1HwBlob()
123 keymaster_blob_t* app_data_ptr = nullptr; in parseKeymaster1HwBlob()
H A Dsoft_keymaster_context.cpp341 keymaster_blob_t client_id = {nullptr, 0}; in ParseKeymaster1HwBlob()
342 keymaster_blob_t app_data = {nullptr, 0}; in ParseKeymaster1HwBlob()
343 keymaster_blob_t* client_id_ptr = nullptr; in ParseKeymaster1HwBlob()
344 keymaster_blob_t* app_data_ptr = nullptr; in ParseKeymaster1HwBlob()
/aosp12/system/keymaster/include/keymaster/km_openssl/
H A Dattestation_record.h351 const keymaster_blob_t& application_id,
356 const keymaster_blob_t& application_id, bool reset_since_rotation);
367 keymaster_blob_t* attestation_challenge,
370 keymaster_blob_t* unique_id);
376 keymaster_blob_t* verified_boot_key,
388 keymaster_security_level_t* keymaster_security_level, keymaster_blob_t* attestation_challenge,
390 keymaster_blob_t* unique_id, keymaster_blob_t* verified_boot_key,
H A Dckdf.h29 const keymaster_blob_t* context_chunks, size_t num_chunks,
37 const keymaster_blob_t& context_chunks, KeymasterKeyBlob* output) { in ckdf()
H A Dcertificate_utils.h33 keymaster_error_t make_name_from_der(const keymaster_blob_t& name, X509_NAME_Ptr* name_out);
75 keymaster_error_t encode_certificate(X509* certificate, keymaster_blob_t* derCert);
/aosp12/system/keymaster/include/keymaster/legacy_support/
H A Dkeymaster1_engine.h93 keymaster_error_t Keymaster1Finish(const KeyData* key_data, const keymaster_blob_t& input,
94 keymaster_blob_t* output);

123