Lines Matching refs:uint8_t
80 uint8_t reserved[EIC_SHA256_CONTEXT_SIZE];
85 uint8_t reserved[EIC_HMAC_SHA256_CONTEXT_SIZE];
117 void eicHexdump(const char* message, const uint8_t* data, size_t dataSize);
119 inline void eicHexdump(const char*, const uint8_t*, size_t) {} in eicHexdump() argument
130 void eicCborPrettyPrint(const uint8_t* cborData, size_t cborDataSize, size_t maxBStrSize);
132 inline void eicCborPrettyPrint(const uint8_t*, size_t, size_t) {} in eicCborPrettyPrint() argument
145 void* eicMemMem(const uint8_t* haystack, size_t haystackLen, const uint8_t* needle,
156 bool eicOpsRandom(uint8_t* buf, size_t numBytes);
168 const uint8_t* eicOpsGetHardwareBoundKey(bool testCredential);
174 const uint8_t* key, // Must be 16 bytes
175 const uint8_t* nonce, // Must be 12 bytes
176 const uint8_t* data, // May be NULL if size is 0
178 const uint8_t* additionalAuthenticationData, // May be NULL if size is 0
179 size_t additionalAuthenticationDataSize, uint8_t* encryptedData);
186 bool eicOpsDecryptAes128Gcm(const uint8_t* key, // Must be 16 bytes
187 const uint8_t* encryptedData, size_t encryptedDataSize,
188 const uint8_t* additionalAuthenticationData,
189 size_t additionalAuthenticationDataSize, uint8_t* data);
194 bool eicOpsCreateEcKey(uint8_t privateKey[EIC_P256_PRIV_KEY_SIZE],
195 uint8_t publicKey[EIC_P256_PUB_KEY_SIZE]);
218 bool eicOpsCreateCredentialKey(uint8_t privateKey[EIC_P256_PRIV_KEY_SIZE], const uint8_t* challenge,
219 size_t challengeSize, const uint8_t* applicationId,
221 const uint8_t* attestationKeyBlob, size_t attestationKeyBlobSize,
222 const uint8_t* attestationKeyCert, size_t attestationKeyCertSize,
223 uint8_t* /*out*/ cert, size_t* /*inout*/ certSize);
234 bool eicOpsSignEcKey(const uint8_t publicKey[EIC_P256_PUB_KEY_SIZE],
235 const uint8_t signingKey[EIC_P256_PRIV_KEY_SIZE], unsigned int serial,
237 time_t validityNotAfter, const uint8_t* proofOfBinding,
238 size_t proofOfBindingSize, uint8_t* cert, size_t* certSize); // inout
243 bool eicOpsEcDsa(const uint8_t privateKey[EIC_P256_PRIV_KEY_SIZE],
244 const uint8_t digestOfData[EIC_SHA256_DIGEST_SIZE],
245 uint8_t signature[EIC_ECDSA_P256_SIGNATURE_SIZE]);
249 bool eicOpsEcdh(const uint8_t publicKey[EIC_P256_PUB_KEY_SIZE],
250 const uint8_t privateKey[EIC_P256_PRIV_KEY_SIZE],
251 uint8_t sharedSecret[EIC_P256_COORDINATE_SIZE]);
255 bool eicOpsHkdf(const uint8_t* sharedSecret, size_t sharedSecretSize, const uint8_t* salt,
256 size_t saltSize, const uint8_t* info, size_t infoSize, uint8_t* output,
261 void eicOpsSha256Update(EicSha256Ctx* ctx, const uint8_t* data, size_t len);
262 void eicOpsSha256Final(EicSha256Ctx* ctx, uint8_t digest[EIC_SHA256_DIGEST_SIZE]);
265 void eicOpsHmacSha256Init(EicHmacSha256Ctx* ctx, const uint8_t* key, size_t keySize);
266 void eicOpsHmacSha256Update(EicHmacSha256Ctx* ctx, const uint8_t* data, size_t len);
267 void eicOpsHmacSha256Final(EicHmacSha256Ctx* ctx, uint8_t digest[EIC_SHA256_DIGEST_SIZE]);
281 bool eicOpsX509GetPublicKey(const uint8_t* x509Cert, size_t x509CertSize, uint8_t* publicKey,
288 bool eicOpsX509CertSignedByPublicKey(const uint8_t* x509Cert, size_t x509CertSize,
289 const uint8_t* publicKey, size_t publicKeySize);
303 bool eicOpsEcDsaVerifyWithPublicKey(const uint8_t* digest, size_t digestSize,
304 const uint8_t* signature, size_t signatureSize,
305 const uint8_t* publicKey, size_t publicKeySize);
310 int hardwareAuthenticatorType, uint64_t timeStamp, const uint8_t* mac,
314 const uint8_t* verificationTokenMac, size_t verificationTokenMacSize);