/trusty/user/app/sample/binder-test/service/ |
D | main.cpp | 56 Status RepeatBoolean(bool token, bool* _aidl_return) override { in RepeatBoolean() argument 57 return Repeat(token, _aidl_return); in RepeatBoolean() 59 Status RepeatByte(int8_t token, int8_t* _aidl_return) override { in RepeatByte() argument 60 return Repeat(token, _aidl_return); in RepeatByte() 62 Status RepeatChar(char16_t token, char16_t* _aidl_return) override { in RepeatChar() argument 63 return Repeat(token, _aidl_return); in RepeatChar() 65 Status RepeatInt(int32_t token, int32_t* _aidl_return) override { in RepeatInt() argument 66 return Repeat(token, _aidl_return); in RepeatInt() 68 Status RepeatLong(int64_t token, int64_t* _aidl_return) override { in RepeatLong() argument 69 return Repeat(token, _aidl_return); in RepeatLong() [all …]
|
/trusty/user/app/keymaster/ |
D | trusty_keymaster_enforcement.cpp | 37 const hw_auth_token_t& token, in auth_token_timed_out() argument 39 uint64_t token_timestamp_millis = ntoh(token.timestamp); in auth_token_timed_out() 55 const hw_auth_token_t& token) const { in ValidateTokenSignature() 62 const uint8_t* hash_data = reinterpret_cast<const uint8_t*>(&token); in ValidateTokenSignature() 64 reinterpret_cast<const uint8_t*>(&token.hmac) - hash_data; in ValidateTokenSignature() 76 return 0 == memcmp_s(computed_hash, token.hmac, in ValidateTokenSignature() 77 min(sizeof(token.hmac), computed_hash_length)); in ValidateTokenSignature()
|
D | trusty_keymaster_enforcement.h | 47 bool auth_token_timed_out(const hw_auth_token_t& token, 51 bool ValidateTokenSignature(const hw_auth_token_t& token) const override;
|
D | openssl_keymaster_enforcement.cpp | 216 response.token.challenge = request.challenge; in VerifyAuthorization() 217 response.token.timestamp = get_current_time_ms(); in VerifyAuthorization() 218 response.token.security_level = SecurityLevel(); in VerifyAuthorization() 221 toBlob(response.token.challenge), in VerifyAuthorization() 222 toBlob(response.token.timestamp), in VerifyAuthorization() 223 toBlob(response.token.security_level), in VerifyAuthorization() 226 response.error = hmacSha256(hmac_key_, data_chunks, 5, &response.token.mac); in VerifyAuthorization()
|
/trusty/user/base/lib/keymaster/test/ |
D | keymaster_test.c | 104 hw_auth_token_t token = {0, in TEST_F() local 112 uint64_t checksum = calculate_checksum(token.hmac, sizeof(token.hmac)); in TEST_F() 115 ret = keymaster_sign_auth_token(_state->km_handle, &token); in TEST_F() 122 checksum = calculate_checksum(token.hmac, sizeof(token.hmac)); in TEST_F() 125 ret = keymaster_validate_auth_token(_state->km_handle, &token); in TEST_F()
|
/trusty/user/base/lib/keymaster/ |
D | keymaster.c | 258 hw_auth_token_t* token) { in keymaster_sign_auth_token() argument 261 if (token == NULL) { in keymaster_sign_auth_token() 274 size_t message_size = sizeof(hw_auth_token_t) - sizeof(token->hmac); in keymaster_sign_auth_token() 276 ret = mint_hmac(key_buf, key_buf_size, (uint8_t*)token, message_size, in keymaster_sign_auth_token() 277 token->hmac); in keymaster_sign_auth_token() 285 hw_auth_token_t* token) { in keymaster_validate_auth_token() argument 288 if (token == NULL) { in keymaster_validate_auth_token() 302 size_t message_size = sizeof(hw_auth_token_t) - sizeof(token->hmac); in keymaster_validate_auth_token() 304 ret = mint_hmac(key_buf, key_buf_size, (uint8_t*)token, message_size, in keymaster_validate_auth_token() 311 ret = memcmp(expected_hmac, token->hmac, sizeof(expected_hmac)); in keymaster_validate_auth_token()
|
/trusty/user/base/lib/keymaster/include/lib/keymaster/ |
D | keymaster.h | 66 hw_auth_token_t* token); 77 hw_auth_token_t* token);
|
/trusty/user/app/sample/hwcrypto/ |
D | hwkey_srv.c | 57 access_token_t token; member 90 memset(node->token, 0, HWKEY_OPAQUE_HANDLE_SIZE); in delete_opaque_handle() 692 if (!is_empty_token(entry->token)) { in get_key_handle() 718 entry->token[token_offset] = random_buf[i]; in get_key_handle() 728 assert(entry->token[HWKEY_OPAQUE_HANDLE_SIZE - 1] == 0); in get_key_handle() 730 memcpy(kbuf, entry->token, HWKEY_OPAQUE_HANDLE_SIZE); in get_key_handle() 745 assert(!is_empty_token(entry->token)); in get_opaque_key() 756 if (CRYPTO_memcmp(entry->token, access_token, in get_opaque_key()
|
/trusty/user/app/keymint/ |
D | keys.rs | 282 fn timestamp_token_mac_input(&self, token: &TimeStampToken) -> Result<Vec<u8>, Error> { in timestamp_token_mac_input() 291 result.extend_from_slice(&token.challenge.to_ne_bytes()[..]); in timestamp_token_mac_input() 292 result.extend_from_slice(&token.timestamp.milliseconds.to_ne_bytes()[..]); in timestamp_token_mac_input()
|