Deprecated List
Deprecated List
- Global keymaster1_device::delete_all )(const struct keymaster1_device *dev)
- Deletes all keys in the hardware keystore. Used when keystore is reset completely.
- Global keymaster1_device::delete_keypair )(const struct keymaster1_device *dev, const uint8_t *key_blob, const size_t key_blob_length)
- Deletes the key pair associated with the key blob.
- Global keymaster1_device::generate_keypair )(const struct keymaster1_device *dev, const keymaster_keypair_t key_type, const void *key_params, uint8_t **key_blob, size_t *key_blob_length)
- Generates a public and private key. The key-blob returned is opaque and must subsequently provided for signing and verification.
- Global keymaster1_device::get_keypair_public )(const struct keymaster1_device *dev, const uint8_t *key_blob, const size_t key_blob_length, uint8_t **x509_data, size_t *x509_data_length)
- Gets the public key part of a key pair. The public key must be in X.509 format (Java standard) encoded byte array.
- Global keymaster1_device::import_keypair )(const struct keymaster1_device *dev, const uint8_t *key, const size_t key_length, uint8_t **key_blob, size_t *key_blob_length)
- Imports a public and private key pair. The imported keys will be in PKCS#8 format with DER encoding (Java standard). The key-blob returned is opaque and will be subsequently provided for signing and verification.
- Global keymaster1_device::sign_data )(const struct keymaster1_device *dev, const void *signing_params, const uint8_t *key_blob, const size_t key_blob_length, const uint8_t *data, const size_t data_length, uint8_t **signed_data, size_t *signed_data_length)
- Signs data using a key-blob generated before. This can use either an asymmetric key or a secret key.
- Global keymaster1_device::verify_data )(const struct keymaster1_device *dev, const void *signing_params, const uint8_t *key_blob, const size_t key_blob_length, const uint8_t *signed_data, const size_t signed_data_length, const uint8_t *signature, const size_t signature_length)
- Verifies data signed with a key-blob. This can use either an asymmetric key or a secret key.