A partir de 27 de março de 2025, recomendamos usar android-latest-release
em vez de aosp-main
para criar e contribuir com o AOSP. Para mais informações, consulte Mudanças no AOSP.
Mantenha tudo organizado com as coleções
Salve e categorize o conteúdo com base nas suas preferências.
Lista obsoleta
-
Global
keymaster1_device::delete_all
)(const struct
keymaster1_device
*dev)
-
Exclui todas as chaves no keystore de hardware. Usado quando o keystore é redefinido completamente.
-
Global
keymaster1_device::delete_keypair
)(const struct
keymaster1_device
*dev, const uint8_t *key_blob, const size_t key_blob_length)
-
Exclui o par de chaves associado ao blob de chaves.
-
Global
keymaster1_device::generate_keypair
)(const struct
keymaster1_device
*dev, const keymaster_keypair_t key_type, const void *key_params, uint8_t **key_blob, size_t *key_blob_length)
-
Gera uma chave pública e privada. O blob de chaves retornado é opaco e precisa ser fornecido para assinatura e verificação.
-
Global
keymaster1_device::get_keypair_public
)(const struct
keymaster1_device
*dev, const uint8_t *key_blob, const size_t key_blob_length, uint8_t **x509_data, size_t *x509_data_length)
-
Recupera a parte da chave pública de um par de chaves. A chave pública precisa estar em uma matriz de bytes codificada no formato X.509 (padrão Java).
-
Global
keymaster1_device::import_keypair
)(const struct
keymaster1_device
*dev, const uint8_t *key, const size_t key_length, uint8_t **key_blob, size_t *key_blob_length)
-
Importa um par de chaves pública e privada. As chaves importadas estarão no formato PKCS#8 com codificação DER (padrão Java). O blob de chaves retornado é opaco e será fornecido posteriormente para assinatura e verificação.
-
Global
keymaster1_device::sign_data
)(const struct
keymaster1_device
*dev, const void *signing_params, const uint8_t *key_blob, const size_t key_blob_length, const uint8_t *data, const size_t data_length, uint8_t **signed_data, size_t *signed_data_length)
-
Assina dados usando um blob de chave gerado anteriormente. Isso pode usar uma chave assimétrica ou uma chave secreta.
-
Global
keymaster1_device::verify_data
)(const struct
keymaster1_device
*dev, const void *signing_params, const uint8_t *key_blob, const size_t key_blob_length, const uint8_t *signed_data, const size_t signed_data_length, const uint8_t *signature, const size_t signature_length)
-
Verifica os dados assinados com um blob de chave. Isso pode usar uma chave assimétrica ou uma chave secreta.
O conteúdo e os exemplos de código nesta página estão sujeitos às licenças descritas na Licença de conteúdo. Java e OpenJDK são marcas registradas da Oracle e/ou suas afiliadas.
Última atualização 2025-07-27 UTC.
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Não contém as informações de que eu preciso","missingTheInformationINeed","thumb-down"],["Muito complicado / etapas demais","tooComplicatedTooManySteps","thumb-down"],["Desatualizado","outOfDate","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Problema com as amostras / o código","samplesCodeIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-07-27 UTC."],[],[],null,["# Android Hardware Abstraction Layer: Deprecated List\n\nDeprecated List\n===============\n\nDeprecated List \n\n\nGlobal\n[keymaster1_device::delete_all](/reference/hal/structkeymaster1__device#ae7158d59431d8a3b114db7db21c2892e)\n)(const struct\n[keymaster1_device](/reference/hal/structkeymaster1__device)\n\\*dev)\n:\n Deletes all keys in the hardware keystore. Used when keystore is reset completely.\n\n\nGlobal\n[keymaster1_device::delete_keypair](/reference/hal/structkeymaster1__device#a1380d233beee6513ef32133b549e5779)\n)(const struct\n[keymaster1_device](/reference/hal/structkeymaster1__device)\n\\*dev, const uint8_t \\*key_blob, const size_t key_blob_length)\n:\n Deletes the key pair associated with the key blob.\n\n\nGlobal\n[keymaster1_device::generate_keypair](/reference/hal/structkeymaster1__device#a7bdefb9b33c3ae42dd36be3afffb1215)\n)(const struct\n[keymaster1_device](/reference/hal/structkeymaster1__device)\n\\*dev, const keymaster_keypair_t key_type, const void \\*key_params, uint8_t \\*\\*key_blob, size_t \\*key_blob_length)\n:\n Generates a public and private key. The key-blob returned is opaque and must subsequently provided for signing and verification.\n\n\nGlobal\n[keymaster1_device::get_keypair_public](/reference/hal/structkeymaster1__device#ad53f324ac6476496708ffa4b13bab716)\n)(const struct\n[keymaster1_device](/reference/hal/structkeymaster1__device)\n\\*dev, const uint8_t \\*key_blob, const size_t key_blob_length, uint8_t \\*\\*x509_data, size_t \\*x509_data_length)\n:\n Gets the public key part of a key pair. The public key must be in X.509 format (Java standard) encoded byte array.\n\n\nGlobal\n[keymaster1_device::import_keypair](/reference/hal/structkeymaster1__device#a7e5d897f4dac88671c441aee9a80b876)\n)(const struct\n[keymaster1_device](/reference/hal/structkeymaster1__device)\n\\*dev, const uint8_t \\*key, const size_t key_length, uint8_t \\*\\*key_blob, size_t \\*key_blob_length)\n:\n Imports a public and private key pair. The imported keys will be in PKCS#8 format with DER encoding (Java standard). The key-blob returned is opaque and will be subsequently provided for signing and verification.\n\n\nGlobal\n[keymaster1_device::sign_data](/reference/hal/structkeymaster1__device#aff0939b6df82b378a41e1b3956bacdc2)\n)(const struct\n[keymaster1_device](/reference/hal/structkeymaster1__device)\n\\*dev, const void \\*signing_params, const uint8_t \\*key_blob, const size_t key_blob_length, const uint8_t \\*data, const size_t data_length, uint8_t \\*\\*signed_data, size_t \\*signed_data_length)\n:\n Signs data using a key-blob generated before. This can use either an asymmetric key or a secret key.\n\n\nGlobal\n[keymaster1_device::verify_data](/reference/hal/structkeymaster1__device#a78c926152ef8e4088969a6b189ce70cd)\n)(const struct\n[keymaster1_device](/reference/hal/structkeymaster1__device)\n\\*dev, const void \\*signing_params, const uint8_t \\*key_blob, const size_t key_blob_length, const uint8_t \\*signed_data, const size_t signed_data_length, const uint8_t \\*signature, const size_t signature_length)\n:\n Verifies data signed with a key-blob. This can use either an asymmetric key or a secret key."]]