diff options
author | Shawn Willden <swillden@google.com> | 2015-02-26 07:43:52 -0700 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2016-01-04 08:44:03 +0100 |
commit | 4aa4ddb06d3dc5ac4ea741ebcf1d312d6fcfdccb (patch) | |
tree | 41c02999ebb9a690e25a1c62d203ded22aba6908 | |
parent | 49c495aa5cc7caec3f980c4e11e97a05148de1d4 (diff) | |
download | android_hardware_samsung_slsi_exynos5430-4aa4ddb06d3dc5ac4ea741ebcf1d312d6fcfdccb.tar.gz android_hardware_samsung_slsi_exynos5430-4aa4ddb06d3dc5ac4ea741ebcf1d312d6fcfdccb.tar.xz android_hardware_samsung_slsi_exynos5430-4aa4ddb06d3dc5ac4ea741ebcf1d312d6fcfdccb.zip |
Separate keymaster0 and keymaster1 HALs.
Change-Id: Ida47d6fae1ed7e85e7c223900f6b7a2e655fee47
(cherry picked from commit f02e17e73036be67a9c8d6ecc7b82cbc5684131d)
-rw-r--r-- | libkeymaster/keymaster_mobicore.cpp | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/libkeymaster/keymaster_mobicore.cpp b/libkeymaster/keymaster_mobicore.cpp index 2211760..0e5a21c 100644 --- a/libkeymaster/keymaster_mobicore.cpp +++ b/libkeymaster/keymaster_mobicore.cpp @@ -20,7 +20,7 @@ #include <stdint.h> #include <hardware/hardware.h> -#include <hardware/keymaster.h> +#include <hardware/keymaster0.h> #include <openssl/evp.h> #include <openssl/bio.h> @@ -66,7 +66,7 @@ struct RSA_Delete { }; typedef UniquePtr<RSA, RSA_Delete> Unique_RSA; -typedef UniquePtr<keymaster_device_t> Unique_keymaster_device_t; +typedef UniquePtr<keymaster0_device_t> Unique_keymaster_device_t; /** * Many OpenSSL APIs take ownership of an argument on success but don't free the argument @@ -92,7 +92,7 @@ static void logOpenSSLError(const char* location) { ERR_remove_state(0); } -static int exynos_km_generate_keypair(const keymaster_device_t* dev, +static int exynos_km_generate_keypair(const keymaster0_device_t* dev, const keymaster_keypair_t key_type, const void* key_params, uint8_t** keyBlob, size_t* keyBlobLength) { teeResult_t ret = TEE_ERR_NONE; @@ -133,7 +133,7 @@ static int exynos_km_generate_keypair(const keymaster_device_t* dev, return 0; } -static int exynos_km_import_keypair(const keymaster_device_t* dev, +static int exynos_km_import_keypair(const keymaster0_device_t* dev, const uint8_t* key, const size_t key_length, uint8_t** key_blob, size_t* key_blob_length) { uint8_t kbuf[RSA_KEY_BUFFER_SIZE]; @@ -233,7 +233,7 @@ static int exynos_km_import_keypair(const keymaster_device_t* dev, return 0; } -static int exynos_km_get_keypair_public(const struct keymaster_device* dev, +static int exynos_km_get_keypair_public(const keymaster0_device_t* dev, const uint8_t* key_blob, const size_t key_blob_length, uint8_t** x509_data, size_t* x509_data_length) { uint32_t bin_mod_len; @@ -332,7 +332,7 @@ static int exynos_km_get_keypair_public(const struct keymaster_device* dev, return 0; } -static int exynos_km_sign_data(const keymaster_device_t* dev, +static int exynos_km_sign_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* data, const size_t dataLength, @@ -380,7 +380,7 @@ static int exynos_km_sign_data(const keymaster_device_t* dev, return 0; } -static int exynos_km_verify_data(const keymaster_device_t* dev, +static int exynos_km_verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, @@ -435,7 +435,7 @@ static int exynos_km_open(const hw_module_t* module, const char* name, if (strcmp(name, KEYSTORE_KEYMASTER) != 0) return -EINVAL; - Unique_keymaster_device_t dev(new keymaster_device_t); + Unique_keymaster_device_t dev(new keymaster0_device_t); if (dev.get() == NULL) return -ENOMEM; |