From bf5b34675a04740d1f307bec40b50b64b120a22b Mon Sep 17 00:00:00 2001 From: Shawn Willden Date: Thu, 26 Feb 2015 06:18:55 -0700 Subject: Separate keymaster0 and keymaster1 HALs. Change-Id: Ida47d6fae1ed7e85e7c223900f6b7a2e655fee47 --- .../nvidia/staging/keymaster/keymaster_grouper.cpp | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/self-extractors/nvidia/staging/keymaster/keymaster_grouper.cpp b/self-extractors/nvidia/staging/keymaster/keymaster_grouper.cpp index 978c5be..37f306a 100644 --- a/self-extractors/nvidia/staging/keymaster/keymaster_grouper.cpp +++ b/self-extractors/nvidia/staging/keymaster/keymaster_grouper.cpp @@ -25,7 +25,7 @@ #include #include -#include +#include #include #include @@ -67,7 +67,7 @@ struct PKCS8_PRIV_KEY_INFO_Delete { }; typedef UniquePtr Unique_PKCS8_PRIV_KEY_INFO; -typedef UniquePtr Unique_keymaster_device_t; +typedef UniquePtr Unique_keymaster_device_t; typedef UniquePtr Unique_CK_BYTE; @@ -327,7 +327,7 @@ static int keyblob_restore(const CryptoSession* session, const uint8_t* keyBlob, || find_single_object(p, ID_LENGTH, CKO_PRIVATE_KEY, session, private_key); } -static int tee_generate_keypair(const keymaster_device_t* dev, +static int tee_generate_keypair(const keymaster0_device_t* dev, const keymaster_keypair_t type, const void* key_params, uint8_t** key_blob, size_t* key_blob_length) { CK_BBOOL bTRUE = CK_TRUE; @@ -406,7 +406,7 @@ static int tee_generate_keypair(const keymaster_device_t* dev, return keyblob_save(objId.get(), key_blob, key_blob_length); } -static int tee_import_keypair(const keymaster_device_t* dev, +static int tee_import_keypair(const keymaster0_device_t* dev, const uint8_t* key, const size_t key_length, uint8_t** key_blob, size_t* key_blob_length) { CK_RV rv; @@ -610,7 +610,7 @@ static int tee_import_keypair(const keymaster_device_t* dev, return keyblob_save(objId.get(), key_blob, key_blob_length); } -static int tee_get_keypair_public(const struct keymaster_device* dev, +static int tee_get_keypair_public(const keymaster0_device_t* dev, const uint8_t* key_blob, const size_t key_blob_length, uint8_t** x509_data, size_t* x509_data_length) { @@ -722,7 +722,7 @@ static int tee_get_keypair_public(const struct keymaster_device* dev, return 0; } -static int tee_delete_keypair(const struct keymaster_device* dev, +static int tee_delete_keypair(const keymaster0_device_t* dev, const uint8_t* key_blob, const size_t key_blob_length) { CryptoSession session(reinterpret_cast(dev->context)); @@ -751,7 +751,7 @@ static int tee_delete_keypair(const struct keymaster_device* dev, return 0; } -static int tee_sign_data(const keymaster_device_t* dev, +static int tee_sign_data(const keymaster0_device_t* dev, const void* params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* data, const size_t dataLength, @@ -821,7 +821,7 @@ static int tee_sign_data(const keymaster_device_t* dev, return 0; } -static int tee_verify_data(const keymaster_device_t* dev, +static int tee_verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, @@ -877,7 +877,7 @@ static int tee_verify_data(const keymaster_device_t* dev, /* Close an opened OpenSSL instance */ static int tee_close(hw_device_t *dev) { - keymaster_device_t *keymaster_dev = (keymaster_device_t *) dev; + keymaster0_device_t *keymaster_dev = (keymaster0_device_t *) dev; if (keymaster_dev != NULL) { CK_SESSION_HANDLE handle = reinterpret_cast(keymaster_dev->context); if (handle != CK_INVALID_HANDLE) { @@ -902,7 +902,7 @@ static int tee_open(const hw_module_t* module, const char* name, if (strcmp(name, KEYSTORE_KEYMASTER) != 0) return -EINVAL; - Unique_keymaster_device_t dev(new keymaster_device_t); + Unique_keymaster_device_t dev(new keymaster0_device_t); if (dev.get() == NULL) return -ENOMEM; -- cgit v1.2.3