Project: /_project.yaml Book: /_book.yaml
Defined in fuchsia.kms/key_manager.fidl
Seal data to an encrypted form.
Seal data to an encrypted form. The sealed data can only be unsealed by the same KMS instance by using UnsealData. plain_text
needs to be less than MAX_DATA_SIZE
bytes.
Unseal sealed data.
Unseal data previously sealed by this KMS instance.
Generate an asymmetric key.
Generate an asymmetric key using key_name
as the unique name. key
is the generated asymmetric key interface request. If the key_name
is not unique, you would get KEY_ALREADY_EXISTS
. The generated key can be used to sign data. The algorithm used for generating asymmetric key is ECDSA_SHA512_P521
.
Generate an asymmetric key with a specific algorithm.
Generate an asymmetric key using key_name
as the unique name and key_algorithm
as algorithm. key
is the generated asymmetric key interface request. If the key_name
is not unique, you would get KEY_ALREADY_EXISTS
.
Import an asymmetric private key with a specific algorithm.
Import an asymmetric private key using key_name
as the unique name, key_algorithm
as algorithm and data
as key data. key
is imported asymmetric key interface request. Key data should be in asn.1 encoded DER format. If the key_name
is not unique, you would get KEY_ALREADY_EXISTS
.
Get an asymmetric private key handle.
Get an asymmetric private key handle using the key_name
. If such key is not found, would return KEY_NOT_FOUND
.
Delete a key.
Delete a key for key_name
. For all the current handle to the deleted key, they would become invalid and all following requests on those handles would return KEY_NOT_FOUND
, user should close the invalid handles once get KEY_NOT_FOUND
Status.
Defined in fuchsia.kms/key_manager.fidl
Get the key origin (generated/imported).
Defined in fuchsia.kms/key_manager.fidl
Get the key origin (generated/imported).
Sign data
using the current key. data
needs to be less than MAX_DATA_SIZE
bytes.
Get the DER format public key for the current private key.
Get the key algorithm.
Defined in fuchsia.kms/key_manager_stateless.fidl
Get a hardware key derived key.
Get a key derived from hardware root key using | key_info | as info and the trusted app ID as salt. This call is deterministic and always returns the same result if given the same | key_info | on the same device and would be different across different devices if they have different hardware keys.
Defined in fuchsia.kms/key_manager.fidl
Defined in fuchsia.kms/key_manager.fidl
Type: uint32
Defined in fuchsia.kms/key_manager.fidl
Type: uint32
Defined in fuchsia.kms/key_manager.fidl
Type: uint32
Defined in fuchsia.kms/key_manager.fidl