Searched refs:key_size (Results 1 - 5 of 5) sorted by relevance
/system/keymaster/ |
H A D | asymmetric_key.cpp | 136 uint32_t key_size = RSA_DEFAULT_KEY_SIZE; local 137 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) 138 authorizations.push_back(Authorization(TAG_KEY_SIZE, key_size)); 149 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) { 192 uint32_t key_size; local 193 if (authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 194 // key_size specified, make sure it matches the key. 195 if (RSA_size(rsa_key.get()) != (int)key_size) { 200 key_size = RSA_size(rsa_key.get()) * 8; 201 authorizations.push_back(TAG_KEY_SIZE, key_size); 286 uint32_t key_size = DSA_DEFAULT_KEY_SIZE; local 466 uint32_t key_size = ECDSA_DEFAULT_KEY_SIZE; local [all...] |
H A D | google_keymaster_test.cpp | 384 keymaster_padding_t padding, uint32_t key_size) { 389 Authorization(TAG_KEY_SIZE, key_size), 383 GenerateKey(keymaster_algorithm_t algorithm, keymaster_digest_t digest, keymaster_padding_t padding, uint32_t key_size) argument
|
/system/vold/ |
H A D | cryptfs.c | 173 size_t key_size; local 175 &key, &key_size)) { 181 if (key_size > KEYMASTER_BLOB_SIZE) { 187 memcpy(ftr->keymaster_blob, key, key_size); 188 ftr->keymaster_blob_size = key_size; 1221 unsigned int key_size; local 1230 unsigned char* master_key = convert_hex_ascii_to_key(passwd, &key_size); 1236 rc = crypto_scrypt(master_key, key_size, salt, SALT_LEN, 1238 memset(master_key, 0, key_size);
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 242 if (dsa_params->key_size < 512) { 252 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL,
|
/system/security/keystore/ |
H A D | keystore.cpp | 1865 dsa_params.key_size = keySize;
|
Completed in 157 milliseconds