Searched defs:key_size (Results 1 - 14 of 14) sorted by relevance

/system/keymaster/
H A Dec_key_factory.cpp52 uint32_t key_size; local
53 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
63 UniquePtr<EC_GROUP, EC_GROUP_Delete> group(choose_group(key_size));
65 LOG_E("Unable to get EC group for key of size %d", key_size);
101 uint32_t key_size; local
103 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
H A Dec_keymaster0_key.cpp47 uint32_t key_size;
48 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
54 if (!engine_->GenerateEcKey(key_size, &key_material))
60 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
79 uint32_t key_size; local
81 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
92 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
H A Drsa_key_factory.cpp67 uint32_t key_size; local
68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
72 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize) {
73 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size);
84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */))
110 uint32_t key_size; local
113 &authorizations, &public_exponent, &key_size);
125 uint32_t* key_size) const {
126 if (!updated_description || !public_exponent || !key_size)
[all...]
H A Drsa_keymaster0_key.cpp55 uint32_t key_size; local
56 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
62 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material))
69 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
89 uint32_t key_size; local
92 &authorizations, &public_exponent, &key_size);
104 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
H A Daes_operation.h63 const uint8_t* key, size_t key_size);
108 bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size)
110 key_size) {}
126 size_t tag_length, const uint8_t* key, size_t key_size)
128 false /* caller_iv -- don't care */, tag_length, key, key_size) {}
107 AesEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size) argument
125 AesEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, size_t tag_length, const uint8_t* key, size_t key_size) argument
H A Dkeymaster0_engine.cpp130 bool Keymaster0Engine::GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const { argument
133 params.field_size = key_size;
H A Daes_operation.cpp171 const uint8_t* key, size_t key_size)
173 data_started_(false), key_size_(key_size), padding_(padding) {
169 AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode, keymaster_padding_t padding, bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size) argument
H A Dandroid_keymaster_test.cpp774 for (int key_size : key_sizes) {
778 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(digest)));
783 message.resize(key_size / 8);
1965 size_t key_size = 768; local
1967 .RsaEncryptionKey(key_size, 3)
1973 EXPECT_EQ(key_size / 8, ciphertext1.size());
1976 EXPECT_EQ(key_size / 8, ciphertext2.size());
1986 size_t key_size = 768; local
1988 .RsaEncryptionKey(key_size, 3)
1993 EXPECT_EQ(key_size /
2081 size_t key_size = 768; local
[all...]
/system/keymaster/include/keymaster/
H A Dauthorization_set.h446 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
447 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
448 AuthorizationSetBuilder& AesKey(uint32_t key_size);
449 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
451 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
452 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
453 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
454 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
481 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, argument
484 Authorization(TAG_KEY_SIZE, key_size);
489 EcdsaKey(uint32_t key_size) argument
495 AesKey(uint32_t key_size) argument
500 HmacKey(uint32_t key_size) argument
506 RsaSigningKey(uint32_t key_size, uint64_t public_exponent) argument
513 RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent) argument
518 EcdsaSigningKey(uint32_t key_size) argument
523 AesEncryptionKey(uint32_t key_size) argument
[all...]
/system/bt/stack/gatt/
H A Dgatt_db.c122 UINT8 key_size)
159 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size))
202 ** key_size: encryption key size.
214 UINT8 key_size)
228 status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size);
316 ** key_size: encryption key size.
330 UINT8 key_size,
375 status = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len -2), &len, sec_flag, key_size);
628 ** key_size: encryption key size
640 UINT8 key_size,
118 gatts_check_attr_readability(tGATT_ATTR16 *p_attr, UINT16 offset, BOOLEAN read_long, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument
207 read_attr_value(void *p_attr, UINT16 offset, UINT8 **p_data, BOOLEAN read_long, UINT16 mtu, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument
321 gatts_db_read_attr_value_by_type(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, BT_HDR *p_rsp, UINT16 s_handle, UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id, UINT16 *p_cur_handle) argument
633 gatts_read_attr_value_by_handle(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id) argument
691 gatts_read_attr_perm_check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument
737 gatts_write_attr_perm_check(tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_data, UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument
[all...]
H A Dgatt_sr.c401 UINT8 sec_flag, key_size; local
410 &key_size);
438 key_size))
487 key_size,
986 UINT8 sec_flag, key_size; local
1036 &key_size);
1047 key_size,
1098 UINT8 sec_flag, key_size, *p = p_data; local
1134 &key_size);
1143 key_size);
1190 UINT8 sec_flag, key_size, *p; local
[all...]
/system/vold/
H A Dcryptfs.c197 size_t key_size = 0; local
233 key_size = key_blob.key_material_size;
242 &key, &key_size)) {
253 if (key_size > KEYMASTER_BLOB_SIZE) {
259 memcpy(ftr->keymaster_blob, key, key_size);
260 ftr->keymaster_blob_size = key_size;
/system/bt/stack/btm/
H A Dbtm_int.h458 UINT8 key_size; /* key size of the LTK delivered to peer device */ member in struct:__anon834
816 UINT8 key_size; member in struct:__anon850
/system/bt/stack/include/
H A Dbtm_api.h1644 UINT8 key_size; member in struct:__anon1027
1660 UINT8 key_size; member in struct:__anon1029

Completed in 1242 milliseconds