/system/keymaster/ |
H A D | rsa_key_factory.cpp | 67 uint32_t key_size; local 68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 72 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize) { 73 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); 84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) 110 uint32_t key_size; local 113 &authorizations, &public_exponent, &key_size); 125 uint32_t* key_size) const { 126 if (!updated_description || !public_exponent || !key_size) [all...] |
H A D | ec_keymaster0_key.cpp | 47 uint32_t key_size; 48 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 54 if (!engine_->GenerateEcKey(key_size, &key_material)) 60 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 79 uint32_t key_size; local 81 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 92 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
H A D | rsa_keymaster0_key.cpp | 55 uint32_t key_size; local 56 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 62 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material)) 69 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 89 uint32_t key_size; local 92 &authorizations, &public_exponent, &key_size); 104 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
H A D | ec_key_factory.cpp | 52 uint32_t key_size; local 53 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 63 UniquePtr<EC_GROUP, EC_GROUP_Delete> group(choose_group(key_size)); 65 LOG_E("Unable to get EC group for key of size %d", key_size); 101 uint32_t key_size; local 103 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
|
H A D | aes_operation.h | 63 const uint8_t* key, size_t key_size); 108 bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size) 110 key_size) {} 126 size_t tag_length, const uint8_t* key, size_t key_size) 128 false /* caller_iv -- don't care */, tag_length, key, key_size) {} 107 AesEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size) argument 125 AesEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, size_t tag_length, const uint8_t* key, size_t key_size) argument
|
H A D | keymaster0_engine.h | 49 bool GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const;
|
H A D | keymaster0_engine.cpp | 130 bool Keymaster0Engine::GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const { argument 133 params.field_size = key_size;
|
H A D | aes_operation.cpp | 171 const uint8_t* key, size_t key_size) 173 data_started_(false), key_size_(key_size), padding_(padding) { 169 AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode, keymaster_padding_t padding, bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size) argument
|
H A D | android_keymaster_test.cpp | 774 for (int key_size : key_sizes) { 778 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(digest))); 783 message.resize(key_size / 8); 1965 size_t key_size = 768; local 1967 .RsaEncryptionKey(key_size, 3) 1973 EXPECT_EQ(key_size / 8, ciphertext1.size()); 1976 EXPECT_EQ(key_size / 8, ciphertext2.size()); 1986 size_t key_size = 768; local 1988 .RsaEncryptionKey(key_size, 3) 1993 EXPECT_EQ(key_size / 2081 size_t key_size = 768; local [all...] |
/system/keymaster/include/keymaster/ |
H A D | authorization_set.h | 446 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 447 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 448 AuthorizationSetBuilder& AesKey(uint32_t key_size); 449 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 451 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 452 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 453 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 454 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 481 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, argument 484 Authorization(TAG_KEY_SIZE, key_size); 489 EcdsaKey(uint32_t key_size) argument 495 AesKey(uint32_t key_size) argument 500 HmacKey(uint32_t key_size) argument 506 RsaSigningKey(uint32_t key_size, uint64_t public_exponent) argument 513 RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent) argument 518 EcdsaSigningKey(uint32_t key_size) argument 523 AesEncryptionKey(uint32_t key_size) argument [all...] |
H A D | ec_key_factory.h | 51 uint32_t* key_size) const;
|
H A D | rsa_key_factory.h | 55 uint32_t* key_size) const;
|
/system/bt/stack/gatt/ |
H A D | gatt_db.c | 122 UINT8 key_size) 159 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) 202 ** key_size: encryption key size. 214 UINT8 key_size) 228 status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size); 316 ** key_size: encryption key size. 330 UINT8 key_size, 375 status = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len -2), &len, sec_flag, key_size); 628 ** key_size: encryption key size 640 UINT8 key_size, 118 gatts_check_attr_readability(tGATT_ATTR16 *p_attr, UINT16 offset, BOOLEAN read_long, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 207 read_attr_value(void *p_attr, UINT16 offset, UINT8 **p_data, BOOLEAN read_long, UINT16 mtu, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 321 gatts_db_read_attr_value_by_type(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, BT_HDR *p_rsp, UINT16 s_handle, UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id, UINT16 *p_cur_handle) argument 633 gatts_read_attr_value_by_handle(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id) argument 691 gatts_read_attr_perm_check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument 737 gatts_write_attr_perm_check(tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_data, UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument [all...] |
H A D | gatt_sr.c | 401 UINT8 sec_flag, key_size; local 410 &key_size); 438 key_size)) 487 key_size, 986 UINT8 sec_flag, key_size; local 1036 &key_size); 1047 key_size, 1098 UINT8 sec_flag, key_size, *p = p_data; local 1134 &key_size); 1143 key_size); 1190 UINT8 sec_flag, key_size, *p; local [all...] |
H A D | gatt_int.h | 700 UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size,UINT32 trans_id, UINT16 *p_cur_handle); 702 UINT8 *p_value, UINT16 *p_len, UINT16 mtu,tGATT_SEC_FLAG sec_flag,UINT8 key_size,UINT32 trans_id); 704 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size); 705 extern tGATT_STATUS gatts_read_attr_perm_check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag,UINT8 key_size);
|
/system/bt/stack/btm/ |
H A D | btm_ble.c | 1041 p_rec->ble.keys.key_size = p_keys->penc_key.key_size; 1093 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size; 1096 BTM_TRACE_DEBUG("BTM_LE_KEY_LENC key_type=0x%x DIV=0x%x key_size=0x%x sec_level=0x%x", 1099 p_rec->ble.keys.key_size, 1456 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size; 1481 for (i = 0; i < (BT_OCTET16_LEN - btm_cb.key_size); i ++) 1550 p_cb->key_size = p_rec->ble.keys.key_size; [all...] |
H A D | btm_int.h | 458 UINT8 key_size; /* key size of the LTK delivered to peer device */ member in struct:__anon834 816 UINT8 key_size; member in struct:__anon850
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 227 if (dsa_params->key_size < 512) { 237 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL,
|
/system/vold/ |
H A D | cryptfs.c | 197 size_t key_size = 0; local 233 key_size = key_blob.key_material_size; 242 &key, &key_size)) { 253 if (key_size > KEYMASTER_BLOB_SIZE) { 259 memcpy(ftr->keymaster_blob, key, key_size); 260 ftr->keymaster_blob_size = key_size;
|
/system/bt/stack/smp/ |
H A D | smp_utils.c | 1475 lle_key.key_size = p_cb->loc_enc_size; 1484 ple_key.key_size = p_cb->loc_enc_size;
|
H A D | smp_act.c | 359 le_key.key_size = p_cb->loc_enc_size; 966 le_key.key_size = p_cb->loc_enc_size;
|
/system/bt/stack/include/ |
H A D | btm_api.h | 1644 UINT8 key_size; member in struct:__anon1027 1660 UINT8 key_size; member in struct:__anon1029
|