Searched refs:key_size (Results 1 - 22 of 22) sorted by relevance

/system/keymaster/
H A Drsa_key_factory.cpp67 uint32_t key_size; local
68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
72 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize) {
73 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size);
84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */))
110 uint32_t key_size; local
113 &authorizations, &public_exponent, &key_size);
125 uint32_t* key_size) const {
126 if (!updated_description || !public_exponent || !key_size)
[all...]
H A Dec_keymaster0_key.cpp47 uint32_t key_size;
48 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
54 if (!engine_->GenerateEcKey(key_size, &key_material))
60 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
79 uint32_t key_size; local
81 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
92 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
H A Drsa_keymaster0_key.cpp55 uint32_t key_size; local
56 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
62 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material))
69 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
89 uint32_t key_size; local
92 &authorizations, &public_exponent, &key_size);
104 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
H A Dec_key_factory.cpp52 uint32_t key_size; local
53 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
63 UniquePtr<EC_GROUP, EC_GROUP_Delete> group(choose_group(key_size));
65 LOG_E("Unable to get EC group for key of size %d", key_size);
101 uint32_t key_size; local
103 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
H A Daes_operation.h63 const uint8_t* key, size_t key_size);
108 bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size)
110 key_size) {}
126 size_t tag_length, const uint8_t* key, size_t key_size)
128 false /* caller_iv -- don't care */, tag_length, key, key_size) {}
107 AesEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size) argument
125 AesEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, size_t tag_length, const uint8_t* key, size_t key_size) argument
H A Dkeymaster0_engine.h49 bool GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const;
H A Dkeymaster0_engine.cpp130 bool Keymaster0Engine::GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const { argument
133 params.field_size = key_size;
H A Daes_operation.cpp171 const uint8_t* key, size_t key_size)
173 data_started_(false), key_size_(key_size), padding_(padding) {
169 AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode, keymaster_padding_t padding, bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size) argument
H A Dandroid_keymaster_test.cpp774 for (int key_size : key_sizes) {
778 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(digest)));
783 message.resize(key_size / 8);
1965 size_t key_size = 768; local
1967 .RsaEncryptionKey(key_size, 3)
1973 EXPECT_EQ(key_size / 8, ciphertext1.size());
1976 EXPECT_EQ(key_size / 8, ciphertext2.size());
1986 size_t key_size = 768; local
1988 .RsaEncryptionKey(key_size, 3)
1993 EXPECT_EQ(key_size /
2081 size_t key_size = 768; local
[all...]
/system/keymaster/include/keymaster/
H A Dauthorization_set.h446 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
447 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
448 AuthorizationSetBuilder& AesKey(uint32_t key_size);
449 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
451 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
452 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
453 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
454 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
481 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, argument
484 Authorization(TAG_KEY_SIZE, key_size);
489 EcdsaKey(uint32_t key_size) argument
495 AesKey(uint32_t key_size) argument
500 HmacKey(uint32_t key_size) argument
506 RsaSigningKey(uint32_t key_size, uint64_t public_exponent) argument
513 RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent) argument
518 EcdsaSigningKey(uint32_t key_size) argument
523 AesEncryptionKey(uint32_t key_size) argument
[all...]
H A Dec_key_factory.h51 uint32_t* key_size) const;
H A Drsa_key_factory.h55 uint32_t* key_size) const;
/system/bt/stack/gatt/
H A Dgatt_db.c122 UINT8 key_size)
159 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size))
202 ** key_size: encryption key size.
214 UINT8 key_size)
228 status = gatts_check_attr_readability((tGATT_ATTR16 *)p_attr, offset, read_long, sec_flag, key_size);
316 ** key_size: encryption key size.
330 UINT8 key_size,
375 status = read_attr_value ((void *)p_attr, 0, &p, FALSE, (UINT16)(*p_len -2), &len, sec_flag, key_size);
628 ** key_size: encryption key size
640 UINT8 key_size,
118 gatts_check_attr_readability(tGATT_ATTR16 *p_attr, UINT16 offset, BOOLEAN read_long, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument
207 read_attr_value(void *p_attr, UINT16 offset, UINT8 **p_data, BOOLEAN read_long, UINT16 mtu, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument
321 gatts_db_read_attr_value_by_type(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, BT_HDR *p_rsp, UINT16 s_handle, UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id, UINT16 *p_cur_handle) argument
633 gatts_read_attr_value_by_handle(tGATT_TCB *p_tcb, tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_value, UINT16 *p_len, UINT16 mtu, tGATT_SEC_FLAG sec_flag, UINT8 key_size, UINT32 trans_id) argument
691 gatts_read_attr_perm_check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument
737 gatts_write_attr_perm_check(tGATT_SVC_DB *p_db, UINT8 op_code, UINT16 handle, UINT16 offset, UINT8 *p_data, UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size) argument
[all...]
H A Dgatt_sr.c401 UINT8 sec_flag, key_size; local
410 &key_size);
438 key_size))
487 key_size,
986 UINT8 sec_flag, key_size; local
1036 &key_size);
1047 key_size,
1098 UINT8 sec_flag, key_size, *p = p_data; local
1134 &key_size);
1143 key_size);
1190 UINT8 sec_flag, key_size, *p; local
[all...]
H A Dgatt_int.h700 UINT16 e_handle, tBT_UUID type, UINT16 *p_len, tGATT_SEC_FLAG sec_flag, UINT8 key_size,UINT32 trans_id, UINT16 *p_cur_handle);
702 UINT8 *p_value, UINT16 *p_len, UINT16 mtu,tGATT_SEC_FLAG sec_flag,UINT8 key_size,UINT32 trans_id);
704 UINT16 len, tGATT_SEC_FLAG sec_flag, UINT8 key_size);
705 extern tGATT_STATUS gatts_read_attr_perm_check(tGATT_SVC_DB *p_db, BOOLEAN is_long, UINT16 handle, tGATT_SEC_FLAG sec_flag,UINT8 key_size);
/system/bt/stack/btm/
H A Dbtm_ble.c1041 p_rec->ble.keys.key_size = p_keys->penc_key.key_size;
1093 p_rec->ble.keys.key_size = p_keys->lenc_key.key_size;
1096 BTM_TRACE_DEBUG("BTM_LE_KEY_LENC key_type=0x%x DIV=0x%x key_size=0x%x sec_level=0x%x",
1099 p_rec->ble.keys.key_size,
1456 p_dev_rec->enc_key_size = p_dev_rec->ble.keys.key_size;
1481 for (i = 0; i < (BT_OCTET16_LEN - btm_cb.key_size); i ++)
1550 p_cb->key_size = p_rec->ble.keys.key_size;
[all...]
H A Dbtm_int.h458 UINT8 key_size; /* key size of the LTK delivered to peer device */ member in struct:__anon834
816 UINT8 key_size; member in struct:__anon850
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp227 if (dsa_params->key_size < 512) {
237 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL,
/system/vold/
H A Dcryptfs.c197 size_t key_size = 0; local
233 key_size = key_blob.key_material_size;
242 &key, &key_size)) {
253 if (key_size > KEYMASTER_BLOB_SIZE) {
259 memcpy(ftr->keymaster_blob, key, key_size);
260 ftr->keymaster_blob_size = key_size;
/system/bt/stack/smp/
H A Dsmp_utils.c1475 lle_key.key_size = p_cb->loc_enc_size;
1484 ple_key.key_size = p_cb->loc_enc_size;
H A Dsmp_act.c359 le_key.key_size = p_cb->loc_enc_size;
966 le_key.key_size = p_cb->loc_enc_size;
/system/bt/stack/include/
H A Dbtm_api.h1644 UINT8 key_size; member in struct:__anon1027
1660 UINT8 key_size; member in struct:__anon1029

Completed in 127 milliseconds