/system/keymaster/km_openssl/ |
H A D | aes_operation.cpp | 30 const EVP_CIPHER* AesEvpCipherDescription::GetCipherInstance(size_t key_size, argument 37 switch (key_size) { 49 switch (key_size) { 61 switch (key_size) { 73 switch (key_size) {
|
H A D | triple_des_operation.cpp | 30 TripleDesEvpCipherDescription::GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode, argument 36 switch (key_size) { 48 switch (key_size) {
|
H A D | rsa_key_factory.cpp | 71 uint32_t key_size; local 72 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 76 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize || key_size < kMinimumRsaKeySize) { 77 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); 88 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) 114 uint32_t key_size; local 117 &authorizations, &public_exponent, &key_size); 129 uint32_t* key_size) cons [all...] |
H A D | ec_key_factory.cpp | 84 uint32_t key_size; local 85 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); 88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { 89 authorizations.push_back(TAG_KEY_SIZE, key_size); 137 uint32_t key_size; local 139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
|
H A D | attestation_record.cpp | 179 integer_ptr = &record->key_size; 339 uint32_t key_size; local 342 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) { 345 keymaster_error_t error = EcKeySizeToCurve(key_size, &ec_curve); 556 if (record->key_size && !auth_list->push_back(TAG_KEY_SIZE, ASN1_INTEGER_get(record->key_size)))
|
/system/keymaster/legacy_support/ |
H A D | ec_keymaster0_key.cpp | 47 uint32_t key_size; local 48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 54 if (!engine_->GenerateEcKey(key_size, &key_material)) 60 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 80 uint32_t key_size; local 82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 93 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
H A D | rsa_keymaster0_key.cpp | 49 uint32_t key_size; local 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material)) 63 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 79 uint32_t key_size; local 82 &authorizations, &public_exponent, &key_size); 94 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
H A D | ec_keymaster1_key.cpp | 72 uint32_t key_size; local 73 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 76 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { 77 key_params_copy.push_back(TAG_KEY_SIZE, key_size);
|
H A D | keymaster0_engine.cpp | 97 bool Keymaster0Engine::GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const { argument 100 params.field_size = key_size;
|
/system/keymaster/tests/ |
H A D | wrapped_key_test.cpp | 94 uint32_t key_size; local 95 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size); 96 EXPECT_EQ(key_size, (uint32_t)256);
|
H A D | android_keymaster_test.cpp | 367 for (size_t key_size = 0; key_size <= kMaxHmacKeyLengthBits + 10; ++key_size) { 368 if (key_size < kMinHmacKeyLengthBits || key_size > kMaxHmacKeyLengthBits || 369 key_size % 8 != 0) { 372 .HmacKey(key_size) 375 << "HMAC key size " << key_size << " invalid."; 378 .HmacKey(key_size) 743 for (int key_size 2162 size_t key_size = 768; local 2183 size_t key_size = 768; local 2204 size_t key_size = 768; local 2221 size_t key_size = 768; local 2325 size_t key_size = 768; local 2383 size_t key_size = 2048; local [all...] |
/system/keymaster/ng/include/ |
H A D | authorization_set.h | 245 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 246 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 247 AuthorizationSetBuilder& AesKey(uint32_t key_size); 248 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 250 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 251 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 252 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 253 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 269 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, argument 272 Authorization(TAG_KEY_SIZE, key_size); 277 EcdsaKey(uint32_t key_size) argument 283 AesKey(uint32_t key_size) argument 288 HmacKey(uint32_t key_size) argument 294 RsaSigningKey(uint32_t key_size, uint64_t public_exponent) argument 301 RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent) argument 306 EcdsaSigningKey(uint32_t key_size) argument 311 AesEncryptionKey(uint32_t key_size) argument [all...] |
/system/netd/libbpf/ |
H A D | BpfUtils.cpp | 72 int createMap(bpf_map_type map_type, uint32_t key_size, uint32_t value_size, uint32_t max_entries, argument 77 attr.key_size = key_size;
|
/system/vold/tests/ |
H A D | CryptfsScryptHidlizationEquivalence_test.cpp | 156 size_t key_size = 0; local 192 key_size = key_blob.key_material_size; 201 &key, &key_size)) { 212 if (key_size > KEYMASTER_BLOB_SIZE) { 218 memcpy(ftr->keymaster_blob, key, key_size); 219 ftr->keymaster_blob_size = key_size;
|
/system/bt/stack/gatt/ |
H A D | gatt_db.cc | 85 uint8_t key_size) { 119 (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) { 158 * key_size: encryption key size. 166 tGATT_SEC_FLAG sec_flag, uint8_t key_size) { 174 sec_flag, key_size); 249 * key_size: encryption key size. 257 tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id, 274 &len, sec_flag, key_size); 437 * key_size: encryption key size 445 tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_ 81 gatts_check_attr_readability(const tGATT_ATTR& attr, UNUSED_ATTR uint16_t offset, bool read_long, tGATT_SEC_FLAG sec_flag, uint8_t key_size) argument 163 read_attr_value(tGATT_ATTR& attr16, uint16_t offset, uint8_t** p_data, bool read_long, uint16_t mtu, uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size) argument 254 gatts_db_read_attr_value_by_type( tGATT_TCB& tcb, tGATT_SVC_DB* p_db, uint8_t op_code, BT_HDR* p_rsp, uint16_t s_handle, uint16_t e_handle, const Uuid& type, uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id, uint16_t* p_cur_handle) argument 442 gatts_read_attr_value_by_handle( tGATT_TCB& tcb, tGATT_SVC_DB* p_db, uint8_t op_code, uint16_t handle, uint16_t offset, uint8_t* p_value, uint16_t* p_len, uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id) argument 480 gatts_read_attr_perm_check(tGATT_SVC_DB* p_db, bool is_long, uint16_t handle, tGATT_SEC_FLAG sec_flag, uint8_t key_size) argument 508 gatts_write_attr_perm_check(tGATT_SVC_DB* p_db, uint8_t op_code, uint16_t handle, uint16_t offset, uint8_t* p_data, uint16_t len, tGATT_SEC_FLAG sec_flag, uint8_t key_size) argument [all...] |
H A D | gatt_sr.cc | 358 uint8_t sec_flag, key_size; local 363 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); 389 key_size); 422 &p_msg->attr_value.len, GATT_MAX_ATTR_LEN, sec_flag, key_size, 826 uint8_t sec_flag, key_size; local 827 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); 831 key_size, 0, &err_hdl); 870 uint8_t sec_flag, key_size, *p = p_data; local 906 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); 910 sec_flag, key_size); 975 uint8_t sec_flag, key_size; local [all...] |
/system/keymaster/include/keymaster/ |
H A D | attestation_record.h | 58 ASN1_INTEGER* key_size; member in struct:keymaster::km_auth_list 97 ASN1_EXP_OPT(KM_AUTH_LIST, key_size, ASN1_INTEGER, TAG_KEY_SIZE.masked_tag()),
|
H A D | authorization_set.h | 515 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 516 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 517 AuthorizationSetBuilder& AesKey(uint32_t key_size); 518 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size); 519 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 521 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 522 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 523 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 524 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 525 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size); 556 RsaKey(uint32_t key_size, uint64_t public_exponent) argument 564 EcdsaKey(uint32_t key_size) argument 570 AesKey(uint32_t key_size) argument 575 TripleDesKey(uint32_t key_size) argument 580 HmacKey(uint32_t key_size) argument 586 RsaSigningKey(uint32_t key_size, uint64_t public_exponent) argument 593 RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent) argument 598 EcdsaSigningKey(uint32_t key_size) argument 603 AesEncryptionKey(uint32_t key_size) argument 608 TripleDesEncryptionKey(uint32_t key_size) argument [all...] |
/system/security/keystore/ |
H A D | keystore_client_impl.cpp | 484 auto key_size = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_KEY_SIZE), local 486 if (!key_size.isOk() || key_size.value() != kAESKeySize) { 525 auto key_size = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_KEY_SIZE), local 527 if (!key_size.isOk() || key_size.value() != kHMACKeySize) {
|
H A D | keystore_cli_v2.cpp | 137 AuthorizationSet GetRSASignParameters(uint32_t key_size, bool sha256_only) { argument 139 parameters.RsaSigningKey(key_size, 65537) 150 AuthorizationSet GetRSAEncryptParameters(uint32_t key_size) { argument 152 parameters.RsaEncryptionKey(key_size, 65537) 159 AuthorizationSet GetECDSAParameters(uint32_t key_size, bool sha256_only) { argument 161 parameters.EcdsaSigningKey(key_size) 170 AuthorizationSet GetAESParameters(uint32_t key_size, bool with_gcm_mode) { argument 172 parameters.AesEncryptionKey(key_size).Authorization(TAG_NO_AUTH_REQUIRED); 185 AuthorizationSet GetHMACParameters(uint32_t key_size, Digest digest) { argument 187 parameters.HmacKey(key_size) [all...] |
/system/bt/stack/btm/ |
H A D | btm_int_types.h | 430 uint8_t key_size; /* key size of the LTK delivered to peer device */ member in struct:__anon971 775 uint8_t key_size; member in struct:__anon987
|
/system/bt/stack/include/ |
H A D | btm_api_types.h | 1636 uint8_t key_size; member in struct:__anon1160 1650 uint8_t key_size; member in struct:__anon1162
|
/system/tpm/trunks/ |
H A D | tpm_generated.h | 1446 UINT16 key_size; member in struct:trunks::TPMS_ALGORITHM_DETAIL_ECC
|