Searched defs:key_size (Results 1 - 23 of 23) sorted by relevance

/system/keymaster/km_openssl/
H A Daes_operation.cpp30 const EVP_CIPHER* AesEvpCipherDescription::GetCipherInstance(size_t key_size, argument
37 switch (key_size) {
49 switch (key_size) {
61 switch (key_size) {
73 switch (key_size) {
H A Dtriple_des_operation.cpp30 TripleDesEvpCipherDescription::GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode, argument
36 switch (key_size) {
48 switch (key_size) {
H A Drsa_key_factory.cpp71 uint32_t key_size; local
72 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
76 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize || key_size < kMinimumRsaKeySize) {
77 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size);
88 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */))
114 uint32_t key_size; local
117 &authorizations, &public_exponent, &key_size);
129 uint32_t* key_size) cons
[all...]
H A Dec_key_factory.cpp84 uint32_t key_size; local
85 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size);
88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) {
89 authorizations.push_back(TAG_KEY_SIZE, key_size);
137 uint32_t key_size; local
139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
H A Dattestation_record.cpp179 integer_ptr = &record->key_size;
339 uint32_t key_size; local
342 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) {
345 keymaster_error_t error = EcKeySizeToCurve(key_size, &ec_curve);
556 if (record->key_size && !auth_list->push_back(TAG_KEY_SIZE, ASN1_INTEGER_get(record->key_size)))
/system/keymaster/legacy_support/
H A Dec_keymaster0_key.cpp47 uint32_t key_size; local
48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size);
54 if (!engine_->GenerateEcKey(key_size, &key_material))
60 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
80 uint32_t key_size; local
82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
93 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
H A Drsa_keymaster0_key.cpp49 uint32_t key_size; local
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material))
63 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
79 uint32_t key_size; local
82 &authorizations, &public_exponent, &key_size);
94 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
H A Dec_keymaster1_key.cpp72 uint32_t key_size; local
73 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size);
76 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) {
77 key_params_copy.push_back(TAG_KEY_SIZE, key_size);
H A Dkeymaster0_engine.cpp97 bool Keymaster0Engine::GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const { argument
100 params.field_size = key_size;
/system/keymaster/tests/
H A Dwrapped_key_test.cpp94 uint32_t key_size; local
95 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size);
96 EXPECT_EQ(key_size, (uint32_t)256);
H A Dandroid_keymaster_test.cpp367 for (size_t key_size = 0; key_size <= kMaxHmacKeyLengthBits + 10; ++key_size) {
368 if (key_size < kMinHmacKeyLengthBits || key_size > kMaxHmacKeyLengthBits ||
369 key_size % 8 != 0) {
372 .HmacKey(key_size)
375 << "HMAC key size " << key_size << " invalid.";
378 .HmacKey(key_size)
743 for (int key_size
2162 size_t key_size = 768; local
2183 size_t key_size = 768; local
2204 size_t key_size = 768; local
2221 size_t key_size = 768; local
2325 size_t key_size = 768; local
2383 size_t key_size = 2048; local
[all...]
/system/keymaster/ng/include/
H A Dauthorization_set.h245 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
246 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
247 AuthorizationSetBuilder& AesKey(uint32_t key_size);
248 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
250 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
251 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
252 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
253 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
269 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, argument
272 Authorization(TAG_KEY_SIZE, key_size);
277 EcdsaKey(uint32_t key_size) argument
283 AesKey(uint32_t key_size) argument
288 HmacKey(uint32_t key_size) argument
294 RsaSigningKey(uint32_t key_size, uint64_t public_exponent) argument
301 RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent) argument
306 EcdsaSigningKey(uint32_t key_size) argument
311 AesEncryptionKey(uint32_t key_size) argument
[all...]
/system/netd/libbpf/
H A DBpfUtils.cpp72 int createMap(bpf_map_type map_type, uint32_t key_size, uint32_t value_size, uint32_t max_entries, argument
77 attr.key_size = key_size;
/system/vold/tests/
H A DCryptfsScryptHidlizationEquivalence_test.cpp156 size_t key_size = 0; local
192 key_size = key_blob.key_material_size;
201 &key, &key_size)) {
212 if (key_size > KEYMASTER_BLOB_SIZE) {
218 memcpy(ftr->keymaster_blob, key, key_size);
219 ftr->keymaster_blob_size = key_size;
/system/bt/stack/gatt/
H A Dgatt_db.cc85 uint8_t key_size) {
119 (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) {
158 * key_size: encryption key size.
166 tGATT_SEC_FLAG sec_flag, uint8_t key_size) {
174 sec_flag, key_size);
249 * key_size: encryption key size.
257 tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id,
274 &len, sec_flag, key_size);
437 * key_size: encryption key size
445 tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_
81 gatts_check_attr_readability(const tGATT_ATTR& attr, UNUSED_ATTR uint16_t offset, bool read_long, tGATT_SEC_FLAG sec_flag, uint8_t key_size) argument
163 read_attr_value(tGATT_ATTR& attr16, uint16_t offset, uint8_t** p_data, bool read_long, uint16_t mtu, uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size) argument
254 gatts_db_read_attr_value_by_type( tGATT_TCB& tcb, tGATT_SVC_DB* p_db, uint8_t op_code, BT_HDR* p_rsp, uint16_t s_handle, uint16_t e_handle, const Uuid& type, uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id, uint16_t* p_cur_handle) argument
442 gatts_read_attr_value_by_handle( tGATT_TCB& tcb, tGATT_SVC_DB* p_db, uint8_t op_code, uint16_t handle, uint16_t offset, uint8_t* p_value, uint16_t* p_len, uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id) argument
480 gatts_read_attr_perm_check(tGATT_SVC_DB* p_db, bool is_long, uint16_t handle, tGATT_SEC_FLAG sec_flag, uint8_t key_size) argument
508 gatts_write_attr_perm_check(tGATT_SVC_DB* p_db, uint8_t op_code, uint16_t handle, uint16_t offset, uint8_t* p_data, uint16_t len, tGATT_SEC_FLAG sec_flag, uint8_t key_size) argument
[all...]
H A Dgatt_sr.cc358 uint8_t sec_flag, key_size; local
363 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size);
389 key_size);
422 &p_msg->attr_value.len, GATT_MAX_ATTR_LEN, sec_flag, key_size,
826 uint8_t sec_flag, key_size; local
827 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size);
831 key_size, 0, &err_hdl);
870 uint8_t sec_flag, key_size, *p = p_data; local
906 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size);
910 sec_flag, key_size);
975 uint8_t sec_flag, key_size; local
[all...]
/system/keymaster/include/keymaster/
H A Dattestation_record.h58 ASN1_INTEGER* key_size; member in struct:keymaster::km_auth_list
97 ASN1_EXP_OPT(KM_AUTH_LIST, key_size, ASN1_INTEGER, TAG_KEY_SIZE.masked_tag()),
H A Dauthorization_set.h515 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
516 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
517 AuthorizationSetBuilder& AesKey(uint32_t key_size);
518 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size);
519 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
521 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
522 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
523 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
524 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
525 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size);
556 RsaKey(uint32_t key_size, uint64_t public_exponent) argument
564 EcdsaKey(uint32_t key_size) argument
570 AesKey(uint32_t key_size) argument
575 TripleDesKey(uint32_t key_size) argument
580 HmacKey(uint32_t key_size) argument
586 RsaSigningKey(uint32_t key_size, uint64_t public_exponent) argument
593 RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent) argument
598 EcdsaSigningKey(uint32_t key_size) argument
603 AesEncryptionKey(uint32_t key_size) argument
608 TripleDesEncryptionKey(uint32_t key_size) argument
[all...]
/system/security/keystore/
H A Dkeystore_client_impl.cpp484 auto key_size = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_KEY_SIZE), local
486 if (!key_size.isOk() || key_size.value() != kAESKeySize) {
525 auto key_size = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_KEY_SIZE), local
527 if (!key_size.isOk() || key_size.value() != kHMACKeySize) {
H A Dkeystore_cli_v2.cpp137 AuthorizationSet GetRSASignParameters(uint32_t key_size, bool sha256_only) { argument
139 parameters.RsaSigningKey(key_size, 65537)
150 AuthorizationSet GetRSAEncryptParameters(uint32_t key_size) { argument
152 parameters.RsaEncryptionKey(key_size, 65537)
159 AuthorizationSet GetECDSAParameters(uint32_t key_size, bool sha256_only) { argument
161 parameters.EcdsaSigningKey(key_size)
170 AuthorizationSet GetAESParameters(uint32_t key_size, bool with_gcm_mode) { argument
172 parameters.AesEncryptionKey(key_size).Authorization(TAG_NO_AUTH_REQUIRED);
185 AuthorizationSet GetHMACParameters(uint32_t key_size, Digest digest) { argument
187 parameters.HmacKey(key_size)
[all...]
/system/bt/stack/btm/
H A Dbtm_int_types.h430 uint8_t key_size; /* key size of the LTK delivered to peer device */ member in struct:__anon971
775 uint8_t key_size; member in struct:__anon987
/system/bt/stack/include/
H A Dbtm_api_types.h1636 uint8_t key_size; member in struct:__anon1160
1650 uint8_t key_size; member in struct:__anon1162
/system/tpm/trunks/
H A Dtpm_generated.h1446 UINT16 key_size; member in struct:trunks::TPMS_ALGORITHM_DETAIL_ECC

Completed in 350 milliseconds