/external/mmc-utils/3rdparty/hmac_sha/ |
hmac_sha2.h | 96 unsigned int key_size); 102 void hmac_sha224(const unsigned char *key, unsigned int key_size, 107 unsigned int key_size); 113 void hmac_sha256(const unsigned char *key, unsigned int key_size, 118 unsigned int key_size); 124 void hmac_sha384(const unsigned char *key, unsigned int key_size, 129 unsigned int key_size); 135 void hmac_sha512(const unsigned char *key, unsigned int key_size,
|
hmac_sha2.c | 45 unsigned int key_size) 54 if (key_size == SHA224_BLOCK_SIZE) { 58 if (key_size > SHA224_BLOCK_SIZE){ 60 sha224(key, key_size, key_temp); 62 } else { /* key_size > SHA224_BLOCK_SIZE */ 64 num = key_size; 117 void hmac_sha224(const unsigned char *key, unsigned int key_size, 123 hmac_sha224_init(&ctx, key, key_size); 131 unsigned int key_size) 140 if (key_size == SHA256_BLOCK_SIZE) [all...] |
/system/keymaster/ |
rsa_key_factory.cpp | 67 uint32_t key_size; local 68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 72 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize) { 73 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); 84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) 110 uint32_t key_size; local 113 &authorizations, &public_exponent, &key_size); 125 uint32_t* key_size) const { 126 if (!updated_description || !public_exponent || !key_size) [all...] |
ec_keymaster0_key.cpp | 47 uint32_t key_size; local 48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 54 if (!engine_->GenerateEcKey(key_size, &key_material)) 60 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 80 uint32_t key_size; local 82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 93 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
rsa_keymaster0_key.cpp | 49 uint32_t key_size; local 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material)) 63 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 79 uint32_t key_size; local 82 &authorizations, &public_exponent, &key_size); 94 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
aes_operation.h | 63 const uint8_t* key, size_t key_size); 111 bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size) 113 key_size) {} 130 size_t tag_length, const uint8_t* key, size_t key_size) 132 false /* caller_iv -- don't care */, tag_length, key, key_size) {}
|
/external/opencv3/modules/flann/test/ |
test_lshtable_badarg.cpp | 54 int table_number, key_size, multi_probe_level; member in struct:CV_LshTableBadArgTest::Caller 59 flann::LshIndexParams indexParams(table_number, key_size, multi_probe_level); 76 caller.key_size = 0; 77 errors += run_test_case(Error::StsBadArg, "key_size is zero", caller); 79 caller.key_size = static_cast<int>(sizeof(size_t) * CHAR_BIT); 80 errors += run_test_case(Error::StsBadArg, "key_size is too big", caller); 82 caller.key_size += cvtest::randInt(rng) % 100; 83 errors += run_test_case(Error::StsBadArg, "key_size is too big", caller);
|
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 19 int i, key_size; local 35 key_size = siglen_map[algorithm] * 8; /* in bits. */ 37 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", key_size); 57 key_size, sha_strings[algorithm]); 75 " Speed = %.02f verifications/s\n", key_size, sha_strings[algorithm], 77 fprintf(stdout, "ms_rsa%d_%s:%.02f\n", key_size, sha_strings[algorithm],
|
/external/vboot_reference/firmware/lib20/ |
misc.c | 23 uint32_t key_size; local 35 key_size = sd->gbb_rootkey_size; 36 key_data = vb2_workbuf_alloc(&wb, key_size); 41 key_data, key_size); 46 rv = vb2_unpack_key(&root_key, key_data, key_size); 103 packed_key->key_size = kb->data_key.key_size; 113 packed_key->key_size); 118 packed_key->key_offset + packed_key->key_size; 136 uint32_t key_size = sd->workbuf_data_key_size local [all...] |
packed_key.c | 23 key->key_offset, key->key_size); 55 if (!expected_key_size || expected_key_size != packed_key->key_size) {
|
/external/vboot_reference/host/lib/ |
host_key.c | 146 /* Allocate a new public key with space for a [key_size] byte key. */ 147 VbPublicKey* PublicKeyAlloc(uint64_t key_size, uint64_t algorithm, 149 VbPublicKey* key = (VbPublicKey*)malloc(sizeof(VbPublicKey) + key_size); 155 key->key_size = key_size; 164 uint64_t key_size; local 177 key_data = ReadFile(filename, &key_size); 182 expected_key_size != key_size) { 188 key = PublicKeyAlloc(key_size, algorithm, version); 193 Memcpy(GetPublicKeyData(key), key_data, key_size); local 202 uint64_t key_size; local [all...] |
host_keyblock.c | 20 uint64_t signed_size = sizeof(VbKeyBlockHeader) + data_key->key_size; 34 block_chk_dest = data_key_dest + data_key->key_size; 44 PublicKeyInit(&h->data_key, data_key_dest, data_key->key_size); 81 uint64_t signed_size = sizeof(VbKeyBlockHeader) + data_key->key_size; 97 block_chk_dest = data_key_dest + data_key->key_size; 107 PublicKeyInit(&h->data_key, data_key_dest, data_key->key_size);
|
/external/google-breakpad/src/common/ |
simple_string_dictionary.h | 61 static const size_t key_size = KeySize; member in class:google_breakpad::NonAllocatingMap 112 assert(other.key_size == key_size); 115 if (other.key_size == key_size && other.value_size == value_size && 184 strncpy(entry->key, key, key_size); 185 entry->key[key_size - 1] = '\0'; 200 if (strncmp(entries_[i].key, key, key_size) == 0) 240 if (strncmp(key, entries_[i].key, key_size) == 0) {
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_state_cache.c | 59 assert(item->key_size % 4 == 0); 63 for (i = 0; i < item->key_size/4; i++) { 77 a->key_size == b->key_size && 78 (memcmp(a->key, b->key, a->key_size) == 0); 135 const void *key, GLuint key_size, 145 lookup.key_size = key_size; 154 *(void **)out_aux = ((char *)item->key + item->key_size); 205 const void *item_aux = item->key + item->key_size; [all...] |
/external/vboot_reference/firmware/lib21/ |
packed_key.c | 15 uint32_t key_size) 21 if (!expected_key_size || expected_key_size != key_size) { 65 pkey->key_offset, pkey->key_size); 90 pkey->key_size);
|
misc.c | 71 uint32_t key_size; local 81 key_size = sd->gbb_rootkey_size; 82 key_data = vb2_workbuf_alloc(&wb, key_size); 87 key_data, key_size); 92 rv = vb2_unpack_key(&root_key, key_data, key_size); 159 uint32_t key_size = sd->workbuf_data_key_size; local 173 rv = vb2_unpack_key(&data_key, key_data, key_size);
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa_utility.c | 91 uint64_t key_size; local 97 if (!RSAProcessedKeySize(algorithm, &key_size)) 102 verification_key = RSAPublicKeyFromBuf(key_blob, key_size); 130 uint64_t key_size; local 136 if (!RSAProcessedKeySize(algorithm, &key_size)) 141 verification_key = RSAPublicKeyFromBuf(key_blob, key_size);
|
/system/keymaster/include/keymaster/ |
authorization_set.h | 502 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 503 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 504 AuthorizationSetBuilder& AesKey(uint32_t key_size); 505 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 507 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 508 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 509 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 510 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 537 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, 540 Authorization(TAG_KEY_SIZE, key_size); [all...] |
/external/vboot_reference/firmware/lib/ |
vboot_common.c | 92 key->key_offset, key->key_size); 103 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size) 106 key->key_size = key_size; 113 if (dest->key_size < src->key_size) 116 dest->key_size = src->key_size; 119 Memcpy(GetPublicKeyData(dest), GetPublicKeyDataC(src), src->key_size); 126 uint64_t key_size; local [all...] |
region-fw.c | 33 size = hdr.key_offset + hdr.key_size;
|
/external/vboot_reference/host/lib/include/ |
host_key.h | 43 /* Allocate a new public key with space for a [key_size] byte key. */ 44 VbPublicKey* PublicKeyAlloc(uint64_t key_size, uint64_t algorithm,
|
/external/vboot_reference/host/lib21/ |
host_key.c | 111 pkey->key_offset, pkey->key_size)) 135 if (pkey->key_size != 0) { 142 pkey->key_size); 259 pkey.key_size = roundup32(rsalen); 260 pkey.c.total_size = pkey.key_offset + pkey.key_size; 382 uint32_t key_size; local 387 if (vb2_read_file(filename, &key_data, &key_size)) 392 if (key_size == vb2_packed_key_size(sig_alg)) 407 memcpy(key_buf, key_data, key_size); 410 if (vb2_unpack_key_data(key, key_buf, key_size)) { [all...] |
/external/mesa3d/src/gallium/auxiliary/util/ |
u_keymap.c | 49 unsigned key_size; member in struct:keymap 125 map->key_size = keySize; 156 if (!memcmp(item->key, key, map->key_size)) 199 key_hash = hash(key, map->key_size); 213 item->key = mem_dup(key, map->key_size); 241 key_hash = hash(key, map->key_size); 267 key_hash = hash(key, map->key_size);
|
/external/vboot_reference/utility/ |
load_kernel_test.c | 83 uint64_t key_size; local 150 key_blob = ReadFile(argv[optind+1], &key_size); 155 printf("Read %" PRIu64 " bytes of key from %s\n", key_size, argv[optind+1]); 159 lkp.gbb_size = sizeof(GoogleBinaryBlockHeader) + key_size; 171 gbb->rootkey_size = key_size; 172 Memcpy((uint8_t*)gbb + gbb->rootkey_offset, key_blob, key_size); 175 gbb->recovery_key_size = key_size;
|
/external/vboot_reference/firmware/lib21/include/ |
vb2_common.h | 100 * @param key_size Size of packed key data in bytes 104 uint32_t key_size);
|