HomeSort by relevance Sort by last modified time
    Searched refs:key_size (Results 1 - 25 of 119) sorted by null

1 2 3 4 5

  /external/mmc-utils/3rdparty/hmac_sha/
hmac_sha2.h 96 unsigned int key_size);
102 void hmac_sha224(const unsigned char *key, unsigned int key_size,
107 unsigned int key_size);
113 void hmac_sha256(const unsigned char *key, unsigned int key_size,
118 unsigned int key_size);
124 void hmac_sha384(const unsigned char *key, unsigned int key_size,
129 unsigned int key_size);
135 void hmac_sha512(const unsigned char *key, unsigned int key_size,
hmac_sha2.c 45 unsigned int key_size)
54 if (key_size == SHA224_BLOCK_SIZE) {
58 if (key_size > SHA224_BLOCK_SIZE){
60 sha224(key, key_size, key_temp);
62 } else { /* key_size > SHA224_BLOCK_SIZE */
64 num = key_size;
117 void hmac_sha224(const unsigned char *key, unsigned int key_size,
123 hmac_sha224_init(&ctx, key, key_size);
131 unsigned int key_size)
140 if (key_size == SHA256_BLOCK_SIZE)
    [all...]
  /system/keymaster/
rsa_key_factory.cpp 67 uint32_t key_size; local
68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
72 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize) {
73 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size);
84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */))
110 uint32_t key_size; local
113 &authorizations, &public_exponent, &key_size);
125 uint32_t* key_size) const {
126 if (!updated_description || !public_exponent || !key_size)
    [all...]
ec_keymaster0_key.cpp 47 uint32_t key_size; local
48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size);
54 if (!engine_->GenerateEcKey(key_size, &key_material))
60 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
80 uint32_t key_size; local
82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
93 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
rsa_keymaster0_key.cpp 49 uint32_t key_size; local
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material))
63 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
79 uint32_t key_size; local
82 &authorizations, &public_exponent, &key_size);
94 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
aes_operation.h 63 const uint8_t* key, size_t key_size);
111 bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size)
113 key_size) {}
130 size_t tag_length, const uint8_t* key, size_t key_size)
132 false /* caller_iv -- don't care */, tag_length, key, key_size) {}
  /external/opencv3/modules/flann/test/
test_lshtable_badarg.cpp 54 int table_number, key_size, multi_probe_level; member in struct:CV_LshTableBadArgTest::Caller
59 flann::LshIndexParams indexParams(table_number, key_size, multi_probe_level);
76 caller.key_size = 0;
77 errors += run_test_case(Error::StsBadArg, "key_size is zero", caller);
79 caller.key_size = static_cast<int>(sizeof(size_t) * CHAR_BIT);
80 errors += run_test_case(Error::StsBadArg, "key_size is too big", caller);
82 caller.key_size += cvtest::randInt(rng) % 100;
83 errors += run_test_case(Error::StsBadArg, "key_size is too big", caller);
  /external/vboot_reference/tests/
rsa_verify_benchmark.c 19 int i, key_size; local
35 key_size = siglen_map[algorithm] * 8; /* in bits. */
37 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", key_size);
57 key_size, sha_strings[algorithm]);
75 " Speed = %.02f verifications/s\n", key_size, sha_strings[algorithm],
77 fprintf(stdout, "ms_rsa%d_%s:%.02f\n", key_size, sha_strings[algorithm],
  /external/vboot_reference/firmware/lib20/
misc.c 23 uint32_t key_size; local
35 key_size = sd->gbb_rootkey_size;
36 key_data = vb2_workbuf_alloc(&wb, key_size);
41 key_data, key_size);
46 rv = vb2_unpack_key(&root_key, key_data, key_size);
103 packed_key->key_size = kb->data_key.key_size;
113 packed_key->key_size);
118 packed_key->key_offset + packed_key->key_size;
136 uint32_t key_size = sd->workbuf_data_key_size local
    [all...]
packed_key.c 23 key->key_offset, key->key_size);
55 if (!expected_key_size || expected_key_size != packed_key->key_size) {
  /external/vboot_reference/host/lib/
host_key.c 146 /* Allocate a new public key with space for a [key_size] byte key. */
147 VbPublicKey* PublicKeyAlloc(uint64_t key_size, uint64_t algorithm,
149 VbPublicKey* key = (VbPublicKey*)malloc(sizeof(VbPublicKey) + key_size);
155 key->key_size = key_size;
164 uint64_t key_size; local
177 key_data = ReadFile(filename, &key_size);
182 expected_key_size != key_size) {
188 key = PublicKeyAlloc(key_size, algorithm, version);
193 Memcpy(GetPublicKeyData(key), key_data, key_size); local
202 uint64_t key_size; local
    [all...]
host_keyblock.c 20 uint64_t signed_size = sizeof(VbKeyBlockHeader) + data_key->key_size;
34 block_chk_dest = data_key_dest + data_key->key_size;
44 PublicKeyInit(&h->data_key, data_key_dest, data_key->key_size);
81 uint64_t signed_size = sizeof(VbKeyBlockHeader) + data_key->key_size;
97 block_chk_dest = data_key_dest + data_key->key_size;
107 PublicKeyInit(&h->data_key, data_key_dest, data_key->key_size);
  /external/google-breakpad/src/common/
simple_string_dictionary.h 61 static const size_t key_size = KeySize; member in class:google_breakpad::NonAllocatingMap
112 assert(other.key_size == key_size);
115 if (other.key_size == key_size && other.value_size == value_size &&
184 strncpy(entry->key, key, key_size);
185 entry->key[key_size - 1] = '\0';
200 if (strncmp(entries_[i].key, key, key_size) == 0)
240 if (strncmp(key, entries_[i].key, key_size) == 0) {
  /external/mesa3d/src/mesa/drivers/dri/i965/
brw_state_cache.c 59 assert(item->key_size % 4 == 0);
63 for (i = 0; i < item->key_size/4; i++) {
77 a->key_size == b->key_size &&
78 (memcmp(a->key, b->key, a->key_size) == 0);
135 const void *key, GLuint key_size,
145 lookup.key_size = key_size;
154 *(void **)out_aux = ((char *)item->key + item->key_size);
205 const void *item_aux = item->key + item->key_size;
    [all...]
  /external/vboot_reference/firmware/lib21/
packed_key.c 15 uint32_t key_size)
21 if (!expected_key_size || expected_key_size != key_size) {
65 pkey->key_offset, pkey->key_size);
90 pkey->key_size);
misc.c 71 uint32_t key_size; local
81 key_size = sd->gbb_rootkey_size;
82 key_data = vb2_workbuf_alloc(&wb, key_size);
87 key_data, key_size);
92 rv = vb2_unpack_key(&root_key, key_data, key_size);
159 uint32_t key_size = sd->workbuf_data_key_size; local
173 rv = vb2_unpack_key(&data_key, key_data, key_size);
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 91 uint64_t key_size; local
97 if (!RSAProcessedKeySize(algorithm, &key_size))
102 verification_key = RSAPublicKeyFromBuf(key_blob, key_size);
130 uint64_t key_size; local
136 if (!RSAProcessedKeySize(algorithm, &key_size))
141 verification_key = RSAPublicKeyFromBuf(key_blob, key_size);
  /system/keymaster/include/keymaster/
authorization_set.h 502 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
503 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
504 AuthorizationSetBuilder& AesKey(uint32_t key_size);
505 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
507 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
508 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
509 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
510 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
537 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size,
540 Authorization(TAG_KEY_SIZE, key_size);
    [all...]
  /external/vboot_reference/firmware/lib/
vboot_common.c 92 key->key_offset, key->key_size);
103 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size)
106 key->key_size = key_size;
113 if (dest->key_size < src->key_size)
116 dest->key_size = src->key_size;
119 Memcpy(GetPublicKeyData(dest), GetPublicKeyDataC(src), src->key_size);
126 uint64_t key_size; local
    [all...]
region-fw.c 33 size = hdr.key_offset + hdr.key_size;
  /external/vboot_reference/host/lib/include/
host_key.h 43 /* Allocate a new public key with space for a [key_size] byte key. */
44 VbPublicKey* PublicKeyAlloc(uint64_t key_size, uint64_t algorithm,
  /external/vboot_reference/host/lib21/
host_key.c 111 pkey->key_offset, pkey->key_size))
135 if (pkey->key_size != 0) {
142 pkey->key_size);
259 pkey.key_size = roundup32(rsalen);
260 pkey.c.total_size = pkey.key_offset + pkey.key_size;
382 uint32_t key_size; local
387 if (vb2_read_file(filename, &key_data, &key_size))
392 if (key_size == vb2_packed_key_size(sig_alg))
407 memcpy(key_buf, key_data, key_size);
410 if (vb2_unpack_key_data(key, key_buf, key_size)) {
    [all...]
  /external/mesa3d/src/gallium/auxiliary/util/
u_keymap.c 49 unsigned key_size; member in struct:keymap
125 map->key_size = keySize;
156 if (!memcmp(item->key, key, map->key_size))
199 key_hash = hash(key, map->key_size);
213 item->key = mem_dup(key, map->key_size);
241 key_hash = hash(key, map->key_size);
267 key_hash = hash(key, map->key_size);
  /external/vboot_reference/utility/
load_kernel_test.c 83 uint64_t key_size; local
150 key_blob = ReadFile(argv[optind+1], &key_size);
155 printf("Read %" PRIu64 " bytes of key from %s\n", key_size, argv[optind+1]);
159 lkp.gbb_size = sizeof(GoogleBinaryBlockHeader) + key_size;
171 gbb->rootkey_size = key_size;
172 Memcpy((uint8_t*)gbb + gbb->rootkey_offset, key_blob, key_size);
175 gbb->recovery_key_size = key_size;
  /external/vboot_reference/firmware/lib21/include/
vb2_common.h 100 * @param key_size Size of packed key data in bytes
104 uint32_t key_size);

Completed in 695 milliseconds

1 2 3 4 5