/system/keymaster/ |
ec_keymaster0_key.cpp | 47 uint32_t key_size; local 48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 54 if (!engine_->GenerateEcKey(key_size, &key_material)) 60 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 80 uint32_t key_size; local 82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 93 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
rsa_keymaster0_key.cpp | 49 uint32_t key_size; local 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material)) 63 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 79 uint32_t key_size; local 82 &authorizations, &public_exponent, &key_size); 94 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
ec_key_factory.cpp | 84 uint32_t key_size; local 85 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); 88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { 89 authorizations.push_back(TAG_KEY_SIZE, key_size); 137 uint32_t key_size; local 139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
|
rsa_key_factory.cpp | 67 uint32_t key_size; local 68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 72 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize) { 73 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); 84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) 110 uint32_t key_size; local 113 &authorizations, &public_exponent, &key_size); 125 uint32_t* key_size) const { 126 if (!updated_description || !public_exponent || !key_size) [all...] |
attestation_record.cpp | 83 ASN1_INTEGER* key_size; member in struct:keymaster::km_auth_list 109 ASN1_EXP_OPT(KM_AUTH_LIST, key_size, ASN1_INTEGER, TAG_KEY_SIZE.masked_tag()), 282 integer_ptr = &record->key_size; 406 uint32_t key_size; local 409 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) { 412 keymaster_error_t error = EcKeySizeToCurve(key_size, &ec_curve); 583 if (record->key_size && !auth_list->push_back(TAG_KEY_SIZE, ASN1_INTEGER_get(record->key_size)))
|
/external/opencv3/modules/flann/test/ |
test_lshtable_badarg.cpp | 54 int table_number, key_size, multi_probe_level; member in struct:CV_LshTableBadArgTest::Caller 59 flann::LshIndexParams indexParams(table_number, key_size, multi_probe_level); 76 caller.key_size = 0; 77 errors += run_test_case(Error::StsBadArg, "key_size is zero", caller); 79 caller.key_size = static_cast<int>(sizeof(size_t) * CHAR_BIT); 80 errors += run_test_case(Error::StsBadArg, "key_size is too big", caller); 82 caller.key_size += cvtest::randInt(rng) % 100; 83 errors += run_test_case(Error::StsBadArg, "key_size is too big", caller);
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa_utility.c | 91 uint64_t key_size; local 97 if (!RSAProcessedKeySize(algorithm, &key_size)) 102 verification_key = RSAPublicKeyFromBuf(key_blob, key_size); 130 uint64_t key_size; local 136 if (!RSAProcessedKeySize(algorithm, &key_size)) 141 verification_key = RSAPublicKeyFromBuf(key_blob, key_size);
|
/external/vboot_reference/firmware/lib20/ |
misc.c | 23 uint32_t key_size; local 35 key_size = sd->gbb_rootkey_size; 36 key_data = vb2_workbuf_alloc(&wb, key_size); 41 key_data, key_size); 46 rv = vb2_unpack_key(&root_key, key_data, key_size); 103 packed_key->key_size = kb->data_key.key_size; 113 packed_key->key_size); 118 packed_key->key_offset + packed_key->key_size; 136 uint32_t key_size = sd->workbuf_data_key_size local [all...] |
/external/vboot_reference/firmware/lib21/ |
misc.c | 71 uint32_t key_size; local 81 key_size = sd->gbb_rootkey_size; 82 key_data = vb2_workbuf_alloc(&wb, key_size); 87 key_data, key_size); 92 rv = vb2_unpack_key(&root_key, key_data, key_size); 159 uint32_t key_size = sd->workbuf_data_key_size; local 173 rv = vb2_unpack_key(&data_key, key_data, key_size);
|
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 19 int i, key_size; local 35 key_size = siglen_map[algorithm] * 8; /* in bits. */ 37 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", key_size); 57 key_size, sha_strings[algorithm]); 75 " Speed = %.02f verifications/s\n", key_size, sha_strings[algorithm], 77 fprintf(stdout, "ms_rsa%d_%s:%.02f\n", key_size, sha_strings[algorithm],
|
/external/vboot_reference/utility/ |
load_kernel_test.c | 83 uint64_t key_size; local 150 key_blob = ReadFile(argv[optind+1], &key_size); 155 printf("Read %" PRIu64 " bytes of key from %s\n", key_size, argv[optind+1]); 159 lkp.gbb_size = sizeof(GoogleBinaryBlockHeader) + key_size; 171 gbb->rootkey_size = key_size; 172 Memcpy((uint8_t*)gbb + gbb->rootkey_offset, key_blob, key_size); 175 gbb->recovery_key_size = key_size;
|
/external/google-breakpad/src/common/ |
simple_string_dictionary.h | 61 static const size_t key_size = KeySize; member in class:google_breakpad::NonAllocatingMap 112 assert(other.key_size == key_size); 115 if (other.key_size == key_size && other.value_size == value_size && 184 strncpy(entry->key, key, key_size); 185 entry->key[key_size - 1] = '\0'; 200 if (strncmp(entries_[i].key, key, key_size) == 0) 240 if (strncmp(key, entries_[i].key, key_size) == 0) {
|
/external/libchrome/crypto/ |
hmac_win.cc | 140 DWORD key_size; member in struct:crypto::KeyBlob 151 key_blob->key_size = static_cast<DWORD>(key_length);
|
/external/mesa3d/src/gallium/auxiliary/util/ |
u_keymap.c | 49 unsigned key_size; member in struct:keymap 125 map->key_size = keySize; 156 if (!memcmp(item->key, key, map->key_size)) 199 key_hash = hash(key, map->key_size); 213 item->key = mem_dup(key, map->key_size); 241 key_hash = hash(key, map->key_size); 267 key_hash = hash(key, map->key_size);
|
/external/opencv3/samples/python2/ |
plane_tracker.py | 39 key_size = 12, # 20 variable
|
/external/strace/ |
bpf.c | 43 uint32_t map_type, key_size, value_size, max_entries; member in struct:__anon22834 57 tprintf(", key_size=%u, value_size=%u, max_entries=%u}", 58 attr.key_size, attr.value_size, attr.max_entries);
|
/external/vboot_reference/host/lib/ |
host_key.c | 146 /* Allocate a new public key with space for a [key_size] byte key. */ 147 VbPublicKey* PublicKeyAlloc(uint64_t key_size, uint64_t algorithm, 149 VbPublicKey* key = (VbPublicKey*)malloc(sizeof(VbPublicKey) + key_size); 155 key->key_size = key_size; 164 uint64_t key_size; local 177 key_data = ReadFile(filename, &key_size); 182 expected_key_size != key_size) { 188 key = PublicKeyAlloc(key_size, algorithm, version); 193 Memcpy(GetPublicKeyData(key), key_data, key_size); local 202 uint64_t key_size; local [all...] |
/external/vboot_reference/firmware/lib/ |
vboot_common.c | 92 key->key_offset, key->key_size); 103 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size) 106 key->key_size = key_size; 113 if (dest->key_size < src->key_size) 116 dest->key_size = src->key_size; 119 Memcpy(GetPublicKeyData(dest), GetPublicKeyDataC(src), src->key_size); 126 uint64_t key_size; local [all...] |
/external/vboot_reference/firmware/lib20/include/ |
vb2_struct.h | 27 uint32_t key_size; member in struct:vb2_packed_key
|
/external/vboot_reference/firmware/lib21/include/ |
vb2_struct.h | 125 uint32_t key_size; member in struct:vb2_packed_key 167 uint32_t key_size; member in struct:vb2_packed_private_key
|
/external/vboot_reference/host/lib21/ |
host_key.c | 111 pkey->key_offset, pkey->key_size)) 135 if (pkey->key_size != 0) { 142 pkey->key_size); 259 pkey.key_size = roundup32(rsalen); 260 pkey.c.total_size = pkey.key_offset + pkey.key_size; 382 uint32_t key_size; local 387 if (vb2_read_file(filename, &key_data, &key_size)) 392 if (key_size == vb2_packed_key_size(sig_alg)) 407 memcpy(key_buf, key_data, key_size); 410 if (vb2_unpack_key_data(key, key_buf, key_size)) { [all...] |
/hardware/libhardware/include/hardware/ |
keymaster_common.h | 133 uint32_t key_size; member in struct:__anon30910
|
/system/bt/stack/gatt/ |
gatt_sr.c | 396 UINT8 sec_flag, key_size; local 404 &key_size); 432 key_size)) 477 key_size, 950 UINT8 sec_flag, key_size; local 1046 UINT8 sec_flag, key_size, *p = p_data; local 1142 UINT8 sec_flag, key_size, *p; local [all...] |
/system/security/keystore/ |
keystore_client_impl.cpp | 483 uint32_t key_size = 0; local 484 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size) && 485 !software_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size)) || 486 key_size != kAESKeySize) { 528 uint32_t key_size = 0; local 529 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size) && 530 !software_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size)) || 531 key_size != kHMACKeySize) {
|
/bionic/libc/kernel/uapi/linux/ |
bpf.h | 109 __u32 key_size; member in struct:bpf_attr::__anon378
|