HomeSort by relevance Sort by last modified time
    Searched defs:key_size (Results 1 - 25 of 64) sorted by null

1 2 3

  /system/keymaster/
ec_keymaster0_key.cpp 47 uint32_t key_size; local
48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size);
54 if (!engine_->GenerateEcKey(key_size, &key_material))
60 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
80 uint32_t key_size; local
82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
93 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
rsa_keymaster0_key.cpp 49 uint32_t key_size; local
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material))
63 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
79 uint32_t key_size; local
82 &authorizations, &public_exponent, &key_size);
94 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
ec_key_factory.cpp 84 uint32_t key_size; local
85 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size);
88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) {
89 authorizations.push_back(TAG_KEY_SIZE, key_size);
137 uint32_t key_size; local
139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
rsa_key_factory.cpp 67 uint32_t key_size; local
68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
72 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize) {
73 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size);
84 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */))
110 uint32_t key_size; local
113 &authorizations, &public_exponent, &key_size);
125 uint32_t* key_size) const {
126 if (!updated_description || !public_exponent || !key_size)
    [all...]
attestation_record.cpp 83 ASN1_INTEGER* key_size; member in struct:keymaster::km_auth_list
109 ASN1_EXP_OPT(KM_AUTH_LIST, key_size, ASN1_INTEGER, TAG_KEY_SIZE.masked_tag()),
282 integer_ptr = &record->key_size;
406 uint32_t key_size; local
409 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) {
412 keymaster_error_t error = EcKeySizeToCurve(key_size, &ec_curve);
583 if (record->key_size && !auth_list->push_back(TAG_KEY_SIZE, ASN1_INTEGER_get(record->key_size)))
  /external/opencv3/modules/flann/test/
test_lshtable_badarg.cpp 54 int table_number, key_size, multi_probe_level; member in struct:CV_LshTableBadArgTest::Caller
59 flann::LshIndexParams indexParams(table_number, key_size, multi_probe_level);
76 caller.key_size = 0;
77 errors += run_test_case(Error::StsBadArg, "key_size is zero", caller);
79 caller.key_size = static_cast<int>(sizeof(size_t) * CHAR_BIT);
80 errors += run_test_case(Error::StsBadArg, "key_size is too big", caller);
82 caller.key_size += cvtest::randInt(rng) % 100;
83 errors += run_test_case(Error::StsBadArg, "key_size is too big", caller);
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 91 uint64_t key_size; local
97 if (!RSAProcessedKeySize(algorithm, &key_size))
102 verification_key = RSAPublicKeyFromBuf(key_blob, key_size);
130 uint64_t key_size; local
136 if (!RSAProcessedKeySize(algorithm, &key_size))
141 verification_key = RSAPublicKeyFromBuf(key_blob, key_size);
  /external/vboot_reference/firmware/lib20/
misc.c 23 uint32_t key_size; local
35 key_size = sd->gbb_rootkey_size;
36 key_data = vb2_workbuf_alloc(&wb, key_size);
41 key_data, key_size);
46 rv = vb2_unpack_key(&root_key, key_data, key_size);
103 packed_key->key_size = kb->data_key.key_size;
113 packed_key->key_size);
118 packed_key->key_offset + packed_key->key_size;
136 uint32_t key_size = sd->workbuf_data_key_size local
    [all...]
  /external/vboot_reference/firmware/lib21/
misc.c 71 uint32_t key_size; local
81 key_size = sd->gbb_rootkey_size;
82 key_data = vb2_workbuf_alloc(&wb, key_size);
87 key_data, key_size);
92 rv = vb2_unpack_key(&root_key, key_data, key_size);
159 uint32_t key_size = sd->workbuf_data_key_size; local
173 rv = vb2_unpack_key(&data_key, key_data, key_size);
  /external/vboot_reference/tests/
rsa_verify_benchmark.c 19 int i, key_size; local
35 key_size = siglen_map[algorithm] * 8; /* in bits. */
37 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", key_size);
57 key_size, sha_strings[algorithm]);
75 " Speed = %.02f verifications/s\n", key_size, sha_strings[algorithm],
77 fprintf(stdout, "ms_rsa%d_%s:%.02f\n", key_size, sha_strings[algorithm],
  /external/vboot_reference/utility/
load_kernel_test.c 83 uint64_t key_size; local
150 key_blob = ReadFile(argv[optind+1], &key_size);
155 printf("Read %" PRIu64 " bytes of key from %s\n", key_size, argv[optind+1]);
159 lkp.gbb_size = sizeof(GoogleBinaryBlockHeader) + key_size;
171 gbb->rootkey_size = key_size;
172 Memcpy((uint8_t*)gbb + gbb->rootkey_offset, key_blob, key_size);
175 gbb->recovery_key_size = key_size;
  /external/google-breakpad/src/common/
simple_string_dictionary.h 61 static const size_t key_size = KeySize; member in class:google_breakpad::NonAllocatingMap
112 assert(other.key_size == key_size);
115 if (other.key_size == key_size && other.value_size == value_size &&
184 strncpy(entry->key, key, key_size);
185 entry->key[key_size - 1] = '\0';
200 if (strncmp(entries_[i].key, key, key_size) == 0)
240 if (strncmp(key, entries_[i].key, key_size) == 0) {
  /external/libchrome/crypto/
hmac_win.cc 140 DWORD key_size; member in struct:crypto::KeyBlob
151 key_blob->key_size = static_cast<DWORD>(key_length);
  /external/mesa3d/src/gallium/auxiliary/util/
u_keymap.c 49 unsigned key_size; member in struct:keymap
125 map->key_size = keySize;
156 if (!memcmp(item->key, key, map->key_size))
199 key_hash = hash(key, map->key_size);
213 item->key = mem_dup(key, map->key_size);
241 key_hash = hash(key, map->key_size);
267 key_hash = hash(key, map->key_size);
  /external/opencv3/samples/python2/
plane_tracker.py 39 key_size = 12, # 20 variable
  /external/strace/
bpf.c 43 uint32_t map_type, key_size, value_size, max_entries; member in struct:__anon22834
57 tprintf(", key_size=%u, value_size=%u, max_entries=%u}",
58 attr.key_size, attr.value_size, attr.max_entries);
  /external/vboot_reference/host/lib/
host_key.c 146 /* Allocate a new public key with space for a [key_size] byte key. */
147 VbPublicKey* PublicKeyAlloc(uint64_t key_size, uint64_t algorithm,
149 VbPublicKey* key = (VbPublicKey*)malloc(sizeof(VbPublicKey) + key_size);
155 key->key_size = key_size;
164 uint64_t key_size; local
177 key_data = ReadFile(filename, &key_size);
182 expected_key_size != key_size) {
188 key = PublicKeyAlloc(key_size, algorithm, version);
193 Memcpy(GetPublicKeyData(key), key_data, key_size); local
202 uint64_t key_size; local
    [all...]
  /external/vboot_reference/firmware/lib/
vboot_common.c 92 key->key_offset, key->key_size);
103 void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size)
106 key->key_size = key_size;
113 if (dest->key_size < src->key_size)
116 dest->key_size = src->key_size;
119 Memcpy(GetPublicKeyData(dest), GetPublicKeyDataC(src), src->key_size);
126 uint64_t key_size; local
    [all...]
  /external/vboot_reference/firmware/lib20/include/
vb2_struct.h 27 uint32_t key_size; member in struct:vb2_packed_key
  /external/vboot_reference/firmware/lib21/include/
vb2_struct.h 125 uint32_t key_size; member in struct:vb2_packed_key
167 uint32_t key_size; member in struct:vb2_packed_private_key
  /external/vboot_reference/host/lib21/
host_key.c 111 pkey->key_offset, pkey->key_size))
135 if (pkey->key_size != 0) {
142 pkey->key_size);
259 pkey.key_size = roundup32(rsalen);
260 pkey.c.total_size = pkey.key_offset + pkey.key_size;
382 uint32_t key_size; local
387 if (vb2_read_file(filename, &key_data, &key_size))
392 if (key_size == vb2_packed_key_size(sig_alg))
407 memcpy(key_buf, key_data, key_size);
410 if (vb2_unpack_key_data(key, key_buf, key_size)) {
    [all...]
  /hardware/libhardware/include/hardware/
keymaster_common.h 133 uint32_t key_size; member in struct:__anon30910
  /system/bt/stack/gatt/
gatt_sr.c 396 UINT8 sec_flag, key_size; local
404 &key_size);
432 key_size))
477 key_size,
950 UINT8 sec_flag, key_size; local
1046 UINT8 sec_flag, key_size, *p = p_data; local
1142 UINT8 sec_flag, key_size, *p; local
    [all...]
  /system/security/keystore/
keystore_client_impl.cpp 483 uint32_t key_size = 0; local
484 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size) &&
485 !software_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size)) ||
486 key_size != kAESKeySize) {
528 uint32_t key_size = 0; local
529 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size) &&
530 !software_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size)) ||
531 key_size != kHMACKeySize) {
  /bionic/libc/kernel/uapi/linux/
bpf.h 109 __u32 key_size; member in struct:bpf_attr::__anon378

Completed in 3355 milliseconds

1 2 3