HomeSort by relevance Sort by last modified time
    Searched refs:kAesKeySize (Results 1 - 8 of 8) sorted by null

  /system/tpm/trunks/
hmac_authorization_delegate_test.cc 39 nonce.size = kAesKeySize;
71 nonce.size = kAesKeySize;
100 session_nonce_.size = kAesKeySize;
101 memset(session_nonce_.buffer, 0, kAesKeySize);
181 auth_response.nonce.size = kAesKeySize;
182 memset(auth_response.nonce.buffer, 0, kAesKeySize);
hmac_authorization_delegate.cc 290 CHECK_EQ(compound_key.size(), kAesKeySize + kAesIVSize);
291 unsigned char aes_key[kAesKeySize];
293 memcpy(aes_key, &compound_key[0], kAesKeySize);
294 memcpy(aes_iv, &compound_key[kAesKeySize], kAesIVSize);
297 AES_set_encrypt_key(aes_key, kAesKeySize * 8, &key);
hmac_authorization_delegate.h 33 const size_t kAesKeySize = 16; // 128 bits is minimum AES key size.
tpm_utility_impl.cc 787 encryption_key.size = kAesKeySize;
794 symmetric_alg.key_bits.aes = kAesKeySize * 8;
    [all...]
tpm_utility_test.cc     [all...]
  /system/tpm/attestation/common/
crypto_utility_impl.cc 39 const size_t kAesKeySize = 32;
84 if (!GetRandom(kAesKeySize, aes_key)) {
218 0, kEncModeCBC, 0, kAesKeySize};
223 if (!GetRandom(kAesKeySize, &aes_key)) {
314 if (key.size() != kAesKeySize || iv.size() != kAesBlockSize) {
364 if (key.size() != kAesKeySize || iv.size() != kAesBlockSize) {
424 CHECK_EQ(key.size(), kAesKeySize);
  /system/security/keystore/
blob.h 28 constexpr size_t kAesKeySize = 128 / 8;
blob.cpp 302 AES_set_decrypt_key(aes_key, kAesKeySize * 8, &key);

Completed in 153 milliseconds