Home | History | Annotate | Download | only in vold

Lines Matching defs:keysize

283         return CryptoType(property, this->crypto_name, this->keysize);
286 return CryptoType(this->property_name, crypto, this->keysize);
291 constexpr uint32_t get_keysize() const { return keysize; }
296 uint32_t keysize;
300 : property_name(property), crypto_name(crypto), keysize(ksize) {}
329 // We confirm all supported_crypto_types have a small enough keysize and
355 "We have a CryptoType with keysize > MAX_KEY_LEN or which was "
714 if ((crypt_ftr->keysize == 0) || ((crypt_ftr->keysize % 16) != 0) ||
715 (crypt_ftr->keysize > MAX_KEY_LEN)) {
716 SLOGE("Invalid keysize (%u) for block device %s; Must be non-zero, "
717 "divisible by 16, and <= %d\n", crypt_ftr->keysize, fname,
966 unsigned int keysize, char *master_key_ascii) {
970 for (i=0, a=0; i<keysize; i++, a+=2) {
1010 convert_key_to_hex_ascii(master_key, crypt_ftr->keysize, master_key_ascii);
1300 decrypted_master_key, crypt_ftr->keysize)) {
1309 if (encrypted_len + final_len != static_cast<int>(crypt_ftr->keysize)) {
1339 size_t keysize,
1364 encrypted_master_key, keysize)) {
1371 if (decrypted_len + final_len != static_cast<int>(keysize)) {
1414 crypt_ftr->keysize,
1825 memcpy(saved_master_key, decrypted_master_key, crypt_ftr->keysize);
1876 * assume it must be using our same crypt type and keysize.
1900 ext_crypt_ftr.keysize = cryptfs_get_keysize();
2032 if (!memcmp(decrypted_master_key, saved_master_key, crypt_ftr.keysize)) {
2045 /* Initialize a crypt_mnt_ftr structure. The keysize is
2059 ftr->keysize = cryptfs_get_keysize();