HomeSort by relevance Sort by last modified time
    Searched refs:key_size (Results 1 - 25 of 152) sorted by null

1 2 3 4 5 6 7

  /system/keymaster/km_openssl/
aes_operation.cpp 30 const EVP_CIPHER* AesEvpCipherDescription::GetCipherInstance(size_t key_size,
37 switch (key_size) {
49 switch (key_size) {
61 switch (key_size) {
73 switch (key_size) {
triple_des_operation.cpp 30 TripleDesEvpCipherDescription::GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
36 switch (key_size) {
48 switch (key_size) {
rsa_key_factory.cpp 71 uint32_t key_size; local
72 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) {
76 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize || key_size < kMinimumRsaKeySize) {
77 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size);
88 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */))
114 uint32_t key_size; local
117 &authorizations, &public_exponent, &key_size);
129 uint32_t* key_size) const
    [all...]
aes_operation.h 32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
triple_des_operation.h 32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
  /external/mmc-utils/3rdparty/hmac_sha/
hmac_sha2.h 96 unsigned int key_size);
102 void hmac_sha224(const unsigned char *key, unsigned int key_size,
107 unsigned int key_size);
113 void hmac_sha256(const unsigned char *key, unsigned int key_size,
118 unsigned int key_size);
124 void hmac_sha384(const unsigned char *key, unsigned int key_size,
129 unsigned int key_size);
135 void hmac_sha512(const unsigned char *key, unsigned int key_size,
hmac_sha2.c 45 unsigned int key_size)
54 if (key_size == SHA224_BLOCK_SIZE) {
58 if (key_size > SHA224_BLOCK_SIZE){
60 sha224(key, key_size, key_temp);
62 } else { /* key_size > SHA224_BLOCK_SIZE */
64 num = key_size;
117 void hmac_sha224(const unsigned char *key, unsigned int key_size,
123 hmac_sha224_init(&ctx, key, key_size);
131 unsigned int key_size)
140 if (key_size == SHA256_BLOCK_SIZE)
    [all...]
  /system/keymaster/ng/include/
authorization_set.h 245 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
246 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
247 AuthorizationSetBuilder& AesKey(uint32_t key_size);
248 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
250 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
251 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
252 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
253 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
269 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size,
272 Authorization(TAG_KEY_SIZE, key_size);
    [all...]
  /external/avb/libavb/
avb_property_descriptor.c 63 size_t key_size; member in struct:__anon14245
90 if (data->key_size == prop_desc.key_num_bytes) {
93 data->key_size) == 0) {
110 size_t key_size,
114 if (key_size == 0) {
115 key_size = avb_strlen(key);
119 data.key_size = key_size;
138 size_t key_size,
146 value = avb_property_lookup(image_data, image_size, key, key_size, NULL)
    [all...]
avb_property_descriptor.h 61 * name |key| in a vbmeta image. If |key_size| is 0, |key| must be
86 size_t key_size,
99 size_t key_size,
  /external/vboot_reference/tests/
rsa_verify_benchmark.c 19 int i, key_size; local
35 key_size = siglen_map[algorithm] * 8; /* in bits. */
37 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", key_size);
57 key_size, sha_strings[algorithm]);
75 " Speed = %.02f verifications/s\n", key_size, sha_strings[algorithm],
77 fprintf(stdout, "ms_rsa%d_%s:%.02f\n", key_size, sha_strings[algorithm],
  /external/vboot_reference/firmware/lib20/
misc.c 23 uint32_t key_size; local
35 key_size = sd->gbb_rootkey_size;
36 key_data = vb2_workbuf_alloc(&wb, key_size);
41 key_data, key_size);
46 rv = vb2_unpack_key(&root_key, key_data, key_size);
103 packed_key->key_size = kb->data_key.key_size;
113 packed_key->key_size);
118 packed_key->key_offset + packed_key->key_size;
136 uint32_t key_size = sd->workbuf_data_key_size local
    [all...]
  /external/python/cpython3/Modules/
hashtable.c 62 (sizeof(_Py_hashtable_entry_t) + (HT)->key_size + (HT)->data_size)
122 return (memcmp(pkey, pkey2, ht->key_size) == 0);
141 _Py_hashtable_new_full(size_t key_size, size_t data_size,
164 ht->key_size = key_size;
183 _Py_hashtable_new(size_t key_size, size_t data_size,
187 return _Py_hashtable_new_full(key_size, data_size,
254 size_t key_size, const void *pkey)
260 assert(key_size == ht->key_size);
496 const size_t key_size = src->key_size; local
    [all...]
hashtable.h 29 /* key (key_size bytes) and then data (data_size bytes) follows */
39 + (TABLE)->key_size))
45 assert(sizeof(DST_KEY) == (TABLE)->key_size); \
51 assert(sizeof(KEY) == (TABLE)->key_size); \
96 size_t key_size; member in struct:_Py_hashtable_t
116 size_t key_size,
122 size_t key_size,
157 size_t key_size,
176 size_t key_size,
189 size_t key_size,
    [all...]
  /system/keymaster/legacy_support/
rsa_keymaster0_key.cpp 49 uint32_t key_size; local
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material))
63 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
79 uint32_t key_size; local
82 &authorizations, &public_exponent, &key_size);
94 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
ec_keymaster0_key.cpp 47 uint32_t key_size; local
48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size);
54 if (!engine_->GenerateEcKey(key_size, &key_material))
60 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
80 uint32_t key_size; local
82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
93 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
  /external/vboot_reference/host/lib/
host_key.c 146 /* Allocate a new public key with space for a [key_size] byte key. */
147 VbPublicKey* PublicKeyAlloc(uint64_t key_size, uint64_t algorithm,
149 VbPublicKey* key = (VbPublicKey*)malloc(sizeof(VbPublicKey) + key_size);
155 key->key_size = key_size;
164 uint64_t key_size; local
177 key_data = ReadFile(filename, &key_size);
182 expected_key_size != key_size) {
188 key = PublicKeyAlloc(key_size, algorithm, version);
193 Memcpy(GetPublicKeyData(key), key_data, key_size); local
202 uint64_t key_size; local
    [all...]
  /external/google-breakpad/src/common/
simple_string_dictionary.h 61 static const size_t key_size = KeySize; member in class:google_breakpad::NonAllocatingMap
112 assert(other.key_size == key_size);
115 if (other.key_size == key_size && other.value_size == value_size &&
184 strncpy(entry->key, key, key_size);
185 entry->key[key_size - 1] = '\0';
200 if (strncmp(entries_[i].key, key, key_size) == 0)
240 if (strncmp(key, entries_[i].key, key_size) == 0) {
  /hardware/interfaces/keymaster/3.0/vts/functional/
authorization_set.h 268 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
269 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
271 AuthorizationSetBuilder& AesKey(uint32_t key_size);
272 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
274 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
275 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
276 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
278 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
314 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size,
317 Authorization(TAG_KEY_SIZE, key_size);
    [all...]
  /external/linux-kselftest/tools/testing/selftests/bpf/
test_obj_id.c 21 .key_size = sizeof(__u32),
sockmap_verdict_prog.c 17 .key_size = sizeof(int),
24 .key_size = sizeof(int),
31 .key_size = sizeof(int),
  /external/vboot_reference/firmware/lib21/
packed_key.c 15 uint32_t key_size)
21 if (!expected_key_size || expected_key_size != key_size) {
65 pkey->key_offset, pkey->key_size);
90 pkey->key_size);
misc.c 71 uint32_t key_size; local
81 key_size = sd->gbb_rootkey_size;
82 key_data = vb2_workbuf_alloc(&wb, key_size);
87 key_data, key_size);
92 rv = vb2_unpack_key(&root_key, key_data, key_size);
159 uint32_t key_size = sd->workbuf_data_key_size; local
173 rv = vb2_unpack_key(&data_key, key_data, key_size);
  /system/keymaster/include/keymaster/
authorization_set.h 515 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
516 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
517 AuthorizationSetBuilder& AesKey(uint32_t key_size);
518 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size);
519 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
521 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
522 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
523 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
524 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
525 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size);
    [all...]
  /external/mesa3d/src/mesa/drivers/dri/i965/
brw_program_cache.c 69 GLuint key_size; member in struct:brw_cache_item
106 assert(item->key_size % 4 == 0);
110 for (i = 0; i < item->key_size/4; i++) {
124 a->key_size == b->key_size &&
125 (memcmp(a->key, b->key, a->key_size) == 0);
182 const void *key, GLuint key_size,
192 lookup.key_size = key_size;
201 void *aux = ((char *) item->key) + item->key_size;
    [all...]

Completed in 409 milliseconds

1 2 3 4 5 6 7