/system/keymaster/km_openssl/ |
aes_operation.cpp | 30 const EVP_CIPHER* AesEvpCipherDescription::GetCipherInstance(size_t key_size, 37 switch (key_size) { 49 switch (key_size) { 61 switch (key_size) { 73 switch (key_size) {
|
triple_des_operation.cpp | 30 TripleDesEvpCipherDescription::GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode, 36 switch (key_size) { 48 switch (key_size) {
|
rsa_key_factory.cpp | 71 uint32_t key_size; local 72 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { 76 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize || key_size < kMinimumRsaKeySize) { 77 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); 88 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) 114 uint32_t key_size; local 117 &authorizations, &public_exponent, &key_size); 129 uint32_t* key_size) const [all...] |
aes_operation.h | 32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
|
triple_des_operation.h | 32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
|
/external/mmc-utils/3rdparty/hmac_sha/ |
hmac_sha2.h | 96 unsigned int key_size); 102 void hmac_sha224(const unsigned char *key, unsigned int key_size, 107 unsigned int key_size); 113 void hmac_sha256(const unsigned char *key, unsigned int key_size, 118 unsigned int key_size); 124 void hmac_sha384(const unsigned char *key, unsigned int key_size, 129 unsigned int key_size); 135 void hmac_sha512(const unsigned char *key, unsigned int key_size,
|
hmac_sha2.c | 45 unsigned int key_size) 54 if (key_size == SHA224_BLOCK_SIZE) { 58 if (key_size > SHA224_BLOCK_SIZE){ 60 sha224(key, key_size, key_temp); 62 } else { /* key_size > SHA224_BLOCK_SIZE */ 64 num = key_size; 117 void hmac_sha224(const unsigned char *key, unsigned int key_size, 123 hmac_sha224_init(&ctx, key, key_size); 131 unsigned int key_size) 140 if (key_size == SHA256_BLOCK_SIZE) [all...] |
/system/keymaster/ng/include/ |
authorization_set.h | 245 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 246 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 247 AuthorizationSetBuilder& AesKey(uint32_t key_size); 248 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 250 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 251 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 252 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 253 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 269 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, 272 Authorization(TAG_KEY_SIZE, key_size); [all...] |
/external/avb/libavb/ |
avb_property_descriptor.c | 63 size_t key_size; member in struct:__anon14245 90 if (data->key_size == prop_desc.key_num_bytes) { 93 data->key_size) == 0) { 110 size_t key_size, 114 if (key_size == 0) { 115 key_size = avb_strlen(key); 119 data.key_size = key_size; 138 size_t key_size, 146 value = avb_property_lookup(image_data, image_size, key, key_size, NULL) [all...] |
avb_property_descriptor.h | 61 * name |key| in a vbmeta image. If |key_size| is 0, |key| must be 86 size_t key_size, 99 size_t key_size,
|
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 19 int i, key_size; local 35 key_size = siglen_map[algorithm] * 8; /* in bits. */ 37 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", key_size); 57 key_size, sha_strings[algorithm]); 75 " Speed = %.02f verifications/s\n", key_size, sha_strings[algorithm], 77 fprintf(stdout, "ms_rsa%d_%s:%.02f\n", key_size, sha_strings[algorithm],
|
/external/vboot_reference/firmware/lib20/ |
misc.c | 23 uint32_t key_size; local 35 key_size = sd->gbb_rootkey_size; 36 key_data = vb2_workbuf_alloc(&wb, key_size); 41 key_data, key_size); 46 rv = vb2_unpack_key(&root_key, key_data, key_size); 103 packed_key->key_size = kb->data_key.key_size; 113 packed_key->key_size); 118 packed_key->key_offset + packed_key->key_size; 136 uint32_t key_size = sd->workbuf_data_key_size local [all...] |
/external/python/cpython3/Modules/ |
hashtable.c | 62 (sizeof(_Py_hashtable_entry_t) + (HT)->key_size + (HT)->data_size) 122 return (memcmp(pkey, pkey2, ht->key_size) == 0); 141 _Py_hashtable_new_full(size_t key_size, size_t data_size, 164 ht->key_size = key_size; 183 _Py_hashtable_new(size_t key_size, size_t data_size, 187 return _Py_hashtable_new_full(key_size, data_size, 254 size_t key_size, const void *pkey) 260 assert(key_size == ht->key_size); 496 const size_t key_size = src->key_size; local [all...] |
hashtable.h | 29 /* key (key_size bytes) and then data (data_size bytes) follows */ 39 + (TABLE)->key_size)) 45 assert(sizeof(DST_KEY) == (TABLE)->key_size); \ 51 assert(sizeof(KEY) == (TABLE)->key_size); \ 96 size_t key_size; member in struct:_Py_hashtable_t 116 size_t key_size, 122 size_t key_size, 157 size_t key_size, 176 size_t key_size, 189 size_t key_size, [all...] |
/system/keymaster/legacy_support/ |
rsa_keymaster0_key.cpp | 49 uint32_t key_size; local 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material)) 63 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 79 uint32_t key_size; local 82 &authorizations, &public_exponent, &key_size); 94 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
ec_keymaster0_key.cpp | 47 uint32_t key_size; local 48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 54 if (!engine_->GenerateEcKey(key_size, &key_material)) 60 hw_enforced->push_back(TAG_KEY_SIZE, key_size); 80 uint32_t key_size; local 82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 93 hw_enforced->push_back(TAG_KEY_SIZE, key_size);
|
/external/vboot_reference/host/lib/ |
host_key.c | 146 /* Allocate a new public key with space for a [key_size] byte key. */ 147 VbPublicKey* PublicKeyAlloc(uint64_t key_size, uint64_t algorithm, 149 VbPublicKey* key = (VbPublicKey*)malloc(sizeof(VbPublicKey) + key_size); 155 key->key_size = key_size; 164 uint64_t key_size; local 177 key_data = ReadFile(filename, &key_size); 182 expected_key_size != key_size) { 188 key = PublicKeyAlloc(key_size, algorithm, version); 193 Memcpy(GetPublicKeyData(key), key_data, key_size); local 202 uint64_t key_size; local [all...] |
/external/google-breakpad/src/common/ |
simple_string_dictionary.h | 61 static const size_t key_size = KeySize; member in class:google_breakpad::NonAllocatingMap 112 assert(other.key_size == key_size); 115 if (other.key_size == key_size && other.value_size == value_size && 184 strncpy(entry->key, key, key_size); 185 entry->key[key_size - 1] = '\0'; 200 if (strncmp(entries_[i].key, key, key_size) == 0) 240 if (strncmp(key, entries_[i].key, key_size) == 0) {
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
authorization_set.h | 268 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 269 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 271 AuthorizationSetBuilder& AesKey(uint32_t key_size); 272 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 274 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 275 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 276 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 278 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 314 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, 317 Authorization(TAG_KEY_SIZE, key_size); [all...] |
/external/linux-kselftest/tools/testing/selftests/bpf/ |
test_obj_id.c | 21 .key_size = sizeof(__u32),
|
sockmap_verdict_prog.c | 17 .key_size = sizeof(int), 24 .key_size = sizeof(int), 31 .key_size = sizeof(int),
|
/external/vboot_reference/firmware/lib21/ |
packed_key.c | 15 uint32_t key_size) 21 if (!expected_key_size || expected_key_size != key_size) { 65 pkey->key_offset, pkey->key_size); 90 pkey->key_size);
|
misc.c | 71 uint32_t key_size; local 81 key_size = sd->gbb_rootkey_size; 82 key_data = vb2_workbuf_alloc(&wb, key_size); 87 key_data, key_size); 92 rv = vb2_unpack_key(&root_key, key_data, key_size); 159 uint32_t key_size = sd->workbuf_data_key_size; local 173 rv = vb2_unpack_key(&data_key, key_data, key_size);
|
/system/keymaster/include/keymaster/ |
authorization_set.h | 515 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 516 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 517 AuthorizationSetBuilder& AesKey(uint32_t key_size); 518 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size); 519 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 521 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 522 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 523 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 524 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 525 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size); [all...] |
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_program_cache.c | 69 GLuint key_size; member in struct:brw_cache_item 106 assert(item->key_size % 4 == 0); 110 for (i = 0; i < item->key_size/4; i++) { 124 a->key_size == b->key_size && 125 (memcmp(a->key, b->key, a->key_size) == 0); 182 const void *key, GLuint key_size, 192 lookup.key_size = key_size; 201 void *aux = ((char *) item->key) + item->key_size; [all...] |