Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 10 of 10) sorted by relevance

/system/keymaster/km_openssl/
Dhmac.cpp38 bool HmacSha256::Init(const uint8_t* key, size_t key_len) { in Init() argument
42 key_len_ = key_len; in Init()
43 key_.reset(dup_buffer(key, key_len)); in Init()
Drsa_operation.cpp331 size_t key_len = EVP_PKEY_size(rsa_key_); in SignUndigested() local
337 if (data_.available_read() > key_len) { in SignUndigested()
339 } else if (data_.available_read() < key_len) { in SignUndigested()
340 keymaster_error_t error = zero_pad_left(&zero_padded, key_len, data_); in SignUndigested()
345 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), in SignUndigested()
351 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in SignUndigested()
435 size_t key_len = RSA_size(rsa.get()); in VerifyUndigested() local
439 if (data_.available_read() > key_len) in VerifyUndigested()
441 if (key_len != signature.available_read()) in VerifyUndigested()
446 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in VerifyUndigested()
[all …]
/system/keymaster/include/keymaster/key_blob_utils/
Dae.h75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len);
/system/gatekeeper/
Dgatekeeper.cpp248 uint32_t key_len = 0; in MintAuthToken() local
249 if (GetAuthTokenKey(&auth_token_key, &key_len)) { in MintAuthToken()
251 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len, in MintAuthToken()
/system/bt/stack/hcic/
Dhciblecmds.cc353 void btsnd_hcic_ble_encrypt(uint8_t* key, uint8_t key_len, uint8_t* plain_text, in btsnd_hcic_ble_encrypt() argument
370 if (key_len > HCIC_BLE_ENCRYT_KEY_SIZE) key_len = HCIC_BLE_ENCRYT_KEY_SIZE; in btsnd_hcic_ble_encrypt()
373 ARRAY_TO_STREAM(pp, key, key_len); in btsnd_hcic_ble_encrypt()
374 pp += (HCIC_BLE_ENCRYT_KEY_SIZE - key_len); in btsnd_hcic_ble_encrypt()
/system/sepolicy/tools/
Dcheck_seapp.c777 int key_len = strlen(k->key); in rule_map_new() local
780 l = l + key_len + val_len; in rule_map_new()
792 strncat(new_map->key, k->key, key_len); in rule_map_new()
/system/core/trusty/keymaster/legacy/
Dtrusty_keymaster_device_test.cpp491 static void VerifySignature(const uint8_t* key, size_t key_len, const uint8_t* signature, in VerifySignature() argument
493 std::unique_ptr<EVP_PKEY, EVP_PKEY_Delete> pkey(d2i_PUBKEY(NULL, &key, key_len)); in VerifySignature()
/system/keymaster/key_blob_utils/
Docb.c705 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len) { in ae_init() argument
714 key_len = OCB_KEY_LEN; in ae_init()
716 AES_set_encrypt_key((unsigned char*)key, key_len * 8, &ctx->encrypt_key); in ae_init()
720 AES_set_decrypt_key((unsigned char*)key, (int)(key_len * 8), &ctx->decrypt_key); in ae_init()
/system/bt/btif/src/
Dbtif_storage.cc498 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, in btif_read_le_key() argument
509 key_len) == BT_STATUS_SUCCESS) { in btif_read_le_key()
/system/bt/stack/include/
Dhcimsgs.h784 extern void btsnd_hcic_ble_encrypt(uint8_t* key, uint8_t key_len,