Home
last modified time | relevance | path

Searched refs:key_length (Results 1 – 7 of 7) sorted by relevance

/system/keymaster/km_openssl/
Dopenssl_utils.cpp69 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, in convert_pkcs8_blob_to_evp() argument
72 if (key_data == nullptr || key_length <= 0) return KM_ERROR_INVALID_KEY_BLOB; in convert_pkcs8_blob_to_evp()
75 d2i_PKCS8_PRIV_KEY_INFO(nullptr, &key_data, key_length)); in convert_pkcs8_blob_to_evp()
/system/gatekeeper/include/gatekeeper/
Dgatekeeper.h92 const uint8_t *key, uint32_t key_length, const uint8_t *password,
109 const uint8_t *key, uint32_t key_length, const uint8_t *message,
/system/keymaster/include/keymaster/km_openssl/
Dhmac.h34 bool Init(const uint8_t* key, size_t key_length);
Dopenssl_utils.h89 keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
/system/security/keystore2/src/fuzzers/
Dkeystore2_unsafe_fuzzer.rs73 key_length: usize,
151 FuzzCommand::Password { pw, salt, key_length } => {
152 let _res = Password::from(pw).derive_key(salt, key_length % MAX_SIZE_MODIFIER);
/system/security/keystore2/src/crypto/
Dlib.rs200 pub fn derive_key(&self, salt: &[u8], key_length: usize) -> Result<ZVec, Error> { in derive_key()
204 match key_length { in derive_key()
210 let mut result = ZVec::new(key_length)?; in derive_key()
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h90 static keymaster_error_t GetPkcs8KeyAlgorithm(const uint8_t* key, size_t key_length,