Home
last modified time | relevance | path

Searched refs:kAesKeySize (Results 1 – 8 of 8) sorted by relevance

/system/tpm/trunks/
Dhmac_authorization_delegate_test.cc39 nonce.size = kAesKeySize; in TEST()
71 nonce.size = kAesKeySize; in TEST()
100 session_nonce_.size = kAesKeySize; in SetUp()
101 memset(session_nonce_.buffer, 0, kAesKeySize); in SetUp()
181 auth_response.nonce.size = kAesKeySize; in TEST_F()
182 memset(auth_response.nonce.buffer, 0, kAesKeySize); in TEST_F()
Dhmac_authorization_delegate.cc290 CHECK_EQ(compound_key.size(), kAesKeySize + kAesIVSize); in AesOperation()
291 unsigned char aes_key[kAesKeySize]; in AesOperation()
293 memcpy(aes_key, &compound_key[0], kAesKeySize); in AesOperation()
294 memcpy(aes_iv, &compound_key[kAesKeySize], kAesIVSize); in AesOperation()
297 AES_set_encrypt_key(aes_key, kAesKeySize * 8, &key); in AesOperation()
Dhmac_authorization_delegate.h33 const size_t kAesKeySize = 16; // 128 bits is minimum AES key size. variable
Dtpm_utility_impl.cc787 encryption_key.size = kAesKeySize; in ImportRSAKey()
794 symmetric_alg.key_bits.aes = kAesKeySize * 8; in ImportRSAKey()
1826 AES_set_encrypt_key(encryption_key->buffer, kAesKeySize * 8, &key); in EncryptPrivateData()
Dtpm_utility_test.cc1148 EXPECT_EQ(kAesKeySize, encryption_key.size); in TEST_F()
1150 AES_set_encrypt_key(encryption_key.buffer, kAesKeySize * 8, &key); in TEST_F()
/system/tpm/attestation/common/
Dcrypto_utility_impl.cc39 const size_t kAesKeySize = 32; variable
84 if (!GetRandom(kAesKeySize, aes_key)) { in CreateSealedKey()
218 0, kEncModeCBC, 0, kAesKeySize}; in EncryptIdentityCredential()
223 if (!GetRandom(kAesKeySize, &aes_key)) { in EncryptIdentityCredential()
314 if (key.size() != kAesKeySize || iv.size() != kAesBlockSize) { in AesEncrypt()
364 if (key.size() != kAesKeySize || iv.size() != kAesBlockSize) { in AesDecrypt()
424 CHECK_EQ(key.size(), kAesKeySize); in TssCompatibleEncrypt()
/system/security/keystore/
Dblob.h28 constexpr size_t kAesKeySize = 128 / 8; variable
Dblob.cpp302 AES_set_decrypt_key(aes_key, kAesKeySize * 8, &key); in readBlob()