/system/keymaster/ |
D | hmac.cpp | 38 bool HmacSha256::Init(const uint8_t* key, size_t key_len) { in Init() argument 42 key_len_ = key_len; in Init() 43 key_.reset(dup_buffer(key, key_len)); in Init()
|
D | rsa_operation.cpp | 330 size_t key_len = EVP_PKEY_size(rsa_key_); in SignUndigested() local 336 if (data_.available_read() > key_len) { in SignUndigested() 338 } else if (data_.available_read() < key_len) { in SignUndigested() 339 keymaster_error_t error = zero_pad_left(&zero_padded, key_len, data_); in SignUndigested() 344 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), in SignUndigested() 350 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in SignUndigested() 434 size_t key_len = RSA_size(rsa.get()); in VerifyUndigested() local 438 if (data_.available_read() > key_len) in VerifyUndigested() 440 if (key_len != signature.available_read()) in VerifyUndigested() 445 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in VerifyUndigested() [all …]
|
D | ae.h | 75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len);
|
D | ocb.c | 703 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len) { in ae_init() argument 712 key_len = OCB_KEY_LEN; in ae_init() 714 AES_set_encrypt_key((unsigned char*)key, key_len * 8, &ctx->encrypt_key); in ae_init() 718 AES_set_decrypt_key((unsigned char*)key, (int)(key_len * 8), &ctx->decrypt_key); in ae_init()
|
/system/bt/stack/include/ |
D | smp_api.h | 192 extern bool SMP_Encrypt(uint8_t* key, uint8_t key_len, uint8_t* plain_text,
|
D | hcimsgs.h | 785 extern void btsnd_hcic_ble_encrypt(uint8_t* key, uint8_t key_len,
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 239 uint32_t key_len = 0; in MintAuthToken() local 240 if (GetAuthTokenKey(&auth_token_key, &key_len)) { in MintAuthToken() 242 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len, in MintAuthToken()
|
/system/bt/btif/include/ |
D | btif_storage.h | 223 int key_len);
|
/system/bt/stack/smp/ |
D | smp_api.cc | 479 bool SMP_Encrypt(uint8_t* key, uint8_t key_len, uint8_t* plain_text, in SMP_Encrypt() argument 484 status = smp_encrypt_data(key, key_len, plain_text, pt_len, p_out); in SMP_Encrypt()
|
D | smp_int.h | 479 extern bool smp_encrypt_data(uint8_t* key, uint8_t key_len, uint8_t* plain_text,
|
D | smp_keys.cc | 112 bool smp_encrypt_data(uint8_t* key, uint8_t key_len, uint8_t* plain_text, in smp_encrypt_data() argument 122 if ((p_out == NULL) || (key_len != SMP_ENCRYT_KEY_SIZE)) { in smp_encrypt_data()
|
/system/bt/stack/hcic/ |
D | hciblecmds.cc | 367 void btsnd_hcic_ble_encrypt(uint8_t* key, uint8_t key_len, uint8_t* plain_text, in btsnd_hcic_ble_encrypt() argument 384 if (key_len > HCIC_BLE_ENCRYT_KEY_SIZE) key_len = HCIC_BLE_ENCRYT_KEY_SIZE; in btsnd_hcic_ble_encrypt() 387 ARRAY_TO_STREAM(pp, key, key_len); in btsnd_hcic_ble_encrypt() 388 pp += (HCIC_BLE_ENCRYT_KEY_SIZE - key_len); in btsnd_hcic_ble_encrypt()
|
/system/sepolicy/tools/ |
D | check_seapp.c | 777 int key_len = strlen(k->key); in rule_map_new() local 780 l = l + key_len + val_len; in rule_map_new() 792 strncat(new_map->key, k->key, key_len); in rule_map_new()
|
/system/core/trusty/keymaster/ |
D | trusty_keymaster_device_test.cpp | 492 static void VerifySignature(const uint8_t* key, size_t key_len, const uint8_t* signature, in VerifySignature() argument 494 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(d2i_PUBKEY(NULL, &key, key_len)); in VerifySignature()
|
/system/core/init/ |
D | init.cpp | 120 size_t key_len = strlen(key); in add_environment() local 128 if ((entry_key_len == key_len) && (strncmp(ENV[n], key, entry_key_len) == 0)) { in add_environment()
|
/system/bt/btif/src/ |
D | btif_storage.cc | 477 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, in btif_read_le_key() argument 487 if (btif_storage_get_ble_bonding_key(&bd_addr, key_type, buffer, key_len) == in btif_read_le_key()
|
/system/bt/stack/test/ |
D | ble_advertiser_test.cc | 50 bool SMP_Encrypt(uint8_t* key, uint8_t key_len, uint8_t* plain_text, in SMP_Encrypt() argument
|