Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 40) sorted by relevance

12

/system/keymaster/ng/include/
Dauthorization_set.h245 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
246 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
247 AuthorizationSetBuilder& AesKey(uint32_t key_size);
248 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
250 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
251 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
252 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
253 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
269 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, in RsaKey() argument
272 Authorization(TAG_KEY_SIZE, key_size); in RsaKey()
[all …]
/system/keymaster/km_openssl/
Drsa_key_factory.cpp71 uint32_t key_size; in GenerateKey() local
72 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { in GenerateKey()
76 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize || key_size < kMinimumRsaKeySize) { in GenerateKey()
77 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); in GenerateKey()
88 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) in GenerateKey()
114 uint32_t key_size; in ImportKey() local
117 &authorizations, &public_exponent, &key_size); in ImportKey()
129 uint32_t* key_size) const { in UpdateImportKeyDescription()
130 if (!updated_description || !public_exponent || !key_size) in UpdateImportKeyDescription()
156 *key_size = RSA_size(rsa_key.get()) * 8; in UpdateImportKeyDescription()
[all …]
Daes_operation.cpp30 const EVP_CIPHER* AesEvpCipherDescription::GetCipherInstance(size_t key_size, in GetCipherInstance() argument
37 switch (key_size) { in GetCipherInstance()
49 switch (key_size) { in GetCipherInstance()
61 switch (key_size) { in GetCipherInstance()
73 switch (key_size) { in GetCipherInstance()
Dtriple_des_operation.cpp30 TripleDesEvpCipherDescription::GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode, in GetCipherInstance() argument
36 switch (key_size) { in GetCipherInstance()
48 switch (key_size) { in GetCipherInstance()
Dec_key_factory.cpp84 uint32_t key_size; in GenerateKey() local
85 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); in GenerateKey()
88 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey()
89 authorizations.push_back(TAG_KEY_SIZE, key_size); in GenerateKey()
137 uint32_t key_size; in ImportKey() local
139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); in ImportKey()
Dtriple_des_operation.h32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
Daes_operation.h32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
Dattestation_record.cpp179 integer_ptr = &record->key_size; in build_auth_list()
339 uint32_t key_size; in build_auth_list() local
342 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) { in build_auth_list()
345 keymaster_error_t error = EcKeySizeToCurve(key_size, &ec_curve); in build_auth_list()
556 if (record->key_size && !auth_list->push_back(TAG_KEY_SIZE, ASN1_INTEGER_get(record->key_size))) in extract_auth_list()
/system/keymaster/include/keymaster/
Dauthorization_set.h515 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
516 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
517 AuthorizationSetBuilder& AesKey(uint32_t key_size);
518 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size);
519 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
521 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
522 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
523 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
524 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
525 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size);
[all …]
/system/keymaster/legacy_support/
Dec_keymaster0_key.cpp47 uint32_t key_size; in GenerateKey() local
48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); in GenerateKey()
54 if (!engine_->GenerateEcKey(key_size, &key_material)) in GenerateKey()
60 hw_enforced->push_back(TAG_KEY_SIZE, key_size); in GenerateKey()
80 uint32_t key_size; in ImportKey() local
82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); in ImportKey()
93 hw_enforced->push_back(TAG_KEY_SIZE, key_size); in ImportKey()
Drsa_keymaster0_key.cpp49 uint32_t key_size; in GenerateKey() local
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { in GenerateKey()
56 if (!engine_->GenerateRsaKey(public_exponent, key_size, &key_material)) in GenerateKey()
63 hw_enforced->push_back(TAG_KEY_SIZE, key_size); in GenerateKey()
79 uint32_t key_size; in ImportKey() local
82 &authorizations, &public_exponent, &key_size); in ImportKey()
94 hw_enforced->push_back(TAG_KEY_SIZE, key_size); in ImportKey()
Dec_keymaster1_key.cpp72 uint32_t key_size; in GenerateKey() local
73 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); in GenerateKey()
76 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey()
77 key_params_copy.push_back(TAG_KEY_SIZE, key_size); in GenerateKey()
/system/bt/stack/gatt/
Dgatt_db.cc85 uint8_t key_size) { in gatts_check_attr_readability() argument
119 (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) { in gatts_check_attr_readability()
166 tGATT_SEC_FLAG sec_flag, uint8_t key_size) { in read_attr_value() argument
174 sec_flag, key_size); in read_attr_value()
257 tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id, in gatts_db_read_attr_value_by_type() argument
274 &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type()
445 tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id) { in gatts_read_attr_value_by_handle() argument
452 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle()
483 uint8_t key_size) { in gatts_read_attr_perm_check() argument
487 return gatts_check_attr_readability(*p_attr, 0, is_long, sec_flag, key_size); in gatts_read_attr_perm_check()
[all …]
Dgatt_sr.cc358 uint8_t sec_flag, key_size; in gatt_process_read_multi_req() local
363 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatt_process_read_multi_req()
389 key_size); in gatt_process_read_multi_req()
422 &p_msg->attr_value.len, GATT_MAX_ATTR_LEN, sec_flag, key_size, in gatt_process_read_multi_req()
826 uint8_t sec_flag, key_size; in gatts_process_read_by_type_req() local
827 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_read_by_type_req()
831 key_size, 0, &err_hdl); in gatts_process_read_by_type_req()
870 uint8_t sec_flag, key_size, *p = p_data; in gatts_process_write_req() local
906 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_write_req()
910 sec_flag, key_size); in gatts_process_write_req()
[all …]
Dgatt_int.h572 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size,
577 tGATT_SEC_FLAG sec_flag, uint8_t key_size, uint32_t trans_id);
580 uint8_t* p_data, uint16_t len, tGATT_SEC_FLAG sec_flag, uint8_t key_size);
584 uint8_t key_size);
/system/keymaster/tests/
Dwrapped_key_test.cpp94 uint32_t key_size; in TEST() local
95 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size); in TEST()
96 EXPECT_EQ(key_size, (uint32_t)256); in TEST()
Dandroid_keymaster_test.cpp367 for (size_t key_size = 0; key_size <= kMaxHmacKeyLengthBits + 10; ++key_size) { in TEST_P() local
368 if (key_size < kMinHmacKeyLengthBits || key_size > kMaxHmacKeyLengthBits || in TEST_P()
369 key_size % 8 != 0) { in TEST_P()
372 .HmacKey(key_size) in TEST_P()
375 << "HMAC key size " << key_size << " invalid."; in TEST_P()
378 .HmacKey(key_size) in TEST_P()
743 for (int key_size : key_sizes) { in TEST_P() local
747 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(digest))); in TEST_P()
752 message.resize(key_size / 8); in TEST_P()
1451 for (auto key_size : key_sizes) { in TEST_P() local
[all …]
/system/vold/tests/
DCryptfsScryptHidlizationEquivalence_test.cpp156 size_t key_size = 0; in keymaster_create_key_old() local
192 key_size = key_blob.key_material_size; in keymaster_create_key_old()
201 &key, &key_size)) { in keymaster_create_key_old()
212 if (key_size > KEYMASTER_BLOB_SIZE) { in keymaster_create_key_old()
218 memcpy(ftr->keymaster_blob, key, key_size); in keymaster_create_key_old()
219 ftr->keymaster_blob_size = key_size; in keymaster_create_key_old()
/system/security/keystore/
Dkeystore_cli_v2.cpp137 AuthorizationSet GetRSASignParameters(uint32_t key_size, bool sha256_only) { in GetRSASignParameters() argument
139 parameters.RsaSigningKey(key_size, 65537) in GetRSASignParameters()
150 AuthorizationSet GetRSAEncryptParameters(uint32_t key_size) { in GetRSAEncryptParameters() argument
152 parameters.RsaEncryptionKey(key_size, 65537) in GetRSAEncryptParameters()
159 AuthorizationSet GetECDSAParameters(uint32_t key_size, bool sha256_only) { in GetECDSAParameters() argument
161 parameters.EcdsaSigningKey(key_size) in GetECDSAParameters()
170 AuthorizationSet GetAESParameters(uint32_t key_size, bool with_gcm_mode) { in GetAESParameters() argument
172 parameters.AesEncryptionKey(key_size).Authorization(TAG_NO_AUTH_REQUIRED); in GetAESParameters()
185 AuthorizationSet GetHMACParameters(uint32_t key_size, Digest digest) { in GetHMACParameters() argument
187 parameters.HmacKey(key_size) in GetHMACParameters()
Dkeystore_client_impl.cpp484 auto key_size = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_KEY_SIZE), in verifyEncryptionKeyAttributes() local
486 if (!key_size.isOk() || key_size.value() != kAESKeySize) { in verifyEncryptionKeyAttributes()
525 auto key_size = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_KEY_SIZE), in verifyAuthenticationKeyAttributes() local
527 if (!key_size.isOk() || key_size.value() != kHMACKeySize) { in verifyAuthenticationKeyAttributes()
/system/netd/libbpf/
DBpfUtils.cpp72 int createMap(bpf_map_type map_type, uint32_t key_size, uint32_t value_size, uint32_t max_entries, in createMap() argument
77 attr.key_size = key_size; in createMap()
/system/keymaster/include/keymaster/km_openssl/
Drsa_key_factory.h58 uint32_t* key_size) const;
Dec_key_factory.h54 uint32_t* key_size) const;
/system/bt/stack/btu/
Dbtu_hcif.cc728 uint8_t status, uint16_t handle, uint8_t key_size) { in read_encryption_key_size_complete_after_encryption_change() argument
731 HCI_READ_ENCR_KEY_SIZE, HCI_COMMAND_COMPLETE_EVT, status, 0, key_size); in read_encryption_key_size_complete_after_encryption_change()
734 << std::to_string(key_size); in read_encryption_key_size_complete_after_encryption_change()
751 if (key_size < MIN_KEY_SIZE) { in read_encryption_key_size_complete_after_encryption_change()
755 << loghex(handle) << " key_size: " << +key_size; in read_encryption_key_size_complete_after_encryption_change()
1698 uint8_t status, uint16_t handle, uint8_t key_size) { in read_encryption_key_size_complete_after_key_refresh() argument
1701 HCI_READ_ENCR_KEY_SIZE, HCI_COMMAND_COMPLETE_EVT, status, 0, key_size); in read_encryption_key_size_complete_after_key_refresh()
1704 << std::to_string(key_size); in read_encryption_key_size_complete_after_key_refresh()
1721 if (key_size < MIN_KEY_SIZE) { in read_encryption_key_size_complete_after_key_refresh()
1725 << loghex(handle) << " key_size: " << +key_size; in read_encryption_key_size_complete_after_key_refresh()
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster0_engine.h50 bool GenerateEcKey(uint32_t key_size, KeymasterKeyBlob* key_material) const;

12