/aosp12/system/keymaster/ng/include/ |
H A D | authorization_set.h | 235 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 236 AuthorizationSetBuilder& AesKey(uint32_t key_size); 237 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 259 Authorization(TAG_KEY_SIZE, key_size); in RsaKey() 266 Authorization(TAG_KEY_SIZE, key_size); in EcdsaKey() 272 return Authorization(TAG_KEY_SIZE, key_size); in AesKey() 277 Authorization(TAG_KEY_SIZE, key_size); in HmacKey() 283 RsaKey(key_size, public_exponent); in RsaSigningKey() 289 RsaKey(key_size, public_exponent); in RsaEncryptionKey() 294 EcdsaKey(key_size); in EcdsaSigningKey() [all …]
|
/aosp12/hardware/interfaces/security/keymint/support/ |
H A D | authorization_set.cpp | 116 AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, in RsaKey() argument 119 Authorization(TAG_KEY_SIZE, key_size); in RsaKey() 126 Authorization(TAG_KEY_SIZE, key_size); in EcdsaKey() 138 return Authorization(TAG_KEY_SIZE, key_size); in AesKey() 143 return Authorization(TAG_KEY_SIZE, key_size); in TripleDesKey() 148 Authorization(TAG_KEY_SIZE, key_size); in HmacKey() 154 RsaKey(key_size, public_exponent); in RsaSigningKey() 160 RsaKey(key_size, public_exponent); in RsaEncryptionKey() 165 EcdsaKey(key_size); in EcdsaSigningKey() 175 AesKey(key_size); in AesEncryptionKey() [all …]
|
/aosp12/system/keymaster/km_openssl/ |
H A D | rsa_key_factory.cpp | 70 uint32_t key_size; in GenerateKey() local 71 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { in GenerateKey() 75 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize || key_size < kMinimumRsaKeySize) { in GenerateKey() 132 uint32_t key_size; in ImportKey() local 135 &authorizations, &public_exponent, &key_size); in ImportKey() 172 if (!updated_description || !public_exponent || !key_size) in UpdateImportKeyDescription() 195 *key_size = RSA_size(rsa_key.get()) * 8; in UpdateImportKeyDescription() 196 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size)) in UpdateImportKeyDescription() 197 updated_description->push_back(TAG_KEY_SIZE, *key_size); in UpdateImportKeyDescription() 198 if (RSA_size(rsa_key.get()) * 8 != *key_size) { in UpdateImportKeyDescription() [all …]
|
H A D | aes_operation.cpp | 30 const EVP_CIPHER* AesEvpCipherDescription::GetCipherInstance(size_t key_size, in GetCipherInstance() argument 37 switch (key_size) { in GetCipherInstance() 49 switch (key_size) { in GetCipherInstance() 61 switch (key_size) { in GetCipherInstance() 73 switch (key_size) { in GetCipherInstance()
|
H A D | triple_des_operation.cpp | 30 TripleDesEvpCipherDescription::GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode, in GetCipherInstance() argument 36 switch (key_size) { in GetCipherInstance() 48 switch (key_size) { in GetCipherInstance()
|
H A D | ec_key_factory.cpp | 91 uint32_t key_size; in GenerateKey() local 92 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); in GenerateKey() 95 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey() 96 authorizations.push_back(TAG_KEY_SIZE, key_size); in GenerateKey() 160 uint32_t key_size; in ImportKey() local 162 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); in ImportKey()
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | authorization_set.h | 274 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 276 AuthorizationSetBuilder& AesKey(uint32_t key_size); 277 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 322 Authorization(TAG_KEY_SIZE, key_size); in RsaKey() 329 Authorization(TAG_KEY_SIZE, key_size); in EcdsaKey() 341 return Authorization(TAG_KEY_SIZE, key_size); in AesKey() 346 Authorization(TAG_KEY_SIZE, key_size); in HmacKey() 352 RsaKey(key_size, public_exponent); in RsaSigningKey() 358 RsaKey(key_size, public_exponent); in RsaEncryptionKey() 363 EcdsaKey(key_size); in EcdsaSigningKey() [all …]
|
/aosp12/system/keymaster/include/keymaster/ |
H A D | authorization_set.h | 521 AuthorizationSetBuilder& AesKey(uint32_t key_size); 567 Authorization(TAG_KEY_SIZE, key_size); in RsaKey() 574 Authorization(TAG_KEY_SIZE, key_size); in EcdsaKey() 580 return Authorization(TAG_KEY_SIZE, key_size); in AesKey() 585 return Authorization(TAG_KEY_SIZE, key_size); in TripleDesKey() 590 Authorization(TAG_KEY_SIZE, key_size); in HmacKey() 596 RsaKey(key_size, public_exponent); in RsaSigningKey() 602 RsaKey(key_size, public_exponent); in RsaEncryptionKey() 607 EcdsaKey(key_size); in EcdsaSigningKey() 612 AesKey(key_size); in AesEncryptionKey() [all …]
|
/aosp12/hardware/interfaces/keymaster/4.0/support/ |
H A D | authorization_set.cpp | 455 AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, in RsaKey() argument 458 Authorization(TAG_KEY_SIZE, key_size); in RsaKey() 465 Authorization(TAG_KEY_SIZE, key_size); in EcdsaKey() 477 return Authorization(TAG_KEY_SIZE, key_size); in AesKey() 482 return Authorization(TAG_KEY_SIZE, key_size); in TripleDesKey() 487 Authorization(TAG_KEY_SIZE, key_size); in HmacKey() 493 RsaKey(key_size, public_exponent); in RsaSigningKey() 499 RsaKey(key_size, public_exponent); in RsaEncryptionKey() 504 EcdsaKey(key_size); in EcdsaSigningKey() 514 AesKey(key_size); in AesEncryptionKey() [all …]
|
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
H A D | authorization_set.h | 269 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 270 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 272 AuthorizationSetBuilder& AesKey(uint32_t key_size); 273 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size); 274 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 276 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 277 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 278 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 280 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 281 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size);
|
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | authorization_set.h | 275 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 276 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 278 AuthorizationSetBuilder& AesKey(uint32_t key_size); 279 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size); 280 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 282 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 283 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 284 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 286 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 287 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size);
|
/aosp12/system/bt/gd/security/ |
H A D | pairing_handler_le.cc | 71 uint8_t key_size = in PairingMain() local 73 if (key_size < 7 || key_size > 16) { in PairingMain() 74 LOG_WARN("Resulting key size is bad %d", key_size); in PairingMain() 79 if (key_size != 16) { in PairingMain() 126 std::fill(ltk.begin() + key_size, ltk.end(), 0x00); in PairingMain() 156 std::fill(stk.begin() + key_size, stk.end(), 0x00); in PairingMain() 212 .key_size = key_size, in PairingMain() 289 uint8_t key_size = pairing_request->GetMaximumEncryptionKeySize(); in ExchangePairingFeature() local 290 if (key_size < 7 || key_size > 16) { in ExchangePairingFeature() 291 LOG_WARN("Resulting key size is bad %d", key_size); in ExchangePairingFeature()
|
/aosp12/system/bt/stack/gatt/ |
H A D | gatt_db.cc | 87 uint8_t key_size) { in gatts_check_attr_readability() argument 121 (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) { in gatts_check_attr_readability() 176 sec_flag, key_size); in read_attr_value() 270 uint16_t* p_len, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_db_read_attr_value_by_type() argument 287 &len, sec_flag, key_size); in gatts_db_read_attr_value_by_type() 472 uint16_t mtu, tGATT_SEC_FLAG sec_flag, uint8_t key_size, in gatts_read_attr_value_by_handle() argument 480 mtu, p_len, sec_flag, key_size); in gatts_read_attr_value_by_handle() 511 uint8_t key_size) { in gatts_read_attr_perm_check() argument 540 uint8_t key_size) { in gatts_write_attr_perm_check() argument 544 __func__, op_code, handle, offset, len, sec_flag, key_size); in gatts_write_attr_perm_check() [all …]
|
H A D | gatt_sr.cc | 412 uint8_t sec_flag, key_size; in gatt_process_read_multi_req() local 419 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatt_process_read_multi_req() 444 key_size); in gatt_process_read_multi_req() 479 &p_msg->attr_value.len, GATT_MAX_ATTR_LEN, sec_flag, key_size, in gatt_process_read_multi_req() 895 uint8_t sec_flag, key_size; in gatts_process_read_by_type_req() local 900 sec_flag, key_size, 0, &err_hdl); in gatts_process_read_by_type_req() 940 uint8_t sec_flag, key_size, *p = p_data; in gatts_process_write_req() local 977 gatt_sr_get_sec_info(tcb.peer_bda, tcb.transport, &sec_flag, &key_size); in gatts_process_write_req() 981 sec_flag, key_size); in gatts_process_write_req() 1049 uint8_t sec_flag, key_size; in gatts_process_read_req() local [all …]
|
/aosp12/hardware/interfaces/security/keymint/aidl/vts/functional/ |
H A D | KeyMintTest.cpp | 1026 auto key_size = 2048; in TEST_P() local 1167 auto key_size = 2048; in TEST_P() local 2082 for (size_t key_size = 0; key_size <= 512; ++key_size) { in TEST_P() local 2083 if (key_size < 64 || key_size % 8 != 0) { in TEST_P() 2106 size_t key_size = 520; in TEST_P() local 3109 uint32_t key_size; in TEST_P() local 3113 key_size = 2048; in TEST_P() 3116 key_size = 1024; in TEST_P() 3148 uint32_t key_size; in TEST_P() local 3152 key_size = 2048; in TEST_P() [all …]
|
/aosp12/system/keymaster/legacy_support/ |
H A D | ec_keymaster1_key.cpp | 76 uint32_t key_size; in GenerateKey() local 77 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); in GenerateKey() 80 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey() 81 key_params_copy.push_back(TAG_KEY_SIZE, key_size); in GenerateKey()
|
/aosp12/system/security/keystore2/src/crypto/ |
H A D | crypto.cpp | 61 const EVP_CIPHER* getAesCipherForKey(size_t key_size) { in getAesCipherForKey() argument 63 if (key_size == kAes128KeySizeBytes) { in getAesCipherForKey() 79 size_t key_size, const uint8_t* iv, uint8_t* tag) { in AES_gcm_encrypt() argument 82 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_encrypt() 115 size_t key_size, const uint8_t* iv, const uint8_t* tag) { in AES_gcm_decrypt() argument 118 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_decrypt()
|
H A D | crypto.hpp | 27 const uint8_t* key, size_t key_size, const uint8_t* iv, uint8_t* tag); 29 const uint8_t* key, size_t key_size, const uint8_t* iv,
|
/aosp12/system/keymaster/tests/ |
H A D | wrapped_key_test.cpp | 93 uint32_t key_size; in TEST() local 94 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size); in TEST() 95 EXPECT_EQ(key_size, (uint32_t)256); in TEST()
|
H A D | android_keymaster_test.cpp | 338 for (size_t key_size = 0; key_size <= kMaxHmacKeyLengthBits + 10; ++key_size) { in TEST_P() local 339 if (key_size < kMinHmacKeyLengthBits || key_size > kMaxHmacKeyLengthBits || in TEST_P() 1900 size_t key_size = 768; in TEST_P() local 1918 size_t key_size = 768; in TEST_P() local 1939 size_t key_size = 768; in TEST_P() local 1960 size_t key_size = 768; in TEST_P() local 1978 size_t key_size = 768; in TEST_P() local 1992 size_t key_size = 768; in TEST_P() local 2009 size_t key_size = 768; in TEST_P() local 2113 size_t key_size = 768; in TEST_P() local [all …]
|
/aosp12/frameworks/libs/net/common/native/bpf_syscall_wrappers/include/ |
H A D | BpfSyscallWrappers.h | 45 inline int createMap(bpf_map_type map_type, uint32_t key_size, uint32_t value_size, in createMap() argument 49 .key_size = key_size, in createMap()
|
/aosp12/system/security/keystore2/src/crypto/tests/ |
H A D | certificate_utils_test.cpp | 218 auto [key_size, padding, digest] = param.param; in paramsToStringRsa() 219 s << param.index << "_" << key_size << "_"; in paramsToStringRsa() 243 long key_size; in TEST_P() local 246 std::tie(key_size, padding, digest) = GetParam(); in TEST_P() 249 switch (key_size) { in TEST_P()
|
/aosp12/packages/modules/adb/pairing_auth/ |
H A D | pairing_auth.cpp | 121 size_t key_size = 0; in PairingAuthCtx() local 123 int status = SPAKE2_generate_msg(spake2_ctx_.get(), key, &key_size, SPAKE2_MAX_MSG_SIZE, in PairingAuthCtx() 125 if (status != 1 || key_size == 0) { in PairingAuthCtx() 129 our_msg_.assign(key, key + key_size); in PairingAuthCtx()
|
/aosp12/system/security/ondevice-signing/ |
H A D | KeystoreHmacKey.cpp | 76 KeyParameter key_size; in createKey() local 77 key_size.tag = Tag::KEY_SIZE; in createKey() 78 key_size.value = KeyParameterValue::make<KeyParameterValue::integer>(kHmacKeySize); in createKey() 79 params.push_back(key_size); in createKey()
|
/aosp12/system/core/fs_mgr/libfs_avb/tests/ |
H A D | avb_util_test.cpp | 424 const size_t key_size = 2048; in TEST_F() local 425 base::FilePath key_path = GenerateImage("key.bin", key_size); in TEST_F() 427 uint8_t key_data[key_size]; in TEST_F() 428 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F() 432 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F() 437 EXPECT_TRUE(ValidatePublicKeyBlob(key_data, key_size, expected_key_blob)); in TEST_F() 442 const size_t key_size = 2048; in TEST_F() local 443 base::FilePath key_path = GenerateImage("key.bin", key_size); in TEST_F() 445 uint8_t key_data[key_size]; in TEST_F() 446 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F() [all …]
|