Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 31) sorted by relevance

12

/trusty/user/base/app/swaes-benchmark/
Dvectors.h5581 size_t key_size; member
5599 #define INPUT_BYTES_DECRYPT(mode, key_size, input_size) \ argument
5600 ciphertext_##mode##_##key_size
5602 #define INPUT_BYTES(mode, key_size, input_size, direction) \ argument
5603 INPUT_BYTES##_##direction(mode, key_size, input_size)
5605 #define OUTPUT_BYTES_ENCRYPT(mode, key_size, input_size) \ argument
5606 ciphertext_##mode##_##key_size
5609 #define OUTPUT_BYTES(mode, key_size, input_size, direction) \ argument
5610 OUTPUT_BYTES##_##direction(mode, key_size, input_size)
5615 #define TAG(key_size, input_size) tag_##key_size##_##input_size argument
[all …]
Dswaes-bench.c131 params[param_idx].key_size * 8, params[param_idx].input_size); in get_param_name_cb()
151 if (_state->param->key_size * 8 == 128) { in BENCH_SETUP()
153 } else if (_state->param->key_size * 8 == 256) { in BENCH_SETUP()
158 if (_state->param->key_size * 8 == 128) { in BENCH_SETUP()
160 } else if (_state->param->key_size * 8 == 256) { in BENCH_SETUP()
172 ASSERT_EQ(EVP_CIPHER_key_length(_state->cipher), param->key_size); in BENCH_SETUP()
/trusty/user/base/app/hwaes-benchmark/
Dvectors.h5571 #define INPUT_BYTES_DECRYPT(mode, key_size, input_size) \ argument
5572 ciphertext_##mode##_##key_size
5574 #define INPUT_BYTES(mode, key_size, input_size, direction) \ argument
5575 INPUT_BYTES##_##direction(mode, key_size, input_size)
5577 #define OUTPUT_BYTES_ENCRYPT(mode, key_size, input_size) \ argument
5578 ciphertext_##mode##_##key_size
5581 #define OUTPUT_BYTES(mode, key_size, input_size, direction) \ argument
5582 OUTPUT_BYTES##_##direction(mode, key_size, input_size)
5587 #define TAG(key_size, input_size) tag_##key_size##_##input_size argument
5592 .key = key_##arg_key_size, .key_size = sizeof(key_##arg_key_size), \
Dhwaes-bench.c117 size_t key_size; member
207 params[param_idx].key_size * 8, params[param_idx].input_size * 8); in get_param_name_cb()
277 .len = CUR_PARAM.key_size, in BENCH_SETUP()
328 .len = CUR_PARAM.key_size, in BENCH_SETUP()
/trusty/user/base/lib/sample/apploader_policy_engine/
Dapploader_policy_engine.cpp55 unsigned int key_size = kMaximumKeySize; in get_key() local
56 uint8_t* key_bytes = (uint8_t*)malloc(key_size * sizeof(uint8_t)); in get_key()
63 &key_size); in get_key()
71 *public_key_size = key_size; in get_key()
/trusty/user/app/keymint/
Dkey_wrapper.rs87 let key_size = get_tag_value!(params, KeySize, ErrorCode::UnsupportedTag)?; in create_storage_key() localVariable
88 let key_size = key_size.0 as usize; in create_storage_key() localVariable
106 None => hwwsk::generate_key(&session, &mut buf, key_size, key_flags), in create_storage_key()
107 Some(key) => hwwsk::import_key(&session, &mut buf, key_size, key_flags, key), in create_storage_key()
113 None => hwwsk::generate_key(&session, &mut buf, key_size, key_flags), in create_storage_key()
114 Some(key) => hwwsk::import_key(&session, &mut buf, key_size, key_flags, key), in create_storage_key()
152 let key_size = aes_key.size(); in import_key() localVariable
153 Ok((self.create_storage_key(Some(aes_key), params)?, key_size)) in import_key()
/trusty/user/app/storage/
Dproxy.c48 uint32_t key_size) { in get_storage_encryption_key() argument
57 if (key_size != sizeof(storage_key_derivation_data.byte)) { in get_storage_encryption_key()
63 storage_key_derivation_data.byte, key, key_size); in get_storage_encryption_key()
75 uint32_t key_size) { in get_rpmb_auth_key() argument
79 &key_size); in get_rpmb_auth_key()
Dblock_tree.h69 size_t key_size; member
191 size_t key_size,
Dblock_tree.c109 size_t key_size, in block_tree_set_sizes() argument
115 assert(key_size); in block_tree_set_sizes()
116 assert(key_size <= sizeof(data_block_t)); in block_tree_set_sizes()
117 assert(child_size >= key_size); in block_tree_set_sizes()
122 tree->key_size = key_size; in block_tree_set_sizes()
125 tree->key_count[0] = (payload_size - child_size) / (key_size + child_size); in block_tree_set_sizes()
127 tree->key_count[1] = (payload_size) / (key_size + data_size); in block_tree_set_sizes()
162 assert(key_count * tree->key_size < tree->block_size); in block_tree_max_key_count()
239 entry_size = tree->key_size; in block_tree_node_shift()
242 base = node_rw->data + tree->key_size * max_count; in block_tree_node_shift()
[all …]
/trusty/user/base/lib/hwwsk/rust/src/
Dlib.rs133 serializer.serialize_as_bytes(&self.req.key_size)?; in serialize()
155 let hwwsk_generate_key_req { key_size, key_flags } = in deserialize()
159 req: hwwsk_generate_key_req { key_size: *key_size, key_flags: *key_flags }, in deserialize()
292 key_size: usize, in import_key()
299 create_key(session, buf, key_size, key_flags, raw_key) in import_key()
323 key_size: usize, in generate_key()
326 create_key(session, buf, key_size, key_flags, &[]) in generate_key()
332 key_size: usize, in create_key()
340 req: hwwsk_generate_key_req { key_size: key_size as u32, key_flags: key_flags.flags }, in create_key()
/trusty/user/base/lib/hwwsk/
Dclient.c90 uint32_t key_size, in hwwsk_generate_key() argument
105 msg.req.key_size = key_size; in hwwsk_generate_key()
/trusty/user/app/keymaster/
Dtrusty_aes_key.cpp61 uint32_t key_size; in CreateHwStorageKeyBlob() local
81 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { in CreateHwStorageKeyBlob()
99 rc = hwwsk_generate_key(hchan, sk_blob, sizeof(sk_blob), key_size, in CreateHwStorageKeyBlob()
106 rc = hwwsk_generate_key(hchan, sk_blob, sizeof(sk_blob), key_size, in CreateHwStorageKeyBlob()
Dsecure_storage_manager.h85 uint32_t key_size);
213 uint32_t key_size);
Dsecure_storage_manager.cpp140 uint32_t key_size) { in WriteKeyToStorage() argument
141 if (key_size > kKeySizeMax) { in WriteKeyToStorage()
152 memcpy(attestation_key->key.bytes, key, key_size); in WriteKeyToStorage()
153 attestation_key->key.size = key_size; in WriteKeyToStorage()
830 uint32_t key_size; in TranslateLegacyFormat() local
843 &key_size, kKeySizeMax); in TranslateLegacyFormat()
847 if (key_size == 0) { in TranslateLegacyFormat()
851 attestation_key->key.size = key_size; in TranslateLegacyFormat()
994 uint32_t key_size) { in LegacyWriteKeyToStorage() argument
998 return LegacySecureStorageWrite(key_file, key, key_size); in LegacyWriteKeyToStorage()
Dtrusty_keymaster.cpp105 size_t key_size = request.key_data.buffer_size(); in SetAttestationKey() local
114 if (key_size == 0) { in SetAttestationKey()
118 response->error = ss_manager->WriteKeyToStorage(key_slot, key, key_size); in SetAttestationKey()
/trusty/user/base/lib/hwwsk/include/lib/hwwsk/
Dclient.h55 uint32_t key_size,
/trusty/user/base/interface/hwwsk/include/interface/hwwsk/
Dhwwsk.h157 uint32_t key_size; member
/trusty/user/base/lib/apploader_package/
Dpackage.cpp59 uint32_t key_size = kMaximumKeySize; in get_key() local
60 std::unique_ptr<uint8_t[]> result(new (std::nothrow) uint8_t[key_size]()); in get_key()
67 result.get(), &key_size); in get_key()
73 return {std::move(result), static_cast<size_t>(key_size)}; in get_key()
/trusty/user/base/lib/hwbcc/srv/include/lib/hwbcc/srv/
Dsrv.h57 uint32_t key_size,
/trusty/hardware/nxp/app/hwcrypto/
Dcaam.h58 size_t key_size,
/trusty/user/app/sample/hwcryptohal/server/
Dhwcrypto_device_key.rs229 let key_size = opaque_key::get_key_size_in_bytes(&key_type)?; in derive_dice_policy_bound_key() localVariable
232 derived_key.try_reserve(key_size)?; in derive_dice_policy_bound_key()
233 derived_key.resize(key_size, 0); in derive_dice_policy_bound_key()
334 let key_size = clear_policy.keySizeBytes.try_into().map_err(|_| { in deriveKey() localVariable
341 if key_size > (u32::MAX as usize) { in deriveKey()
347 let key_size_as_bytes = (key_size as u32).to_le_bytes(); in deriveKey()
354 derivation_key.derive_raw_key_material(concat_context.as_slice(), key_size)?; in deriveKey()
/trusty/user/base/lib/hwbcc/common/include/lib/hwbcc/common/
Dswbcc.h56 uint32_t key_size,
/trusty/user/app/cast-auth/app/
Dcast_auth_impl.cc117 size_t key_size = sizeof(key); in SignHash() local
118 int rc = LoadKey(key, &key_size); in SignHash()
123 bssl::UniquePtr<BIO> bio(BIO_new_mem_buf(key, key_size)); in SignHash()
/trusty/user/base/lib/keymaster/
Dkeymaster.c240 size_t key_size, in mint_hmac() argument
247 ret = HMAC(EVP_sha256(), (void*)key, key_size, message, message_size, hmac, in mint_hmac()
/trusty/user/app/sample/hwcrypto/
Dhwkey_srv_fake_provider.c737 size_t key_size = (size_t)*key->key_size_ptr; in get_apploader_key() local
738 assert(kbuf_len >= key_size); in get_apploader_key()
740 memcpy(kbuf, key->key_data, key_size); in get_apploader_key()
741 *klen = key_size; in get_apploader_key()

12