/trusty/user/base/app/swaes-benchmark/ |
D | vectors.h | 5581 size_t key_size; member 5599 #define INPUT_BYTES_DECRYPT(mode, key_size, input_size) \ argument 5600 ciphertext_##mode##_##key_size 5602 #define INPUT_BYTES(mode, key_size, input_size, direction) \ argument 5603 INPUT_BYTES##_##direction(mode, key_size, input_size) 5605 #define OUTPUT_BYTES_ENCRYPT(mode, key_size, input_size) \ argument 5606 ciphertext_##mode##_##key_size 5609 #define OUTPUT_BYTES(mode, key_size, input_size, direction) \ argument 5610 OUTPUT_BYTES##_##direction(mode, key_size, input_size) 5615 #define TAG(key_size, input_size) tag_##key_size##_##input_size argument [all …]
|
D | swaes-bench.c | 131 params[param_idx].key_size * 8, params[param_idx].input_size); in get_param_name_cb() 151 if (_state->param->key_size * 8 == 128) { in BENCH_SETUP() 153 } else if (_state->param->key_size * 8 == 256) { in BENCH_SETUP() 158 if (_state->param->key_size * 8 == 128) { in BENCH_SETUP() 160 } else if (_state->param->key_size * 8 == 256) { in BENCH_SETUP() 172 ASSERT_EQ(EVP_CIPHER_key_length(_state->cipher), param->key_size); in BENCH_SETUP()
|
/trusty/user/base/app/hwaes-benchmark/ |
D | vectors.h | 5571 #define INPUT_BYTES_DECRYPT(mode, key_size, input_size) \ argument 5572 ciphertext_##mode##_##key_size 5574 #define INPUT_BYTES(mode, key_size, input_size, direction) \ argument 5575 INPUT_BYTES##_##direction(mode, key_size, input_size) 5577 #define OUTPUT_BYTES_ENCRYPT(mode, key_size, input_size) \ argument 5578 ciphertext_##mode##_##key_size 5581 #define OUTPUT_BYTES(mode, key_size, input_size, direction) \ argument 5582 OUTPUT_BYTES##_##direction(mode, key_size, input_size) 5587 #define TAG(key_size, input_size) tag_##key_size##_##input_size argument 5592 .key = key_##arg_key_size, .key_size = sizeof(key_##arg_key_size), \
|
D | hwaes-bench.c | 117 size_t key_size; member 207 params[param_idx].key_size * 8, params[param_idx].input_size * 8); in get_param_name_cb() 277 .len = CUR_PARAM.key_size, in BENCH_SETUP() 328 .len = CUR_PARAM.key_size, in BENCH_SETUP()
|
/trusty/user/base/lib/sample/apploader_policy_engine/ |
D | apploader_policy_engine.cpp | 55 unsigned int key_size = kMaximumKeySize; in get_key() local 56 uint8_t* key_bytes = (uint8_t*)malloc(key_size * sizeof(uint8_t)); in get_key() 63 &key_size); in get_key() 71 *public_key_size = key_size; in get_key()
|
/trusty/user/app/keymint/ |
D | key_wrapper.rs | 87 let key_size = get_tag_value!(params, KeySize, ErrorCode::UnsupportedTag)?; in create_storage_key() localVariable 88 let key_size = key_size.0 as usize; in create_storage_key() localVariable 106 None => hwwsk::generate_key(&session, &mut buf, key_size, key_flags), in create_storage_key() 107 Some(key) => hwwsk::import_key(&session, &mut buf, key_size, key_flags, key), in create_storage_key() 113 None => hwwsk::generate_key(&session, &mut buf, key_size, key_flags), in create_storage_key() 114 Some(key) => hwwsk::import_key(&session, &mut buf, key_size, key_flags, key), in create_storage_key() 152 let key_size = aes_key.size(); in import_key() localVariable 153 Ok((self.create_storage_key(Some(aes_key), params)?, key_size)) in import_key()
|
/trusty/user/app/storage/ |
D | proxy.c | 48 uint32_t key_size) { in get_storage_encryption_key() argument 57 if (key_size != sizeof(storage_key_derivation_data.byte)) { in get_storage_encryption_key() 63 storage_key_derivation_data.byte, key, key_size); in get_storage_encryption_key() 75 uint32_t key_size) { in get_rpmb_auth_key() argument 79 &key_size); in get_rpmb_auth_key()
|
D | block_tree.h | 69 size_t key_size; member 191 size_t key_size,
|
D | block_tree.c | 109 size_t key_size, in block_tree_set_sizes() argument 115 assert(key_size); in block_tree_set_sizes() 116 assert(key_size <= sizeof(data_block_t)); in block_tree_set_sizes() 117 assert(child_size >= key_size); in block_tree_set_sizes() 122 tree->key_size = key_size; in block_tree_set_sizes() 125 tree->key_count[0] = (payload_size - child_size) / (key_size + child_size); in block_tree_set_sizes() 127 tree->key_count[1] = (payload_size) / (key_size + data_size); in block_tree_set_sizes() 162 assert(key_count * tree->key_size < tree->block_size); in block_tree_max_key_count() 239 entry_size = tree->key_size; in block_tree_node_shift() 242 base = node_rw->data + tree->key_size * max_count; in block_tree_node_shift() [all …]
|
/trusty/user/base/lib/hwwsk/rust/src/ |
D | lib.rs | 133 serializer.serialize_as_bytes(&self.req.key_size)?; in serialize() 155 let hwwsk_generate_key_req { key_size, key_flags } = in deserialize() 159 req: hwwsk_generate_key_req { key_size: *key_size, key_flags: *key_flags }, in deserialize() 292 key_size: usize, in import_key() 299 create_key(session, buf, key_size, key_flags, raw_key) in import_key() 323 key_size: usize, in generate_key() 326 create_key(session, buf, key_size, key_flags, &[]) in generate_key() 332 key_size: usize, in create_key() 340 req: hwwsk_generate_key_req { key_size: key_size as u32, key_flags: key_flags.flags }, in create_key()
|
/trusty/user/base/lib/hwwsk/ |
D | client.c | 90 uint32_t key_size, in hwwsk_generate_key() argument 105 msg.req.key_size = key_size; in hwwsk_generate_key()
|
/trusty/user/app/keymaster/ |
D | trusty_aes_key.cpp | 61 uint32_t key_size; in CreateHwStorageKeyBlob() local 81 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { in CreateHwStorageKeyBlob() 99 rc = hwwsk_generate_key(hchan, sk_blob, sizeof(sk_blob), key_size, in CreateHwStorageKeyBlob() 106 rc = hwwsk_generate_key(hchan, sk_blob, sizeof(sk_blob), key_size, in CreateHwStorageKeyBlob()
|
D | secure_storage_manager.h | 85 uint32_t key_size); 213 uint32_t key_size);
|
D | secure_storage_manager.cpp | 140 uint32_t key_size) { in WriteKeyToStorage() argument 141 if (key_size > kKeySizeMax) { in WriteKeyToStorage() 152 memcpy(attestation_key->key.bytes, key, key_size); in WriteKeyToStorage() 153 attestation_key->key.size = key_size; in WriteKeyToStorage() 830 uint32_t key_size; in TranslateLegacyFormat() local 843 &key_size, kKeySizeMax); in TranslateLegacyFormat() 847 if (key_size == 0) { in TranslateLegacyFormat() 851 attestation_key->key.size = key_size; in TranslateLegacyFormat() 994 uint32_t key_size) { in LegacyWriteKeyToStorage() argument 998 return LegacySecureStorageWrite(key_file, key, key_size); in LegacyWriteKeyToStorage()
|
D | trusty_keymaster.cpp | 105 size_t key_size = request.key_data.buffer_size(); in SetAttestationKey() local 114 if (key_size == 0) { in SetAttestationKey() 118 response->error = ss_manager->WriteKeyToStorage(key_slot, key, key_size); in SetAttestationKey()
|
/trusty/user/base/lib/hwwsk/include/lib/hwwsk/ |
D | client.h | 55 uint32_t key_size,
|
/trusty/user/base/interface/hwwsk/include/interface/hwwsk/ |
D | hwwsk.h | 157 uint32_t key_size; member
|
/trusty/user/base/lib/apploader_package/ |
D | package.cpp | 59 uint32_t key_size = kMaximumKeySize; in get_key() local 60 std::unique_ptr<uint8_t[]> result(new (std::nothrow) uint8_t[key_size]()); in get_key() 67 result.get(), &key_size); in get_key() 73 return {std::move(result), static_cast<size_t>(key_size)}; in get_key()
|
/trusty/user/base/lib/hwbcc/srv/include/lib/hwbcc/srv/ |
D | srv.h | 57 uint32_t key_size,
|
/trusty/hardware/nxp/app/hwcrypto/ |
D | caam.h | 58 size_t key_size,
|
/trusty/user/app/sample/hwcryptohal/server/ |
D | hwcrypto_device_key.rs | 229 let key_size = opaque_key::get_key_size_in_bytes(&key_type)?; in derive_dice_policy_bound_key() localVariable 232 derived_key.try_reserve(key_size)?; in derive_dice_policy_bound_key() 233 derived_key.resize(key_size, 0); in derive_dice_policy_bound_key() 334 let key_size = clear_policy.keySizeBytes.try_into().map_err(|_| { in deriveKey() localVariable 341 if key_size > (u32::MAX as usize) { in deriveKey() 347 let key_size_as_bytes = (key_size as u32).to_le_bytes(); in deriveKey() 354 derivation_key.derive_raw_key_material(concat_context.as_slice(), key_size)?; in deriveKey()
|
/trusty/user/base/lib/hwbcc/common/include/lib/hwbcc/common/ |
D | swbcc.h | 56 uint32_t key_size,
|
/trusty/user/app/cast-auth/app/ |
D | cast_auth_impl.cc | 117 size_t key_size = sizeof(key); in SignHash() local 118 int rc = LoadKey(key, &key_size); in SignHash() 123 bssl::UniquePtr<BIO> bio(BIO_new_mem_buf(key, key_size)); in SignHash()
|
/trusty/user/base/lib/keymaster/ |
D | keymaster.c | 240 size_t key_size, in mint_hmac() argument 247 ret = HMAC(EVP_sha256(), (void*)key, key_size, message, message_size, hmac, in mint_hmac()
|
/trusty/user/app/sample/hwcrypto/ |
D | hwkey_srv_fake_provider.c | 737 size_t key_size = (size_t)*key->key_size_ptr; in get_apploader_key() local 738 assert(kbuf_len >= key_size); in get_apploader_key() 740 memcpy(kbuf, key->key_data, key_size); in get_apploader_key() 741 *klen = key_size; in get_apploader_key()
|