Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 14 of 14) sorted by relevance

/system/keymaster/
Dhmac.cpp38 bool HmacSha256::Init(const uint8_t* key, size_t key_len) { in Init() argument
42 key_len_ = key_len; in Init()
43 key_.reset(dup_buffer(key, key_len)); in Init()
Drsa_operation.cpp323 size_t key_len = EVP_PKEY_size(rsa_key_); in SignUndigested() local
329 if (data_.available_read() > key_len) { in SignUndigested()
331 } else if (data_.available_read() < key_len) { in SignUndigested()
332 keymaster_error_t error = zero_pad_left(&zero_padded, key_len, data_); in SignUndigested()
337 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), in SignUndigested()
343 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in SignUndigested()
423 size_t key_len = RSA_size(rsa.get()); in VerifyUndigested() local
427 if (data_.available_read() > key_len) in VerifyUndigested()
429 if (key_len != signature.available_read()) in VerifyUndigested()
434 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in VerifyUndigested()
[all …]
Dae.h75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len);
Docb.c702 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len) { in ae_init() argument
711 key_len = OCB_KEY_LEN; in ae_init()
713 AES_set_encrypt_key((unsigned char*)key, key_len * 8, &ctx->encrypt_key); in ae_init()
717 AES_set_decrypt_key((unsigned char*)key, (int)(key_len * 8), &ctx->decrypt_key); in ae_init()
/system/gatekeeper/
Dgatekeeper.cpp231 uint32_t key_len = 0; in MintAuthToken() local
232 if (GetAuthTokenKey(&auth_token_key, &key_len)) { in MintAuthToken()
234 ComputeSignature(token->hmac, sizeof(token->hmac), auth_token_key, key_len, in MintAuthToken()
/system/bt/btif/include/
Dbtif_storage.h329 int key_len);
/system/bt/stack/smp/
Dsmp_api.c506 BOOLEAN SMP_Encrypt (UINT8 *key, UINT8 key_len, in SMP_Encrypt() argument
512 status = smp_encrypt_data(key, key_len, plain_text, pt_len, p_out); in SMP_Encrypt()
Dsmp_int.h484 extern BOOLEAN smp_encrypt_data (UINT8 *key, UINT8 key_len,
Dsmp_keys.c137 BOOLEAN smp_encrypt_data (UINT8 *key, UINT8 key_len, in smp_encrypt_data() argument
149 if ( (p_out == NULL ) || (key_len != SMP_ENCRYT_KEY_SIZE) ) in smp_encrypt_data()
/system/bt/stack/hcic/
Dhciblecmds.c497 BOOLEAN btsnd_hcic_ble_encrypt (UINT8 *key, UINT8 key_len, in btsnd_hcic_ble_encrypt() argument
522 if (key_len > HCIC_BLE_ENCRYT_KEY_SIZE) key_len = HCIC_BLE_ENCRYT_KEY_SIZE; in btsnd_hcic_ble_encrypt()
525 ARRAY_TO_STREAM (pp, key, key_len); in btsnd_hcic_ble_encrypt()
526 pp += (HCIC_BLE_ENCRYT_KEY_SIZE - key_len); in btsnd_hcic_ble_encrypt()
/system/bt/stack/include/
Dsmp_api.h459 extern BOOLEAN SMP_Encrypt (UINT8 *key, UINT8 key_len,
Dhcimsgs.h739 extern BOOLEAN btsnd_hcic_ble_encrypt (UINT8* key, UINT8 key_len, UINT8* plain_text, UINT8 pt_len, …
/system/core/init/
Dinit.cpp121 size_t key_len = strlen(key); in add_environment() local
129 if ((entry_key_len == key_len) && (strncmp(ENV[n], key, entry_key_len) == 0)) { in add_environment()
/system/bt/btif/src/
Dbtif_storage.c552 static void btif_read_le_key(const uint8_t key_type, const size_t key_len, bt_bdaddr_t bd_addr, in btif_read_le_key() argument
561 if (btif_storage_get_ble_bonding_key(&bd_addr, key_type, buffer, key_len) == BT_STATUS_SUCCESS) in btif_read_le_key()