Searched refs:kAesKeySize (Results 1 – 6 of 6) sorted by relevance
/system/tpm/trunks/ |
D | hmac_authorization_delegate_test.cc | 39 nonce.size = kAesKeySize; in TEST() 70 nonce.size = kAesKeySize; in TEST() 99 session_nonce_.size = kAesKeySize; in SetUp() 100 memset(session_nonce_.buffer, 0, kAesKeySize); in SetUp() 189 auth_response.nonce.size = kAesKeySize; in TEST_F() 190 memset(auth_response.nonce.buffer, 0, kAesKeySize); in TEST_F()
|
D | hmac_authorization_delegate.cc | 299 CHECK_EQ(compound_key.size(), kAesKeySize + kAesIVSize); in AesOperation() 300 unsigned char aes_key[kAesKeySize]; in AesOperation() 302 memcpy(aes_key, &compound_key[0], kAesKeySize); in AesOperation() 303 memcpy(aes_iv, &compound_key[kAesKeySize], kAesIVSize); in AesOperation() 306 AES_set_encrypt_key(aes_key, kAesKeySize*8, &key); in AesOperation()
|
D | hmac_authorization_delegate.h | 33 const size_t kAesKeySize = 16; // 128 bits is minimum AES key size. variable
|
D | tpm_utility_impl.cc | 809 encryption_key.size = kAesKeySize; in ImportRSAKey() 816 symmetric_alg.key_bits.aes = kAesKeySize * 8; in ImportRSAKey() 1837 AES_set_encrypt_key(encryption_key->buffer, kAesKeySize * 8, &key); in EncryptPrivateData()
|
D | tpm_utility_test.cc | 1267 EXPECT_EQ(kAesKeySize, encryption_key.size); in TEST_F() 1269 AES_set_encrypt_key(encryption_key.buffer, kAesKeySize * 8, &key); in TEST_F()
|
/system/tpm/attestation/common/ |
D | crypto_utility_impl.cc | 39 const size_t kAesKeySize = 32; variable 84 if (!GetRandom(kAesKeySize, aes_key)) { in CreateSealedKey() 219 {0, 0, 0, kAlgAES256, 0, kEncModeCBC, 0, kAesKeySize}; in EncryptIdentityCredential() 224 if (!GetRandom(kAesKeySize, &aes_key)) { in EncryptIdentityCredential() 315 if (key.size() != kAesKeySize || iv.size() != kAesBlockSize) { in AesEncrypt() 365 if (key.size() != kAesKeySize || iv.size() != kAesBlockSize) { in AesDecrypt() 425 CHECK_EQ(key.size(), kAesKeySize); in TssCompatibleEncrypt()
|