Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 46) sorted by relevance

12

/system/keymint/common/src/crypto/
Dhmac.rs35 fn valid_size(key_size: KeySizeInBits, max_size_bits: usize) -> Result<(), Error> { in valid_size()
36 if key_size.0 % 8 != 0 { in valid_size()
37 Err(km_err!(UnsupportedKeySize, "key size {} bits not a multiple of 8", key_size.0)) in valid_size()
38 } else if !(MIN_KEY_SIZE_BITS..=max_size_bits).contains(&(key_size.0 as usize)) { in valid_size()
39 Err(km_err!(UnsupportedKeySize, "unsupported KEY_SIZE {} bits for HMAC", key_size.0)) in valid_size()
46 pub fn valid_hal_size(key_size: KeySizeInBits) -> Result<(), Error> { in valid_hal_size()
47 valid_size(key_size, MAX_KEY_SIZE_BITS) in valid_hal_size()
51 pub fn valid_strongbox_hal_size(key_size: KeySizeInBits) -> Result<(), Error> { in valid_strongbox_hal_size()
52 valid_size(key_size, MAX_STRONGBOX_KEY_SIZE_BITS) in valid_strongbox_hal_size()
Dtraits.rs134 let key_size = aes_key.size(); in import_key() localVariable
135 Ok((KeyMaterial::Aes(aes_key.into()), key_size)) in import_key()
199 key_size: KeySizeInBits, in generate_key()
202 hmac::valid_hal_size(key_size)?; in generate_key()
204 let key_len = (key_size.0 / 8) as usize; in generate_key()
218 let key_size = hmac_key.size(); in import_key() localVariable
219 hmac::valid_hal_size(key_size)?; in import_key()
220 Ok((KeyMaterial::Hmac(hmac_key.into()), key_size)) in import_key()
248 key_size: KeySizeInBits, in generate_key()
/system/security/keystore2/tests/
Dkeystore2_client_hmac_key_tests.rs33 key_size: i32, in create_hmac_key_and_operation()
39 key_generations::generate_hmac_key(sec_level, alias, key_size, min_mac_len, digest)?; in create_hmac_key_and_operation()
70 let key_size = 128; in keystore2_hmac_key_op_success() localVariable
83 key_size, in keystore2_hmac_key_op_success()
102 for key_size in 0..513 { in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size()
103 let alias = format!("ks_hmac_test_key_{}", key_size); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size()
107 key_size, in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size()
114 assert!((key_size >= 64 && key_size % 8 == 0)); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size()
118 assert!((key_size < 64 || key_size % 8 != 0), "Unsupported KeySize: {}", key_size); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size()
129 let key_size = 128; in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length() localVariable
[all …]
Dkeystore2_client_aes_key_tests.rs35 key_size: i32, in create_aes_key_and_operation()
42 let alias = format!("ks_aes_test_key_{}{}{}", key_size, block_mode.0, padding_mode.0); in create_aes_key_and_operation()
47 key_size, in create_aes_key_and_operation()
92 for key_size in key_sizes { in keystore2_aes_ecb_cbc_generate_key()
99 key_size, in keystore2_aes_ecb_cbc_generate_key()
124 for key_size in key_sizes { in keystore2_aes_ctr_gcm_generate_key_success()
128 key_size, in keystore2_aes_ctr_gcm_generate_key_success()
154 for key_size in key_sizes { in keystore2_aes_ctr_gcm_generate_key_fails_incompatible()
158 key_size, in keystore2_aes_ctr_gcm_generate_key_fails_incompatible()
227 .key_size(128) in keystore2_aes_key_op_fails_multi_block_modes()
[all …]
Dkeystore2_client_attest_key_tests.rs71 key_size: 2048, in keystore2_attest_rsa_signing_key_success()
119 key_size: 2048, in keystore2_attest_rsa_encrypt_key_success()
212 key_size: 2048, in keystore2_attest_rsa_signing_key_with_ec_25519_key_success()
242 let key_size = 2048; in keystore2_generate_rsa_attest_key_with_multi_purpose_fail() localVariable
245 format!("ksrsa_attest_multipurpose_key_{}{}{}", getuid(), key_size, digest.0); in keystore2_generate_rsa_attest_key_with_multi_purpose_fail()
254 .key_size(key_size) in keystore2_generate_rsa_attest_key_with_multi_purpose_fail()
339 key_size: 2048, in keystore2_attest_key_fails_missing_challenge()
382 key_size: 2048, in keystore2_attest_rsa_key_with_non_attest_key_fails_incompat_purpose_error()
426 key_size: 2048, in keystore2_attest_rsa_key_with_symmetric_key_fails_sys_error()
467 .key_size(128) in keystore2_attest_symmetric_key_fail_sys_error()
Dkeystore2_client_rsa_key_tests.rs33 ( $test_name:ident, $digest:expr, $key_size:expr, $padding:expr ) => {
36 perform_rsa_sign_key_op_success($digest, $key_size, stringify!($test_name), $padding);
51 ( $test_name:ident, $digest:expr, $key_size:expr, $padding:expr ) => {
56 $key_size,
64 ( $test_name:ident, $digest:expr, $key_size:expr, $padding:expr, $mgf_digest:expr ) => {
69 $key_size,
112 key_size: i32, in perform_rsa_sign_key_op_success()
125 key_size, in perform_rsa_sign_key_op_success()
161 key_size: 2048, in perform_rsa_sign_key_op_failure()
185 key_size: i32, in create_rsa_encrypt_decrypt_key_op_success()
[all …]
/system/keymaster/km_openssl/
Drsa_key_factory.cpp73 uint32_t key_size; in GenerateKey() local
74 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { in GenerateKey()
78 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize || key_size < kMinimumRsaKeySize) { in GenerateKey()
79 LOG_E("Invalid key size of %" PRIu32 " bits specified for RSA key generation", key_size); in GenerateKey()
91 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), nullptr /* callback */)) in GenerateKey()
114 bool fake_signature = key_size < 1024 || !IsCertSigningKey(key_description); in GenerateKey()
135 uint32_t key_size; in ImportKey() local
138 &authorizations, &public_exponent, &key_size); in ImportKey()
161 bool fake_signature = key_size < 1024 || !IsCertSigningKey(key_description); in ImportKey()
174 uint32_t* key_size) const { in UpdateImportKeyDescription()
[all …]
Daes_operation.cpp30 const EVP_CIPHER* AesEvpCipherDescription::GetCipherInstance(size_t key_size, in GetCipherInstance() argument
37 switch (key_size) { in GetCipherInstance()
49 switch (key_size) { in GetCipherInstance()
61 switch (key_size) { in GetCipherInstance()
73 switch (key_size) { in GetCipherInstance()
Dtriple_des_operation.cpp30 TripleDesEvpCipherDescription::GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode, in GetCipherInstance() argument
36 switch (key_size) { in GetCipherInstance()
48 switch (key_size) { in GetCipherInstance()
Dec_key_factory.cpp96 uint32_t key_size; in GenerateKey() local
97 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); in GenerateKey()
100 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey()
101 authorizations.push_back(TAG_KEY_SIZE, key_size); in GenerateKey()
220 uint32_t key_size; in ImportKey() local
222 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); in ImportKey()
Dtriple_des_operation.h32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
Daes_operation.h32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
/system/bpfprogs/test/
Dmock_bpf.cpp38 size_t key_size; member
82 mock_bpf_map_t mock_bpf_map_create(uint32_t key_size, uint32_t value_size, uint32_t type) { in mock_bpf_map_create() argument
85 map->key_size = key_size; in mock_bpf_map_create()
100 std::vector<uint8_t> keyVector(map->key_size); in mock_bpf_lookup_elem()
101 memcpy(keyVector.data(), key, map->key_size); in mock_bpf_lookup_elem()
111 std::vector<uint8_t> keyVector(map->key_size); in mock_bpf_update_elem()
112 memcpy(keyVector.data(), key, map->key_size); in mock_bpf_update_elem()
132 std::vector<uint8_t> keyVector(map->key_size); in mock_bpf_delete_elem()
133 memcpy(keyVector.data(), key, map->key_size); in mock_bpf_delete_elem()
/system/security/mls/mls-rs-crypto-boringssl/src/
Daead.rs99 if key.len() != self.key_size() { in seal()
100 return Err(AeadError::InvalidKeyLen { len: key.len(), expected_len: self.key_size() }); in seal()
113 let cipher = Aes128Gcm::new(key[..self.key_size()].try_into()?); in seal()
117 let cipher = Aes256Gcm::new(key[..self.key_size()].try_into()?); in seal()
121 let cipher = Chacha20Poly1305::new(key[..self.key_size()].try_into()?); in seal()
141 if key.len() != self.key_size() { in open()
142 return Err(AeadError::InvalidKeyLen { len: key.len(), expected_len: self.key_size() }); in open()
155 let cipher = Aes128Gcm::new(key[..self.key_size()].try_into()?); in open()
161 let cipher = Aes256Gcm::new(key[..self.key_size()].try_into()?); in open()
167 let cipher = Chacha20Poly1305::new(key[..self.key_size()].try_into()?); in open()
[all …]
/system/keymaster/include/keymaster/
Dauthorization_set.h515 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent);
516 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size);
517 AuthorizationSetBuilder& AesKey(uint32_t key_size);
518 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size);
519 AuthorizationSetBuilder& HmacKey(uint32_t key_size);
521 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent);
522 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent);
523 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size);
524 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size);
525 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size);
[all …]
/system/keymint/common/src/
Dtag.rs380 fn check_rsa_key_size(key_size: KeySizeInBits, sec_level: SecurityLevel) -> Result<(), Error> { in check_rsa_key_size()
382 match key_size { in check_rsa_key_size()
389 _ => Err(km_err!(UnsupportedKeySize, "unsupported KEY_SIZE {:?} bits for RSA", key_size)), in check_rsa_key_size()
399 let key_size = get_tag_value!(params, KeySize, ErrorCode::UnsupportedKeySize)?; in check_rsa_gen_params() localVariable
400 check_rsa_key_size(key_size, sec_level)?; in check_rsa_gen_params()
404 Ok(KeyGenInfo::Rsa(key_size, public_exponent)) in check_rsa_gen_params()
425 let (key, key_size, public_exponent) = rsa.import_pkcs8_key(key_data, params)?; in check_rsa_import_params()
432 if *param_key_size != key_size { in check_rsa_import_params()
437 key_size in check_rsa_import_params()
441 None => deduced_chars.try_push(KeyParam::KeySize(key_size))?, in check_rsa_import_params()
[all …]
/system/keymaster/legacy_support/
Dec_keymaster1_key.cpp77 uint32_t key_size; in GenerateKey() local
78 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); in GenerateKey()
81 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey()
82 key_params_copy.push_back(TAG_KEY_SIZE, key_size); in GenerateKey()
/system/security/keystore2/src/crypto/
Dcrypto.cpp63 const EVP_CIPHER* getAesCipherForKey(size_t key_size) { in getAesCipherForKey() argument
65 if (key_size == kAes128KeySizeBytes) { in getAesCipherForKey()
71 bool hmacSha256(const uint8_t* key, size_t key_size, const uint8_t* msg, size_t msg_size, in hmacSha256() argument
75 uint8_t* p = HMAC(digest, key, key_size, msg, msg_size, out, &actual_out_size); in hmacSha256()
89 size_t key_size, const uint8_t* iv, uint8_t* tag) { in AES_gcm_encrypt() argument
92 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_encrypt()
125 size_t key_size, const uint8_t* iv, const uint8_t* tag) { in AES_gcm_decrypt() argument
128 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_decrypt()
Dcrypto.hpp25 bool hmacSha256(const uint8_t* key, size_t key_size, const uint8_t* msg, size_t msg_size,
29 const uint8_t* key, size_t key_size, const uint8_t* iv, uint8_t* tag);
31 const uint8_t* key, size_t key_size, const uint8_t* iv,
/system/keymaster/tests/
Dwrapped_key_test.cpp93 uint32_t key_size; in TEST() local
94 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size); in TEST()
95 EXPECT_EQ(key_size, (uint32_t)256); in TEST()
/system/security/keystore2/test_utils/
Dkey_generations.rs106 pub key_size: i32, field
635 .key_size(key_params.key_size); in generate_rsa_key()
711 .key_size(size) in generate_sym_key()
745 key_size: i32, in generate_hmac_key()
754 .key_size(key_size) in generate_hmac_key()
802 key_size: 2048, in generate_attestation_key()
1022 let key_size = AES_KEY.len() * 8; in import_aes_key() localVariable
1028 .key_size(key_size.try_into().unwrap()) in import_aes_key()
1087 .key_size(168) in import_3des_key()
1141 let key_size = HMAC_KEY.len() * 8; in import_hmac_key() localVariable
[all …]
/system/security/keystore2/src/crypto/tests/
Dcertificate_utils_test.cpp218 auto [key_size, padding, digest] = param.param; in paramsToStringRsa()
219 s << param.index << "_" << key_size << "_"; in paramsToStringRsa()
243 long key_size; in TEST_P() local
246 std::tie(key_size, padding, digest) = GetParam(); in TEST_P()
249 switch (key_size) { in TEST_P()
/system/security/keystore2/aidl/android/security/metrics/
DKeyCreationWithGeneralInfo.aidl30 int key_size;
/system/security/ondevice-signing/
DKeystoreHmacKey.cpp73 KeyParameter key_size; in createKey() local
74 key_size.tag = Tag::KEY_SIZE; in createKey()
75 key_size.value = KeyParameterValue::make<KeyParameterValue::integer>(kHmacKeySize); in createKey()
76 params.push_back(key_size); in createKey()
DKeystoreKey.cpp80 KeyParameter key_size; in createKey() local
81 key_size.tag = Tag::KEY_SIZE; in createKey()
82 key_size.value = KeyParameterValue::make<KeyParameterValue::integer>(kRsaKeySize); in createKey()
83 params.push_back(key_size); in createKey()

12