/system/keymint/common/src/crypto/ |
D | hmac.rs | 35 fn valid_size(key_size: KeySizeInBits, max_size_bits: usize) -> Result<(), Error> { in valid_size() 36 if key_size.0 % 8 != 0 { in valid_size() 37 Err(km_err!(UnsupportedKeySize, "key size {} bits not a multiple of 8", key_size.0)) in valid_size() 38 } else if !(MIN_KEY_SIZE_BITS..=max_size_bits).contains(&(key_size.0 as usize)) { in valid_size() 39 Err(km_err!(UnsupportedKeySize, "unsupported KEY_SIZE {} bits for HMAC", key_size.0)) in valid_size() 46 pub fn valid_hal_size(key_size: KeySizeInBits) -> Result<(), Error> { in valid_hal_size() 47 valid_size(key_size, MAX_KEY_SIZE_BITS) in valid_hal_size() 51 pub fn valid_strongbox_hal_size(key_size: KeySizeInBits) -> Result<(), Error> { in valid_strongbox_hal_size() 52 valid_size(key_size, MAX_STRONGBOX_KEY_SIZE_BITS) in valid_strongbox_hal_size()
|
D | traits.rs | 134 let key_size = aes_key.size(); in import_key() localVariable 135 Ok((KeyMaterial::Aes(aes_key.into()), key_size)) in import_key() 199 key_size: KeySizeInBits, in generate_key() 202 hmac::valid_hal_size(key_size)?; in generate_key() 204 let key_len = (key_size.0 / 8) as usize; in generate_key() 218 let key_size = hmac_key.size(); in import_key() localVariable 219 hmac::valid_hal_size(key_size)?; in import_key() 220 Ok((KeyMaterial::Hmac(hmac_key.into()), key_size)) in import_key() 248 key_size: KeySizeInBits, in generate_key()
|
/system/security/keystore2/tests/ |
D | keystore2_client_hmac_key_tests.rs | 33 key_size: i32, in create_hmac_key_and_operation() 39 key_generations::generate_hmac_key(sec_level, alias, key_size, min_mac_len, digest)?; in create_hmac_key_and_operation() 70 let key_size = 128; in keystore2_hmac_key_op_success() localVariable 83 key_size, in keystore2_hmac_key_op_success() 102 for key_size in 0..513 { in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() 103 let alias = format!("ks_hmac_test_key_{}", key_size); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() 107 key_size, in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() 114 assert!((key_size >= 64 && key_size % 8 == 0)); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() 118 assert!((key_size < 64 || key_size % 8 != 0), "Unsupported KeySize: {}", key_size); in keystore2_hmac_gen_keys_fails_expect_unsupported_key_size() 129 let key_size = 128; in keystore2_hmac_gen_keys_fails_expect_unsupported_min_mac_length() localVariable [all …]
|
D | keystore2_client_aes_key_tests.rs | 35 key_size: i32, in create_aes_key_and_operation() 42 let alias = format!("ks_aes_test_key_{}{}{}", key_size, block_mode.0, padding_mode.0); in create_aes_key_and_operation() 47 key_size, in create_aes_key_and_operation() 92 for key_size in key_sizes { in keystore2_aes_ecb_cbc_generate_key() 99 key_size, in keystore2_aes_ecb_cbc_generate_key() 124 for key_size in key_sizes { in keystore2_aes_ctr_gcm_generate_key_success() 128 key_size, in keystore2_aes_ctr_gcm_generate_key_success() 154 for key_size in key_sizes { in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() 158 key_size, in keystore2_aes_ctr_gcm_generate_key_fails_incompatible() 227 .key_size(128) in keystore2_aes_key_op_fails_multi_block_modes() [all …]
|
D | keystore2_client_attest_key_tests.rs | 71 key_size: 2048, in keystore2_attest_rsa_signing_key_success() 119 key_size: 2048, in keystore2_attest_rsa_encrypt_key_success() 212 key_size: 2048, in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() 242 let key_size = 2048; in keystore2_generate_rsa_attest_key_with_multi_purpose_fail() localVariable 245 format!("ksrsa_attest_multipurpose_key_{}{}{}", getuid(), key_size, digest.0); in keystore2_generate_rsa_attest_key_with_multi_purpose_fail() 254 .key_size(key_size) in keystore2_generate_rsa_attest_key_with_multi_purpose_fail() 339 key_size: 2048, in keystore2_attest_key_fails_missing_challenge() 382 key_size: 2048, in keystore2_attest_rsa_key_with_non_attest_key_fails_incompat_purpose_error() 426 key_size: 2048, in keystore2_attest_rsa_key_with_symmetric_key_fails_sys_error() 467 .key_size(128) in keystore2_attest_symmetric_key_fail_sys_error()
|
D | keystore2_client_rsa_key_tests.rs | 33 ( $test_name:ident, $digest:expr, $key_size:expr, $padding:expr ) => { 36 perform_rsa_sign_key_op_success($digest, $key_size, stringify!($test_name), $padding); 51 ( $test_name:ident, $digest:expr, $key_size:expr, $padding:expr ) => { 56 $key_size, 64 ( $test_name:ident, $digest:expr, $key_size:expr, $padding:expr, $mgf_digest:expr ) => { 69 $key_size, 112 key_size: i32, in perform_rsa_sign_key_op_success() 125 key_size, in perform_rsa_sign_key_op_success() 161 key_size: 2048, in perform_rsa_sign_key_op_failure() 185 key_size: i32, in create_rsa_encrypt_decrypt_key_op_success() [all …]
|
/system/keymaster/km_openssl/ |
D | rsa_key_factory.cpp | 73 uint32_t key_size; in GenerateKey() local 74 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { in GenerateKey() 78 if (key_size % 8 != 0 || key_size > kMaximumRsaKeySize || key_size < kMinimumRsaKeySize) { in GenerateKey() 79 LOG_E("Invalid key size of %" PRIu32 " bits specified for RSA key generation", key_size); in GenerateKey() 91 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), nullptr /* callback */)) in GenerateKey() 114 bool fake_signature = key_size < 1024 || !IsCertSigningKey(key_description); in GenerateKey() 135 uint32_t key_size; in ImportKey() local 138 &authorizations, &public_exponent, &key_size); in ImportKey() 161 bool fake_signature = key_size < 1024 || !IsCertSigningKey(key_description); in ImportKey() 174 uint32_t* key_size) const { in UpdateImportKeyDescription() [all …]
|
D | aes_operation.cpp | 30 const EVP_CIPHER* AesEvpCipherDescription::GetCipherInstance(size_t key_size, in GetCipherInstance() argument 37 switch (key_size) { in GetCipherInstance() 49 switch (key_size) { in GetCipherInstance() 61 switch (key_size) { in GetCipherInstance() 73 switch (key_size) { in GetCipherInstance()
|
D | triple_des_operation.cpp | 30 TripleDesEvpCipherDescription::GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode, in GetCipherInstance() argument 36 switch (key_size) { in GetCipherInstance() 48 switch (key_size) { in GetCipherInstance()
|
D | ec_key_factory.cpp | 96 uint32_t key_size; in GenerateKey() local 97 keymaster_error_t error = GetCurveAndSize(authorizations, &ec_curve, &key_size); in GenerateKey() 100 } else if (!authorizations.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey() 101 authorizations.push_back(TAG_KEY_SIZE, key_size); in GenerateKey() 220 uint32_t key_size; in ImportKey() local 222 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); in ImportKey()
|
D | triple_des_operation.h | 32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
|
D | aes_operation.h | 32 const EVP_CIPHER* GetCipherInstance(size_t key_size, keymaster_block_mode_t block_mode,
|
/system/bpfprogs/test/ |
D | mock_bpf.cpp | 38 size_t key_size; member 82 mock_bpf_map_t mock_bpf_map_create(uint32_t key_size, uint32_t value_size, uint32_t type) { in mock_bpf_map_create() argument 85 map->key_size = key_size; in mock_bpf_map_create() 100 std::vector<uint8_t> keyVector(map->key_size); in mock_bpf_lookup_elem() 101 memcpy(keyVector.data(), key, map->key_size); in mock_bpf_lookup_elem() 111 std::vector<uint8_t> keyVector(map->key_size); in mock_bpf_update_elem() 112 memcpy(keyVector.data(), key, map->key_size); in mock_bpf_update_elem() 132 std::vector<uint8_t> keyVector(map->key_size); in mock_bpf_delete_elem() 133 memcpy(keyVector.data(), key, map->key_size); in mock_bpf_delete_elem()
|
/system/security/mls/mls-rs-crypto-boringssl/src/ |
D | aead.rs | 99 if key.len() != self.key_size() { in seal() 100 return Err(AeadError::InvalidKeyLen { len: key.len(), expected_len: self.key_size() }); in seal() 113 let cipher = Aes128Gcm::new(key[..self.key_size()].try_into()?); in seal() 117 let cipher = Aes256Gcm::new(key[..self.key_size()].try_into()?); in seal() 121 let cipher = Chacha20Poly1305::new(key[..self.key_size()].try_into()?); in seal() 141 if key.len() != self.key_size() { in open() 142 return Err(AeadError::InvalidKeyLen { len: key.len(), expected_len: self.key_size() }); in open() 155 let cipher = Aes128Gcm::new(key[..self.key_size()].try_into()?); in open() 161 let cipher = Aes256Gcm::new(key[..self.key_size()].try_into()?); in open() 167 let cipher = Chacha20Poly1305::new(key[..self.key_size()].try_into()?); in open() [all …]
|
/system/keymaster/include/keymaster/ |
D | authorization_set.h | 515 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 516 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 517 AuthorizationSetBuilder& AesKey(uint32_t key_size); 518 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size); 519 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 521 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 522 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 523 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 524 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 525 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size); [all …]
|
/system/keymint/common/src/ |
D | tag.rs | 380 fn check_rsa_key_size(key_size: KeySizeInBits, sec_level: SecurityLevel) -> Result<(), Error> { in check_rsa_key_size() 382 match key_size { in check_rsa_key_size() 389 _ => Err(km_err!(UnsupportedKeySize, "unsupported KEY_SIZE {:?} bits for RSA", key_size)), in check_rsa_key_size() 399 let key_size = get_tag_value!(params, KeySize, ErrorCode::UnsupportedKeySize)?; in check_rsa_gen_params() localVariable 400 check_rsa_key_size(key_size, sec_level)?; in check_rsa_gen_params() 404 Ok(KeyGenInfo::Rsa(key_size, public_exponent)) in check_rsa_gen_params() 425 let (key, key_size, public_exponent) = rsa.import_pkcs8_key(key_data, params)?; in check_rsa_import_params() 432 if *param_key_size != key_size { in check_rsa_import_params() 437 key_size in check_rsa_import_params() 441 None => deduced_chars.try_push(KeyParam::KeySize(key_size))?, in check_rsa_import_params() [all …]
|
/system/keymaster/legacy_support/ |
D | ec_keymaster1_key.cpp | 77 uint32_t key_size; in GenerateKey() local 78 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); in GenerateKey() 81 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { in GenerateKey() 82 key_params_copy.push_back(TAG_KEY_SIZE, key_size); in GenerateKey()
|
/system/security/keystore2/src/crypto/ |
D | crypto.cpp | 63 const EVP_CIPHER* getAesCipherForKey(size_t key_size) { in getAesCipherForKey() argument 65 if (key_size == kAes128KeySizeBytes) { in getAesCipherForKey() 71 bool hmacSha256(const uint8_t* key, size_t key_size, const uint8_t* msg, size_t msg_size, in hmacSha256() argument 75 uint8_t* p = HMAC(digest, key, key_size, msg, msg_size, out, &actual_out_size); in hmacSha256() 89 size_t key_size, const uint8_t* iv, uint8_t* tag) { in AES_gcm_encrypt() argument 92 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_encrypt() 125 size_t key_size, const uint8_t* iv, const uint8_t* tag) { in AES_gcm_decrypt() argument 128 const EVP_CIPHER* cipher = getAesCipherForKey(key_size); in AES_gcm_decrypt()
|
D | crypto.hpp | 25 bool hmacSha256(const uint8_t* key, size_t key_size, const uint8_t* msg, size_t msg_size, 29 const uint8_t* key, size_t key_size, const uint8_t* iv, uint8_t* tag); 31 const uint8_t* key, size_t key_size, const uint8_t* iv,
|
/system/keymaster/tests/ |
D | wrapped_key_test.cpp | 93 uint32_t key_size; in TEST() local 94 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size); in TEST() 95 EXPECT_EQ(key_size, (uint32_t)256); in TEST()
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 106 pub key_size: i32, field 635 .key_size(key_params.key_size); in generate_rsa_key() 711 .key_size(size) in generate_sym_key() 745 key_size: i32, in generate_hmac_key() 754 .key_size(key_size) in generate_hmac_key() 802 key_size: 2048, in generate_attestation_key() 1022 let key_size = AES_KEY.len() * 8; in import_aes_key() localVariable 1028 .key_size(key_size.try_into().unwrap()) in import_aes_key() 1087 .key_size(168) in import_3des_key() 1141 let key_size = HMAC_KEY.len() * 8; in import_hmac_key() localVariable [all …]
|
/system/security/keystore2/src/crypto/tests/ |
D | certificate_utils_test.cpp | 218 auto [key_size, padding, digest] = param.param; in paramsToStringRsa() 219 s << param.index << "_" << key_size << "_"; in paramsToStringRsa() 243 long key_size; in TEST_P() local 246 std::tie(key_size, padding, digest) = GetParam(); in TEST_P() 249 switch (key_size) { in TEST_P()
|
/system/security/keystore2/aidl/android/security/metrics/ |
D | KeyCreationWithGeneralInfo.aidl | 30 int key_size;
|
/system/security/ondevice-signing/ |
D | KeystoreHmacKey.cpp | 73 KeyParameter key_size; in createKey() local 74 key_size.tag = Tag::KEY_SIZE; in createKey() 75 key_size.value = KeyParameterValue::make<KeyParameterValue::integer>(kHmacKeySize); in createKey() 76 params.push_back(key_size); in createKey()
|
D | KeystoreKey.cpp | 80 KeyParameter key_size; in createKey() local 81 key_size.tag = Tag::KEY_SIZE; in createKey() 82 key_size.value = KeyParameterValue::make<KeyParameterValue::integer>(kRsaKeySize); in createKey() 83 params.push_back(key_size); in createKey()
|