/system/keymaster/km_openssl/ |
D | rsa_key.cpp | 35 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument 39 return padding == KM_PAD_NONE || padding == KM_PAD_RSA_PSS || in SupportedMode() 40 padding == KM_PAD_RSA_PKCS1_1_5_SIGN; in SupportedMode() 45 return padding == KM_PAD_RSA_OAEP || padding == KM_PAD_RSA_PKCS1_1_5_ENCRYPT; in SupportedMode()
|
D | block_cipher_operation.h | 72 keymaster_padding_t padding, bool caller_iv, size_t tag_length, 120 BlockCipherEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, in BlockCipherEvpEncryptOperation() argument 123 : BlockCipherEvpOperation(KM_PURPOSE_ENCRYPT, block_mode, padding, caller_iv, tag_length, in BlockCipherEvpEncryptOperation() 140 BlockCipherEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, in BlockCipherEvpDecryptOperation() argument 143 : BlockCipherEvpOperation(KM_PURPOSE_DECRYPT, block_mode, padding, in BlockCipherEvpDecryptOperation()
|
D | rsa_operation.cpp | 65 keymaster_padding_t padding; in CreateRsaOperation() local 66 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr; in CreateRsaOperation() 69 padding == KM_PAD_RSA_OAEP); in CreateRsaOperation() 81 padding, rsa.release()); in CreateRsaOperation() 100 switch (op->padding()) { in CreateRsaOperation() 233 keymaster_padding_t padding, EVP_PKEY* key) in RsaDigestingOperation() argument 234 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) { in RsaDigestingOperation() 492 if (padding() != KM_PAD_RSA_OAEP) in SetOaepDigestIfRequired()
|
D | block_cipher_operation.cpp | 106 keymaster_padding_t padding; in CreateOperation() local 107 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation() 110 if (!allows_padding(block_mode) && padding != KM_PAD_NONE) { in CreateOperation() 122 block_mode, padding, caller_nonce, tag_length, move(key), GetCipherDescription())); in CreateOperation() 126 block_mode, padding, tag_length, move(key), GetCipherDescription())); in CreateOperation() 146 keymaster_padding_t padding, bool caller_iv, in BlockCipherEvpOperation() argument 150 caller_iv_(caller_iv), tag_length_(tag_length), data_started_(false), padding_(padding), in BlockCipherEvpOperation()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | rsa_operation.h | 38 keymaster_padding_t padding, EVP_PKEY* key) in RsaOperation() argument 40 padding_(padding), digest_(digest), digest_algorithm_(nullptr) {} in RsaOperation() 50 keymaster_padding_t padding() const { return padding_; } in padding() function 78 keymaster_padding_t padding, EVP_PKEY* key); 93 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) in RsaSignOperation() argument 95 padding, key) {} in RsaSignOperation() 117 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) in RsaVerifyOperation() argument 119 padding, key) {} in RsaVerifyOperation() 142 keymaster_padding_t padding, EVP_PKEY* key) in RsaCryptOperation() argument 143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) {} in RsaCryptOperation() [all …]
|
D | rsa_key.h | 35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding);
|
/system/keymaster/android_keymaster/ |
D | operation.cpp | 24 bool OperationFactory::supported(keymaster_padding_t padding) const { in supported() 28 if (padding == supported_paddings[i]) in supported() 90 keymaster_padding_t* padding, in GetAndValidatePadding() argument 93 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding() 96 } else if (!supported(*padding)) { in GetAndValidatePadding() 97 LOG_E("Padding mode %d not supported", *padding); in GetAndValidatePadding() 103 !key.authorizations().Contains(TAG_PADDING, *padding) && in GetAndValidatePadding() 104 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) { in GetAndValidatePadding() 105 LOG_E("Padding mode %d was specified, but not authorized by key", *padding); in GetAndValidatePadding()
|
/system/keymaster/include/keymaster/ |
D | operation.h | 74 bool supported(keymaster_padding_t padding) const; 75 bool supported(keymaster_block_mode_t padding) const; 76 bool supported(keymaster_digest_t padding) const; 81 keymaster_padding_t* padding, keymaster_error_t* error) const;
|
/system/keymaster/tests/ |
D | android_keymaster_test_utils.cpp | 413 keymaster_digest_t digest, keymaster_padding_t padding) { in SignMessage() argument 417 input_params.push_back(TAG_PADDING, padding); in SignMessage() 448 keymaster_digest_t digest, keymaster_padding_t padding) { in VerifyMessage() argument 452 input_params.push_back(TAG_PADDING, padding); in VerifyMessage() 464 string Keymaster2Test::EncryptMessage(const string& message, keymaster_padding_t padding, in EncryptMessage() argument 468 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage() 483 keymaster_padding_t padding, string* generated_nonce) { in EncryptMessage() argument 485 return EncryptMessage(update_params, message, digest, padding, generated_nonce); in EncryptMessage() 489 keymaster_padding_t padding, string* generated_nonce) { in EncryptMessage() argument 491 return EncryptMessage(update_params, message, block_mode, padding, generated_nonce); in EncryptMessage() [all …]
|
D | android_keymaster_test_utils.h | 242 keymaster_padding_t padding); 248 keymaster_digest_t digest, keymaster_padding_t padding); 251 std::string EncryptMessage(const std::string& message, keymaster_padding_t padding, 254 keymaster_padding_t padding, std::string* generated_nonce = nullptr); 256 keymaster_padding_t padding, std::string* generated_nonce = nullptr); 258 keymaster_digest_t digest, keymaster_padding_t padding, 261 keymaster_block_mode_t block_mode, keymaster_padding_t padding, 268 std::string DecryptMessage(const std::string& ciphertext, keymaster_padding_t padding); 270 keymaster_padding_t padding); 272 keymaster_padding_t padding); [all …]
|
/system/keymaster/legacy_support/ |
D | rsa_keymaster1_operation.cpp | 125 keymaster_padding_t padding; in CreateOperation() local 126 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr; in CreateOperation() 135 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), in CreateOperation() 139 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), in CreateOperation()
|
D | keymaster1_engine.cpp | 285 const uint8_t* in, size_t in_len, int padding) { in rsa_sign_raw() argument 290 if (padding != key_data->expected_openssl_padding) { in rsa_sign_raw() 292 key_data->expected_openssl_padding, padding); in rsa_sign_raw() 310 const uint8_t* in, size_t in_len, int padding) { in rsa_decrypt() argument 315 if (padding != key_data->expected_openssl_padding) { in rsa_decrypt() 317 key_data->expected_openssl_padding, padding); in rsa_decrypt()
|
D | rsa_keymaster1_operation.h | 57 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key, in RsaKeymaster1Operation() argument 59 : BaseOperation(move(hw_enforced), move(sw_enforced), digest, padding, key), in RsaKeymaster1Operation()
|
/system/core/storaged/ |
D | storaged.cpp | 215 vector<char> padding; in prepare_proto() local 218 padding = vector<char>(size - proto->ByteSize(), 0xFD); in prepare_proto() 219 proto->set_padding(padding.data(), padding.size()); in prepare_proto() 221 padding.push_back(0xFD); in prepare_proto() 222 proto->set_padding(padding.data(), padding.size()); in prepare_proto()
|
/system/update_engine/scripts/update_payload/ |
D | test_utils.py | 242 sigs_data=None, padding=None): argument 262 if padding: 263 file_obj.write(padding) 318 privkey_file_name=None, padding=None): argument 359 padding=padding)
|
/system/tools/mkbootimg/ |
D | mkbootimg.py | 45 def pad_file(f, padding): argument 46 pad = (padding - (f.tell() & (padding - 1))) & (padding - 1) 188 def write_padded_file(f_out, f_in, padding): argument 192 pad_file(f_out, padding)
|
/system/chre/apps/chqts/src/general_test/ |
D | basic_sensor_tests.cc | 108 uint32_t padding = data->readings[i].padding0; in confirmDataIsSane() local 109 sendFatalFailureToHost("padding0 is data is non-zero:", &padding); in confirmDataIsSane()
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster1_engine.h | 104 const uint8_t* in, size_t in_len, int padding); 106 const uint8_t* in, size_t in_len, int padding);
|
/system/media/camera/docs/ |
D | html.mako | 29 …#eeeeee; font-size: 1.5em; font-weight: bold; background-color: #888888; padding: 0.5em 0em 0.5em … 30 ….kind { color: #eeeeee; font-size: 1.2em; font-weight: bold; padding-left: 1.5em; background-color… 42 td,th { border: 1px solid; border-color: #aaaaaa; padding-left: 0.5em; padding-right: 0.5em } 57 ….entry_name { color: #333333; padding-left:1.0em; font-size:1.1em; font-family: monospace; vertica… 63 .entry_type_visibility { font-weight: bolder; padding-left:1em} 72 .entry ul { margin: 0 0 0 0; list-style-position: inside; padding-left: 0.5em; } 73 .entry ul li { padding: 0 0 0 0; margin: 0 0 0 0;}
|
/system/security/keystore/ |
D | key_config.proto | 42 // Track which padding modes this key supports. 43 repeated string padding = 6; field
|
D | operation_config.proto | 43 // Track which padding mode was used for this operation. 44 optional string padding = 6; field
|
/system/bt/gd/crypto_toolbox/ |
D | aes_cmac.cc | 78 static void padding(Octet16* dest, uint8_t length) { in padding() function 128 padding((Octet16*)&cmac_cb.text[0], (uint8_t)(cmac_cb.len % 16)); in cmac_prepare_last_block()
|
/system/extras/verity/fec/ |
D | image.cpp | 327 if (ctx->padding > 0) { in image_ecc_save() 328 uint8_t padding[FEC_BLOCKSIZE] = {0}; in image_ecc_save() local 330 for (uint32_t i = 0; i < ctx->padding; i += FEC_BLOCKSIZE) { in image_ecc_save() 331 if (!android::base::WriteFully(fd, padding, FEC_BLOCKSIZE)) { in image_ecc_save()
|
D | main.cpp | 224 if (ctx.padding) { in decode() 349 ctx.padding = (uint32_t)parse_arg(optarg, "padding", UINT32_MAX); in main() 350 if (ctx.padding % FEC_BLOCKSIZE) { in main()
|
/system/bt/stack/crypto_toolbox/ |
D | aes_cmac.cc | 81 static void padding(Octet16* dest, uint8_t length) { in padding() function 139 padding((Octet16*)&cmac_cb.text[0], (uint8_t)(cmac_cb.len % 16)); in cmac_prepare_last_block()
|