Home
last modified time | relevance | path

Searched refs:padding (Results 1 – 25 of 37) sorted by relevance

12

/system/keymaster/
Drsa_operation.h37 keymaster_padding_t padding, EVP_PKEY* key) in RsaOperation() argument
38 : Operation(purpose), rsa_key_(key), padding_(padding), digest_(digest), in RsaOperation()
49 keymaster_padding_t padding() const { return padding_; } in padding() function
76 keymaster_padding_t padding, EVP_PKEY* key);
90 RsaSignOperation(keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) in RsaSignOperation() argument
91 : RsaDigestingOperation(KM_PURPOSE_SIGN, digest, padding, key) {} in RsaSignOperation()
112 RsaVerifyOperation(keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) in RsaVerifyOperation() argument
113 : RsaDigestingOperation(KM_PURPOSE_VERIFY, digest, padding, key) {} in RsaVerifyOperation()
135 keymaster_padding_t padding, EVP_PKEY* key) in RsaCryptOperation() argument
136 : RsaOperation(purpose, digest, padding, key) {} in RsaCryptOperation()
[all …]
Drsa_key.cpp36 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument
40 return padding == KM_PAD_NONE || padding == KM_PAD_RSA_PSS || in SupportedMode()
41 padding == KM_PAD_RSA_PKCS1_1_5_SIGN; in SupportedMode()
45 return padding == KM_PAD_RSA_OAEP || padding == KM_PAD_RSA_PKCS1_1_5_ENCRYPT; in SupportedMode()
Doperation.cpp25 bool OperationFactory::supported(keymaster_padding_t padding) const { in supported()
29 if (padding == supported_paddings[i]) in supported()
89 keymaster_padding_t* padding, in GetAndValidatePadding() argument
92 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding()
95 } else if (!supported(*padding)) { in GetAndValidatePadding()
96 LOG_E("Padding mode %d not supported", *padding); in GetAndValidatePadding()
102 !key.authorizations().Contains(TAG_PADDING, *padding) && in GetAndValidatePadding()
103 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) { in GetAndValidatePadding()
104 LOG_E("Padding mode %d was specified, but not authorized by key", *padding); in GetAndValidatePadding()
Doperation.h73 bool supported(keymaster_padding_t padding) const;
74 bool supported(keymaster_block_mode_t padding) const;
75 bool supported(keymaster_digest_t padding) const;
80 keymaster_padding_t* padding, keymaster_error_t* error) const;
Dandroid_keymaster_test_utils.cpp410 keymaster_digest_t digest, keymaster_padding_t padding) { in SignMessage() argument
414 input_params.push_back(TAG_PADDING, padding); in SignMessage()
445 keymaster_digest_t digest, keymaster_padding_t padding) { in VerifyMessage() argument
449 input_params.push_back(TAG_PADDING, padding); in VerifyMessage()
461 string Keymaster2Test::EncryptMessage(const string& message, keymaster_padding_t padding, in EncryptMessage() argument
465 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage()
480 keymaster_padding_t padding, string* generated_nonce) { in EncryptMessage() argument
482 return EncryptMessage(update_params, message, digest, padding, generated_nonce); in EncryptMessage()
486 keymaster_padding_t padding, string* generated_nonce) { in EncryptMessage() argument
488 return EncryptMessage(update_params, message, block_mode, padding, generated_nonce); in EncryptMessage()
[all …]
Daes_operation.h62 keymaster_padding_t padding, bool caller_iv, size_t tag_length,
110 AesEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, in AesEvpEncryptOperation() argument
112 : AesEvpOperation(KM_PURPOSE_ENCRYPT, block_mode, padding, caller_iv, tag_length, key, in AesEvpEncryptOperation()
129 AesEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, in AesEvpDecryptOperation() argument
131 : AesEvpOperation(KM_PURPOSE_DECRYPT, block_mode, padding, in AesEvpDecryptOperation()
Drsa_keymaster1_operation.cpp122 keymaster_padding_t padding; in CreateOperation() local
123 if (!GetAndValidatePadding(begin_params, key, &padding, error)) in CreateOperation()
133 return new RsaKeymaster1Operation<RsaSignOperation>(digest, padding, rsa.release(), in CreateOperation()
136 return new RsaKeymaster1Operation<RsaDecryptOperation>(digest, padding, rsa.release(), in CreateOperation()
Dandroid_keymaster_test_utils.h241 keymaster_padding_t padding);
247 keymaster_digest_t digest, keymaster_padding_t padding);
250 std::string EncryptMessage(const std::string& message, keymaster_padding_t padding,
253 keymaster_padding_t padding, std::string* generated_nonce = NULL);
255 keymaster_padding_t padding, std::string* generated_nonce = NULL);
257 keymaster_digest_t digest, keymaster_padding_t padding,
260 keymaster_block_mode_t block_mode, keymaster_padding_t padding,
267 std::string DecryptMessage(const std::string& ciphertext, keymaster_padding_t padding);
269 keymaster_padding_t padding);
271 keymaster_padding_t padding);
[all …]
Dkeymaster1_engine.cpp286 const uint8_t* in, size_t in_len, int padding) { in rsa_sign_raw() argument
291 if (padding != key_data->expected_openssl_padding) { in rsa_sign_raw()
293 key_data->expected_openssl_padding, padding); in rsa_sign_raw()
311 const uint8_t* in, size_t in_len, int padding) { in rsa_decrypt() argument
316 if (padding != key_data->expected_openssl_padding) { in rsa_decrypt()
318 key_data->expected_openssl_padding, padding); in rsa_decrypt()
Drsa_operation.cpp68 keymaster_padding_t padding; in CreateRsaOperation() local
69 if (!GetAndValidatePadding(begin_params, key, &padding, error)) in CreateRsaOperation()
73 padding == KM_PAD_RSA_OAEP); in CreateRsaOperation()
83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release()); in CreateRsaOperation()
102 switch (op->padding()) { in CreateRsaOperation()
229 keymaster_padding_t padding, EVP_PKEY* key) in RsaDigestingOperation() argument
230 : RsaOperation(purpose, digest, padding, key) { in RsaDigestingOperation()
488 if (padding() != KM_PAD_RSA_OAEP) in SetOaepDigestIfRequired()
Daes_operation.cpp117 keymaster_padding_t padding; in CreateOperation() local
118 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation()
121 if (!allows_padding(block_mode) && padding != KM_PAD_NONE) { in CreateOperation()
133 AesEvpEncryptOperation(block_mode, padding, caller_nonce, tag_length, in CreateOperation()
138 AesEvpDecryptOperation(block_mode, padding, tag_length, symmetric_key->key_data(), in CreateOperation()
168 keymaster_padding_t padding, bool caller_iv, size_t tag_length, in AesEvpOperation() argument
171 data_started_(false), key_size_(key_size), padding_(padding) { in AesEvpOperation()
Dkeymaster1_engine.h104 const uint8_t* in, size_t in_len, int padding);
106 const uint8_t* in, size_t in_len, int padding);
Drsa_keymaster1_operation.h56 RsaKeymaster1Operation(keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key, in RsaKeymaster1Operation() argument
58 : BaseOperation(digest, padding, key), wrapped_operation_(super::purpose(), engine) { in RsaKeymaster1Operation()
Drsa_key.h35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding);
/system/core/mkbootimg/
Dmkbootimg43 def pad_file(f, padding): argument
44 pad = (padding - (f.tell() & (padding - 1))) & (padding - 1)
92 def write_padded_file(f_out, f_in, padding): argument
96 pad_file(f_out, padding)
/system/update_engine/scripts/update_payload/
Dtest_utils.py229 sigs_data=None, padding=None): argument
249 if padding:
250 file_obj.write(padding)
308 is_pseudo_in_kernel=False, padding=None): argument
364 padding=padding)
/system/media/camera/docs/
Dhtml.mako29 …#eeeeee; font-size: 1.5em; font-weight: bold; background-color: #888888; padding: 0.5em 0em 0.5em …
30 ….kind { color: #eeeeee; font-size: 1.2em; font-weight: bold; padding-left: 1.5em; background-color…
42 td,th { border: 1px solid; border-color: #aaaaaa; padding-left: 0.5em; padding-right: 0.5em }
56 ….entry_name { color: #333333; padding-left:1.0em; font-size:1.1em; font-family: monospace; vertica…
62 .entry_type_visibility { font-weight: bolder; padding-left:1em}
71 .entry ul { margin: 0 0 0 0; list-style-position: inside; padding-left: 0.5em; }
72 .entry ul li { padding: 0 0 0 0; margin: 0 0 0 0;}
/system/extras/verity/fec/
Dmain.cpp225 if (ctx.padding) { in decode()
350 ctx.padding = (uint32_t)parse_arg(optarg, "padding", UINT32_MAX); in main()
351 if (ctx.padding % FEC_BLOCKSIZE) { in main()
Dimage.cpp327 if (ctx->padding > 0) { in image_ecc_save()
328 uint8_t padding[FEC_BLOCKSIZE] = {0}; in image_ecc_save() local
330 for (uint32_t i = 0; i < ctx->padding; i += FEC_BLOCKSIZE) { in image_ecc_save()
331 if (!android::base::WriteFully(fd, padding, FEC_BLOCKSIZE)) { in image_ecc_save()
Dimage.h55 uint32_t padding; member
/system/bt/stack/smp/
Dsmp_cmac.cc74 static void padding(BT_OCTET16 dest, uint8_t length) { in padding() function
192 padding(&cmac_cb.text[0], (uint8_t)(cmac_cb.len % 16)); in cmac_prepare_last_block()
/system/core/libziparchive/
Dzip_writer.cc236 uint16_t padding = alignment - (offset % alignment); in StartAlignedEntryWithTime() local
237 file_entry.padding_length = padding; in StartAlignedEntryWithTime()
238 offset += padding; in StartAlignedEntryWithTime()
239 zero_padding.resize(padding, 0); in StartAlignedEntryWithTime()
/system/tpm/attestation/common/
Dattestation_ca.proto29 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
109 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
119 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
163 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
/system/core/libappfuse/tests/
DFuseAppLoopTest.cc170 EXPECT_EQ(0u, response_.entry_out.attr.padding); in TEST_F()
229 EXPECT_EQ(0u, response_.attr_out.attr.padding); in TEST_F()
262 EXPECT_EQ(0u, response_.attr_out.attr.padding); in TEST_F()
/system/security/keystore/include/keystore/
Dauthorization_set.h263 AuthorizationSetBuilder& Padding(PaddingMode padding) { in Padding() argument
264 return Authorization(TAG_PADDING, padding); in Padding()

12