/system/keymaster/ |
D | rsa_operation.h | 37 keymaster_padding_t padding, EVP_PKEY* key) in RsaOperation() argument 38 : Operation(purpose), rsa_key_(key), padding_(padding), digest_(digest), in RsaOperation() 49 keymaster_padding_t padding() const { return padding_; } in padding() function 76 keymaster_padding_t padding, EVP_PKEY* key); 90 RsaSignOperation(keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) in RsaSignOperation() argument 91 : RsaDigestingOperation(KM_PURPOSE_SIGN, digest, padding, key) {} in RsaSignOperation() 112 RsaVerifyOperation(keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) in RsaVerifyOperation() argument 113 : RsaDigestingOperation(KM_PURPOSE_VERIFY, digest, padding, key) {} in RsaVerifyOperation() 135 keymaster_padding_t padding, EVP_PKEY* key) in RsaCryptOperation() argument 136 : RsaOperation(purpose, digest, padding, key) {} in RsaCryptOperation() [all …]
|
D | rsa_key.cpp | 36 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument 40 return padding == KM_PAD_NONE || padding == KM_PAD_RSA_PSS || in SupportedMode() 41 padding == KM_PAD_RSA_PKCS1_1_5_SIGN; in SupportedMode() 45 return padding == KM_PAD_RSA_OAEP || padding == KM_PAD_RSA_PKCS1_1_5_ENCRYPT; in SupportedMode()
|
D | operation.cpp | 25 bool OperationFactory::supported(keymaster_padding_t padding) const { in supported() 29 if (padding == supported_paddings[i]) in supported() 89 keymaster_padding_t* padding, in GetAndValidatePadding() argument 92 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding() 95 } else if (!supported(*padding)) { in GetAndValidatePadding() 96 LOG_E("Padding mode %d not supported", *padding); in GetAndValidatePadding() 102 !key.authorizations().Contains(TAG_PADDING, *padding) && in GetAndValidatePadding() 103 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) { in GetAndValidatePadding() 104 LOG_E("Padding mode %d was specified, but not authorized by key", *padding); in GetAndValidatePadding()
|
D | operation.h | 73 bool supported(keymaster_padding_t padding) const; 74 bool supported(keymaster_block_mode_t padding) const; 75 bool supported(keymaster_digest_t padding) const; 80 keymaster_padding_t* padding, keymaster_error_t* error) const;
|
D | android_keymaster_test_utils.cpp | 410 keymaster_digest_t digest, keymaster_padding_t padding) { in SignMessage() argument 414 input_params.push_back(TAG_PADDING, padding); in SignMessage() 445 keymaster_digest_t digest, keymaster_padding_t padding) { in VerifyMessage() argument 449 input_params.push_back(TAG_PADDING, padding); in VerifyMessage() 461 string Keymaster2Test::EncryptMessage(const string& message, keymaster_padding_t padding, in EncryptMessage() argument 465 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage() 480 keymaster_padding_t padding, string* generated_nonce) { in EncryptMessage() argument 482 return EncryptMessage(update_params, message, digest, padding, generated_nonce); in EncryptMessage() 486 keymaster_padding_t padding, string* generated_nonce) { in EncryptMessage() argument 488 return EncryptMessage(update_params, message, block_mode, padding, generated_nonce); in EncryptMessage() [all …]
|
D | aes_operation.h | 62 keymaster_padding_t padding, bool caller_iv, size_t tag_length, 110 AesEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, in AesEvpEncryptOperation() argument 112 : AesEvpOperation(KM_PURPOSE_ENCRYPT, block_mode, padding, caller_iv, tag_length, key, in AesEvpEncryptOperation() 129 AesEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, in AesEvpDecryptOperation() argument 131 : AesEvpOperation(KM_PURPOSE_DECRYPT, block_mode, padding, in AesEvpDecryptOperation()
|
D | rsa_keymaster1_operation.cpp | 122 keymaster_padding_t padding; in CreateOperation() local 123 if (!GetAndValidatePadding(begin_params, key, &padding, error)) in CreateOperation() 133 return new RsaKeymaster1Operation<RsaSignOperation>(digest, padding, rsa.release(), in CreateOperation() 136 return new RsaKeymaster1Operation<RsaDecryptOperation>(digest, padding, rsa.release(), in CreateOperation()
|
D | android_keymaster_test_utils.h | 241 keymaster_padding_t padding); 247 keymaster_digest_t digest, keymaster_padding_t padding); 250 std::string EncryptMessage(const std::string& message, keymaster_padding_t padding, 253 keymaster_padding_t padding, std::string* generated_nonce = NULL); 255 keymaster_padding_t padding, std::string* generated_nonce = NULL); 257 keymaster_digest_t digest, keymaster_padding_t padding, 260 keymaster_block_mode_t block_mode, keymaster_padding_t padding, 267 std::string DecryptMessage(const std::string& ciphertext, keymaster_padding_t padding); 269 keymaster_padding_t padding); 271 keymaster_padding_t padding); [all …]
|
D | keymaster1_engine.cpp | 286 const uint8_t* in, size_t in_len, int padding) { in rsa_sign_raw() argument 291 if (padding != key_data->expected_openssl_padding) { in rsa_sign_raw() 293 key_data->expected_openssl_padding, padding); in rsa_sign_raw() 311 const uint8_t* in, size_t in_len, int padding) { in rsa_decrypt() argument 316 if (padding != key_data->expected_openssl_padding) { in rsa_decrypt() 318 key_data->expected_openssl_padding, padding); in rsa_decrypt()
|
D | rsa_operation.cpp | 68 keymaster_padding_t padding; in CreateRsaOperation() local 69 if (!GetAndValidatePadding(begin_params, key, &padding, error)) in CreateRsaOperation() 73 padding == KM_PAD_RSA_OAEP); in CreateRsaOperation() 83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release()); in CreateRsaOperation() 102 switch (op->padding()) { in CreateRsaOperation() 229 keymaster_padding_t padding, EVP_PKEY* key) in RsaDigestingOperation() argument 230 : RsaOperation(purpose, digest, padding, key) { in RsaDigestingOperation() 488 if (padding() != KM_PAD_RSA_OAEP) in SetOaepDigestIfRequired()
|
D | aes_operation.cpp | 117 keymaster_padding_t padding; in CreateOperation() local 118 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation() 121 if (!allows_padding(block_mode) && padding != KM_PAD_NONE) { in CreateOperation() 133 AesEvpEncryptOperation(block_mode, padding, caller_nonce, tag_length, in CreateOperation() 138 AesEvpDecryptOperation(block_mode, padding, tag_length, symmetric_key->key_data(), in CreateOperation() 168 keymaster_padding_t padding, bool caller_iv, size_t tag_length, in AesEvpOperation() argument 171 data_started_(false), key_size_(key_size), padding_(padding) { in AesEvpOperation()
|
D | keymaster1_engine.h | 104 const uint8_t* in, size_t in_len, int padding); 106 const uint8_t* in, size_t in_len, int padding);
|
D | rsa_keymaster1_operation.h | 56 RsaKeymaster1Operation(keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key, in RsaKeymaster1Operation() argument 58 : BaseOperation(digest, padding, key), wrapped_operation_(super::purpose(), engine) { in RsaKeymaster1Operation()
|
D | rsa_key.h | 35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding);
|
/system/core/mkbootimg/ |
D | mkbootimg | 43 def pad_file(f, padding): argument 44 pad = (padding - (f.tell() & (padding - 1))) & (padding - 1) 92 def write_padded_file(f_out, f_in, padding): argument 96 pad_file(f_out, padding)
|
/system/update_engine/scripts/update_payload/ |
D | test_utils.py | 229 sigs_data=None, padding=None): argument 249 if padding: 250 file_obj.write(padding) 308 is_pseudo_in_kernel=False, padding=None): argument 364 padding=padding)
|
/system/media/camera/docs/ |
D | html.mako | 29 …#eeeeee; font-size: 1.5em; font-weight: bold; background-color: #888888; padding: 0.5em 0em 0.5em … 30 ….kind { color: #eeeeee; font-size: 1.2em; font-weight: bold; padding-left: 1.5em; background-color… 42 td,th { border: 1px solid; border-color: #aaaaaa; padding-left: 0.5em; padding-right: 0.5em } 56 ….entry_name { color: #333333; padding-left:1.0em; font-size:1.1em; font-family: monospace; vertica… 62 .entry_type_visibility { font-weight: bolder; padding-left:1em} 71 .entry ul { margin: 0 0 0 0; list-style-position: inside; padding-left: 0.5em; } 72 .entry ul li { padding: 0 0 0 0; margin: 0 0 0 0;}
|
/system/extras/verity/fec/ |
D | main.cpp | 225 if (ctx.padding) { in decode() 350 ctx.padding = (uint32_t)parse_arg(optarg, "padding", UINT32_MAX); in main() 351 if (ctx.padding % FEC_BLOCKSIZE) { in main()
|
D | image.cpp | 327 if (ctx->padding > 0) { in image_ecc_save() 328 uint8_t padding[FEC_BLOCKSIZE] = {0}; in image_ecc_save() local 330 for (uint32_t i = 0; i < ctx->padding; i += FEC_BLOCKSIZE) { in image_ecc_save() 331 if (!android::base::WriteFully(fd, padding, FEC_BLOCKSIZE)) { in image_ecc_save()
|
D | image.h | 55 uint32_t padding; member
|
/system/bt/stack/smp/ |
D | smp_cmac.cc | 74 static void padding(BT_OCTET16 dest, uint8_t length) { in padding() function 192 padding(&cmac_cb.text[0], (uint8_t)(cmac_cb.len % 16)); in cmac_prepare_last_block()
|
/system/core/libziparchive/ |
D | zip_writer.cc | 236 uint16_t padding = alignment - (offset % alignment); in StartAlignedEntryWithTime() local 237 file_entry.padding_length = padding; in StartAlignedEntryWithTime() 238 offset += padding; in StartAlignedEntryWithTime() 239 zero_padding.resize(padding, 0); in StartAlignedEntryWithTime()
|
/system/tpm/attestation/common/ |
D | attestation_ca.proto | 29 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding. 109 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding. 119 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding. 163 // Data encryption: 256-bit key, AES-CBC with PKCS5 padding.
|
/system/core/libappfuse/tests/ |
D | FuseAppLoopTest.cc | 170 EXPECT_EQ(0u, response_.entry_out.attr.padding); in TEST_F() 229 EXPECT_EQ(0u, response_.attr_out.attr.padding); in TEST_F() 262 EXPECT_EQ(0u, response_.attr_out.attr.padding); in TEST_F()
|
/system/security/keystore/include/keystore/ |
D | authorization_set.h | 263 AuthorizationSetBuilder& Padding(PaddingMode padding) { in Padding() argument 264 return Authorization(TAG_PADDING, padding); in Padding()
|