Home
last modified time | relevance | path

Searched refs:padding (Results 1 – 25 of 42) sorted by relevance

12

/system/keymaster/km_openssl/
Drsa_key.cpp35 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument
39 return padding == KM_PAD_NONE || padding == KM_PAD_RSA_PSS || in SupportedMode()
40 padding == KM_PAD_RSA_PKCS1_1_5_SIGN; in SupportedMode()
45 return padding == KM_PAD_RSA_OAEP || padding == KM_PAD_RSA_PKCS1_1_5_ENCRYPT; in SupportedMode()
Dblock_cipher_operation.h72 keymaster_padding_t padding, bool caller_iv, size_t tag_length,
120 BlockCipherEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, in BlockCipherEvpEncryptOperation() argument
123 : BlockCipherEvpOperation(KM_PURPOSE_ENCRYPT, block_mode, padding, caller_iv, tag_length, in BlockCipherEvpEncryptOperation()
140 BlockCipherEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, in BlockCipherEvpDecryptOperation() argument
143 : BlockCipherEvpOperation(KM_PURPOSE_DECRYPT, block_mode, padding, in BlockCipherEvpDecryptOperation()
Drsa_operation.cpp65 keymaster_padding_t padding; in CreateRsaOperation() local
66 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr; in CreateRsaOperation()
69 padding == KM_PAD_RSA_OAEP); in CreateRsaOperation()
78 padding, rsa.release()); in CreateRsaOperation()
97 switch (op->padding()) { in CreateRsaOperation()
230 keymaster_padding_t padding, EVP_PKEY* key) in RsaDigestingOperation() argument
231 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) { in RsaDigestingOperation()
489 if (padding() != KM_PAD_RSA_OAEP) in SetOaepDigestIfRequired()
Dblock_cipher_operation.cpp106 keymaster_padding_t padding; in CreateOperation() local
107 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation()
110 if (!allows_padding(block_mode) && padding != KM_PAD_NONE) { in CreateOperation()
122 block_mode, padding, caller_nonce, tag_length, move(key), GetCipherDescription())); in CreateOperation()
126 block_mode, padding, tag_length, move(key), GetCipherDescription())); in CreateOperation()
146 keymaster_padding_t padding, bool caller_iv, in BlockCipherEvpOperation() argument
150 caller_iv_(caller_iv), tag_length_(tag_length), data_started_(false), padding_(padding), in BlockCipherEvpOperation()
/system/keymaster/include/keymaster/km_openssl/
Drsa_operation.h38 keymaster_padding_t padding, EVP_PKEY* key) in RsaOperation() argument
40 padding_(padding), digest_(digest), digest_algorithm_(nullptr) {} in RsaOperation()
50 keymaster_padding_t padding() const { return padding_; } in padding() function
78 keymaster_padding_t padding, EVP_PKEY* key);
93 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) in RsaSignOperation() argument
95 padding, key) {} in RsaSignOperation()
117 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) in RsaVerifyOperation() argument
119 padding, key) {} in RsaVerifyOperation()
142 keymaster_padding_t padding, EVP_PKEY* key) in RsaCryptOperation() argument
143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) {} in RsaCryptOperation()
[all …]
Drsa_key.h35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding);
/system/keymaster/android_keymaster/
Doperation.cpp24 bool OperationFactory::supported(keymaster_padding_t padding) const { in supported()
28 if (padding == supported_paddings[i]) in supported()
90 keymaster_padding_t* padding, in GetAndValidatePadding() argument
93 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding()
96 } else if (!supported(*padding)) { in GetAndValidatePadding()
97 LOG_E("Padding mode %d not supported", *padding); in GetAndValidatePadding()
103 !key.authorizations().Contains(TAG_PADDING, *padding) && in GetAndValidatePadding()
104 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) { in GetAndValidatePadding()
105 LOG_E("Padding mode %d was specified, but not authorized by key", *padding); in GetAndValidatePadding()
/system/keymaster/include/keymaster/
Doperation.h74 bool supported(keymaster_padding_t padding) const;
75 bool supported(keymaster_block_mode_t padding) const;
76 bool supported(keymaster_digest_t padding) const;
81 keymaster_padding_t* padding, keymaster_error_t* error) const;
/system/keymaster/tests/
Dandroid_keymaster_test_utils.cpp413 keymaster_digest_t digest, keymaster_padding_t padding) { in SignMessage() argument
417 input_params.push_back(TAG_PADDING, padding); in SignMessage()
448 keymaster_digest_t digest, keymaster_padding_t padding) { in VerifyMessage() argument
452 input_params.push_back(TAG_PADDING, padding); in VerifyMessage()
464 string Keymaster2Test::EncryptMessage(const string& message, keymaster_padding_t padding, in EncryptMessage() argument
468 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage()
483 keymaster_padding_t padding, string* generated_nonce) { in EncryptMessage() argument
485 return EncryptMessage(update_params, message, digest, padding, generated_nonce); in EncryptMessage()
489 keymaster_padding_t padding, string* generated_nonce) { in EncryptMessage() argument
491 return EncryptMessage(update_params, message, block_mode, padding, generated_nonce); in EncryptMessage()
[all …]
Dandroid_keymaster_test_utils.h242 keymaster_padding_t padding);
248 keymaster_digest_t digest, keymaster_padding_t padding);
251 std::string EncryptMessage(const std::string& message, keymaster_padding_t padding,
254 keymaster_padding_t padding, std::string* generated_nonce = nullptr);
256 keymaster_padding_t padding, std::string* generated_nonce = nullptr);
258 keymaster_digest_t digest, keymaster_padding_t padding,
261 keymaster_block_mode_t block_mode, keymaster_padding_t padding,
268 std::string DecryptMessage(const std::string& ciphertext, keymaster_padding_t padding);
270 keymaster_padding_t padding);
272 keymaster_padding_t padding);
[all …]
/system/keymaster/legacy_support/
Drsa_keymaster1_operation.cpp125 keymaster_padding_t padding; in CreateOperation() local
126 if (!GetAndValidatePadding(begin_params, key, &padding, error)) return nullptr; in CreateOperation()
135 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), in CreateOperation()
139 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), in CreateOperation()
Dkeymaster1_engine.cpp285 const uint8_t* in, size_t in_len, int padding) { in rsa_sign_raw() argument
290 if (padding != key_data->expected_openssl_padding) { in rsa_sign_raw()
292 key_data->expected_openssl_padding, padding); in rsa_sign_raw()
310 const uint8_t* in, size_t in_len, int padding) { in rsa_decrypt() argument
315 if (padding != key_data->expected_openssl_padding) { in rsa_decrypt()
317 key_data->expected_openssl_padding, padding); in rsa_decrypt()
Drsa_keymaster1_operation.h57 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key, in RsaKeymaster1Operation() argument
59 : BaseOperation(move(hw_enforced), move(sw_enforced), digest, padding, key), in RsaKeymaster1Operation()
/system/core/storaged/
Dstoraged.cpp215 vector<char> padding; in prepare_proto() local
218 padding = vector<char>(size - proto->ByteSize(), 0xFD); in prepare_proto()
219 proto->set_padding(padding.data(), padding.size()); in prepare_proto()
221 padding.push_back(0xFD); in prepare_proto()
222 proto->set_padding(padding.data(), padding.size()); in prepare_proto()
/system/update_engine/scripts/update_payload/
Dtest_utils.py235 sigs_data=None, padding=None): argument
255 if padding:
256 file_obj.write(padding)
313 is_pseudo_in_kernel=False, padding=None): argument
369 padding=padding)
/system/core/mkbootimg/
Dmkbootimg.py43 def pad_file(f, padding): argument
44 pad = (padding - (f.tell() & (padding - 1))) & (padding - 1)
137 def write_padded_file(f_out, f_in, padding): argument
141 pad_file(f_out, padding)
/system/tools/hidl/docs/resources/assets/
Dstyle.css13 padding: 0;
/system/chre/apps/chqts/src/general_test/
Dbasic_sensor_tests.cc108 uint32_t padding = data->readings[i].padding0; in confirmDataIsSane() local
109 sendFatalFailureToHost("padding0 is data is non-zero:", &padding); in confirmDataIsSane()
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster1_engine.h104 const uint8_t* in, size_t in_len, int padding);
106 const uint8_t* in, size_t in_len, int padding);
/system/core/fs_mgr/libdm/
Ddm_target.cpp36 size_t padding = DM_ALIGN(data.size()) - data.size(); in Serialize() local
37 for (size_t i = 0; i < padding; i++) { in Serialize()
/system/media/camera/docs/
Dhtml.mako29 …#eeeeee; font-size: 1.5em; font-weight: bold; background-color: #888888; padding: 0.5em 0em 0.5em …
30 ….kind { color: #eeeeee; font-size: 1.2em; font-weight: bold; padding-left: 1.5em; background-color…
42 td,th { border: 1px solid; border-color: #aaaaaa; padding-left: 0.5em; padding-right: 0.5em }
57 ….entry_name { color: #333333; padding-left:1.0em; font-size:1.1em; font-family: monospace; vertica…
63 .entry_type_visibility { font-weight: bolder; padding-left:1em}
72 .entry ul { margin: 0 0 0 0; list-style-position: inside; padding-left: 0.5em; }
73 .entry ul li { padding: 0 0 0 0; margin: 0 0 0 0;}
/system/security/keystore/
Dkey_config.proto42 // Track which padding modes this key supports.
43 repeated string padding = 6; field
Doperation_config.proto43 // Track which padding mode was used for this operation.
44 optional string padding = 6; field
/system/extras/verity/fec/
Dimage.cpp327 if (ctx->padding > 0) { in image_ecc_save()
328 uint8_t padding[FEC_BLOCKSIZE] = {0}; in image_ecc_save() local
330 for (uint32_t i = 0; i < ctx->padding; i += FEC_BLOCKSIZE) { in image_ecc_save()
331 if (!android::base::WriteFully(fd, padding, FEC_BLOCKSIZE)) { in image_ecc_save()
/system/bt/stack/crypto_toolbox/
Daes_cmac.cc81 static void padding(Octet16* dest, uint8_t length) { in padding() function
139 padding((Octet16*)&cmac_cb.text[0], (uint8_t)(cmac_cb.len % 16)); in cmac_prepare_last_block()

12