/system/keymaster/ |
dsa_operation.h | 33 keymaster_padding_t padding, DSA* key) 46 keymaster_padding_t padding_; 53 keymaster_padding_t padding, DSA* key) 61 keymaster_padding_t padding, DSA* key)
|
ecdsa_operation.h | 33 keymaster_padding_t padding, EC_KEY* key) 46 keymaster_padding_t padding_; 53 keymaster_padding_t padding, EC_KEY* key) 61 keymaster_digest_t digest, keymaster_padding_t padding, EC_KEY* key)
|
rsa_operation.h | 31 keymaster_padding_t padding, RSA* key) 44 keymaster_padding_t padding_; 51 keymaster_padding_t padding, RSA* key) 59 keymaster_padding_t padding, RSA* key)
|
asymmetric_key.h | 57 keymaster_padding_t padding, keymaster_error_t* error) = 0; 69 keymaster_padding_t padding, keymaster_error_t* error); 95 keymaster_padding_t padding, keymaster_error_t* error); 123 keymaster_padding_t padding, keymaster_error_t* error);
|
asymmetric_key.cpp | 115 keymaster_padding_t padding; 228 keymaster_padding_t padding, keymaster_error_t* error) { 432 keymaster_padding_t padding, keymaster_error_t* error) { 600 keymaster_padding_t padding, keymaster_error_t* error) {
|
google_keymaster.cpp | 82 keymaster_padding_t supported_padding[] = {KM_PAD_NONE}; 85 SupportedResponse<keymaster_padding_t>* response) const {
|
google_keymaster_test.cpp | 93 SupportedResponse<keymaster_padding_t> response; 384 keymaster_padding_t padding, uint32_t key_size) { 619 GenerateKey(KM_ALGORITHM_RSA, KM_DIGEST_NONE, static_cast<keymaster_padding_t>(-1), [all...] |
authorization_set_test.cpp | 512 keymaster_padding_t val2;
|
/system/keymaster/include/keymaster/ |
google_keymaster.h | 54 SupportedResponse<keymaster_padding_t>* response) const;
|
keymaster_defs.h | 60 KM_TAG_PADDING = KM_ENUM | 7, /* keymaster_padding_t. */ 207 } keymaster_padding_t; typedef in typeref:enum:__anon81490
|
keymaster_tags.h | 193 DEFINE_KEYMASTER_ENUM_TAG(KM_ENUM, TAG_PADDING, keymaster_padding_t);
|