HomeSort by relevance Sort by last modified time
    Searched refs:KM_PAD_NONE (Results 1 - 20 of 20) sorted by null

  /system/keymaster/
rsa_key.cpp 40 return padding == KM_PAD_NONE || padding == KM_PAD_RSA_PSS ||
android_keymaster_test.cpp 302 .Padding(KM_PAD_NONE)));
493 .Padding(KM_PAD_NONE)));
510 .Padding(KM_PAD_NONE)));
513 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE);
537 .Padding(KM_PAD_NONE)));
634 .Padding(KM_PAD_NONE)));
637 begin_params.push_back(TAG_PADDING, KM_PAD_NONE);
691 .Padding(KM_PAD_NONE)));
694 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE);
704 .Padding(KM_PAD_NONE)));
    [all...]
rsa_keymaster1_operation.cpp 38 // KM_PAD_RSA_PSS and KM_PAD_OAEP to KM_PAD_NONE, if necessary. These are the params we'll pass
43 // KM_PAD_NONE is because the hardware can perform those padding modes, since they don't involve
63 begin_params[pos].enumerated = KM_PAD_NONE;
157 KM_PAD_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN, KM_PAD_RSA_PSS,
160 KM_PAD_NONE, KM_PAD_RSA_PKCS1_1_5_ENCRYPT, KM_PAD_RSA_OAEP,
rsa_keymaster1_key.cpp 67 case KM_PAD_NONE:
80 LOG_I("Adding KM_PAD_NONE to key authorization, to enable PSS or OAEP software padding", 0);
81 new_description->push_back(TAG_PADDING, KM_PAD_NONE);
rsa_operation.cpp 89 static const keymaster_padding_t supported_sig_padding[] = {KM_PAD_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN,
103 case KM_PAD_NONE:
126 static const keymaster_padding_t supported_crypt_padding[] = {KM_PAD_NONE, KM_PAD_RSA_OAEP,
240 case KM_PAD_NONE:
333 case KM_PAD_NONE: {
437 case KM_PAD_NONE:
467 if (padding_ == KM_PAD_NONE && data_.available_read() < bytes_to_compare) {
505 case KM_PAD_NONE:
557 if (padding_ == KM_PAD_NONE && to_encrypt_len < outlen) {
610 if (padding_ == KM_PAD_NONE && to_decrypt_len < outlen)
    [all...]
aes_operation.cpp 121 if (!allows_padding(block_mode) && padding != KM_PAD_NONE) {
160 static const keymaster_padding_t supported_padding_modes[] = {KM_PAD_NONE, KM_PAD_PKCS7};
327 case KM_PAD_NONE:
android_keymaster_test_utils.cpp 636 .Padding(KM_PAD_NONE),
642 begin_params.push_back(TAG_PADDING, KM_PAD_NONE);
    [all...]
soft_keymaster_device.cpp     [all...]
soft_keymaster_context.cpp     [all...]
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreUnauthenticatedAESCipherSpi.java 51 super(KeymasterDefs.KM_PAD_NONE);
69 super(KeymasterDefs.KM_PAD_NONE);
87 super(KeymasterDefs.KM_PAD_NONE);
KeymasterUtils.java 72 case KeymasterDefs.KM_PAD_NONE:
KeyProperties.java 393 return KeymasterDefs.KM_PAD_NONE;
409 case KeymasterDefs.KM_PAD_NONE:
AndroidKeyStoreAuthenticatedAESCipherSpi.java 225 super(KeymasterDefs.KM_PAD_NONE);
AndroidKeyStoreRSACipherSpi.java 54 super(KeymasterDefs.KM_PAD_NONE);
  /frameworks/base/keystore/tests/src/android/security/
KeyStoreTest.java     [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
AuthorizationList.java 57 public static final int KM_PAD_NONE = 1;
127 .put(KM_PAD_NONE, "NONE")
383 case KM_PAD_NONE:
  /system/core/trusty/keymaster/
trusty_keymaster_device.cpp 500 !auth_set->push_back(TAG_PADDING, KM_PAD_NONE))
527 auth_set->push_back(TAG_PADDING_OLD, KM_PAD_NONE);
530 auth_set->push_back(TAG_PADDING, KM_PAD_NONE);
  /frameworks/base/core/java/android/security/keymaster/
KeymasterDefs.java 113 public static final int KM_PAD_NONE = 1;
  /hardware/libhardware/include/hardware/
keymaster_defs.h 212 KM_PAD_NONE = 1, /* deprecated */
  /system/keymaster/include/keymaster/
authorization_set.h 608 return Authorization(TAG_PADDING, KM_PAD_NONE);

Completed in 370 milliseconds