/system/keymaster/ |
aes_operation.h | 61 AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode, 110 AesEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, 112 : AesEvpOperation(KM_PURPOSE_ENCRYPT, block_mode, padding, caller_iv, tag_length, key, 129 AesEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding, 131 : AesEvpOperation(KM_PURPOSE_DECRYPT, block_mode, padding,
|
aes_operation.cpp | 38 inline bool allows_padding(keymaster_block_mode_t block_mode) { 39 switch (block_mode) { 94 keymaster_block_mode_t block_mode; local 95 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { 99 } else if (!supported(block_mode)) { 100 LOG_E("Block mode %d not supported", block_mode); 103 } else if (!key.authorizations().Contains(TAG_BLOCK_MODE, block_mode)) { 104 LOG_E("Block mode %d was specified, but not authorized by key", block_mode); 110 if (block_mode == KM_MODE_GCM) { 121 if (!allows_padding(block_mode) && padding != KM_PAD_NONE) [all...] |
operation.cpp | 34 bool OperationFactory::supported(keymaster_block_mode_t block_mode) const { 38 if (block_mode == supported_block_modes[i])
|
android_keymaster_test_utils.h | 254 std::string EncryptMessage(const std::string& message, keymaster_block_mode_t block_mode, 260 keymaster_block_mode_t block_mode, keymaster_padding_t padding, 270 std::string DecryptMessage(const std::string& ciphertext, keymaster_block_mode_t block_mode, 274 std::string DecryptMessage(const std::string& ciphertext, keymaster_block_mode_t block_mode, 280 keymaster_block_mode_t block_mode, keymaster_padding_t padding,
|
android_keymaster_test_utils.cpp | 485 string Keymaster2Test::EncryptMessage(const string& message, keymaster_block_mode_t block_mode, 488 return EncryptMessage(update_params, message, block_mode, padding, generated_nonce); 511 keymaster_block_mode_t block_mode, 516 begin_params.push_back(TAG_BLOCK_MODE, block_mode); 555 string Keymaster2Test::DecryptMessage(const string& ciphertext, keymaster_block_mode_t block_mode, 560 begin_params.push_back(TAG_BLOCK_MODE, block_mode); 576 string Keymaster2Test::DecryptMessage(const string& ciphertext, keymaster_block_mode_t block_mode, 581 begin_params.push_back(TAG_BLOCK_MODE, block_mode); [all...] |
/system/security/keystore/ |
keystore_client_impl.cpp | 463 auto block_mode = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_BLOCK_MODE), local 465 if (!block_mode.isOk() || block_mode.value() != BlockMode::CBC) {
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
authorization_set.h | 393 for (auto block_mode : block_modes) { 394 Authorization(TAG_BLOCK_MODE, block_mode);
|
keymaster_tags.h | 151 DECLARE_TYPED_TAG(BLOCK_MODE); 367 inline const char* stringify(BlockMode block_mode) { 368 switch (block_mode) {
|
keymaster_hidl_hal_test.cpp | 140 case Tag::BLOCK_MODE: [all...] |
/external/syslinux/gpxe/src/drivers/infiniband/ |
MT25408_PRM.h | 2449 pseudo_bit_t block_mode[0x00001]; \/* If set, the page size is not power of two, and entity_size is in bytes. *\/ member in struct:hermonprm_mpt_st [all...] |