/system/keymaster/ |
rsa_key.cpp | 40 return padding == KM_PAD_NONE || padding == KM_PAD_RSA_PSS ||
|
android_keymaster_test.cpp | 302 .Padding(KM_PAD_NONE))); 493 .Padding(KM_PAD_NONE))); 510 .Padding(KM_PAD_NONE))); 513 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); 537 .Padding(KM_PAD_NONE))); 634 .Padding(KM_PAD_NONE))); 637 begin_params.push_back(TAG_PADDING, KM_PAD_NONE); 691 .Padding(KM_PAD_NONE))); 694 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); 704 .Padding(KM_PAD_NONE))); [all...] |
rsa_keymaster1_operation.cpp | 38 // KM_PAD_RSA_PSS and KM_PAD_OAEP to KM_PAD_NONE, if necessary. These are the params we'll pass 43 // KM_PAD_NONE is because the hardware can perform those padding modes, since they don't involve 63 begin_params[pos].enumerated = KM_PAD_NONE; 157 KM_PAD_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN, KM_PAD_RSA_PSS, 160 KM_PAD_NONE, KM_PAD_RSA_PKCS1_1_5_ENCRYPT, KM_PAD_RSA_OAEP,
|
rsa_keymaster1_key.cpp | 67 case KM_PAD_NONE: 80 LOG_I("Adding KM_PAD_NONE to key authorization, to enable PSS or OAEP software padding", 0); 81 new_description->push_back(TAG_PADDING, KM_PAD_NONE);
|
rsa_operation.cpp | 89 static const keymaster_padding_t supported_sig_padding[] = {KM_PAD_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN, 103 case KM_PAD_NONE: 126 static const keymaster_padding_t supported_crypt_padding[] = {KM_PAD_NONE, KM_PAD_RSA_OAEP, 240 case KM_PAD_NONE: 333 case KM_PAD_NONE: { 437 case KM_PAD_NONE: 467 if (padding_ == KM_PAD_NONE && data_.available_read() < bytes_to_compare) { 505 case KM_PAD_NONE: 557 if (padding_ == KM_PAD_NONE && to_encrypt_len < outlen) { 610 if (padding_ == KM_PAD_NONE && to_decrypt_len < outlen) [all...] |
aes_operation.cpp | 121 if (!allows_padding(block_mode) && padding != KM_PAD_NONE) { 160 static const keymaster_padding_t supported_padding_modes[] = {KM_PAD_NONE, KM_PAD_PKCS7}; 327 case KM_PAD_NONE:
|
android_keymaster_test_utils.cpp | 639 .Padding(KM_PAD_NONE), 645 begin_params.push_back(TAG_PADDING, KM_PAD_NONE); [all...] |
soft_keymaster_device.cpp | [all...] |
soft_keymaster_context.cpp | [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreUnauthenticatedAESCipherSpi.java | 51 super(KeymasterDefs.KM_PAD_NONE); 69 super(KeymasterDefs.KM_PAD_NONE); 87 super(KeymasterDefs.KM_PAD_NONE);
|
KeymasterUtils.java | 72 case KeymasterDefs.KM_PAD_NONE:
|
KeyProperties.java | 393 return KeymasterDefs.KM_PAD_NONE; 409 case KeymasterDefs.KM_PAD_NONE:
|
AndroidKeyStoreAuthenticatedAESCipherSpi.java | 225 super(KeymasterDefs.KM_PAD_NONE);
|
AndroidKeyStoreRSACipherSpi.java | 54 super(KeymasterDefs.KM_PAD_NONE);
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AuthorizationList.java | 57 public static final int KM_PAD_NONE = 1; 127 .put(KM_PAD_NONE, "NONE") 383 case KM_PAD_NONE:
|
/system/vold/tests/ |
CryptfsScryptHidlizationEquivalence_test.cpp | 168 keymaster_param_enum(KM_TAG_PADDING, KM_PAD_NONE), 299 keymaster_param_enum(KM_TAG_PADDING, KM_PAD_NONE),
|
/frameworks/base/core/java/android/security/keymaster/ |
KeymasterDefs.java | 113 public static final int KM_PAD_NONE = 1;
|
/hardware/libhardware/include/hardware/ |
keymaster_defs.h | 212 KM_PAD_NONE = 1, /* deprecated */
|
/system/core/trusty/keymaster/ |
trusty_keymaster_main.cpp | 124 keymaster_param_enum(KM_TAG_PADDING, KM_PAD_NONE), 142 keymaster_param_enum(KM_TAG_PADDING, KM_PAD_NONE),
|
/system/keymaster/include/keymaster/ |
authorization_set.h | 608 return Authorization(TAG_PADDING, KM_PAD_NONE);
|