/system/security/softkeymaster/ |
keymaster_openssl.cpp | 474 static int sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data, 476 if (sign_params->digest_type != DIGEST_NONE) { 477 ALOGW("Cannot handle digest type %d", sign_params->digest_type); 506 static int sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data, 508 if (sign_params->digest_type != DIGEST_NONE) { 509 ALOGW("Cannot handle digest type %d", sign_params->digest_type); 538 static int sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data, 540 if (sign_params->digest_type != DIGEST_NONE) { 541 ALOGW("Cannot handle digest type %d", sign_params->digest_type); 543 } else if (sign_params->padding_type != PADDING_NONE) 591 const keymaster_dsa_sign_params_t* sign_params = local 596 const keymaster_ec_sign_params_t* sign_params = local 601 const keymaster_rsa_sign_params_t* sign_params = local 712 const keymaster_dsa_sign_params_t* sign_params = local 717 const keymaster_rsa_sign_params_t* sign_params = local 722 const keymaster_ec_sign_params_t* sign_params = local [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 490 keymaster_rsa_sign_params_t* sign_params = (keymaster_rsa_sign_params_t*) params; local 491 if (sign_params->digest_type != DIGEST_NONE) { 492 ALOGE("Cannot handle digest type %d", sign_params->digest_type); 494 } else if (sign_params->padding_type != PADDING_NONE) { 495 ALOGE("Cannot handle padding type %d", sign_params->padding_type); 525 send_cmd->sign_param.digest_type = sign_params->digest_type; 526 send_cmd->sign_param.padding_type = sign_params->padding_type; 586 keymaster_rsa_sign_params_t* sign_params = (keymaster_rsa_sign_params_t*) params; local 587 if (sign_params->digest_type != DIGEST_NONE) { 588 ALOGE("Cannot handle digest type %d", sign_params->digest_type) [all...] |
/system/keymaster/ |
keymaster0_engine.cpp | 325 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; local 328 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { 374 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE}; local 377 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
|
/system/security/keystore/ |
keystore_cli_v2.cpp | 343 AuthorizationSetBuilder sign_params; local 344 sign_params.Padding(KM_PAD_RSA_PKCS1_1_5_SIGN); 345 sign_params.Digest(KM_DIGEST_SHA_2_256); 348 int32_t result = keystore->beginOperation(KM_PURPOSE_SIGN, name, sign_params.build(), 373 result = keystore->beginOperation(KM_PURPOSE_VERIFY, name, sign_params.build(), &output_params,
|