HomeSort by relevance Sort by last modified time
    Searched full:sign_params (Results 1 - 4 of 4) sorted by null

  /system/security/softkeymaster/
keymaster_openssl.cpp 474 static int sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data,
476 if (sign_params->digest_type != DIGEST_NONE) {
477 ALOGW("Cannot handle digest type %d", sign_params->digest_type);
506 static int sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data,
508 if (sign_params->digest_type != DIGEST_NONE) {
509 ALOGW("Cannot handle digest type %d", sign_params->digest_type);
538 static int sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data,
540 if (sign_params->digest_type != DIGEST_NONE) {
541 ALOGW("Cannot handle digest type %d", sign_params->digest_type);
543 } else if (sign_params->padding_type != PADDING_NONE)
591 const keymaster_dsa_sign_params_t* sign_params = local
596 const keymaster_ec_sign_params_t* sign_params = local
601 const keymaster_rsa_sign_params_t* sign_params = local
712 const keymaster_dsa_sign_params_t* sign_params = local
717 const keymaster_rsa_sign_params_t* sign_params = local
722 const keymaster_ec_sign_params_t* sign_params = local
    [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 490 keymaster_rsa_sign_params_t* sign_params = (keymaster_rsa_sign_params_t*) params; local
491 if (sign_params->digest_type != DIGEST_NONE) {
492 ALOGE("Cannot handle digest type %d", sign_params->digest_type);
494 } else if (sign_params->padding_type != PADDING_NONE) {
495 ALOGE("Cannot handle padding type %d", sign_params->padding_type);
525 send_cmd->sign_param.digest_type = sign_params->digest_type;
526 send_cmd->sign_param.padding_type = sign_params->padding_type;
586 keymaster_rsa_sign_params_t* sign_params = (keymaster_rsa_sign_params_t*) params; local
587 if (sign_params->digest_type != DIGEST_NONE) {
588 ALOGE("Cannot handle digest type %d", sign_params->digest_type)
    [all...]
  /system/keymaster/
keymaster0_engine.cpp 325 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; local
328 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) {
374 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE}; local
377 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
  /system/security/keystore/
keystore_cli_v2.cpp 343 AuthorizationSetBuilder sign_params; local
344 sign_params.Padding(KM_PAD_RSA_PKCS1_1_5_SIGN);
345 sign_params.Digest(KM_DIGEST_SHA_2_256);
348 int32_t result = keystore->beginOperation(KM_PURPOSE_SIGN, name, sign_params.build(),
373 result = keystore->beginOperation(KM_PURPOSE_VERIFY, name, sign_params.build(), &output_params,

Completed in 458 milliseconds