HomeSort by relevance Sort by last modified time
    Searched refs:sign_params (Results 1 - 5 of 5) sorted by null

  /system/security/softkeymaster/
keymaster_openssl.cpp 468 static int sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data,
470 if (sign_params->digest_type != DIGEST_NONE) {
471 ALOGW("Cannot handle digest type %d", sign_params->digest_type);
500 static int sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data,
502 if (sign_params->digest_type != DIGEST_NONE) {
503 ALOGW("Cannot handle digest type %d", sign_params->digest_type);
532 static int sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data,
534 if (sign_params->digest_type != DIGEST_NONE) {
535 ALOGW("Cannot handle digest type %d", sign_params->digest_type);
537 } else if (sign_params->padding_type != PADDING_NONE)
585 const keymaster_dsa_sign_params_t* sign_params = local
590 const keymaster_ec_sign_params_t* sign_params = local
595 const keymaster_rsa_sign_params_t* sign_params = local
706 const keymaster_dsa_sign_params_t* sign_params = local
711 const keymaster_rsa_sign_params_t* sign_params = local
716 const keymaster_ec_sign_params_t* sign_params = local
    [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 490 keymaster_rsa_sign_params_t* sign_params = (keymaster_rsa_sign_params_t*) params; local
491 if (sign_params->digest_type != DIGEST_NONE) {
492 ALOGE("Cannot handle digest type %d", sign_params->digest_type);
494 } else if (sign_params->padding_type != PADDING_NONE) {
495 ALOGE("Cannot handle padding type %d", sign_params->padding_type);
525 send_cmd->sign_param.digest_type = sign_params->digest_type;
526 send_cmd->sign_param.padding_type = sign_params->padding_type;
586 keymaster_rsa_sign_params_t* sign_params = (keymaster_rsa_sign_params_t*) params; local
587 if (sign_params->digest_type != DIGEST_NONE) {
588 ALOGE("Cannot handle digest type %d", sign_params->digest_type)
    [all...]
  /system/core/trusty/keymaster/
trusty_keymaster_main.cpp 129 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; local
135 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature,
144 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature,
175 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; local
181 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature,
190 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature,
247 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE}; local
253 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature,
262 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature,
291 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE} local
    [all...]
  /system/security/keystore/
keystore_cli_v2.cpp 350 AuthorizationSetBuilder sign_params; local
351 sign_params.Padding(PaddingMode::RSA_PKCS1_1_5_SIGN);
352 sign_params.Digest(Digest::SHA_2_256);
355 auto result = keystore->beginOperation(KeyPurpose::SIGN, name, sign_params,
380 result = keystore->beginOperation(KeyPurpose::VERIFY, name, sign_params, &output_params,
  /system/keymaster/
keymaster0_engine.cpp 307 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; local
310 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) {
356 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE}; local
359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,

Completed in 398 milliseconds