/system/security/softkeymaster/ |
keymaster_openssl.cpp | 468 static int sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data, 470 if (sign_params->digest_type != DIGEST_NONE) { 471 ALOGW("Cannot handle digest type %d", sign_params->digest_type); 500 static int sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data, 502 if (sign_params->digest_type != DIGEST_NONE) { 503 ALOGW("Cannot handle digest type %d", sign_params->digest_type); 532 static int sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data, 534 if (sign_params->digest_type != DIGEST_NONE) { 535 ALOGW("Cannot handle digest type %d", sign_params->digest_type); 537 } else if (sign_params->padding_type != PADDING_NONE) 585 const keymaster_dsa_sign_params_t* sign_params = local 590 const keymaster_ec_sign_params_t* sign_params = local 595 const keymaster_rsa_sign_params_t* sign_params = local 706 const keymaster_dsa_sign_params_t* sign_params = local 711 const keymaster_rsa_sign_params_t* sign_params = local 716 const keymaster_ec_sign_params_t* sign_params = local [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 490 keymaster_rsa_sign_params_t* sign_params = (keymaster_rsa_sign_params_t*) params; local 491 if (sign_params->digest_type != DIGEST_NONE) { 492 ALOGE("Cannot handle digest type %d", sign_params->digest_type); 494 } else if (sign_params->padding_type != PADDING_NONE) { 495 ALOGE("Cannot handle padding type %d", sign_params->padding_type); 525 send_cmd->sign_param.digest_type = sign_params->digest_type; 526 send_cmd->sign_param.padding_type = sign_params->padding_type; 586 keymaster_rsa_sign_params_t* sign_params = (keymaster_rsa_sign_params_t*) params; local 587 if (sign_params->digest_type != DIGEST_NONE) { 588 ALOGE("Cannot handle digest type %d", sign_params->digest_type) [all...] |
/system/core/trusty/keymaster/ |
trusty_keymaster_main.cpp | 129 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; local 135 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature, 144 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature, 175 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; local 181 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature, 190 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature, 247 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE}; local 253 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature, 262 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature, 291 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE} local [all...] |
/system/security/keystore/ |
keystore_cli_v2.cpp | 350 AuthorizationSetBuilder sign_params; local 351 sign_params.Padding(PaddingMode::RSA_PKCS1_1_5_SIGN); 352 sign_params.Digest(Digest::SHA_2_256); 355 auto result = keystore->beginOperation(KeyPurpose::SIGN, name, sign_params, 380 result = keystore->beginOperation(KeyPurpose::VERIFY, name, sign_params, &output_params,
|
/system/keymaster/ |
keymaster0_engine.cpp | 307 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; local 310 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { 356 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE}; local 359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
|