Home
last modified time | relevance | path

Searched refs:signedDataLength (Results 1 – 2 of 2) sorted by relevance

/hardware/samsung_slsi/exynos5/libkeymaster/
Dkeymaster_mobicore.cpp335 uint8_t** signedData, size_t* signedDataLength) { in exynos_km_sign_data() argument
341 } else if (signedData == NULL || signedDataLength == NULL) { in exynos_km_sign_data()
361 *signedDataLength = RSA_KEY_MAX_SIZE; in exynos_km_sign_data()
367 signedDataLength, TEE_RSA_NODIGEST_NOPADDING); in exynos_km_sign_data()
382 const uint8_t* signedData, const size_t signedDataLength, in exynos_km_verify_data() argument
399 } else if (signatureLength != signedDataLength) { in exynos_km_verify_data()
404 void *tmpSignedData = malloc(signedDataLength); in exynos_km_verify_data()
405 memcpy(tmpSignedData, signedData, signedDataLength); in exynos_km_verify_data()
408 …ret = TEE_RSAVerify(keyBlob, keyBlobLength, (const uint8_t*)tmpSignedData, signedDataLength, (cons… in exynos_km_verify_data()
/hardware/qcom/keymaster/
Dkeymaster_qcom.cpp473 uint8_t** signedData, size_t* signedDataLength) in qcom_km_sign_data() argument
486 } else if (signedData == NULL || signedDataLength == NULL) { in qcom_km_sign_data()
563 *signedDataLength = resp->sig_len; in qcom_km_sign_data()
573 const uint8_t* signedData, const size_t signedDataLength, in qcom_km_verify_data() argument
593 } else if (signatureLength != signedDataLength) { in qcom_km_verify_data()
610 if (qcom_km_ION_memalloc(&ihandle, signedDataLength + signatureLength) <0) { in qcom_km_verify_data()
630 send_cmd->signed_dlen = signedDataLength; in qcom_km_verify_data()
631 memcpy((unsigned char *)ihandle.ion_sbuffer, signedData, signedDataLength); in qcom_km_verify_data()
633 send_cmd->signature = signedDataLength; in qcom_km_verify_data()
635 memcpy(((unsigned char *)ihandle.ion_sbuffer + signedDataLength), in qcom_km_verify_data()