/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 475 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) { in sign_dsa() argument 495 if (DSA_sign(0, data, dataLength, tmp, &dsaSize, dsa.get()) <= 0) { in sign_dsa() 507 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) { in sign_ec() argument 527 if (ECDSA_sign(0, data, dataLength, tmp, &ecdsaSize, eckey.get()) <= 0) { in sign_ec() 539 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) { in sign_rsa() argument 554 UniquePtr<uint8_t, Malloc_Free> signedDataPtr(reinterpret_cast<uint8_t*>(malloc(dataLength))); in sign_rsa() 561 if (RSA_private_encrypt(dataLength, data, tmp, rsa.get(), RSA_NO_PADDING) <= 0) { in sign_rsa() 566 *signedDataLength = dataLength; in sign_rsa() 574 const size_t keyBlobLength, const uint8_t* data, const size_t dataLength, uint8_t** signedData, in openssl_sign_data() argument 594 dataLength, signedData, signedDataLength); in openssl_sign_data() [all …]
|
/system/security/keystore/include/keystore/ |
D | IKeystoreService.h | 67 size_t dataLength; member 80 size_t dataLength; member 173 virtual int32_t verify(const String16& name, const uint8_t* data, size_t dataLength, 191 virtual int32_t addRngEntropy(const uint8_t* data, size_t dataLength) = 0; 217 const uint8_t* data, size_t dataLength, OperationResult* result) = 0;
|
/system/security/softkeymaster/include/keymaster/ |
D | softkeymaster.h | 33 const size_t keyBlobLength, const uint8_t* data, const size_t dataLength,
|
/system/security/keystore/ |
D | IKeystoreService.cpp | 52 data(NULL), dataLength(0) { in OperationResult() 64 dataLength = 0; in readFromParcel() 71 dataLength = (size_t) length; in readFromParcel() 87 out->writeInt32(dataLength); in writeToParcel() 88 if (dataLength && data) { in writeToParcel() 89 void* buf = out->writeInplace(dataLength); in writeToParcel() 91 memcpy(buf, data.get(), dataLength); in writeToParcel() 99 ExportResult::ExportResult() : resultCode(0), exportData(NULL), dataLength(0) { in ExportResult() 108 dataLength = 0; in readFromParcel() 115 dataLength = (size_t) length; in readFromParcel() [all …]
|
D | keystore.cpp | 618 size_t dataLength = mBlob.length + sizeof(mBlob.length); in writeBlob() local 620 size_t digestedLength = ((dataLength + AES_BLOCK_SIZE - 1) in writeBlob() 627 memset(mBlob.value + mBlob.length, 0, digestedLength - dataLength); in writeBlob() 1328 size_t dataLength; in importKey() local 1337 rc = mDevice->import_keypair(mDevice, key, keyLen, &data, &dataLength); in importKey() 1345 rc = mFallbackDevice->import_keypair(mFallbackDevice, key, keyLen, &data, &dataLength); in importKey() 1354 Blob keyBlob(data, dataLength, NULL, 0, TYPE_KEY_PAIR); in importKey() 2031 int32_t verify(const String16& name, const uint8_t* data, size_t dataLength, in verify() argument 2036 return doLegacySignVerify(name, data, dataLength, NULL, NULL, signature, signatureLength, in verify() 2060 *pubkeyLength = result.dataLength; in get_pubkey() [all …]
|
/system/netd/server/ |
D | MDnsSdListener.cpp | 434 int dataLength = strlen(argv[i]); in runCommand() local 435 if (dataLength < 1) { in runCommand() 438 if (dataLength > 255) { in runCommand() 443 if (ptr + dataLength + 1 > txtRecord + sizeof(txtRecord)) { in runCommand() 448 *ptr++ = dataLength; in runCommand() 450 ptr += dataLength; in runCommand()
|