Searched refs:sign_params (Results 1 – 3 of 3) sorted by relevance
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 474 static int sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data, in sign_dsa() argument 476 if (sign_params->digest_type != DIGEST_NONE) { in sign_dsa() 477 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_dsa() 506 static int sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data, in sign_ec() argument 508 if (sign_params->digest_type != DIGEST_NONE) { in sign_ec() 509 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_ec() 538 static int sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data, in sign_rsa() argument 540 if (sign_params->digest_type != DIGEST_NONE) { in sign_rsa() 541 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_rsa() 543 } else if (sign_params->padding_type != PADDING_NONE) { in sign_rsa() [all …]
|
/system/security/keystore/ |
D | keystore_cli_v2.cpp | 343 AuthorizationSetBuilder sign_params; in SignAndVerify() local 344 sign_params.Padding(KM_PAD_RSA_PKCS1_1_5_SIGN); in SignAndVerify() 345 sign_params.Digest(KM_DIGEST_SHA_2_256); in SignAndVerify() 348 int32_t result = keystore->beginOperation(KM_PURPOSE_SIGN, name, sign_params.build(), in SignAndVerify() 373 result = keystore->beginOperation(KM_PURPOSE_VERIFY, name, sign_params.build(), &output_params, in SignAndVerify()
|
/system/keymaster/ |
D | keymaster0_engine.cpp | 325 keymaster_rsa_sign_params_t sign_params = {DIGEST_NONE, PADDING_NONE}; in RsaPrivateTransform() local 328 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { in RsaPrivateTransform() 374 keymaster_ec_sign_params_t sign_params = {DIGEST_NONE}; in EcdsaSign() local 377 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, in EcdsaSign()
|