Home
last modified time | relevance | path

Searched refs:signatureLength (Results 1 – 6 of 6) sorted by relevance

/system/security/softkeymaster/
Dkeymaster_openssl.cpp613 const uint8_t* signature, const size_t signatureLength) { in verify_dsa() argument
625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { in verify_dsa()
635 const uint8_t* signature, const size_t signatureLength) { in verify_ec() argument
647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= in verify_ec()
658 const uint8_t* signature, const size_t signatureLength) { in verify_rsa() argument
665 } else if (signatureLength != signedDataLength) { in verify_rsa()
683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { in verify_rsa()
699 const uint8_t* signature, const size_t signatureLength) { in openssl_verify_data() argument
715 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data()
720 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data()
[all …]
/system/security/keystore/
Dkey_store_service.h65 const uint8_t* signature, size_t signatureLength);
111 const uint8_t* signature, size_t signatureLength, const uint8_t* entropy,
225 size_t signatureLength, keymaster_purpose_t purpose);
DIKeystoreService.cpp799 const uint8_t* signature, size_t signatureLength) in verify() argument
809 data.writeInt32(signatureLength); in verify()
810 buf = data.writeInplace(signatureLength); in verify()
811 memcpy(buf, signature, signatureLength); in verify()
1199 const uint8_t* signature, size_t signatureLength, in finish() argument
1211 data.writeByteArray(signatureLength, signature); in finish()
1788 size_t signatureLength = 0; in onTransact() local
1789 readByteArray(data, &signature, &signatureLength); in onTransact()
1794 finish(token, args, signature, signatureLength, entropy, entropyLength, &result); in onTransact()
Dkey_store_service.cpp388 const uint8_t* signature, size_t signatureLength) { in verify() argument
392 return doLegacySignVerify(name, data, dataLength, NULL, NULL, signature, signatureLength, in verify()
1009 const uint8_t* signature, size_t signatureLength, in finish() argument
1046 keymaster_blob_t sig = {signature, signatureLength}; in finish()
1479 const uint8_t* signature, size_t signatureLength, in doLegacySignVerify() argument
1520 finish(token, inArgs, signature, signatureLength, NULL, 0, &result); in doLegacySignVerify()
/system/security/softkeymaster/include/keymaster/
Dsoftkeymaster.h39 const size_t signatureLength);
/system/security/keystore/include/keystore/
DIKeystoreService.h187 const uint8_t* signature, size_t signatureLength) = 0;
234 const uint8_t* signature, size_t signatureLength,