/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 613 const uint8_t* signature, const size_t signatureLength) { in verify_dsa() argument 625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { in verify_dsa() 635 const uint8_t* signature, const size_t signatureLength) { in verify_ec() argument 647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= in verify_ec() 658 const uint8_t* signature, const size_t signatureLength) { in verify_rsa() argument 665 } else if (signatureLength != signedDataLength) { in verify_rsa() 683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { in verify_rsa() 699 const uint8_t* signature, const size_t signatureLength) { in openssl_verify_data() argument 715 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() 720 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() [all …]
|
/system/security/keystore/ |
D | key_store_service.h | 65 const uint8_t* signature, size_t signatureLength); 111 const uint8_t* signature, size_t signatureLength, const uint8_t* entropy, 225 size_t signatureLength, keymaster_purpose_t purpose);
|
D | IKeystoreService.cpp | 799 const uint8_t* signature, size_t signatureLength) in verify() argument 809 data.writeInt32(signatureLength); in verify() 810 buf = data.writeInplace(signatureLength); in verify() 811 memcpy(buf, signature, signatureLength); in verify() 1199 const uint8_t* signature, size_t signatureLength, in finish() argument 1211 data.writeByteArray(signatureLength, signature); in finish() 1788 size_t signatureLength = 0; in onTransact() local 1789 readByteArray(data, &signature, &signatureLength); in onTransact() 1794 finish(token, args, signature, signatureLength, entropy, entropyLength, &result); in onTransact()
|
D | key_store_service.cpp | 388 const uint8_t* signature, size_t signatureLength) { in verify() argument 392 return doLegacySignVerify(name, data, dataLength, NULL, NULL, signature, signatureLength, in verify() 1009 const uint8_t* signature, size_t signatureLength, in finish() argument 1046 keymaster_blob_t sig = {signature, signatureLength}; in finish() 1479 const uint8_t* signature, size_t signatureLength, in doLegacySignVerify() argument 1520 finish(token, inArgs, signature, signatureLength, NULL, 0, &result); in doLegacySignVerify()
|
/system/security/softkeymaster/include/keymaster/ |
D | softkeymaster.h | 39 const size_t signatureLength);
|
/system/security/keystore/include/keystore/ |
D | IKeystoreService.h | 187 const uint8_t* signature, size_t signatureLength) = 0; 234 const uint8_t* signature, size_t signatureLength,
|