Searched refs:digest_type (Results 1 – 7 of 7) sorted by relevance
/system/keymaster/ |
D | kdf.cpp | 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument 27 switch (digest_type) { in Init() 30 digest_type_ = digest_type; in Init() 34 digest_type_ = digest_type; in Init()
|
D | iso18033kdf.h | 38 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument 39 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
|
D | kdf1_test.cpp | 32 keymaster_digest_t digest_type; member 52 kdf1.Init(test.digest_type, reinterpret_cast<const uint8_t*>(key.data()), key.size())); in TEST()
|
D | kdf2_test.cpp | 33 keymaster_digest_t digest_type; member 77 kdf2.Init(test.digest_type, reinterpret_cast<const uint8_t*>(key.data()), key.size())); in TEST()
|
D | kdf.h | 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
|
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 470 if (sign_params->digest_type != DIGEST_NONE) { in sign_dsa() 471 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_dsa() 502 if (sign_params->digest_type != DIGEST_NONE) { in sign_ec() 503 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_ec() 534 if (sign_params->digest_type != DIGEST_NONE) { in sign_rsa() 535 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_rsa() 608 if (sign_params->digest_type != DIGEST_NONE) { in verify_dsa() 609 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in verify_dsa() 630 if (sign_params->digest_type != DIGEST_NONE) { in verify_ec() 631 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in verify_ec() [all …]
|
/system/core/trusty/keymaster/ |
D | trusty_keymaster_device.cpp | 495 if (rsa_params->digest_type != DIGEST_NONE) in StoreSigningParams() 506 if (ecdsa_params->digest_type != DIGEST_NONE) in StoreSigningParams()
|