Home
last modified time | relevance | path

Searched refs:digest_type (Results 1 – 7 of 7) sorted by relevance

/system/keymaster/
Dkdf.cpp23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument
27 switch (digest_type) { in Init()
30 digest_type_ = digest_type; in Init()
34 digest_type_ = digest_type; in Init()
Diso18033kdf.h38 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument
39 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
Dkdf1_test.cpp32 keymaster_digest_t digest_type; member
52 kdf1.Init(test.digest_type, reinterpret_cast<const uint8_t*>(key.data()), key.size())); in TEST()
Dkdf2_test.cpp33 keymaster_digest_t digest_type; member
77 kdf2.Init(test.digest_type, reinterpret_cast<const uint8_t*>(key.data()), key.size())); in TEST()
Dkdf.h35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
/system/security/softkeymaster/
Dkeymaster_openssl.cpp470 if (sign_params->digest_type != DIGEST_NONE) { in sign_dsa()
471 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_dsa()
502 if (sign_params->digest_type != DIGEST_NONE) { in sign_ec()
503 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_ec()
534 if (sign_params->digest_type != DIGEST_NONE) { in sign_rsa()
535 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_rsa()
608 if (sign_params->digest_type != DIGEST_NONE) { in verify_dsa()
609 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in verify_dsa()
630 if (sign_params->digest_type != DIGEST_NONE) { in verify_ec()
631 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in verify_ec()
[all …]
/system/core/trusty/keymaster/
Dtrusty_keymaster_device.cpp495 if (rsa_params->digest_type != DIGEST_NONE) in StoreSigningParams()
506 if (ecdsa_params->digest_type != DIGEST_NONE) in StoreSigningParams()