Searched refs:signatureLength (Results 1 – 3 of 3) sorted by relevance
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 607 const uint8_t* signature, const size_t signatureLength) { in verify_dsa() argument 619 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { in verify_dsa() 629 const uint8_t* signature, const size_t signatureLength) { in verify_ec() argument 641 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= in verify_ec() 652 const uint8_t* signature, const size_t signatureLength) { in verify_rsa() argument 659 } else if (signatureLength != signedDataLength) { in verify_rsa() 677 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { in verify_rsa() 693 const uint8_t* signature, const size_t signatureLength) { in openssl_verify_data() argument 709 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() 714 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() [all …]
|
/system/security/softkeymaster/include/keymaster/ |
D | softkeymaster.h | 39 const size_t signatureLength);
|
/system/core/trusty/keymaster/ |
D | trusty_keymaster_device.cpp | 433 const uint8_t* signature, const size_t signatureLength) { in verify_data() argument 435 signedDataLength, signature, signatureLength); in verify_data()
|