Lines Matching refs:digest
401 keymaster_digest_t digest) { in SignMessage() argument
404 input_params.push_back(TAG_DIGEST, digest); in SignMessage()
413 keymaster_digest_t digest, keymaster_padding_t padding) { in SignMessage() argument
416 input_params.push_back(TAG_DIGEST, digest); in SignMessage()
437 keymaster_digest_t digest) { in VerifyMessage() argument
440 input_params.push_back(TAG_DIGEST, digest); in VerifyMessage()
448 keymaster_digest_t digest, keymaster_padding_t padding) { in VerifyMessage() argument
451 input_params.push_back(TAG_DIGEST, digest); in VerifyMessage()
482 string Keymaster2Test::EncryptMessage(const string& message, keymaster_digest_t digest, in EncryptMessage() argument
485 return EncryptMessage(update_params, message, digest, padding, generated_nonce); in EncryptMessage()
495 keymaster_digest_t digest, keymaster_padding_t padding, in EncryptMessage() argument
500 begin_params.push_back(TAG_DIGEST, digest); in EncryptMessage()
548 string Keymaster2Test::DecryptMessage(const string& ciphertext, keymaster_digest_t digest, in DecryptMessage() argument
553 begin_params.push_back(TAG_DIGEST, digest); in DecryptMessage()
568 string Keymaster2Test::DecryptMessage(const string& ciphertext, keymaster_digest_t digest, in DecryptMessage() argument
573 begin_params.push_back(TAG_DIGEST, digest); in DecryptMessage()
591 const string& ciphertext, keymaster_digest_t digest, in DecryptMessage() argument
596 begin_params.push_back(TAG_DIGEST, digest); in DecryptMessage()
629 keymaster_digest_t digest, string expected_mac) { in CheckHmacTestVector() argument
633 .Digest(digest), in CheckHmacTestVector()
637 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest; in CheckHmacTestVector()
735 static bool is_supported(keymaster_digest_t digest) { in is_supported() argument
736 return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256; in is_supported()
803 [](keymaster_digest_t digest) { return is_supported(digest); }); in get_supported_digests() argument