/system/keymaster/km_openssl/ |
D | hmac.cpp | 50 bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const { in Sign() 51 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len); in Sign() 55 size_t digest_len) const { in Sign() 56 assert(digest_len); in Sign() 60 if (digest_len >= SHA256_DIGEST_LENGTH) in Sign() 66 if (digest_len < SHA256_DIGEST_LENGTH) in Sign() 67 memcpy(out_digest, tmp, digest_len); in Sign() 78 size_t digest_len) const { in Verify() 79 if (digest_len != SHA256_DIGEST_LENGTH) in Verify()
|
D | hmac_operation.cpp | 171 unsigned int digest_len; in Finish() local 172 if (!HMAC_Final(&ctx_, digest, &digest_len)) return TranslateLastOpenSslError(); in Finish() 176 if (mac_length_ > digest_len) return KM_ERROR_UNSUPPORTED_MAC_LENGTH; in Finish() 182 if (siglen > digest_len || siglen < kMinHmacLengthBits / 8) in Finish()
|
D | soft_keymaster_enforcement.cpp | 99 unsigned digest_len = SHA256_DIGEST_LENGTH; in hmacSha256() local 100 if (!output->Reset(digest_len)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in hmacSha256() 115 if (!HMAC_Final(ctx.get(), output->writable_data(), &digest_len)) { in hmacSha256() 119 if (digest_len != output->data_length) return KM_ERROR_UNKNOWN_ERROR; in hmacSha256()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | hmac.h | 40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const; 41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const; 51 size_t digest_len) const;
|
/system/keymaster/legacy_support/ |
D | keymaster0_engine.cpp | 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 255 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned)digest_len, ec_key); in ecdsa_sign() 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); in ecdsa_sign() 343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in EcdsaSign() argument 353 if (digest_len > max_input_len) in EcdsaSign() 354 digest_len = max_input_len; in EcdsaSign() 359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, in EcdsaSign() 378 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, ec_key); in EcdsaSign()
|
D | keymaster1_engine.cpp | 334 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 342 if (digest_len > max_input_len) in ecdsa_sign() 343 digest_len = max_input_len; in ecdsa_sign() 345 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign()
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster0_engine.h | 76 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
D | keymaster1_engine.h | 107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 144 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 146 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned) digest_len, ec_key); in ecdsa_sign() 161 key_id, digest, digest_len, &reply, &reply_len); in ecdsa_sign() 177 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, in ecdsa_sign()
|
/system/netd/resolv/dns_responder/ |
D | dns_tls_frontend.cpp | 50 unsigned int digest_len = 0; in getSPKIDigest() local 51 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), nullptr); in getSPKIDigest() 56 if (digest_len != out->size()) { in getSPKIDigest() 57 ALOGE("Wrong digest length: %d", digest_len); in getSPKIDigest()
|
/system/netd/resolv/ |
D | DnsTlsSocket.cpp | 118 unsigned int digest_len = 0; in getSPKIDigest() local 119 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), nullptr); in getSPKIDigest() 124 if (digest_len != out->size()) { in getSPKIDigest() 125 ALOGW("Wrong digest length: %d", digest_len); in getSPKIDigest()
|