Home
last modified time | relevance | path

Searched refs:digest_len (Results 1 – 11 of 11) sorted by relevance

/system/keymaster/km_openssl/
Dhmac.cpp50 bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const { in Sign()
51 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len); in Sign()
55 size_t digest_len) const { in Sign()
56 assert(digest_len); in Sign()
60 if (digest_len >= SHA256_DIGEST_LENGTH) in Sign()
66 if (digest_len < SHA256_DIGEST_LENGTH) in Sign()
67 memcpy(out_digest, tmp, digest_len); in Sign()
78 size_t digest_len) const { in Verify()
79 if (digest_len != SHA256_DIGEST_LENGTH) in Verify()
Dhmac_operation.cpp171 unsigned int digest_len; in Finish() local
172 if (!HMAC_Final(&ctx_, digest, &digest_len)) return TranslateLastOpenSslError(); in Finish()
176 if (mac_length_ > digest_len) return KM_ERROR_UNSUPPORTED_MAC_LENGTH; in Finish()
182 if (siglen > digest_len || siglen < kMinHmacLengthBits / 8) in Finish()
Dsoft_keymaster_enforcement.cpp99 unsigned digest_len = SHA256_DIGEST_LENGTH; in hmacSha256() local
100 if (!output->Reset(digest_len)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in hmacSha256()
115 if (!HMAC_Final(ctx.get(), output->writable_data(), &digest_len)) { in hmacSha256()
119 if (digest_len != output->data_length) return KM_ERROR_UNKNOWN_ERROR; in hmacSha256()
/system/keymaster/include/keymaster/km_openssl/
Dhmac.h40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const;
41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const;
51 size_t digest_len) const;
/system/keymaster/legacy_support/
Dkeymaster0_engine.cpp253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument
255 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned)digest_len, ec_key); in ecdsa_sign()
257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); in ecdsa_sign()
343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in EcdsaSign() argument
353 if (digest_len > max_input_len) in EcdsaSign()
354 digest_len = max_input_len; in EcdsaSign()
359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, in EcdsaSign()
378 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, ec_key); in EcdsaSign()
Dkeymaster1_engine.cpp334 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument
342 if (digest_len > max_input_len) in ecdsa_sign()
343 digest_len = max_input_len; in ecdsa_sign()
345 keymaster_blob_t input = {digest, digest_len}; in ecdsa_sign()
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster0_engine.h76 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
Dkeymaster1_engine.h107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
/system/security/keystore-engine/
Dandroid_engine.cpp144 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument
146 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned) digest_len, ec_key); in ecdsa_sign()
161 key_id, digest, digest_len, &reply, &reply_len); in ecdsa_sign()
177 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, in ecdsa_sign()
/system/netd/resolv/dns_responder/
Ddns_tls_frontend.cpp50 unsigned int digest_len = 0; in getSPKIDigest() local
51 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), nullptr); in getSPKIDigest()
56 if (digest_len != out->size()) { in getSPKIDigest()
57 ALOGE("Wrong digest length: %d", digest_len); in getSPKIDigest()
/system/netd/resolv/
DDnsTlsSocket.cpp118 unsigned int digest_len = 0; in getSPKIDigest() local
119 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), nullptr); in getSPKIDigest()
124 if (digest_len != out->size()) { in getSPKIDigest()
125 ALOGW("Wrong digest length: %d", digest_len); in getSPKIDigest()