Home
last modified time | relevance | path

Searched refs:digest_type (Results 1 – 7 of 7) sorted by relevance

/system/keymaster/
Dkdf.cpp23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument
27 switch (digest_type) { in Init()
30 digest_type_ = digest_type; in Init()
34 digest_type_ = digest_type; in Init()
Diso18033kdf.h38 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument
39 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
Dkdf1_test.cpp32 keymaster_digest_t digest_type; member
52 kdf1.Init(test.digest_type, reinterpret_cast<const uint8_t*>(key.data()), key.size())); in TEST()
Dkdf2_test.cpp33 keymaster_digest_t digest_type; member
77 kdf2.Init(test.digest_type, reinterpret_cast<const uint8_t*>(key.data()), key.size())); in TEST()
Dkdf.h35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
/system/security/softkeymaster/
Dkeymaster_openssl.cpp476 if (sign_params->digest_type != DIGEST_NONE) { in sign_dsa()
477 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_dsa()
508 if (sign_params->digest_type != DIGEST_NONE) { in sign_ec()
509 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_ec()
540 if (sign_params->digest_type != DIGEST_NONE) { in sign_rsa()
541 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_rsa()
614 if (sign_params->digest_type != DIGEST_NONE) { in verify_dsa()
615 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in verify_dsa()
636 if (sign_params->digest_type != DIGEST_NONE) { in verify_ec()
637 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in verify_ec()
[all …]
/system/vold/
Dcryptfs.c341 params.digest_type = DIGEST_NONE; in keymaster_sign_object()