Searched refs:digest_type (Results 1 – 7 of 7) sorted by relevance
/system/keymaster/ |
D | kdf.cpp | 23 bool Kdf::Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len, in Init() argument 27 switch (digest_type) { in Init() 30 digest_type_ = digest_type; in Init() 34 digest_type_ = digest_type; in Init()
|
D | iso18033kdf.h | 38 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len) { in Init() argument 39 return Kdf::Init(digest_type, secret, secret_len, nullptr /* salt */, 0 /* salt_len */); in Init()
|
D | kdf1_test.cpp | 32 keymaster_digest_t digest_type; member 52 kdf1.Init(test.digest_type, reinterpret_cast<const uint8_t*>(key.data()), key.size())); in TEST()
|
D | kdf2_test.cpp | 33 keymaster_digest_t digest_type; member 77 kdf2.Init(test.digest_type, reinterpret_cast<const uint8_t*>(key.data()), key.size())); in TEST()
|
D | kdf.h | 35 bool Init(keymaster_digest_t digest_type, const uint8_t* secret, size_t secret_len,
|
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 476 if (sign_params->digest_type != DIGEST_NONE) { in sign_dsa() 477 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_dsa() 508 if (sign_params->digest_type != DIGEST_NONE) { in sign_ec() 509 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_ec() 540 if (sign_params->digest_type != DIGEST_NONE) { in sign_rsa() 541 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in sign_rsa() 614 if (sign_params->digest_type != DIGEST_NONE) { in verify_dsa() 615 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in verify_dsa() 636 if (sign_params->digest_type != DIGEST_NONE) { in verify_ec() 637 ALOGW("Cannot handle digest type %d", sign_params->digest_type); in verify_ec() [all …]
|
/system/vold/ |
D | cryptfs.c | 341 params.digest_type = DIGEST_NONE; in keymaster_sign_object()
|