/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 613 const uint8_t* signature, const size_t signatureLength) { 625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { 635 const uint8_t* signature, const size_t signatureLength) { 647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= 658 const uint8_t* signature, const size_t signatureLength) { 665 } else if (signatureLength != signedDataLength) { 683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { 699 const uint8_t* signature, const size_t signatureLength) { 715 signedData, signedDataLength, signature, signatureLength); 720 signedData, signedDataLength, signature, signatureLength); 611 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 633 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 656 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 696 openssl_verify_data( const keymaster0_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument [all...] |
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 799 const uint8_t* signature, size_t signatureLength) 809 data.writeInt32(signatureLength); 810 buf = data.writeInplace(signatureLength); 811 memcpy(buf, signature, signatureLength); 1199 const uint8_t* signature, size_t signatureLength, 1211 data.writeByteArray(signatureLength, signature); 1788 size_t signatureLength = 0; local 1789 readByteArray(data, &signature, &signatureLength); 1794 finish(token, args, signature, signatureLength, entropy, entropyLength, &result); 798 verify(const String16& name, const uint8_t* in, size_t inLength, const uint8_t* signature, size_t signatureLength) argument 1198 finish(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* signature, size_t signatureLength, const uint8_t* entropy, size_t entropyLength, OperationResult* result) argument
|
H A D | key_store_service.cpp | 388 const uint8_t* signature, size_t signatureLength) { 392 return doLegacySignVerify(name, data, dataLength, NULL, NULL, signature, signatureLength, 1009 const uint8_t* signature, size_t signatureLength, 1046 keymaster_blob_t sig = {signature, signatureLength}; 1479 const uint8_t* signature, size_t signatureLength, 1520 finish(token, inArgs, signature, signatureLength, NULL, 0, &result); 387 verify(const String16& name, const uint8_t* data, size_t dataLength, const uint8_t* signature, size_t signatureLength) argument 1008 finish(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* signature, size_t signatureLength, const uint8_t* entropy, size_t entropyLength, OperationResult* result) argument 1477 doLegacySignVerify(const String16& name, const uint8_t* data, size_t length, uint8_t** out, size_t* outLength, const uint8_t* signature, size_t signatureLength, keymaster_purpose_t purpose) argument
|