Searched defs:signatureLength (Results 1 - 3 of 3) sorted by relevance

/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp613 const uint8_t* signature, const size_t signatureLength) {
625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) {
635 const uint8_t* signature, const size_t signatureLength) {
647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <=
658 const uint8_t* signature, const size_t signatureLength) {
665 } else if (signatureLength != signedDataLength) {
683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) {
699 const uint8_t* signature, const size_t signatureLength) {
715 signedData, signedDataLength, signature, signatureLength);
720 signedData, signedDataLength, signature, signatureLength);
611 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
633 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
656 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
696 openssl_verify_data( const keymaster0_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
[all...]
/system/security/keystore/
H A DIKeystoreService.cpp799 const uint8_t* signature, size_t signatureLength)
809 data.writeInt32(signatureLength);
810 buf = data.writeInplace(signatureLength);
811 memcpy(buf, signature, signatureLength);
1199 const uint8_t* signature, size_t signatureLength,
1211 data.writeByteArray(signatureLength, signature);
1806 size_t signatureLength = 0; local
1807 readByteArray(data, &signature, &signatureLength);
1812 finish(token, args, signature, signatureLength, entropy, entropyLength, &result);
798 verify(const String16& name, const uint8_t* in, size_t inLength, const uint8_t* signature, size_t signatureLength) argument
1198 finish(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* signature, size_t signatureLength, const uint8_t* entropy, size_t entropyLength, OperationResult* result) argument
H A Dkey_store_service.cpp396 const uint8_t* signature, size_t signatureLength) {
400 return doLegacySignVerify(name, data, dataLength, NULL, NULL, signature, signatureLength,
1095 const uint8_t* signature, size_t signatureLength,
1132 keymaster_blob_t sig = {signature, signatureLength};
1571 const uint8_t* signature, size_t signatureLength,
1612 finish(token, inArgs, signature, signatureLength, NULL, 0, &result);
395 verify(const String16& name, const uint8_t* data, size_t dataLength, const uint8_t* signature, size_t signatureLength) argument
1094 finish(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* signature, size_t signatureLength, const uint8_t* entropy, size_t entropyLength, OperationResult* result) argument
1569 doLegacySignVerify(const String16& name, const uint8_t* data, size_t length, uint8_t** out, size_t* outLength, const uint8_t* signature, size_t signatureLength, keymaster_purpose_t purpose) argument

Completed in 62 milliseconds