Lines Matching defs:signature
35 // Overhead for PKCS#1 v1.5 signature padding of undigested messages. Digested messages have
293 const Buffer& input, const Buffer& /* signature */,
372 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1)
416 const Buffer& input, const Buffer& signature,
424 return VerifyUndigested(signature);
426 return VerifyDigested(signature);
429 keymaster_error_t RsaVerifyOperation::VerifyUndigested(const Buffer& signature) {
440 if (key_len != signature.available_read())
459 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(),
481 keymaster_error_t RsaVerifyOperation::VerifyDigested(const Buffer& signature) {
482 if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), signature.available_read()))
521 const Buffer& input, const Buffer& /* signature */,
574 const Buffer& input, const Buffer& /* signature */,