Searched refs:digest_len (Results 1 - 11 of 11) sorted by relevance

/system/keymaster/km_openssl/
H A Dhmac.cpp50 bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const {
51 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len);
55 size_t digest_len) const {
56 assert(digest_len);
60 if (digest_len >= SHA256_DIGEST_LENGTH)
66 if (digest_len < SHA256_DIGEST_LENGTH)
67 memcpy(out_digest, tmp, digest_len);
78 size_t digest_len) const {
79 if (digest_len != SHA256_DIGEST_LENGTH)
H A Dhmac_operation.cpp171 unsigned int digest_len; local
172 if (!HMAC_Final(&ctx_, digest, &digest_len)) return TranslateLastOpenSslError();
176 if (mac_length_ > digest_len) return KM_ERROR_UNSUPPORTED_MAC_LENGTH;
182 if (siglen > digest_len || siglen < kMinHmacLengthBits / 8)
H A Dsoft_keymaster_enforcement.cpp103 unsigned digest_len = SHA256_DIGEST_LENGTH; local
104 if (!output->Reset(digest_len)) return KM_ERROR_MEMORY_ALLOCATION_FAILED;
118 if (!HMAC_Final(ctx.get(), output->writable_data(), &digest_len)) {
122 if (digest_len != output->data_length) return KM_ERROR_UNKNOWN_ERROR;
/system/keymaster/include/keymaster/km_openssl/
H A Dhmac.h38 // method. At most |digest_len| bytes of the resulting digest are written
40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const;
41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const;
51 size_t digest_len) const;
/system/keymaster/include/keymaster/legacy_support/
H A Dkeymaster0_engine.h76 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
H A Dkeymaster1_engine.h107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
/system/keymaster/legacy_support/
H A Dkeymaster0_engine.cpp253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
255 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned)digest_len, ec_key);
257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key);
343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
353 if (digest_len > max_input_len)
354 digest_len = max_input_len;
359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
378 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, ec_key);
H A Dkeymaster1_engine.cpp334 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
342 if (digest_len > max_input_len)
343 digest_len = max_input_len;
345 keymaster_blob_t input = {digest, digest_len};
/system/netd/tests/dns_responder/
H A Ddns_tls_frontend.cpp49 unsigned int digest_len = 0; local
50 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL);
55 if (digest_len != out->size()) {
56 ALOGE("Wrong digest length: %d", digest_len);
/system/security/keystore-engine/
H A Dandroid_engine.cpp142 /* ecdsa_sign signs |digest_len| bytes from |digest| with |ec_key| and writes
145 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
147 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned) digest_len, ec_key);
162 key_id, digest, digest_len, &reply, &reply_len);
178 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len,
/system/netd/server/dns/
H A DDnsTlsSocket.cpp119 unsigned int digest_len = 0; local
120 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL);
125 if (digest_len != out->size()) {
126 ALOGW("Wrong digest length: %d", digest_len);

Completed in 145 milliseconds