/system/keymaster/km_openssl/ |
H A D | hmac.cpp | 50 bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const { 51 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len); 55 size_t digest_len) const { 56 assert(digest_len); 60 if (digest_len >= SHA256_DIGEST_LENGTH) 66 if (digest_len < SHA256_DIGEST_LENGTH) 67 memcpy(out_digest, tmp, digest_len); 78 size_t digest_len) const { 79 if (digest_len != SHA256_DIGEST_LENGTH)
|
H A D | hmac_operation.cpp | 171 unsigned int digest_len; local 172 if (!HMAC_Final(&ctx_, digest, &digest_len)) return TranslateLastOpenSslError(); 176 if (mac_length_ > digest_len) return KM_ERROR_UNSUPPORTED_MAC_LENGTH; 182 if (siglen > digest_len || siglen < kMinHmacLengthBits / 8)
|
H A D | soft_keymaster_enforcement.cpp | 103 unsigned digest_len = SHA256_DIGEST_LENGTH; local 104 if (!output->Reset(digest_len)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; 118 if (!HMAC_Final(ctx.get(), output->writable_data(), &digest_len)) { 122 if (digest_len != output->data_length) return KM_ERROR_UNKNOWN_ERROR;
|
/system/keymaster/include/keymaster/km_openssl/ |
H A D | hmac.h | 38 // method. At most |digest_len| bytes of the resulting digest are written 40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const; 41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const; 51 size_t digest_len) const;
|
/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster0_engine.h | 76 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
H A D | keymaster1_engine.h | 107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
|
/system/keymaster/legacy_support/ |
H A D | keymaster0_engine.cpp | 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 255 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned)digest_len, ec_key); 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); 343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 353 if (digest_len > max_input_len) 354 digest_len = max_input_len; 359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, 378 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, ec_key);
|
H A D | keymaster1_engine.cpp | 334 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 342 if (digest_len > max_input_len) 343 digest_len = max_input_len; 345 keymaster_blob_t input = {digest, digest_len};
|
/system/netd/tests/dns_responder/ |
H A D | dns_tls_frontend.cpp | 49 unsigned int digest_len = 0; local 50 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL); 55 if (digest_len != out->size()) { 56 ALOGE("Wrong digest length: %d", digest_len);
|
/system/security/keystore-engine/ |
H A D | android_engine.cpp | 142 /* ecdsa_sign signs |digest_len| bytes from |digest| with |ec_key| and writes 145 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 147 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned) digest_len, ec_key); 162 key_id, digest, digest_len, &reply, &reply_len); 178 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len,
|
/system/netd/server/dns/ |
H A D | DnsTlsSocket.cpp | 119 unsigned int digest_len = 0; local 120 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL); 125 if (digest_len != out->size()) { 126 ALOGW("Wrong digest length: %d", digest_len);
|