Lines Matching refs:key_len
334 size_t key_len = EVP_PKEY_size(rsa_key_); in SignUndigested() local
340 if (data_.available_read() > key_len) { in SignUndigested()
342 } else if (data_.available_read() < key_len) { in SignUndigested()
343 keymaster_error_t error = zero_pad_left(&zero_padded, key_len, data_); in SignUndigested()
348 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), in SignUndigested()
354 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in SignUndigested()
438 size_t key_len = RSA_size(rsa.get()); in VerifyUndigested() local
442 if (data_.available_read() > key_len) in VerifyUndigested()
444 if (key_len != signature.available_read()) in VerifyUndigested()
449 if (data_.available_read() + kPkcs1UndigestedSignaturePaddingOverhead > key_len) { in VerifyUndigested()
451 data_.available_read(), key_len * 8); in VerifyUndigested()
460 UniquePtr<uint8_t[]> decrypted_data(new (std::nothrow) uint8_t[key_len]); in VerifyUndigested()