/system/core/libmincrypt/ |
H A D | rsa.c | 145 // Expected PKCS1.5 signature padding bytes, for a keytool RSA signature. 188 // SHA-1 of PKCS1.5 signature sha_padding for 2048 bit, as above. 233 // SHA-256 of PKCS1.5 signature sha256_padding for 2048 bit, as above. 242 // Verify a 2048-bit RSA PKCS1.5 signature against an expected hash. 250 const uint8_t *signature, 276 buf[i] = signature[i]; 249 RSA_verify(const RSAPublicKey *key, const uint8_t *signature, const int len, const uint8_t *hash, const int hash_len) argument
|
/system/core/fs_mgr/ |
H A D | fs_mgr_verity.c | 86 static int verify_table(char *signature, char *table, int table_length) argument 105 (uint8_t*) signature, 150 static int read_verity_metadata(char *block_device, char **signature, char **table) argument 195 // get the signature 196 *signature = (char*) malloc(RSANUMBYTES * sizeof(char)); 197 if (!*signature) { 198 ERROR("Couldn't allocate memory for signature!\n"); 201 if (!fread(*signature, RSANUMBYTES, 1, device)) { 202 ERROR("Couldn't read signature from verity metadata!\n"); 203 free(*signature); [all...] |
/system/core/libmincrypt/test/ |
H A D | rsa_test.c | 800 unsigned char* signature; local 806 signature = parsehex(signature_##n, &slen); \ 807 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \
|
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 383 const uint8_t* signature, size_t signatureLength) 395 memcpy(buf, signature, signatureLength); 382 verify(const String16& name, const uint8_t* in, size_t inLength, const uint8_t* signature, size_t signatureLength) argument
|
H A D | keystore.cpp | 1940 const uint8_t* signature, size_t signatureLength) { 1978 dataLength, signature, signatureLength); 1981 dataLength, signature, signatureLength); 1939 verify(const String16& name, const uint8_t* data, size_t dataLength, const uint8_t* signature, size_t signatureLength) argument
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 599 ALOGW("output signature buffer == NULL"); 625 const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, 638 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { 647 const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, 660 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= 0) { 669 const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, 678 ALOGW("signed data length must be signature length"); 695 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { 713 const uint8_t* signature, const size_t signatureLength) { 715 if (signedData == NULL || signature 624 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 646 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 668 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 709 openssl_verify_data(const keymaster_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument [all...] |