Searched defs:signature (Results 1 - 6 of 6) sorted by relevance

/system/core/libmincrypt/
H A Drsa.c145 // Expected PKCS1.5 signature padding bytes, for a keytool RSA signature.
188 // SHA-1 of PKCS1.5 signature sha_padding for 2048 bit, as above.
233 // SHA-256 of PKCS1.5 signature sha256_padding for 2048 bit, as above.
242 // Verify a 2048-bit RSA PKCS1.5 signature against an expected hash.
250 const uint8_t *signature,
276 buf[i] = signature[i];
249 RSA_verify(const RSAPublicKey *key, const uint8_t *signature, const int len, const uint8_t *hash, const int hash_len) argument
/system/core/fs_mgr/
H A Dfs_mgr_verity.c86 static int verify_table(char *signature, char *table, int table_length) argument
105 (uint8_t*) signature,
150 static int read_verity_metadata(char *block_device, char **signature, char **table) argument
195 // get the signature
196 *signature = (char*) malloc(RSANUMBYTES * sizeof(char));
197 if (!*signature) {
198 ERROR("Couldn't allocate memory for signature!\n");
201 if (!fread(*signature, RSANUMBYTES, 1, device)) {
202 ERROR("Couldn't read signature from verity metadata!\n");
203 free(*signature);
[all...]
/system/core/libmincrypt/test/
H A Drsa_test.c800 unsigned char* signature; local
806 signature = parsehex(signature_##n, &slen); \
807 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \
/system/security/keystore/
H A DIKeystoreService.cpp383 const uint8_t* signature, size_t signatureLength)
395 memcpy(buf, signature, signatureLength);
382 verify(const String16& name, const uint8_t* in, size_t inLength, const uint8_t* signature, size_t signatureLength) argument
H A Dkeystore.cpp1940 const uint8_t* signature, size_t signatureLength) {
1978 dataLength, signature, signatureLength);
1981 dataLength, signature, signatureLength);
1939 verify(const String16& name, const uint8_t* data, size_t dataLength, const uint8_t* signature, size_t signatureLength) argument
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp599 ALOGW("output signature buffer == NULL");
625 const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature,
638 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) {
647 const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature,
660 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= 0) {
669 const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature,
678 ALOGW("signed data length must be signature length");
695 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) {
713 const uint8_t* signature, const size_t signatureLength) {
715 if (signedData == NULL || signature
624 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
646 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
668 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
709 openssl_verify_data(const keymaster_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
[all...]

Completed in 173 milliseconds