/system/keymaster/ |
H A D | dsa_operation.cpp | 46 keymaster_error_t DsaSignOperation::Finish(const Buffer& /* signature */, Buffer* output) { 56 keymaster_error_t DsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { argument 61 signature.peek_read(), signature.available_read(), dsa_key_);
|
H A D | ecdsa_operation.cpp | 46 keymaster_error_t EcdsaSignOperation::Finish(const Buffer& /* signature */, Buffer* output) { 56 keymaster_error_t EcdsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { argument 58 signature.peek_read(), signature.available_read(), ecdsa_key_);
|
H A D | rsa_operation.cpp | 51 keymaster_error_t RsaSignOperation::Finish(const Buffer& /* signature */, Buffer* output) { 62 keymaster_error_t RsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { argument 66 if (data_.available_read() != signature.available_read()) 70 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(),
|
H A D | google_keymaster_test.cpp | 446 Buffer* signature() { function in class:keymaster::test::SigningOperationsTest 671 ASSERT_TRUE(signature() != NULL); 694 finish_request.signature.Reinitialize(*signature()); 707 ASSERT_TRUE(signature() != NULL); 730 finish_request.signature.Reinitialize(*signature()); 743 ASSERT_TRUE(signature() != NULL); 766 finish_request.signature.Reinitialize(*signature()); [all...] |
/system/core/libmincrypt/ |
H A D | rsa.c | 145 // Expected PKCS1.5 signature padding bytes, for a keytool RSA signature. 188 // SHA-1 of PKCS1.5 signature sha_padding for 2048 bit, as above. 233 // SHA-256 of PKCS1.5 signature sha256_padding for 2048 bit, as above. 242 // Verify a 2048-bit RSA PKCS1.5 signature against an expected hash. 250 const uint8_t *signature, 276 buf[i] = signature[i]; 249 RSA_verify(const RSAPublicKey *key, const uint8_t *signature, const int len, const uint8_t *hash, const int hash_len) argument
|
/system/extras/verity/ |
H A D | KeystoreSigner.java | 89 private BootSignature signature; field in class:BootKeystore 120 v.add(signature); 140 signature = new BootSignature(sig.getEncoded()); 145 return Utils.verify(signature.getPublicKey(), innerKeystore, 146 signature.getSignature(), signature.getAlgorithmIdentifier()); 152 signature = new BootSignature("keystore", innerKeystore.length); 153 signature.setCertificate(certificate); 154 signature.setSignature(rawSignature,
|
H A D | BootSignature.java | 60 * signature ::= OCTET STRING 71 private DEROctetString signature; field in class:BootSignature 89 * @param signature Signature footer 91 public BootSignature(byte[] signature) argument 93 ASN1InputStream stream = new ASN1InputStream(signature); 117 this.signature = (DEROctetString) sequence.getObjectAt(4); 140 return signature.getOctets(); 145 signature = new DEROctetString(sig); 174 return Utils.verify(publicKey, signable, signature.getOctets(), 184 v.add(signature); [all...] |
H A D | Utils.java | 229 static boolean verify(PublicKey key, byte[] input, byte[] signature, argument 241 return verifier.verify(signature);
|
/system/core/libmincrypt/test/ |
H A D | ecdsa_test.c | 85 // Same as signature 1, but with leading zeroes. 110 // Excessive zeroes on the signature 224 unsigned char* signature; local 269 signature = parsehex(signature_##n, &slen); \ 270 int result = dsa_sig_unpack(signature, slen, &r, &s); \ 274 free(signature); \
|
H A D | rsa_test.c | 804 unsigned char* signature; local 810 signature = parsehex(signature_##n, &slen); \ 811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \
|
/system/core/fastbootd/commands/ |
H A D | partitions.h | 81 uint8_t signature[8]; member in struct:GPT_header
|
/system/core/fs_mgr/ |
H A D | fs_mgr_verity.c | 86 static int verify_table(char *signature, char *table, int table_length) argument 104 (uint8_t*) signature, 150 static int read_verity_metadata(char *block_device, char **signature, char **table) argument 158 *signature = 0; 209 // get the signature 210 *signature = (char*) malloc(RSANUMBYTES); 211 if (!*signature) { 212 ERROR("Couldn't allocate memory for signature!\n"); 215 if (TEMP_FAILURE_RETRY(read(device, *signature, RSANUMBYTES)) != RSANUMBYTES) { 216 ERROR("Couldn't read signature fro [all...] |
/system/keymaster/include/keymaster/ |
H A D | google_keymaster_messages.h | 210 Buffer signature; member in struct:keymaster::FinishOperationRequest
|
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 383 const uint8_t* signature, size_t signatureLength) 395 memcpy(buf, signature, signatureLength); 382 verify(const String16& name, const uint8_t* in, size_t inLength, const uint8_t* signature, size_t signatureLength) argument
|
H A D | keystore.cpp | 2050 const uint8_t* signature, size_t signatureLength) { 2089 dataLength, signature, signatureLength); 2092 dataLength, signature, signatureLength); 2049 verify(const String16& name, const uint8_t* data, size_t dataLength, const uint8_t* signature, size_t signatureLength) argument
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 596 ALOGW("output signature buffer == NULL"); 629 const uint8_t* signature, const size_t signatureLength) { 641 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { 651 const uint8_t* signature, const size_t signatureLength) { 663 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= 674 const uint8_t* signature, const size_t signatureLength) { 682 ALOGW("signed data length must be signature length"); 699 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { 715 const uint8_t* signature, const size_t signatureLength) { 717 if (signedData == NULL || signature 627 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 649 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 672 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 712 openssl_verify_data( const keymaster_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument [all...] |
/system/vold/ |
H A D | cryptfs.c | 200 unsigned char **signature, 275 signature, 1223 unsigned char* signature; local 1247 &signature, &signature_size)) { 1252 rc = crypto_scrypt(signature, signature_size, salt, SALT_LEN, 1254 free(signature); 197 keymaster_sign_object(struct crypt_mnt_ftr *ftr, const unsigned char *object, const size_t object_size, unsigned char **signature, size_t *signature_size) argument
|