Searched defs:signature (Results 1 - 17 of 17) sorted by relevance

/system/keymaster/
H A Ddsa_operation.cpp46 keymaster_error_t DsaSignOperation::Finish(const Buffer& /* signature */, Buffer* output) {
56 keymaster_error_t DsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { argument
61 signature.peek_read(), signature.available_read(), dsa_key_);
H A Decdsa_operation.cpp46 keymaster_error_t EcdsaSignOperation::Finish(const Buffer& /* signature */, Buffer* output) {
56 keymaster_error_t EcdsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { argument
58 signature.peek_read(), signature.available_read(), ecdsa_key_);
H A Drsa_operation.cpp51 keymaster_error_t RsaSignOperation::Finish(const Buffer& /* signature */, Buffer* output) {
62 keymaster_error_t RsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { argument
66 if (data_.available_read() != signature.available_read())
70 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(),
H A Dgoogle_keymaster_test.cpp446 Buffer* signature() { function in class:keymaster::test::SigningOperationsTest
671 ASSERT_TRUE(signature() != NULL);
694 finish_request.signature.Reinitialize(*signature());
707 ASSERT_TRUE(signature() != NULL);
730 finish_request.signature.Reinitialize(*signature());
743 ASSERT_TRUE(signature() != NULL);
766 finish_request.signature.Reinitialize(*signature());
[all...]
/system/core/libmincrypt/
H A Drsa.c145 // Expected PKCS1.5 signature padding bytes, for a keytool RSA signature.
188 // SHA-1 of PKCS1.5 signature sha_padding for 2048 bit, as above.
233 // SHA-256 of PKCS1.5 signature sha256_padding for 2048 bit, as above.
242 // Verify a 2048-bit RSA PKCS1.5 signature against an expected hash.
250 const uint8_t *signature,
276 buf[i] = signature[i];
249 RSA_verify(const RSAPublicKey *key, const uint8_t *signature, const int len, const uint8_t *hash, const int hash_len) argument
/system/extras/verity/
H A DKeystoreSigner.java89 private BootSignature signature; field in class:BootKeystore
120 v.add(signature);
140 signature = new BootSignature(sig.getEncoded());
145 return Utils.verify(signature.getPublicKey(), innerKeystore,
146 signature.getSignature(), signature.getAlgorithmIdentifier());
152 signature = new BootSignature("keystore", innerKeystore.length);
153 signature.setCertificate(certificate);
154 signature.setSignature(rawSignature,
H A DBootSignature.java60 * signature ::= OCTET STRING
71 private DEROctetString signature; field in class:BootSignature
89 * @param signature Signature footer
91 public BootSignature(byte[] signature) argument
93 ASN1InputStream stream = new ASN1InputStream(signature);
117 this.signature = (DEROctetString) sequence.getObjectAt(4);
140 return signature.getOctets();
145 signature = new DEROctetString(sig);
174 return Utils.verify(publicKey, signable, signature.getOctets(),
184 v.add(signature);
[all...]
H A DUtils.java229 static boolean verify(PublicKey key, byte[] input, byte[] signature, argument
241 return verifier.verify(signature);
/system/core/libmincrypt/test/
H A Decdsa_test.c85 // Same as signature 1, but with leading zeroes.
110 // Excessive zeroes on the signature
224 unsigned char* signature; local
269 signature = parsehex(signature_##n, &slen); \
270 int result = dsa_sig_unpack(signature, slen, &r, &s); \
274 free(signature); \
H A Drsa_test.c804 unsigned char* signature; local
810 signature = parsehex(signature_##n, &slen); \
811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \
/system/core/fastbootd/commands/
H A Dpartitions.h81 uint8_t signature[8]; member in struct:GPT_header
/system/core/fs_mgr/
H A Dfs_mgr_verity.c86 static int verify_table(char *signature, char *table, int table_length) argument
104 (uint8_t*) signature,
150 static int read_verity_metadata(char *block_device, char **signature, char **table) argument
158 *signature = 0;
209 // get the signature
210 *signature = (char*) malloc(RSANUMBYTES);
211 if (!*signature) {
212 ERROR("Couldn't allocate memory for signature!\n");
215 if (TEMP_FAILURE_RETRY(read(device, *signature, RSANUMBYTES)) != RSANUMBYTES) {
216 ERROR("Couldn't read signature fro
[all...]
/system/keymaster/include/keymaster/
H A Dgoogle_keymaster_messages.h210 Buffer signature; member in struct:keymaster::FinishOperationRequest
/system/security/keystore/
H A DIKeystoreService.cpp383 const uint8_t* signature, size_t signatureLength)
395 memcpy(buf, signature, signatureLength);
382 verify(const String16& name, const uint8_t* in, size_t inLength, const uint8_t* signature, size_t signatureLength) argument
H A Dkeystore.cpp2050 const uint8_t* signature, size_t signatureLength) {
2089 dataLength, signature, signatureLength);
2092 dataLength, signature, signatureLength);
2049 verify(const String16& name, const uint8_t* data, size_t dataLength, const uint8_t* signature, size_t signatureLength) argument
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp596 ALOGW("output signature buffer == NULL");
629 const uint8_t* signature, const size_t signatureLength) {
641 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) {
651 const uint8_t* signature, const size_t signatureLength) {
663 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <=
674 const uint8_t* signature, const size_t signatureLength) {
682 ALOGW("signed data length must be signature length");
699 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) {
715 const uint8_t* signature, const size_t signatureLength) {
717 if (signedData == NULL || signature
627 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
649 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
672 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
712 openssl_verify_data( const keymaster_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
[all...]
/system/vold/
H A Dcryptfs.c200 unsigned char **signature,
275 signature,
1223 unsigned char* signature; local
1247 &signature, &signature_size)) {
1252 rc = crypto_scrypt(signature, signature_size, salt, SALT_LEN,
1254 free(signature);
197 keymaster_sign_object(struct crypt_mnt_ftr *ftr, const unsigned char *object, const size_t object_size, unsigned char **signature, size_t *signature_size) argument

Completed in 332 milliseconds