Searched refs:signature (Results 1 - 25 of 47) sorted by relevance

12

/system/core/include/mincrypt/
H A Drsa.h49 const uint8_t* signature,
/system/extras/verity/
H A DVeritySigner.java48 byte[] signature = Utils.read(args[2]);
51 if (Utils.verify(publicKey, content, signature,
65 byte[] signature = Utils.sign(privateKey, content);
66 Utils.write(signature, args[2]);
H A Dbuild_verity_metadata.py23 def build_metadata_block(verity_table, signature):
25 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len)
56 # build the verity table signature
57 signature = sign_verity_table(verity_table, signer_path, signing_key)
59 metadata_block = build_metadata_block(verity_table, signature)
H A DKeystoreSigner.java89 private BootSignature signature; field in class:BootKeystore
120 v.add(signature);
140 signature = new BootSignature(sig.getEncoded());
145 return Utils.verify(signature.getPublicKey(), innerKeystore,
146 signature.getSignature(), signature.getAlgorithmIdentifier());
152 signature = new BootSignature("keystore", innerKeystore.length);
153 signature.setCertificate(certificate);
154 signature.setSignature(rawSignature,
H A DBootSignature.java60 * signature ::= OCTET STRING
71 private DEROctetString signature; field in class:BootSignature
89 * @param signature Signature footer
91 public BootSignature(byte[] signature) argument
93 ASN1InputStream stream = new ASN1InputStream(signature);
117 this.signature = (DEROctetString) sequence.getObjectAt(4);
140 return signature.getOctets();
145 signature = new DEROctetString(sig);
174 return Utils.verify(publicKey, signable, signature.getOctets(),
184 v.add(signature);
[all...]
H A Dverify_boot_signature.c60 ASN1_OCTET_STRING *signature;
68 ASN1_SIMPLE(BootSignature, signature, ASN1_OCTET_STRING)
95 * based on the boot image header. The signature will start after the
135 * @param offset Offset from the beginning of file to the signature
166 * Validates the format of the boot signature block, and checks that
169 * @param bs The boot signature block to validate
170 * @param length The actual length of the boot image without the signature
194 printf("Unsupported signature version\n");
209 printf("Image length doesn't match signature attributes\n");
226 * @param length Length of the boot image without the signature bloc
[all...]
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h34 // fields included in signature
39 // fields not included in signature
41 uint8_t signature[32]; member in struct:gatekeeper::password_handle_t
H A Dgatekeeper.h81 * Uses platform-specific routines to compute a signature on the provided password.
87 * Writes the signature_length size signature to the 'signature' pointer.
89 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length,
102 * Uses platform-specific routines to compute a signature on the provided message.
104 * Writes the signature_length size signature to the 'signature' pointer.
106 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length,
/system/keymaster/
H A Dandroid_keymaster_test_utils.cpp274 keymaster_error_t Keymaster1Test::FinishOperation(const string& signature, string* output) { argument
277 return FinishOperation(additional_params, signature, &output_params, output);
281 const string& signature,
283 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()),
284 signature.length()};
335 const string& signature, const AuthorizationSet& begin_params,
345 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, signature, &result));
350 const string& signature) {
357 EXPECT_EQ(KM_ERROR_OK, FinishOperation(signature, &result));
361 void Keymaster1Test::SignMessage(const string& message, string* signature, argument
280 FinishOperation(const AuthorizationSet& additional_params, const string& signature, AuthorizationSet* output_params, string* output) argument
334 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* output_params) argument
349 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature) argument
373 SignMessage(const string& message, string* signature, keymaster_digest_t digest, keymaster_padding_t padding) argument
386 MacMessage(const string& message, string* signature, size_t mac_length) argument
397 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest) argument
408 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest, keymaster_padding_t padding) argument
420 VerifyMac(const string& message, const string& signature) argument
588 string signature; local
[all...]
H A Dkeymaster0_engine.cpp282 unique_ptr<uint8_t[], Malloc_Delete>* signature,
293 signature->reset(signed_data);
322 unique_ptr<uint8_t[], Malloc_Delete> signature; local
324 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length))
326 Eraser eraser(signature.get(), signature_length);
333 memcpy(out, signature.get() + signature_length - len, len);
340 memcpy(out + len - signature_length, signature.get(), signature_length);
342 memcpy(out, signature.get(), len);
374 unique_ptr<uint8_t[], Malloc_Delete> signature; local
376 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
280 Keymaster0Sign(const void* signing_params, const keymaster_key_blob_t& blob, const uint8_t* data, const size_t data_length, unique_ptr<uint8_t[], Malloc_Delete>* signature, size_t* signature_length) const argument
[all...]
H A Dandroid_keymaster_test.cpp526 string signature; local
527 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE);
540 string signature; local
541 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS);
553 string signature; local
567 string signature; local
568 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN);
580 string signature; local
581 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN);
601 string signature; local
616 string signature; local
630 string signature; local
706 string signature; local
731 string signature; local
742 string signature; local
753 string signature; local
781 string signature; local
809 string signature; local
822 string signature; local
835 string signature; local
849 string signature; local
862 string signature; local
876 string signature; local
1168 string signature; local
1183 string signature; local
1197 string signature; local
1223 string signature; local
1248 string signature; local
1262 string signature; local
1288 string signature; local
1393 string signature; local
1411 string signature; local
1423 string signature; local
1435 string signature; local
1453 string signature; local
1471 string signature; local
1496 string signature; local
1509 string signature; local
1522 string signature; local
1535 string signature; local
1561 string signature; local
1574 string signature; local
1687 string signature; local
1714 string signature = local
1773 string signature; local
1805 string signature; local
1857 string signature; local
3191 string signature; local
3208 string signature; local
3225 string signature; local
3245 string signature; local
3289 string signature; local
[all...]
H A Drsa_operation.h98 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
119 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
123 keymaster_error_t VerifyUndigested(const Buffer& signature);
124 keymaster_error_t VerifyDigested(const Buffer& signature);
151 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
162 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
H A Dandroid_keymaster_test_utils.h196 keymaster_error_t FinishOperation(const std::string& signature, std::string* output);
198 const std::string& signature, std::string* output) {
199 return FinishOperation(additional_params, signature, nullptr /* output_params */, output);
202 const std::string& signature, AuthorizationSet* output_params,
215 const std::string& signature, const AuthorizationSet& begin_params,
219 const std::string& signature);
221 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest);
222 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest,
224 void MacMessage(const std::string& message, std::string* signature, size_t mac_length);
226 void VerifyMessage(const std::string& message, const std::string& signature,
197 FinishOperation(const AuthorizationSet& additional_params, const std::string& signature, std::string* output) argument
431 counting_verify_data(const struct keymaster0_device* dev, const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* signed_data, const size_t signed_data_length, const uint8_t* signature, const size_t signature_length) argument
[all...]
H A Decdsa_operation.cpp138 const Buffer& /* signature */,
157 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1)
199 const Buffer& signature,
209 signature.peek_read(), signature.available_read(), ecdsa.get());
214 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(),
215 signature.available_read()))
198 Finish(const AuthorizationSet& , const Buffer& signature, AuthorizationSet* , Buffer* ) argument
H A Daes_operation.h71 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
114 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
135 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
H A Dhmac_operation.cpp164 const Buffer& signature,
179 size_t siglen = signature.available_read();
184 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0)
163 Finish(const AuthorizationSet& , const Buffer& signature, AuthorizationSet* , Buffer* output) argument
H A Dhmac_operation.h39 const Buffer& signature, AuthorizationSet* output_params,
H A Drsa_operation.cpp36 // Overhead for PKCS#1 v1.5 signature padding of undigested messages. Digested messages have
290 const Buffer& /* signature */,
365 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1)
409 const Buffer& signature,
413 return VerifyUndigested(signature);
415 return VerifyDigested(signature);
418 keymaster_error_t RsaVerifyOperation::VerifyUndigested(const Buffer& signature) { argument
429 if (key_len != signature.available_read())
448 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature
408 Finish(const AuthorizationSet& , const Buffer& signature, AuthorizationSet* , Buffer* ) argument
470 VerifyDigested(const Buffer& signature) argument
[all...]
/system/core/libmincrypt/test/
H A Decdsa_test.c85 // Same as signature 1, but with leading zeroes.
110 // Excessive zeroes on the signature
224 unsigned char* signature; local
269 signature = parsehex(signature_##n, &slen); \
270 int result = dsa_sig_unpack(signature, slen, &r, &s); \
274 free(signature); \
H A Drsa_test.c804 unsigned char* signature; local
810 signature = parsehex(signature_##n, &slen); \
811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \
/system/core/logd/
H A DLogKlog.h29 const log_time signature; member in class:LogKlog
/system/security/softkeymaster/include/keymaster/
H A Dsoftkeymaster.h38 const size_t signedDataLength, const uint8_t* signature,
/system/core/gatekeeperd/
H A DSoftGateKeeper.h79 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, argument
82 if (signature == NULL) return;
84 sizeof(salt), N, r, p, signature, signature_length);
92 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, argument
94 if (signature == NULL) return;
95 memset(signature, 0, signature_length);
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp580 ALOGW("output signature buffer == NULL");
613 const uint8_t* signature, const size_t signatureLength) {
625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) {
635 const uint8_t* signature, const size_t signatureLength) {
647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <=
658 const uint8_t* signature, const size_t signatureLength) {
666 ALOGW("signed data length must be signature length");
683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) {
699 const uint8_t* signature, const size_t signatureLength) {
700 if (signedData == NULL || signature
611 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
633 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
656 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
696 openssl_verify_data( const keymaster0_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
[all...]
/system/gatekeeper/
H A Dgatekeeper.cpp194 ComputePasswordSignature(password_handle->signature, sizeof(password_handle->signature),
211 return memcmp_s(generated_handle->signature, expected_handle->signature,
212 sizeof(expected_handle->signature)) == 0;

Completed in 257 milliseconds

12