/system/core/include/mincrypt/ |
H A D | rsa.h | 49 const uint8_t* signature,
|
/system/extras/verity/ |
H A D | VeritySigner.java | 48 byte[] signature = Utils.read(args[2]); 51 if (Utils.verify(publicKey, content, signature, 65 byte[] signature = Utils.sign(privateKey, content); 66 Utils.write(signature, args[2]);
|
H A D | build_verity_metadata.py | 23 def build_metadata_block(verity_table, signature): 25 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len) 56 # build the verity table signature 57 signature = sign_verity_table(verity_table, signer_path, signing_key) 59 metadata_block = build_metadata_block(verity_table, signature)
|
H A D | KeystoreSigner.java | 89 private BootSignature signature; field in class:BootKeystore 120 v.add(signature); 140 signature = new BootSignature(sig.getEncoded()); 145 return Utils.verify(signature.getPublicKey(), innerKeystore, 146 signature.getSignature(), signature.getAlgorithmIdentifier()); 152 signature = new BootSignature("keystore", innerKeystore.length); 153 signature.setCertificate(certificate); 154 signature.setSignature(rawSignature,
|
H A D | BootSignature.java | 60 * signature ::= OCTET STRING 71 private DEROctetString signature; field in class:BootSignature 89 * @param signature Signature footer 91 public BootSignature(byte[] signature) argument 93 ASN1InputStream stream = new ASN1InputStream(signature); 117 this.signature = (DEROctetString) sequence.getObjectAt(4); 140 return signature.getOctets(); 145 signature = new DEROctetString(sig); 174 return Utils.verify(publicKey, signable, signature.getOctets(), 184 v.add(signature); [all...] |
H A D | verify_boot_signature.c | 60 ASN1_OCTET_STRING *signature; 68 ASN1_SIMPLE(BootSignature, signature, ASN1_OCTET_STRING) 95 * based on the boot image header. The signature will start after the 135 * @param offset Offset from the beginning of file to the signature 166 * Validates the format of the boot signature block, and checks that 169 * @param bs The boot signature block to validate 170 * @param length The actual length of the boot image without the signature 194 printf("Unsupported signature version\n"); 209 printf("Image length doesn't match signature attributes\n"); 226 * @param length Length of the boot image without the signature bloc [all...] |
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 34 // fields included in signature 39 // fields not included in signature 41 uint8_t signature[32]; member in struct:gatekeeper::password_handle_t
|
H A D | gatekeeper.h | 81 * Uses platform-specific routines to compute a signature on the provided password. 87 * Writes the signature_length size signature to the 'signature' pointer. 89 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, 102 * Uses platform-specific routines to compute a signature on the provided message. 104 * Writes the signature_length size signature to the 'signature' pointer. 106 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length,
|
/system/keymaster/ |
H A D | android_keymaster_test_utils.cpp | 274 keymaster_error_t Keymaster1Test::FinishOperation(const string& signature, string* output) { argument 277 return FinishOperation(additional_params, signature, &output_params, output); 281 const string& signature, 283 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), 284 signature.length()}; 335 const string& signature, const AuthorizationSet& begin_params, 345 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, signature, &result)); 350 const string& signature) { 357 EXPECT_EQ(KM_ERROR_OK, FinishOperation(signature, &result)); 361 void Keymaster1Test::SignMessage(const string& message, string* signature, argument 280 FinishOperation(const AuthorizationSet& additional_params, const string& signature, AuthorizationSet* output_params, string* output) argument 334 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* output_params) argument 349 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature) argument 373 SignMessage(const string& message, string* signature, keymaster_digest_t digest, keymaster_padding_t padding) argument 386 MacMessage(const string& message, string* signature, size_t mac_length) argument 397 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest) argument 408 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest, keymaster_padding_t padding) argument 420 VerifyMac(const string& message, const string& signature) argument 588 string signature; local [all...] |
H A D | keymaster0_engine.cpp | 282 unique_ptr<uint8_t[], Malloc_Delete>* signature, 293 signature->reset(signed_data); 322 unique_ptr<uint8_t[], Malloc_Delete> signature; local 324 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) 326 Eraser eraser(signature.get(), signature_length); 333 memcpy(out, signature.get() + signature_length - len, len); 340 memcpy(out + len - signature_length, signature.get(), signature_length); 342 memcpy(out, signature.get(), len); 374 unique_ptr<uint8_t[], Malloc_Delete> signature; local 376 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, 280 Keymaster0Sign(const void* signing_params, const keymaster_key_blob_t& blob, const uint8_t* data, const size_t data_length, unique_ptr<uint8_t[], Malloc_Delete>* signature, size_t* signature_length) const argument [all...] |
H A D | android_keymaster_test.cpp | 526 string signature; local 527 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); 540 string signature; local 541 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); 553 string signature; local 567 string signature; local 568 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); 580 string signature; local 581 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN); 601 string signature; local 616 string signature; local 630 string signature; local 706 string signature; local 731 string signature; local 742 string signature; local 753 string signature; local 781 string signature; local 809 string signature; local 822 string signature; local 835 string signature; local 849 string signature; local 862 string signature; local 876 string signature; local 1168 string signature; local 1183 string signature; local 1197 string signature; local 1223 string signature; local 1248 string signature; local 1262 string signature; local 1288 string signature; local 1393 string signature; local 1411 string signature; local 1423 string signature; local 1435 string signature; local 1453 string signature; local 1471 string signature; local 1496 string signature; local 1509 string signature; local 1522 string signature; local 1535 string signature; local 1561 string signature; local 1574 string signature; local 1687 string signature; local 1714 string signature = local 1773 string signature; local 1805 string signature; local 1857 string signature; local 3191 string signature; local 3208 string signature; local 3225 string signature; local 3245 string signature; local 3289 string signature; local [all...] |
H A D | rsa_operation.h | 98 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 119 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 123 keymaster_error_t VerifyUndigested(const Buffer& signature); 124 keymaster_error_t VerifyDigested(const Buffer& signature); 151 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 162 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
|
H A D | android_keymaster_test_utils.h | 196 keymaster_error_t FinishOperation(const std::string& signature, std::string* output); 198 const std::string& signature, std::string* output) { 199 return FinishOperation(additional_params, signature, nullptr /* output_params */, output); 202 const std::string& signature, AuthorizationSet* output_params, 215 const std::string& signature, const AuthorizationSet& begin_params, 219 const std::string& signature); 221 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest); 222 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest, 224 void MacMessage(const std::string& message, std::string* signature, size_t mac_length); 226 void VerifyMessage(const std::string& message, const std::string& signature, 197 FinishOperation(const AuthorizationSet& additional_params, const std::string& signature, std::string* output) argument 431 counting_verify_data(const struct keymaster0_device* dev, const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* signed_data, const size_t signed_data_length, const uint8_t* signature, const size_t signature_length) argument [all...] |
H A D | ecdsa_operation.cpp | 138 const Buffer& /* signature */, 157 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 199 const Buffer& signature, 209 signature.peek_read(), signature.available_read(), ecdsa.get()); 214 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), 215 signature.available_read())) 198 Finish(const AuthorizationSet& , const Buffer& signature, AuthorizationSet* , Buffer* ) argument
|
H A D | aes_operation.h | 71 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 114 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 135 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
|
H A D | hmac_operation.cpp | 164 const Buffer& signature, 179 size_t siglen = signature.available_read(); 184 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0) 163 Finish(const AuthorizationSet& , const Buffer& signature, AuthorizationSet* , Buffer* output) argument
|
H A D | hmac_operation.h | 39 const Buffer& signature, AuthorizationSet* output_params,
|
H A D | rsa_operation.cpp | 36 // Overhead for PKCS#1 v1.5 signature padding of undigested messages. Digested messages have 290 const Buffer& /* signature */, 365 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 409 const Buffer& signature, 413 return VerifyUndigested(signature); 415 return VerifyDigested(signature); 418 keymaster_error_t RsaVerifyOperation::VerifyUndigested(const Buffer& signature) { argument 429 if (key_len != signature.available_read()) 448 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature 408 Finish(const AuthorizationSet& , const Buffer& signature, AuthorizationSet* , Buffer* ) argument 470 VerifyDigested(const Buffer& signature) argument [all...] |
/system/core/libmincrypt/test/ |
H A D | ecdsa_test.c | 85 // Same as signature 1, but with leading zeroes. 110 // Excessive zeroes on the signature 224 unsigned char* signature; local 269 signature = parsehex(signature_##n, &slen); \ 270 int result = dsa_sig_unpack(signature, slen, &r, &s); \ 274 free(signature); \
|
H A D | rsa_test.c | 804 unsigned char* signature; local 810 signature = parsehex(signature_##n, &slen); \ 811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \
|
/system/core/logd/ |
H A D | LogKlog.h | 29 const log_time signature; member in class:LogKlog
|
/system/security/softkeymaster/include/keymaster/ |
H A D | softkeymaster.h | 38 const size_t signedDataLength, const uint8_t* signature,
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 79 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, argument 82 if (signature == NULL) return; 84 sizeof(salt), N, r, p, signature, signature_length); 92 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, argument 94 if (signature == NULL) return; 95 memset(signature, 0, signature_length);
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 580 ALOGW("output signature buffer == NULL"); 613 const uint8_t* signature, const size_t signatureLength) { 625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { 635 const uint8_t* signature, const size_t signatureLength) { 647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= 658 const uint8_t* signature, const size_t signatureLength) { 666 ALOGW("signed data length must be signature length"); 683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { 699 const uint8_t* signature, const size_t signatureLength) { 700 if (signedData == NULL || signature 611 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 633 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 656 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 696 openssl_verify_data( const keymaster0_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument [all...] |
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 194 ComputePasswordSignature(password_handle->signature, sizeof(password_handle->signature), 211 return memcmp_s(generated_handle->signature, expected_handle->signature, 212 sizeof(expected_handle->signature)) == 0;
|