Searched defs:signature (Results 1 - 25 of 45) sorted by relevance

12

/system/core/logd/
H A DLogKlog.h29 const log_time signature; member in class:LogKlog
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h34 // fields included in signature
39 // fields not included in signature
41 uint8_t signature[32]; member in struct:gatekeeper::password_handle_t
/system/extras/verity/
H A Dverity_verifier.cpp52 static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size, argument
66 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) {
114 int ret = verify_table(argv[3], verity.signature, sizeof(verity.signature),
H A DBootSignature.java60 * signature ::= OCTET STRING
71 private DEROctetString signature; field in class:BootSignature
89 * @param signature Signature footer
91 public BootSignature(byte[] signature) argument
93 ASN1InputStream stream = new ASN1InputStream(signature);
117 this.signature = (DEROctetString) sequence.getObjectAt(4);
140 return signature.getOctets();
145 signature = new DEROctetString(sig);
175 return Utils.verify(publicKey, signable, signature.getOctets(),
185 v.add(signature);
[all...]
H A DUtils.java259 static boolean verify(PublicKey key, byte[] input, byte[] signature, argument
271 return verifier.verify(signature);
/system/update_engine/payload_consumer/
H A Dpayload_verifier.cc33 // defined in RFC3447. It is prepended to the actual signature (32 bytes) to
49 // OCTET STRING(2+32) <actual signature bytes...>
93 LOG(INFO) << "signature blob size = " << signature_blob.size();
103 // Tries every signature in the signature blob.
105 const Signatures_Signature& signature = signatures.signatures(i); local
106 brillo::Blob sig_data(signature.data().begin(), signature.data().end());
112 LOG(INFO) << "Verified correct signature " << i + 1 << " out of "
158 // Decrypts the signature
[all...]
/system/keymaster/
H A Decdsa_operation.cpp139 const Buffer& input, const Buffer& /* signature */,
162 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1)
204 const Buffer& input, const Buffer& signature,
218 signature.peek_read(), signature.available_read(), ecdsa.get());
223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(),
224 signature.available_read()))
203 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument
H A Dhmac_operation.cpp164 const Buffer& input, const Buffer& signature,
183 size_t siglen = signature.available_read();
188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0)
163 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* output) argument
H A Dkeymaster0_engine.cpp262 unique_ptr<uint8_t[], Malloc_Delete>* signature,
273 signature->reset(signed_data);
308 unique_ptr<uint8_t[], Malloc_Delete> signature; local
310 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) {
320 Eraser eraser(signature.get(), signature_length);
327 memcpy(out, signature.get() + signature_length - len, len);
334 memcpy(out + len - signature_length, signature.get(), signature_length);
336 memcpy(out, signature.get(), len);
357 unique_ptr<uint8_t[], Malloc_Delete> signature; local
359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
260 Keymaster0Sign(const void* signing_params, const keymaster_key_blob_t& blob, const uint8_t* data, const size_t data_length, unique_ptr<uint8_t[], Malloc_Delete>* signature, size_t* signature_length) const argument
[all...]
H A Drsa_operation.cpp35 // Overhead for PKCS#1 v1.5 signature padding of undigested messages. Digested messages have
293 const Buffer& input, const Buffer& /* signature */,
372 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1)
416 const Buffer& input, const Buffer& signature,
424 return VerifyUndigested(signature);
426 return VerifyDigested(signature);
429 keymaster_error_t RsaVerifyOperation::VerifyUndigested(const Buffer& signature) { argument
440 if (key_len != signature.available_read())
459 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature
415 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument
481 VerifyDigested(const Buffer& signature) argument
[all...]
H A Daes_operation.cpp215 const Buffer& input, const Buffer& /* signature */,
509 const Buffer& input, const Buffer& signature,
515 AesEvpOperation::Finish(additional_params, input, signature, output_params, output);
630 const Buffer& input, const Buffer& signature,
644 return AesEvpOperation::Finish(empty_params, empty_input, signature, output_params, output);
508 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument
629 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument
H A Dandroid_keymaster_test_utils.h208 keymaster_error_t FinishOperation(const std::string& input, const std::string& signature,
211 const std::string& input, const std::string& signature,
213 return FinishOperation(additional_params, input, signature, nullptr /* output_params */,
217 const std::string& input, const std::string& signature,
233 const std::string& signature, const AuthorizationSet& begin_params,
237 const std::string& signature);
239 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest);
240 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest,
242 void MacMessage(const std::string& message, std::string* signature, size_t mac_length);
244 void VerifyMessage(const std::string& message, const std::string& signature,
210 FinishOperation(const AuthorizationSet& additional_params, const std::string& input, const std::string& signature, std::string* output) argument
451 counting_verify_data(const struct keymaster0_device* dev, const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* signed_data, const size_t signed_data_length, const uint8_t* signature, const size_t signature_length) argument
[all...]
/system/core/trusty/keymaster/
H A Dtrusty_keymaster_main.cpp133 uint8_t* signature; local
135 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature,
141 UniquePtr<uint8_t[]> signature_deleter(signature);
144 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature,
179 uint8_t* signature; local
181 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature,
187 UniquePtr<uint8_t[]> signature_deleter(signature);
190 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature,
220 if (EVP_PKEY_verify(ctx.get(), signature, signature_len, message.get(), message_len) != 1) {
251 uint8_t* signature; local
295 uint8_t* signature; local
[all...]
H A Dtrusty_keymaster_device_test.cpp185 uint8_t* signature; local
188 &signature, &siglen));
189 Malloc_Delete sig_deleter(signature);
204 uint8_t* signature; local
207 message_len, &signature, &siglen));
221 uint8_t* signature; local
224 message_len, &signature, &siglen));
237 uint8_t* signature; local
240 array_size(message) - 1, &signature, &siglen));
241 Malloc_Delete sig_deleter(signature);
256 uint8_t* signature; local
277 uint8_t* signature; local
298 uint8_t* signature; local
319 uint8_t* signature; local
342 uint8_t* signature; local
364 uint8_t* signature; local
386 uint8_t* signature; local
406 uint8_t* signature; local
427 uint8_t* signature; local
458 uint8_t* signature; local
479 uint8_t* signature; local
492 VerifySignature(const uint8_t* key, size_t key_len, const uint8_t* signature, size_t signature_len, const uint8_t* message, size_t message_len) argument
522 uint8_t* signature; local
550 uint8_t* signature; local
[all...]
H A Dtrusty_keymaster_device.cpp345 const size_t signed_data_length, const uint8_t* signature,
374 finish_request.signature.Reinitialize(signature, signature_length);
433 const uint8_t* signature, const size_t signatureLength) {
435 signedDataLength, signature, signatureLength);
343 verify_data(const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* signed_data, const size_t signed_data_length, const uint8_t* signature, const size_t signature_length) argument
430 verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
/system/update_engine/payload_generator/
H A Dpayload_signer_unittest.cc48 // Some data and its corresponding hash and signature:
170 // Check the signature itself
175 const Signatures_Signature& signature = signatures.signatures(0); local
176 EXPECT_EQ(1U, signature.version());
177 const string& sig_data = signature.data();
/system/core/gatekeeperd/
H A DSoftGateKeeper.h81 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, argument
84 if (signature == NULL) return;
86 sizeof(salt), N, r, p, signature, signature_length);
94 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, argument
96 if (signature == NULL) return;
97 memset(signature, 0, signature_length);
/system/extras/libfec/
H A Dfec_private.h62 uint8_t signature[ANDROID_PUBKEY_MODULUS_SIZE]; member in struct:verity_header
/system/extras/libfec/include/fec/
H A Dio.h74 uint8_t signature[ANDROID_PUBKEY_MODULUS_SIZE]; member in struct:fec_verity_metadata
/system/tpm/attestation/client/
H A Dmain.cc84 --signature=<signature_file>
85 Verifies the signature in |signature_file| against the contents of
228 !command_line->HasSwitch("signature")) {
237 std::string signature; local
238 base::FilePath filename2(command_line->GetSwitchValueASCII("signature"));
239 if (!base::ReadFileToString(filename2, &signature)) {
246 command_line->GetSwitchValueASCII("user"), input, signature);
428 WriteOutput(reply.signature());
436 const std::string& signature) {
442 weak_factory_.GetWeakPtr(), input, signature));
433 VerifySignature(const std::string& label, const std::string& username, const std::string& input, const std::string& signature) argument
445 VerifySignature2(const std::string& input, const std::string& signature, const GetKeyInfoReply& key_info) argument
[all...]
/system/tpm/trunks/
H A Dtpm_generated_test.cc275 const TPMT_SIGNATURE& signature) {
279 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature.signature.rsassa.sig);
400 std::string signature(
403 "\x00\x09" // signature size
404 "signature", // signature bytes
421 command_response += signed_data + signature + auth_out;
447 EXPECT_EQ("signature", signature_);
273 CertifyCallback(TPM_RC response_code, const TPM2B_ATTEST& certify_info, const TPMT_SIGNATURE& signature) argument
H A Dmock_tpm.cc94 TPMT_SIGNATURE* signature,
98 creation_ticket, certify_info, signature, authorization_delegate);
110 TPMT_SIGNATURE* signature,
114 in_scheme, audit_info, signature, authorization_delegate);
238 TPMT_SIGNATURE* signature,
242 certify_info, signature, authorization_delegate);
84 CertifyCreationSync( const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPM2B_DATA& qualifying_data, const TPM2B_DIGEST& creation_hash, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_CREATION& creation_ticket, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
100 GetSessionAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_SH_HMAC& session_handle, const std::string& session_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
227 NV_CertifySync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const UINT16& size, const UINT16& offset, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
/system/security/keystore/
H A DIKeystoreService.cpp406 const hidl_vec<uint8_t>& signature) override {
412 writeBlobAsByteArray(signature, &data);
741 const hidl_vec<uint8_t>& signature, const hidl_vec<uint8_t>& entropy,
750 writeBlobAsByteArray(signature, &data);
1095 auto signature = readBlobAsByteArray(data); local
1096 auto ret = verify(name, in.value(), signature.value());
1264 auto signature = readBlobAsByteArray(data); local
1267 finish(token, args.value(), signature.value(), entropy.value(), &result);
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp574 ALOGW("output signature buffer == NULL");
607 const uint8_t* signature, const size_t signatureLength) {
619 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) {
629 const uint8_t* signature, const size_t signatureLength) {
641 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <=
652 const uint8_t* signature, const size_t signatureLength) {
660 ALOGW("signed data length must be signature length");
677 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) {
693 const uint8_t* signature, const size_t signatureLength) {
694 if (signedData == NULL || signature
605 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
627 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
650 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
690 openssl_verify_data( const keymaster0_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
[all...]
/system/tpm/attestation/common/
H A Dcrypto_utility_impl.cc294 const std::string& signature) {
304 std::string mutable_signature(signature);
307 signature.size(), rsa.get()) == 1);
292 VerifySignature(const std::string& public_key, const std::string& data, const std::string& signature) argument

Completed in 905 milliseconds

12