/system/core/logd/ |
H A D | LogKlog.h | 29 const log_time signature; member in class:LogKlog
|
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 34 // fields included in signature 39 // fields not included in signature 41 uint8_t signature[32]; member in struct:gatekeeper::password_handle_t
|
/system/extras/verity/ |
H A D | verity_verifier.cpp | 52 static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size, argument 66 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) { 114 int ret = verify_table(argv[3], verity.signature, sizeof(verity.signature),
|
H A D | BootSignature.java | 60 * signature ::= OCTET STRING 71 private DEROctetString signature; field in class:BootSignature 89 * @param signature Signature footer 91 public BootSignature(byte[] signature) argument 93 ASN1InputStream stream = new ASN1InputStream(signature); 117 this.signature = (DEROctetString) sequence.getObjectAt(4); 140 return signature.getOctets(); 145 signature = new DEROctetString(sig); 175 return Utils.verify(publicKey, signable, signature.getOctets(), 185 v.add(signature); [all...] |
H A D | Utils.java | 259 static boolean verify(PublicKey key, byte[] input, byte[] signature, argument 271 return verifier.verify(signature);
|
/system/update_engine/payload_consumer/ |
H A D | payload_verifier.cc | 33 // defined in RFC3447. It is prepended to the actual signature (32 bytes) to 49 // OCTET STRING(2+32) <actual signature bytes...> 93 LOG(INFO) << "signature blob size = " << signature_blob.size(); 103 // Tries every signature in the signature blob. 105 const Signatures_Signature& signature = signatures.signatures(i); local 106 brillo::Blob sig_data(signature.data().begin(), signature.data().end()); 112 LOG(INFO) << "Verified correct signature " << i + 1 << " out of " 158 // Decrypts the signature [all...] |
/system/keymaster/ |
H A D | ecdsa_operation.cpp | 139 const Buffer& input, const Buffer& /* signature */, 162 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 204 const Buffer& input, const Buffer& signature, 218 signature.peek_read(), signature.available_read(), ecdsa.get()); 223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), 224 signature.available_read())) 203 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument
|
H A D | hmac_operation.cpp | 164 const Buffer& input, const Buffer& signature, 183 size_t siglen = signature.available_read(); 188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0) 163 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* output) argument
|
H A D | keymaster0_engine.cpp | 262 unique_ptr<uint8_t[], Malloc_Delete>* signature, 273 signature->reset(signed_data); 308 unique_ptr<uint8_t[], Malloc_Delete> signature; local 310 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { 320 Eraser eraser(signature.get(), signature_length); 327 memcpy(out, signature.get() + signature_length - len, len); 334 memcpy(out + len - signature_length, signature.get(), signature_length); 336 memcpy(out, signature.get(), len); 357 unique_ptr<uint8_t[], Malloc_Delete> signature; local 359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, 260 Keymaster0Sign(const void* signing_params, const keymaster_key_blob_t& blob, const uint8_t* data, const size_t data_length, unique_ptr<uint8_t[], Malloc_Delete>* signature, size_t* signature_length) const argument [all...] |
H A D | rsa_operation.cpp | 35 // Overhead for PKCS#1 v1.5 signature padding of undigested messages. Digested messages have 293 const Buffer& input, const Buffer& /* signature */, 372 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 416 const Buffer& input, const Buffer& signature, 424 return VerifyUndigested(signature); 426 return VerifyDigested(signature); 429 keymaster_error_t RsaVerifyOperation::VerifyUndigested(const Buffer& signature) { argument 440 if (key_len != signature.available_read()) 459 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature 415 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument 481 VerifyDigested(const Buffer& signature) argument [all...] |
H A D | aes_operation.cpp | 215 const Buffer& input, const Buffer& /* signature */, 509 const Buffer& input, const Buffer& signature, 515 AesEvpOperation::Finish(additional_params, input, signature, output_params, output); 630 const Buffer& input, const Buffer& signature, 644 return AesEvpOperation::Finish(empty_params, empty_input, signature, output_params, output); 508 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument 629 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* output_params, Buffer* output) argument
|
H A D | android_keymaster_test_utils.h | 208 keymaster_error_t FinishOperation(const std::string& input, const std::string& signature, 211 const std::string& input, const std::string& signature, 213 return FinishOperation(additional_params, input, signature, nullptr /* output_params */, 217 const std::string& input, const std::string& signature, 233 const std::string& signature, const AuthorizationSet& begin_params, 237 const std::string& signature); 239 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest); 240 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest, 242 void MacMessage(const std::string& message, std::string* signature, size_t mac_length); 244 void VerifyMessage(const std::string& message, const std::string& signature, 210 FinishOperation(const AuthorizationSet& additional_params, const std::string& input, const std::string& signature, std::string* output) argument 451 counting_verify_data(const struct keymaster0_device* dev, const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* signed_data, const size_t signed_data_length, const uint8_t* signature, const size_t signature_length) argument [all...] |
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_main.cpp | 133 uint8_t* signature; local 135 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature, 141 UniquePtr<uint8_t[]> signature_deleter(signature); 144 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature, 179 uint8_t* signature; local 181 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature, 187 UniquePtr<uint8_t[]> signature_deleter(signature); 190 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature, 220 if (EVP_PKEY_verify(ctx.get(), signature, signature_len, message.get(), message_len) != 1) { 251 uint8_t* signature; local 295 uint8_t* signature; local [all...] |
H A D | trusty_keymaster_device_test.cpp | 185 uint8_t* signature; local 188 &signature, &siglen)); 189 Malloc_Delete sig_deleter(signature); 204 uint8_t* signature; local 207 message_len, &signature, &siglen)); 221 uint8_t* signature; local 224 message_len, &signature, &siglen)); 237 uint8_t* signature; local 240 array_size(message) - 1, &signature, &siglen)); 241 Malloc_Delete sig_deleter(signature); 256 uint8_t* signature; local 277 uint8_t* signature; local 298 uint8_t* signature; local 319 uint8_t* signature; local 342 uint8_t* signature; local 364 uint8_t* signature; local 386 uint8_t* signature; local 406 uint8_t* signature; local 427 uint8_t* signature; local 458 uint8_t* signature; local 479 uint8_t* signature; local 492 VerifySignature(const uint8_t* key, size_t key_len, const uint8_t* signature, size_t signature_len, const uint8_t* message, size_t message_len) argument 522 uint8_t* signature; local 550 uint8_t* signature; local [all...] |
H A D | trusty_keymaster_device.cpp | 345 const size_t signed_data_length, const uint8_t* signature, 374 finish_request.signature.Reinitialize(signature, signature_length); 433 const uint8_t* signature, const size_t signatureLength) { 435 signedDataLength, signature, signatureLength); 343 verify_data(const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* signed_data, const size_t signed_data_length, const uint8_t* signature, const size_t signature_length) argument 430 verify_data(const keymaster0_device_t* dev, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument
|
/system/update_engine/payload_generator/ |
H A D | payload_signer_unittest.cc | 48 // Some data and its corresponding hash and signature: 170 // Check the signature itself 175 const Signatures_Signature& signature = signatures.signatures(0); local 176 EXPECT_EQ(1U, signature.version()); 177 const string& sig_data = signature.data();
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 81 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, argument 84 if (signature == NULL) return; 86 sizeof(salt), N, r, p, signature, signature_length); 94 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, argument 96 if (signature == NULL) return; 97 memset(signature, 0, signature_length);
|
/system/extras/libfec/ |
H A D | fec_private.h | 62 uint8_t signature[ANDROID_PUBKEY_MODULUS_SIZE]; member in struct:verity_header
|
/system/extras/libfec/include/fec/ |
H A D | io.h | 74 uint8_t signature[ANDROID_PUBKEY_MODULUS_SIZE]; member in struct:fec_verity_metadata
|
/system/tpm/attestation/client/ |
H A D | main.cc | 84 --signature=<signature_file> 85 Verifies the signature in |signature_file| against the contents of 228 !command_line->HasSwitch("signature")) { 237 std::string signature; local 238 base::FilePath filename2(command_line->GetSwitchValueASCII("signature")); 239 if (!base::ReadFileToString(filename2, &signature)) { 246 command_line->GetSwitchValueASCII("user"), input, signature); 428 WriteOutput(reply.signature()); 436 const std::string& signature) { 442 weak_factory_.GetWeakPtr(), input, signature)); 433 VerifySignature(const std::string& label, const std::string& username, const std::string& input, const std::string& signature) argument 445 VerifySignature2(const std::string& input, const std::string& signature, const GetKeyInfoReply& key_info) argument [all...] |
/system/tpm/trunks/ |
H A D | tpm_generated_test.cc | 275 const TPMT_SIGNATURE& signature) { 279 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature.signature.rsassa.sig); 400 std::string signature( 403 "\x00\x09" // signature size 404 "signature", // signature bytes 421 command_response += signed_data + signature + auth_out; 447 EXPECT_EQ("signature", signature_); 273 CertifyCallback(TPM_RC response_code, const TPM2B_ATTEST& certify_info, const TPMT_SIGNATURE& signature) argument
|
H A D | mock_tpm.cc | 94 TPMT_SIGNATURE* signature, 98 creation_ticket, certify_info, signature, authorization_delegate); 110 TPMT_SIGNATURE* signature, 114 in_scheme, audit_info, signature, authorization_delegate); 238 TPMT_SIGNATURE* signature, 242 certify_info, signature, authorization_delegate); 84 CertifyCreationSync( const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPM2B_DATA& qualifying_data, const TPM2B_DIGEST& creation_hash, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_CREATION& creation_ticket, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 100 GetSessionAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_SH_HMAC& session_handle, const std::string& session_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 227 NV_CertifySync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const UINT16& size, const UINT16& offset, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
|
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 406 const hidl_vec<uint8_t>& signature) override { 412 writeBlobAsByteArray(signature, &data); 741 const hidl_vec<uint8_t>& signature, const hidl_vec<uint8_t>& entropy, 750 writeBlobAsByteArray(signature, &data); 1095 auto signature = readBlobAsByteArray(data); local 1096 auto ret = verify(name, in.value(), signature.value()); 1264 auto signature = readBlobAsByteArray(data); local 1267 finish(token, args.value(), signature.value(), entropy.value(), &result);
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 574 ALOGW("output signature buffer == NULL"); 607 const uint8_t* signature, const size_t signatureLength) { 619 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { 629 const uint8_t* signature, const size_t signatureLength) { 641 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= 652 const uint8_t* signature, const size_t signatureLength) { 660 ALOGW("signed data length must be signature length"); 677 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { 693 const uint8_t* signature, const size_t signatureLength) { 694 if (signedData == NULL || signature 605 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 627 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 650 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 690 openssl_verify_data( const keymaster0_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument [all...] |
/system/tpm/attestation/common/ |
H A D | crypto_utility_impl.cc | 294 const std::string& signature) { 304 std::string mutable_signature(signature); 307 signature.size(), rsa.get()) == 1); 292 VerifySignature(const std::string& public_key, const std::string& data, const std::string& signature) argument
|