Searched refs:signature (Results 1 - 25 of 85) sorted by relevance

1234

/system/core/trusty/keymaster/
H A Dtrusty_keymaster_device_test.cpp185 uint8_t* signature; local
188 &signature, &siglen));
189 Malloc_Delete sig_deleter(signature);
204 uint8_t* signature; local
207 message_len, &signature, &siglen));
221 uint8_t* signature; local
224 message_len, &signature, &siglen));
237 uint8_t* signature; local
240 array_size(message) - 1, &signature, &siglen));
241 Malloc_Delete sig_deleter(signature);
256 uint8_t* signature; local
277 uint8_t* signature; local
298 uint8_t* signature; local
319 uint8_t* signature; local
342 uint8_t* signature; local
364 uint8_t* signature; local
386 uint8_t* signature; local
406 uint8_t* signature; local
427 uint8_t* signature; local
458 uint8_t* signature; local
479 uint8_t* signature; local
492 VerifySignature(const uint8_t* key, size_t key_len, const uint8_t* signature, size_t signature_len, const uint8_t* message, size_t message_len) argument
522 uint8_t* signature; local
550 uint8_t* signature; local
[all...]
H A Dtrusty_keymaster_main.cpp133 uint8_t* signature; local
135 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature,
141 UniquePtr<uint8_t[]> signature_deleter(signature);
144 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature,
179 uint8_t* signature; local
181 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature,
187 UniquePtr<uint8_t[]> signature_deleter(signature);
190 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature,
220 if (EVP_PKEY_verify(ctx.get(), signature, signature_len, message.get(), message_len) != 1) {
251 uint8_t* signature; local
295 uint8_t* signature; local
[all...]
/system/extras/verity/
H A DVeritySigner.java48 byte[] signature = Utils.read(args[2]);
51 if (Utils.verify(publicKey, content, signature,
65 byte[] signature = Utils.sign(privateKey, content);
66 Utils.write(signature, args[2]);
H A Dbuild_verity_metadata.py40 def build_metadata_block(verity_table, signature):
42 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len)
77 # build the verity table signature
78 signature = sign_verity_table(verity_table, signer_path, signing_key, signer_args)
80 metadata_block = build_metadata_block(verity_table, signature)
H A Dverity_verifier.cpp52 static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size, argument
66 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) {
114 int ret = verify_table(argv[3], verity.signature, sizeof(verity.signature),
H A DBootSignature.java60 * signature ::= OCTET STRING
71 private DEROctetString signature; field in class:BootSignature
89 * @param signature Signature footer
91 public BootSignature(byte[] signature) argument
93 ASN1InputStream stream = new ASN1InputStream(signature);
117 this.signature = (DEROctetString) sequence.getObjectAt(4);
140 return signature.getOctets();
145 signature = new DEROctetString(sig);
175 return Utils.verify(publicKey, signable, signature.getOctets(),
185 v.add(signature);
[all...]
H A Dverify_boot_signature.c61 ASN1_OCTET_STRING *signature;
69 ASN1_SIMPLE(BootSignature, signature, ASN1_OCTET_STRING)
88 * based on the boot image header. The signature will start after the
128 * @param offset Offset from the beginning of file to the signature
159 * Validates the format of the boot signature block, and checks that
162 * @param bs The boot signature block to validate
163 * @param length The actual length of the boot image without the signature
187 printf("Unsupported signature version\n");
202 printf("Image length doesn't match signature attributes\n");
219 * @param length Length of the boot image without the signature bloc
[all...]
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h34 // fields included in signature
39 // fields not included in signature
41 uint8_t signature[32]; member in struct:gatekeeper::password_handle_t
H A Dgatekeeper.h81 * Uses platform-specific routines to compute a signature on the provided password.
87 * Writes the signature_length size signature to the 'signature' pointer.
89 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length,
102 * Uses platform-specific routines to compute a signature on the provided message.
104 * Writes the signature_length size signature to the 'signature' pointer.
106 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length,
/system/keymaster/
H A Dandroid_keymaster_test.cpp512 string signature; local
513 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE);
526 string signature; local
527 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS);
539 string signature; local
556 string signature; local
557 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN);
569 string signature; local
570 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN);
588 string signature; local
603 string signature; local
617 string signature; local
693 string signature; local
720 string signature; local
740 string signature; local
751 string signature; local
762 string signature; local
773 string signature; local
799 string signature; local
827 string signature; local
840 string signature; local
853 string signature; local
867 string signature; local
880 string signature; local
894 string signature; local
1113 string signature; local
1128 string signature; local
1143 string signature; local
1178 string signature; local
1201 string signature; local
1223 string signature; local
1238 string signature; local
1272 string signature; local
1295 string signature; local
1392 string signature; local
1407 string signature; local
1419 string signature; local
1432 string signature; local
1450 string signature; local
1471 string signature; local
1495 string signature; local
1521 string signature; local
1534 string signature; local
1547 string signature; local
1560 string signature; local
1584 string signature; local
1597 string signature; local
1710 string signature; local
1768 string signature; local
1800 string signature; local
1852 string signature; local
3251 string signature; local
3268 string signature; local
3285 string signature; local
3305 string signature; local
3349 string signature; local
3685 string signature; local
[all...]
H A Dkeymaster0_engine.cpp262 unique_ptr<uint8_t[], Malloc_Delete>* signature,
273 signature->reset(signed_data);
308 unique_ptr<uint8_t[], Malloc_Delete> signature; local
310 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) {
320 Eraser eraser(signature.get(), signature_length);
327 memcpy(out, signature.get() + signature_length - len, len);
334 memcpy(out + len - signature_length, signature.get(), signature_length);
336 memcpy(out, signature.get(), len);
357 unique_ptr<uint8_t[], Malloc_Delete> signature; local
359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
260 Keymaster0Sign(const void* signing_params, const keymaster_key_blob_t& blob, const uint8_t* data, const size_t data_length, unique_ptr<uint8_t[], Malloc_Delete>* signature, size_t* signature_length) const argument
[all...]
H A Dandroid_keymaster_test_utils.cpp301 keymaster_error_t Keymaster2Test::FinishOperation(const string& input, const string& signature, argument
305 return FinishOperation(additional_params, input, signature, &output_params, output);
309 const string& input, const string& signature,
312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()),
313 signature.length()};
362 EXPECT_EQ(KM_ERROR_OK, FinishOperation(message, "" /* signature */, &result));
373 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, message, "" /* signature */, &result));
378 const string& signature, const AuthorizationSet& begin_params,
384 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, message, signature, &result));
389 const string& signature) {
308 FinishOperation(const AuthorizationSet& additional_params, const string& input, const string& signature, AuthorizationSet* output_params, string* output) argument
377 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* output_params) argument
388 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature) argument
397 SignMessage(const string& message, string* signature, keymaster_digest_t digest) argument
409 SignMessage(const string& message, string* signature, keymaster_digest_t digest, keymaster_padding_t padding) argument
422 MacMessage(const string& message, string* signature, size_t mac_length) argument
433 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest) argument
444 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest, keymaster_padding_t padding) argument
456 VerifyMac(const string& message, const string& signature) argument
624 string signature; local
868 finish(const struct keymaster1_device* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
[all...]
H A Dandroid_keymaster_test_utils.h208 keymaster_error_t FinishOperation(const std::string& input, const std::string& signature,
211 const std::string& input, const std::string& signature,
213 return FinishOperation(additional_params, input, signature, nullptr /* output_params */,
217 const std::string& input, const std::string& signature,
233 const std::string& signature, const AuthorizationSet& begin_params,
237 const std::string& signature);
239 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest);
240 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest,
242 void MacMessage(const std::string& message, std::string* signature, size_t mac_length);
244 void VerifyMessage(const std::string& message, const std::string& signature,
210 FinishOperation(const AuthorizationSet& additional_params, const std::string& input, const std::string& signature, std::string* output) argument
451 counting_verify_data(const struct keymaster0_device* dev, const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* signed_data, const size_t signed_data_length, const uint8_t* signature, const size_t signature_length) argument
[all...]
H A Decdsa_operation.cpp139 const Buffer& input, const Buffer& /* signature */,
162 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1)
204 const Buffer& input, const Buffer& signature,
218 signature.peek_read(), signature.available_read(), ecdsa.get());
223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(),
224 signature.available_read()))
203 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument
H A Daes_operation.h72 const Buffer& signature, AuthorizationSet* output_params,
118 const Buffer& signature, AuthorizationSet* output_params,
140 const Buffer& signature, AuthorizationSet* output_params,
H A Dhmac_operation.cpp164 const Buffer& input, const Buffer& signature,
183 size_t siglen = signature.available_read();
188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0)
163 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* output) argument
H A Drsa_operation.h99 const Buffer& signature, AuthorizationSet* output_params,
121 const Buffer& signature, AuthorizationSet* output_params,
125 keymaster_error_t VerifyUndigested(const Buffer& signature);
126 keymaster_error_t VerifyDigested(const Buffer& signature);
154 const Buffer& signature, AuthorizationSet* output_params,
166 const Buffer& signature, AuthorizationSet* output_params,
H A Decdsa_keymaster1_operation.h73 const Buffer& signature, AuthorizationSet* output_params,
78 error = super::Finish(input_params, input, signature, output_params, output);
H A Decdsa_operation.h60 const Buffer& signature, AuthorizationSet* output_params,
74 const Buffer& signature, AuthorizationSet* output_params,
/system/core/logd/
H A DLogKlog.h29 const log_time signature; member in class:LogKlog
/system/security/softkeymaster/include/keymaster/
H A Dsoftkeymaster.h38 const size_t signedDataLength, const uint8_t* signature,
/system/tpm/trunks/
H A Dtrunks_client_test.h84 // is then used to sign arbitrary data, and the signature verified.
120 // Verifies an RSA-SSA-SHA256 |signature| over the given |data|. The
125 const std::string& signature);
132 // verifies the signature with |public_key|. Returns true on success.
H A Dmock_tpm.cc94 TPMT_SIGNATURE* signature,
98 creation_ticket, certify_info, signature, authorization_delegate);
110 TPMT_SIGNATURE* signature,
114 in_scheme, audit_info, signature, authorization_delegate);
238 TPMT_SIGNATURE* signature,
242 certify_info, signature, authorization_delegate);
84 CertifyCreationSync( const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPM2B_DATA& qualifying_data, const TPM2B_DIGEST& creation_hash, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_CREATION& creation_ticket, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
100 GetSessionAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_SH_HMAC& session_handle, const std::string& session_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
227 NV_CertifySync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const UINT16& size, const UINT16& offset, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
/system/core/gatekeeperd/
H A DSoftGateKeeper.h81 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, argument
84 if (signature == NULL) return;
86 sizeof(salt), N, r, p, signature, signature_length);
94 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, argument
96 if (signature == NULL) return;
97 memset(signature, 0, signature_length);
/system/update_engine/payload_generator/
H A Dpayload_signer.cc59 for (const brillo::Blob& signature : signatures) {
63 sig_message->set_data(signature.data(), signature.size());
79 // manifest after adding the dummy signature operation, and
82 // if the payload major version supports metadata signature, 0 otherwise.
109 // Write metadata signature size in header.
115 // Replace metadata signature.
122 LOG(INFO) << "Metadata signature size: " << metadata_signature_size;
125 // Is there already a signature op in place?
127 // The signature o
388 brillo::Blob signature; local
511 brillo::Blob signature; local
[all...]

Completed in 499 milliseconds

1234