/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_device_test.cpp | 185 uint8_t* signature; local 188 &signature, &siglen)); 189 Malloc_Delete sig_deleter(signature); 204 uint8_t* signature; local 207 message_len, &signature, &siglen)); 221 uint8_t* signature; local 224 message_len, &signature, &siglen)); 237 uint8_t* signature; local 240 array_size(message) - 1, &signature, &siglen)); 241 Malloc_Delete sig_deleter(signature); 256 uint8_t* signature; local 277 uint8_t* signature; local 298 uint8_t* signature; local 319 uint8_t* signature; local 342 uint8_t* signature; local 364 uint8_t* signature; local 386 uint8_t* signature; local 406 uint8_t* signature; local 427 uint8_t* signature; local 458 uint8_t* signature; local 479 uint8_t* signature; local 492 VerifySignature(const uint8_t* key, size_t key_len, const uint8_t* signature, size_t signature_len, const uint8_t* message, size_t message_len) argument 522 uint8_t* signature; local 550 uint8_t* signature; local [all...] |
H A D | trusty_keymaster_main.cpp | 133 uint8_t* signature; local 135 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature, 141 UniquePtr<uint8_t[]> signature_deleter(signature); 144 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature, 179 uint8_t* signature; local 181 error = device->sign_data(&sign_params, key, size, message.get(), message_len, &signature, 187 UniquePtr<uint8_t[]> signature_deleter(signature); 190 error = device->verify_data(&sign_params, key, size, message.get(), message_len, signature, 220 if (EVP_PKEY_verify(ctx.get(), signature, signature_len, message.get(), message_len) != 1) { 251 uint8_t* signature; local 295 uint8_t* signature; local [all...] |
/system/extras/verity/ |
H A D | VeritySigner.java | 48 byte[] signature = Utils.read(args[2]); 51 if (Utils.verify(publicKey, content, signature, 65 byte[] signature = Utils.sign(privateKey, content); 66 Utils.write(signature, args[2]);
|
H A D | build_verity_metadata.py | 40 def build_metadata_block(verity_table, signature): 42 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len) 77 # build the verity table signature 78 signature = sign_verity_table(verity_table, signer_path, signing_key, signer_args) 80 metadata_block = build_metadata_block(verity_table, signature)
|
H A D | verity_verifier.cpp | 52 static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size, argument 66 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) { 114 int ret = verify_table(argv[3], verity.signature, sizeof(verity.signature),
|
H A D | BootSignature.java | 60 * signature ::= OCTET STRING 71 private DEROctetString signature; field in class:BootSignature 89 * @param signature Signature footer 91 public BootSignature(byte[] signature) argument 93 ASN1InputStream stream = new ASN1InputStream(signature); 117 this.signature = (DEROctetString) sequence.getObjectAt(4); 140 return signature.getOctets(); 145 signature = new DEROctetString(sig); 175 return Utils.verify(publicKey, signable, signature.getOctets(), 185 v.add(signature); [all...] |
H A D | verify_boot_signature.c | 61 ASN1_OCTET_STRING *signature; 69 ASN1_SIMPLE(BootSignature, signature, ASN1_OCTET_STRING) 88 * based on the boot image header. The signature will start after the 128 * @param offset Offset from the beginning of file to the signature 159 * Validates the format of the boot signature block, and checks that 162 * @param bs The boot signature block to validate 163 * @param length The actual length of the boot image without the signature 187 printf("Unsupported signature version\n"); 202 printf("Image length doesn't match signature attributes\n"); 219 * @param length Length of the boot image without the signature bloc [all...] |
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 34 // fields included in signature 39 // fields not included in signature 41 uint8_t signature[32]; member in struct:gatekeeper::password_handle_t
|
H A D | gatekeeper.h | 81 * Uses platform-specific routines to compute a signature on the provided password. 87 * Writes the signature_length size signature to the 'signature' pointer. 89 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, 102 * Uses platform-specific routines to compute a signature on the provided message. 104 * Writes the signature_length size signature to the 'signature' pointer. 106 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length,
|
/system/keymaster/ |
H A D | android_keymaster_test.cpp | 512 string signature; local 513 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); 526 string signature; local 527 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); 539 string signature; local 556 string signature; local 557 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); 569 string signature; local 570 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN); 588 string signature; local 603 string signature; local 617 string signature; local 693 string signature; local 720 string signature; local 740 string signature; local 751 string signature; local 762 string signature; local 773 string signature; local 799 string signature; local 827 string signature; local 840 string signature; local 853 string signature; local 867 string signature; local 880 string signature; local 894 string signature; local 1113 string signature; local 1128 string signature; local 1143 string signature; local 1178 string signature; local 1201 string signature; local 1223 string signature; local 1238 string signature; local 1272 string signature; local 1295 string signature; local 1392 string signature; local 1407 string signature; local 1419 string signature; local 1432 string signature; local 1450 string signature; local 1471 string signature; local 1495 string signature; local 1521 string signature; local 1534 string signature; local 1547 string signature; local 1560 string signature; local 1584 string signature; local 1597 string signature; local 1710 string signature; local 1768 string signature; local 1800 string signature; local 1852 string signature; local 3251 string signature; local 3268 string signature; local 3285 string signature; local 3305 string signature; local 3349 string signature; local 3685 string signature; local [all...] |
H A D | keymaster0_engine.cpp | 262 unique_ptr<uint8_t[], Malloc_Delete>* signature, 273 signature->reset(signed_data); 308 unique_ptr<uint8_t[], Malloc_Delete> signature; local 310 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { 320 Eraser eraser(signature.get(), signature_length); 327 memcpy(out, signature.get() + signature_length - len, len); 334 memcpy(out + len - signature_length, signature.get(), signature_length); 336 memcpy(out, signature.get(), len); 357 unique_ptr<uint8_t[], Malloc_Delete> signature; local 359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, 260 Keymaster0Sign(const void* signing_params, const keymaster_key_blob_t& blob, const uint8_t* data, const size_t data_length, unique_ptr<uint8_t[], Malloc_Delete>* signature, size_t* signature_length) const argument [all...] |
H A D | android_keymaster_test_utils.cpp | 301 keymaster_error_t Keymaster2Test::FinishOperation(const string& input, const string& signature, argument 305 return FinishOperation(additional_params, input, signature, &output_params, output); 309 const string& input, const string& signature, 312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), 313 signature.length()}; 362 EXPECT_EQ(KM_ERROR_OK, FinishOperation(message, "" /* signature */, &result)); 373 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, message, "" /* signature */, &result)); 378 const string& signature, const AuthorizationSet& begin_params, 384 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, message, signature, &result)); 389 const string& signature) { 308 FinishOperation(const AuthorizationSet& additional_params, const string& input, const string& signature, AuthorizationSet* output_params, string* output) argument 377 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* output_params) argument 388 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature) argument 397 SignMessage(const string& message, string* signature, keymaster_digest_t digest) argument 409 SignMessage(const string& message, string* signature, keymaster_digest_t digest, keymaster_padding_t padding) argument 422 MacMessage(const string& message, string* signature, size_t mac_length) argument 433 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest) argument 444 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest, keymaster_padding_t padding) argument 456 VerifyMac(const string& message, const string& signature) argument 624 string signature; local 868 finish(const struct keymaster1_device* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument [all...] |
H A D | android_keymaster_test_utils.h | 208 keymaster_error_t FinishOperation(const std::string& input, const std::string& signature, 211 const std::string& input, const std::string& signature, 213 return FinishOperation(additional_params, input, signature, nullptr /* output_params */, 217 const std::string& input, const std::string& signature, 233 const std::string& signature, const AuthorizationSet& begin_params, 237 const std::string& signature); 239 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest); 240 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest, 242 void MacMessage(const std::string& message, std::string* signature, size_t mac_length); 244 void VerifyMessage(const std::string& message, const std::string& signature, 210 FinishOperation(const AuthorizationSet& additional_params, const std::string& input, const std::string& signature, std::string* output) argument 451 counting_verify_data(const struct keymaster0_device* dev, const void* signing_params, const uint8_t* key_blob, const size_t key_blob_length, const uint8_t* signed_data, const size_t signed_data_length, const uint8_t* signature, const size_t signature_length) argument [all...] |
H A D | ecdsa_operation.cpp | 139 const Buffer& input, const Buffer& /* signature */, 162 if (EVP_DigestSignFinal(&digest_ctx_, nullptr /* signature */, &siglen) != 1) 204 const Buffer& input, const Buffer& signature, 218 signature.peek_read(), signature.available_read(), ecdsa.get()); 223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), 224 signature.available_read())) 203 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* ) argument
|
H A D | aes_operation.h | 72 const Buffer& signature, AuthorizationSet* output_params, 118 const Buffer& signature, AuthorizationSet* output_params, 140 const Buffer& signature, AuthorizationSet* output_params,
|
H A D | hmac_operation.cpp | 164 const Buffer& input, const Buffer& signature, 183 size_t siglen = signature.available_read(); 188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0) 163 Finish(const AuthorizationSet& additional_params, const Buffer& input, const Buffer& signature, AuthorizationSet* , Buffer* output) argument
|
H A D | rsa_operation.h | 99 const Buffer& signature, AuthorizationSet* output_params, 121 const Buffer& signature, AuthorizationSet* output_params, 125 keymaster_error_t VerifyUndigested(const Buffer& signature); 126 keymaster_error_t VerifyDigested(const Buffer& signature); 154 const Buffer& signature, AuthorizationSet* output_params, 166 const Buffer& signature, AuthorizationSet* output_params,
|
H A D | ecdsa_keymaster1_operation.h | 73 const Buffer& signature, AuthorizationSet* output_params, 78 error = super::Finish(input_params, input, signature, output_params, output);
|
H A D | ecdsa_operation.h | 60 const Buffer& signature, AuthorizationSet* output_params, 74 const Buffer& signature, AuthorizationSet* output_params,
|
/system/core/logd/ |
H A D | LogKlog.h | 29 const log_time signature; member in class:LogKlog
|
/system/security/softkeymaster/include/keymaster/ |
H A D | softkeymaster.h | 38 const size_t signedDataLength, const uint8_t* signature,
|
/system/tpm/trunks/ |
H A D | trunks_client_test.h | 84 // is then used to sign arbitrary data, and the signature verified. 120 // Verifies an RSA-SSA-SHA256 |signature| over the given |data|. The 125 const std::string& signature); 132 // verifies the signature with |public_key|. Returns true on success.
|
H A D | mock_tpm.cc | 94 TPMT_SIGNATURE* signature, 98 creation_ticket, certify_info, signature, authorization_delegate); 110 TPMT_SIGNATURE* signature, 114 in_scheme, audit_info, signature, authorization_delegate); 238 TPMT_SIGNATURE* signature, 242 certify_info, signature, authorization_delegate); 84 CertifyCreationSync( const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPM2B_DATA& qualifying_data, const TPM2B_DIGEST& creation_hash, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_CREATION& creation_ticket, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 100 GetSessionAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_SH_HMAC& session_handle, const std::string& session_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 227 NV_CertifySync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const UINT16& size, const UINT16& offset, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 81 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, argument 84 if (signature == NULL) return; 86 sizeof(salt), N, r, p, signature, signature_length); 94 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, argument 96 if (signature == NULL) return; 97 memset(signature, 0, signature_length);
|
/system/update_engine/payload_generator/ |
H A D | payload_signer.cc | 59 for (const brillo::Blob& signature : signatures) { 63 sig_message->set_data(signature.data(), signature.size()); 79 // manifest after adding the dummy signature operation, and 82 // if the payload major version supports metadata signature, 0 otherwise. 109 // Write metadata signature size in header. 115 // Replace metadata signature. 122 LOG(INFO) << "Metadata signature size: " << metadata_signature_size; 125 // Is there already a signature op in place? 127 // The signature o 388 brillo::Blob signature; local 511 brillo::Blob signature; local [all...] |