Searched defs:signature (Results 26 - 46 of 46) sorted by relevance

12

/system/tpm/trunks/
H A Dmock_tpm.cc94 TPMT_SIGNATURE* signature,
98 creation_ticket, certify_info, signature, authorization_delegate);
110 TPMT_SIGNATURE* signature,
114 in_scheme, audit_info, signature, authorization_delegate);
238 TPMT_SIGNATURE* signature,
242 certify_info, signature, authorization_delegate);
84 CertifyCreationSync( const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPM2B_DATA& qualifying_data, const TPM2B_DIGEST& creation_hash, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_CREATION& creation_ticket, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
100 GetSessionAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_SH_HMAC& session_handle, const std::string& session_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
227 NV_CertifySync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const UINT16& size, const UINT16& offset, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
H A Dtpm_utility_test.cc711 signature_out.signature.rsassa.sig.size = 2;
712 signature_out.signature.rsassa.sig.buffer[0] = 'h';
713 signature_out.signature.rsassa.sig.buffer[1] = 'i';
714 std::string signature; local
728 &mock_authorization_delegate_, &signature));
729 EXPECT_EQ(0, signature.compare("hi"));
736 std::string signature; local
749 &mock_authorization_delegate_, &signature));
756 std::string signature; local
765 &mock_authorization_delegate_, &signature));
772 std::string signature; local
782 std::string signature; local
798 std::string signature; local
814 std::string signature; local
830 std::string signature; local
842 std::string signature; local
868 std::string signature; local
891 std::string signature; local
908 std::string signature; local
925 std::string signature; local
940 std::string signature; local
955 std::string signature; local
970 std::string signature; local
985 std::string signature; local
1000 std::string signature; local
1020 std::string signature; local
[all...]
H A Dtrunks_client_test.cc123 std::string signature; local
126 std::string(32, 'a'), session->GetDelegate(), &signature);
132 std::string(32, 'a'), signature, nullptr);
460 std::string signature; local
464 &signature);
470 std::string(32, 0), signature, nullptr);
590 std::string signature; local
595 &signature);
627 &signature);
633 std::string(32, 'a'), signature, nullpt
801 std::string signature; local
1044 VerifyRSASignature(const std::string& public_key, const std::string& data, const std::string& signature) argument
1089 std::string signature; local
[all...]
H A Dtpm_utility_impl.cc539 std::string* signature) {
600 signature->resize(signature_out.signature.rsapss.sig.size);
601 signature->assign(
602 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature_out.signature.rsapss.sig));
604 signature->resize(signature_out.signature.rsassa.sig.size);
605 signature->assign(
606 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature_out.signature.rsassa.sig));
615 const std::string& signature,
534 Sign(TPM_HANDLE key_handle, TPM_ALG_ID scheme, TPM_ALG_ID hash_alg, const std::string& plaintext, AuthorizationDelegate* delegate, std::string* signature) argument
611 Verify(TPM_HANDLE key_handle, TPM_ALG_ID scheme, TPM_ALG_ID hash_alg, const std::string& plaintext, const std::string& signature, AuthorizationDelegate* delegate) argument
682 TPMT_SIGNATURE signature; local
[all...]
H A Dtpm_generated.h1487 TPMU_SIGNATURE signature; member in struct:trunks::TPMT_SIGNATURE
4247 const TPMT_SIGNATURE& signature)>
4261 TPMT_SIGNATURE* signature,
4278 TPMT_SIGNATURE* signature,
4282 const TPMT_SIGNATURE& signature)>
4298 TPMT_SIGNATURE* signature,
4320 TPMT_SIGNATURE* signature,
4324 const TPMT_SIGNATURE& signature)>
4337 TPMT_SIGNATURE* signature,
4352 TPMT_SIGNATURE* signature,
[all...]
H A Dtpm_generated.cc6659 result = Serialize_TPMU_SIGNATURE(value.signature, value.sig_alg, buffer);
6677 result = Parse_TPMU_SIGNATURE(buffer, value->sig_alg, &value->signature,
16399 TPMT_SIGNATURE* signature,
16469 rc = Parse_TPMT_SIGNATURE(&buffer, signature, &signature_bytes);
16502 TPMT_SIGNATURE signature; local
16503 TPM_RC rc = Tpm::ParseResponse_Certify(response, &certify_info, &signature,
16509 callback.Run(rc, certify_info, signature);
16543 TPMT_SIGNATURE* signature,
16554 rc = ParseResponse_Certify(response, certify_info, signature,
16688 TPMT_SIGNATURE* signature,
16396 ParseResponse_Certify( const std::string& response, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
16536 CertifySync(const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
16685 ParseResponse_CertifyCreation( const std::string& response, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
16792 TPMT_SIGNATURE signature; local
16829 CertifyCreationSync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPM2B_DATA& qualifying_data, const TPM2B_DIGEST& creation_hash, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_CREATION& creation_ticket, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
16962 ParseResponse_Quote(const std::string& response, TPM2B_ATTEST* quoted, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
17067 TPMT_SIGNATURE signature; local
17100 QuoteSync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const TPML_PCR_SELECTION& pcrselect, TPM2B_ATTEST* quoted, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
17241 ParseResponse_GetSessionAuditDigest( const std::string& response, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
17349 TPMT_SIGNATURE signature; local
17386 GetSessionAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_SH_HMAC& session_handle, const std::string& session_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
17521 ParseResponse_GetCommandAuditDigest( const std::string& response, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
17629 TPMT_SIGNATURE signature; local
17663 GetCommandAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_handle, const std::string& privacy_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
17797 ParseResponse_GetTime( const std::string& response, TPM2B_ATTEST* time_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
17903 TPMT_SIGNATURE signature; local
17938 GetTimeSync(const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* time_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
18473 SerializeCommand_VerifySignature( const TPMI_DH_OBJECT& key_handle, const std::string& key_handle_name, const TPM2B_DIGEST& digest, const TPMT_SIGNATURE& signature, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument
18668 VerifySignature(const TPMI_DH_OBJECT& key_handle, const std::string& key_handle_name, const TPM2B_DIGEST& digest, const TPMT_SIGNATURE& signature, AuthorizationDelegate* authorization_delegate, const VerifySignatureResponse& callback) argument
18690 VerifySignatureSync(const TPMI_DH_OBJECT& key_handle, const std::string& key_handle_name, const TPM2B_DIGEST& digest, const TPMT_SIGNATURE& signature, TPMT_TK_VERIFIED* validation, AuthorizationDelegate* authorization_delegate) argument
18817 ParseResponse_Sign(const std::string& response, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
18902 TPMT_SIGNATURE signature; local
18935 SignSync(const TPMI_DH_OBJECT& key_handle, const std::string& key_handle_name, const TPM2B_DIGEST& digest, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_HASHCHECK& validation, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
33053 ParseResponse_NV_Certify( const std::string& response, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
33159 TPMT_SIGNATURE signature; local
33198 NV_CertifySync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const UINT16& size, const UINT16& offset, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
[all...]
/system/update_engine/payload_generator/
H A Dgenerate_delta_main.cc65 << "Invalid signature size: " << str;
68 "Only signature sizes of 256 bytes are supported.";
134 brillo::Blob signature; local
135 CHECK(utils::ReadFile(signature_file, &signature));
136 signatures->push_back(signature);
299 "Raw signature size used for hash calculation. "
304 "Raw signature file to sign payload with. To pass multiple "
307 "signature will be assigned a client version, starting from "
310 "Raw signature file with the signature o
[all...]
H A Dpayload_signer.cc59 for (const brillo::Blob& signature : signatures) {
63 sig_message->set_data(signature.data(), signature.size());
79 // manifest after adding the dummy signature operation, and
82 // if the payload major version supports metadata signature, 0 otherwise.
109 // Write metadata signature size in header.
115 // Replace metadata signature.
122 LOG(INFO) << "Metadata signature size: " << metadata_signature_size;
125 // Is there already a signature op in place?
127 // The signature o
388 brillo::Blob signature; local
511 brillo::Blob signature; local
[all...]
/system/core/fs_mgr/
H A Dfs_mgr_verity.cpp115 static int verify_table(const uint8_t *signature, size_t signature_size, argument
133 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature,
148 if (verify_table(verity.signature, sizeof(verity.signature),
599 SHA256(verity.signature, sizeof(verity.signature), curr);
629 /* update current signature hash */
842 // verify the signature on the table
844 // Allow signature verification error when the device is unlocked
847 LWARNING << "Allow signature verificatio
[all...]
/system/security/keystore/
H A Dlegacy_keymaster_device_wrapper.cpp495 const hidl_vec<uint8_t>& signature,
507 auto kmSignature = hidlVec2KmBlob(signature);
492 finish(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams, const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) argument
H A Dkey_store_service.cpp484 const hidl_vec<uint8_t>& signature) {
488 return doLegacySignVerify(name, data, nullptr, signature, KeyPurpose::VERIFY);
1252 const hidl_vec<uint8_t>& signature, const hidl_vec<uint8_t>& entropy,
1300 hidl_vec<uint8_t>() /* TODO(swillden): wire up input to finish() */, signature, hidlCb));
1819 const hidl_vec<uint8_t>& signature,
1863 finish(token, inArgs.hidl_data(), signature, hidl_vec<uint8_t>(), &result);
482 verify(const String16& name, const hidl_vec<uint8_t>& data, const hidl_vec<uint8_t>& signature) argument
1251 finish(const sp<IBinder>& token, const hidl_vec<KeyParameter>& params, const hidl_vec<uint8_t>& signature, const hidl_vec<uint8_t>& entropy, OperationResult* result) argument
1816 doLegacySignVerify(const String16& name, const hidl_vec<uint8_t>& data, hidl_vec<uint8_t>* out, const hidl_vec<uint8_t>& signature, KeyPurpose purpose) argument
/system/tpm/attestation/common/
H A Dtpm_utility_v1.cc434 std::string* signature) {
435 CHECK(signature);
466 TPM_LOG(ERROR, result) << __func__ << ": Failed to generate signature.";
469 signature->assign(TSSBufferAsString(buffer.value(), length));
432 Sign(const std::string& key_blob, const std::string& data_to_sign, std::string* signature) argument
/system/tpm/attestation/server/
H A Dattestation_service.cc418 std::string signature; local
419 if (!tpm_utility_->Sign(key.key_blob(), request.data_to_sign(), &signature)) {
423 result->set_signature(signature);
/system/core/logd/tests/
H A Dlogd_test.cpp105 // liblog_benchmarks has been run designed to SPAM. The signature of
114 static const char signature[] = "\n0 root "; local
116 benchmark = strstr(cp, signature);
120 cp = benchmark + sizeof(signature);
/system/keymaster/
H A Dandroid_keymaster_test.cpp512 string signature; local
513 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE);
526 string signature; local
527 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS);
539 string signature; local
556 string signature; local
557 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN);
569 string signature; local
570 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN);
588 string signature; local
603 string signature; local
617 string signature; local
693 string signature; local
720 string signature; local
740 string signature; local
751 string signature; local
762 string signature; local
773 string signature; local
799 string signature; local
827 string signature; local
840 string signature; local
853 string signature; local
867 string signature; local
880 string signature; local
894 string signature; local
1113 string signature; local
1128 string signature; local
1143 string signature; local
1178 string signature; local
1201 string signature; local
1223 string signature; local
1238 string signature; local
1272 string signature; local
1295 string signature; local
1392 string signature; local
1407 string signature; local
1419 string signature; local
1432 string signature; local
1450 string signature; local
1471 string signature; local
1495 string signature; local
1521 string signature; local
1534 string signature; local
1547 string signature; local
1560 string signature; local
1584 string signature; local
1597 string signature; local
1710 string signature; local
1768 string signature; local
1800 string signature; local
1852 string signature; local
3251 string signature; local
3268 string signature; local
3285 string signature; local
3305 string signature; local
3349 string signature; local
3685 string signature; local
[all...]
H A Dandroid_keymaster_test_utils.cpp301 keymaster_error_t Keymaster2Test::FinishOperation(const string& input, const string& signature, argument
305 return FinishOperation(additional_params, input, signature, &output_params, output);
309 const string& input, const string& signature,
312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()),
313 signature.length()};
365 EXPECT_EQ(KM_ERROR_OK, FinishOperation(message, "" /* signature */, &result));
376 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, message, "" /* signature */, &result));
381 const string& signature, const AuthorizationSet& begin_params,
387 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, message, signature, &result));
392 const string& signature) {
308 FinishOperation(const AuthorizationSet& additional_params, const string& input, const string& signature, AuthorizationSet* output_params, string* output) argument
380 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* output_params) argument
391 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature) argument
400 SignMessage(const string& message, string* signature, keymaster_digest_t digest) argument
412 SignMessage(const string& message, string* signature, keymaster_digest_t digest, keymaster_padding_t padding) argument
425 MacMessage(const string& message, string* signature, size_t mac_length) argument
436 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest) argument
447 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest, keymaster_padding_t padding) argument
459 VerifyMac(const string& message, const string& signature) argument
627 string signature; local
871 finish(const struct keymaster1_device* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
[all...]
H A Dsoft_keymaster_device.cpp1377 const keymaster_blob_t* signature,
1388 return km1_dev->finish(km1_dev, operation_handle, params, signature, out_params, output);
1403 if (signature && signature->data_length > 0)
1404 request.signature.Reinitialize(signature->data, signature->data_length);
1441 const keymaster_blob_t* signature,
1510 signature, &finish_out_params, &finish_output);
1559 if (signature
1374 finish(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* params, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
1437 finish(const keymaster2_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* params, const keymaster_blob_t* input, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument
[all...]
/system/keymaster/include/keymaster/
H A Dandroid_keymaster_messages.h387 Buffer signature; member in struct:keymaster::FinishOperationRequest
/system/update_engine/payload_consumer/
H A Ddelta_performer_integration_test.cc173 brillo::Blob signature; local
176 &signature));
177 return signature.size();
201 brillo::Blob signature; local
202 ASSERT_TRUE(PayloadSigner::SignHash(hash, private_key_path, &signature));
204 payload_path, {signature}, {}, payload_path, out_metadata_size));
263 brillo::Blob hash, signature; local
265 ASSERT_TRUE(PayloadSigner::SignHash(hash, private_key_path, &signature));
268 ASSERT_TRUE(utils::MakeTempFile("signature.XXXXXX", &sig_file, nullptr));
270 ASSERT_TRUE(test_utils::WriteFileVector(sig_file, signature));
620 const Signatures_Signature& signature = sigs_message.signatures(0); local
[all...]
/system/bt/stack/btm/
H A Dbtm_ble.cc2143 * signature: output parameter where data signature is going to
2150 uint16_t len, BLE_SIGNATURE signature) {
2159 uint8_t* p_mac = (uint8_t*)signature;
2199 * Description This function is called to verify the data signature
2202 * p_orig: original data before signature.
2205 * p_comp: signature to be compared against.
2207 * Returns true if signature verified correctly; otherwise false.
2217 BTM_TRACE_ERROR("can not verify signature for unknown device");
2219 BTM_TRACE_ERROR("signature receive
2149 BTM_BleDataSignature(const RawAddress& bd_addr, uint8_t* p_text, uint16_t len, BLE_SIGNATURE signature) argument
[all...]
/system/vold/
H A Dcryptfs.cpp137 unsigned char **signature,
174 KEYMASTER_CRYPTFS_RATE_LIMIT, to_sign, to_sign_size, signature, signature_size);
1040 unsigned char* signature; local
1057 &signature, &signature_size)) {
1062 rc = crypto_scrypt(signature, signature_size, salt, SALT_LEN,
1064 free(signature);
134 keymaster_sign_object(struct crypt_mnt_ftr *ftr, const unsigned char *object, const size_t object_size, unsigned char **signature, size_t *signature_size) argument

Completed in 919 milliseconds

12