/system/tpm/trunks/ |
H A D | mock_tpm.cc | 94 TPMT_SIGNATURE* signature, 98 creation_ticket, certify_info, signature, authorization_delegate); 110 TPMT_SIGNATURE* signature, 114 in_scheme, audit_info, signature, authorization_delegate); 238 TPMT_SIGNATURE* signature, 242 certify_info, signature, authorization_delegate); 84 CertifyCreationSync( const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPM2B_DATA& qualifying_data, const TPM2B_DIGEST& creation_hash, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_CREATION& creation_ticket, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 100 GetSessionAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_SH_HMAC& session_handle, const std::string& session_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 227 NV_CertifySync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const UINT16& size, const UINT16& offset, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument
|
H A D | tpm_utility_test.cc | 711 signature_out.signature.rsassa.sig.size = 2; 712 signature_out.signature.rsassa.sig.buffer[0] = 'h'; 713 signature_out.signature.rsassa.sig.buffer[1] = 'i'; 714 std::string signature; local 728 &mock_authorization_delegate_, &signature)); 729 EXPECT_EQ(0, signature.compare("hi")); 736 std::string signature; local 749 &mock_authorization_delegate_, &signature)); 756 std::string signature; local 765 &mock_authorization_delegate_, &signature)); 772 std::string signature; local 782 std::string signature; local 798 std::string signature; local 814 std::string signature; local 830 std::string signature; local 842 std::string signature; local 868 std::string signature; local 891 std::string signature; local 908 std::string signature; local 925 std::string signature; local 940 std::string signature; local 955 std::string signature; local 970 std::string signature; local 985 std::string signature; local 1000 std::string signature; local 1020 std::string signature; local [all...] |
H A D | trunks_client_test.cc | 123 std::string signature; local 126 std::string(32, 'a'), session->GetDelegate(), &signature); 132 std::string(32, 'a'), signature, nullptr); 460 std::string signature; local 464 &signature); 470 std::string(32, 0), signature, nullptr); 590 std::string signature; local 595 &signature); 627 &signature); 633 std::string(32, 'a'), signature, nullpt 801 std::string signature; local 1044 VerifyRSASignature(const std::string& public_key, const std::string& data, const std::string& signature) argument 1089 std::string signature; local [all...] |
H A D | tpm_utility_impl.cc | 539 std::string* signature) { 600 signature->resize(signature_out.signature.rsapss.sig.size); 601 signature->assign( 602 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature_out.signature.rsapss.sig)); 604 signature->resize(signature_out.signature.rsassa.sig.size); 605 signature->assign( 606 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature_out.signature.rsassa.sig)); 615 const std::string& signature, 534 Sign(TPM_HANDLE key_handle, TPM_ALG_ID scheme, TPM_ALG_ID hash_alg, const std::string& plaintext, AuthorizationDelegate* delegate, std::string* signature) argument 611 Verify(TPM_HANDLE key_handle, TPM_ALG_ID scheme, TPM_ALG_ID hash_alg, const std::string& plaintext, const std::string& signature, AuthorizationDelegate* delegate) argument 682 TPMT_SIGNATURE signature; local [all...] |
H A D | tpm_generated.h | 1487 TPMU_SIGNATURE signature; member in struct:trunks::TPMT_SIGNATURE 4247 const TPMT_SIGNATURE& signature)> 4261 TPMT_SIGNATURE* signature, 4278 TPMT_SIGNATURE* signature, 4282 const TPMT_SIGNATURE& signature)> 4298 TPMT_SIGNATURE* signature, 4320 TPMT_SIGNATURE* signature, 4324 const TPMT_SIGNATURE& signature)> 4337 TPMT_SIGNATURE* signature, 4352 TPMT_SIGNATURE* signature, [all...] |
H A D | tpm_generated.cc | 6659 result = Serialize_TPMU_SIGNATURE(value.signature, value.sig_alg, buffer); 6677 result = Parse_TPMU_SIGNATURE(buffer, value->sig_alg, &value->signature, 16399 TPMT_SIGNATURE* signature, 16469 rc = Parse_TPMT_SIGNATURE(&buffer, signature, &signature_bytes); 16502 TPMT_SIGNATURE signature; local 16503 TPM_RC rc = Tpm::ParseResponse_Certify(response, &certify_info, &signature, 16509 callback.Run(rc, certify_info, signature); 16543 TPMT_SIGNATURE* signature, 16554 rc = ParseResponse_Certify(response, certify_info, signature, 16688 TPMT_SIGNATURE* signature, 16396 ParseResponse_Certify( const std::string& response, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 16536 CertifySync(const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 16685 ParseResponse_CertifyCreation( const std::string& response, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 16792 TPMT_SIGNATURE signature; local 16829 CertifyCreationSync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_DH_OBJECT& object_handle, const std::string& object_handle_name, const TPM2B_DATA& qualifying_data, const TPM2B_DIGEST& creation_hash, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_CREATION& creation_ticket, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 16962 ParseResponse_Quote(const std::string& response, TPM2B_ATTEST* quoted, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 17067 TPMT_SIGNATURE signature; local 17100 QuoteSync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const TPML_PCR_SELECTION& pcrselect, TPM2B_ATTEST* quoted, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 17241 ParseResponse_GetSessionAuditDigest( const std::string& response, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 17349 TPMT_SIGNATURE signature; local 17386 GetSessionAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_SH_HMAC& session_handle, const std::string& session_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 17521 ParseResponse_GetCommandAuditDigest( const std::string& response, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 17629 TPMT_SIGNATURE signature; local 17663 GetCommandAuditDigestSync( const TPMI_RH_ENDORSEMENT& privacy_handle, const std::string& privacy_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* audit_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 17797 ParseResponse_GetTime( const std::string& response, TPM2B_ATTEST* time_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 17903 TPMT_SIGNATURE signature; local 17938 GetTimeSync(const TPMI_RH_ENDORSEMENT& privacy_admin_handle, const std::string& privacy_admin_handle_name, const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, TPM2B_ATTEST* time_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 18473 SerializeCommand_VerifySignature( const TPMI_DH_OBJECT& key_handle, const std::string& key_handle_name, const TPM2B_DIGEST& digest, const TPMT_SIGNATURE& signature, std::string* serialized_command, AuthorizationDelegate* authorization_delegate) argument 18668 VerifySignature(const TPMI_DH_OBJECT& key_handle, const std::string& key_handle_name, const TPM2B_DIGEST& digest, const TPMT_SIGNATURE& signature, AuthorizationDelegate* authorization_delegate, const VerifySignatureResponse& callback) argument 18690 VerifySignatureSync(const TPMI_DH_OBJECT& key_handle, const std::string& key_handle_name, const TPM2B_DIGEST& digest, const TPMT_SIGNATURE& signature, TPMT_TK_VERIFIED* validation, AuthorizationDelegate* authorization_delegate) argument 18817 ParseResponse_Sign(const std::string& response, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 18902 TPMT_SIGNATURE signature; local 18935 SignSync(const TPMI_DH_OBJECT& key_handle, const std::string& key_handle_name, const TPM2B_DIGEST& digest, const TPMT_SIG_SCHEME& in_scheme, const TPMT_TK_HASHCHECK& validation, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 33053 ParseResponse_NV_Certify( const std::string& response, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument 33159 TPMT_SIGNATURE signature; local 33198 NV_CertifySync(const TPMI_DH_OBJECT& sign_handle, const std::string& sign_handle_name, const TPMI_RH_NV_AUTH& auth_handle, const std::string& auth_handle_name, const TPMI_RH_NV_INDEX& nv_index, const std::string& nv_index_name, const TPM2B_DATA& qualifying_data, const TPMT_SIG_SCHEME& in_scheme, const UINT16& size, const UINT16& offset, TPM2B_ATTEST* certify_info, TPMT_SIGNATURE* signature, AuthorizationDelegate* authorization_delegate) argument [all...] |
/system/update_engine/payload_generator/ |
H A D | generate_delta_main.cc | 65 << "Invalid signature size: " << str; 68 "Only signature sizes of 256 bytes are supported."; 134 brillo::Blob signature; local 135 CHECK(utils::ReadFile(signature_file, &signature)); 136 signatures->push_back(signature); 299 "Raw signature size used for hash calculation. " 304 "Raw signature file to sign payload with. To pass multiple " 307 "signature will be assigned a client version, starting from " 310 "Raw signature file with the signature o [all...] |
H A D | payload_signer.cc | 59 for (const brillo::Blob& signature : signatures) { 63 sig_message->set_data(signature.data(), signature.size()); 79 // manifest after adding the dummy signature operation, and 82 // if the payload major version supports metadata signature, 0 otherwise. 109 // Write metadata signature size in header. 115 // Replace metadata signature. 122 LOG(INFO) << "Metadata signature size: " << metadata_signature_size; 125 // Is there already a signature op in place? 127 // The signature o 388 brillo::Blob signature; local 511 brillo::Blob signature; local [all...] |
/system/core/fs_mgr/ |
H A D | fs_mgr_verity.cpp | 115 static int verify_table(const uint8_t *signature, size_t signature_size, argument 133 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, 148 if (verify_table(verity.signature, sizeof(verity.signature), 599 SHA256(verity.signature, sizeof(verity.signature), curr); 629 /* update current signature hash */ 842 // verify the signature on the table 844 // Allow signature verification error when the device is unlocked 847 LWARNING << "Allow signature verificatio [all...] |
/system/security/keystore/ |
H A D | legacy_keymaster_device_wrapper.cpp | 495 const hidl_vec<uint8_t>& signature, 507 auto kmSignature = hidlVec2KmBlob(signature); 492 finish(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams, const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature, finish_cb _hidl_cb) argument
|
H A D | key_store_service.cpp | 484 const hidl_vec<uint8_t>& signature) { 488 return doLegacySignVerify(name, data, nullptr, signature, KeyPurpose::VERIFY); 1252 const hidl_vec<uint8_t>& signature, const hidl_vec<uint8_t>& entropy, 1300 hidl_vec<uint8_t>() /* TODO(swillden): wire up input to finish() */, signature, hidlCb)); 1819 const hidl_vec<uint8_t>& signature, 1863 finish(token, inArgs.hidl_data(), signature, hidl_vec<uint8_t>(), &result); 482 verify(const String16& name, const hidl_vec<uint8_t>& data, const hidl_vec<uint8_t>& signature) argument 1251 finish(const sp<IBinder>& token, const hidl_vec<KeyParameter>& params, const hidl_vec<uint8_t>& signature, const hidl_vec<uint8_t>& entropy, OperationResult* result) argument 1816 doLegacySignVerify(const String16& name, const hidl_vec<uint8_t>& data, hidl_vec<uint8_t>* out, const hidl_vec<uint8_t>& signature, KeyPurpose purpose) argument
|
/system/tpm/attestation/common/ |
H A D | tpm_utility_v1.cc | 434 std::string* signature) { 435 CHECK(signature); 466 TPM_LOG(ERROR, result) << __func__ << ": Failed to generate signature."; 469 signature->assign(TSSBufferAsString(buffer.value(), length)); 432 Sign(const std::string& key_blob, const std::string& data_to_sign, std::string* signature) argument
|
/system/tpm/attestation/server/ |
H A D | attestation_service.cc | 418 std::string signature; local 419 if (!tpm_utility_->Sign(key.key_blob(), request.data_to_sign(), &signature)) { 423 result->set_signature(signature);
|
/system/core/logd/tests/ |
H A D | logd_test.cpp | 105 // liblog_benchmarks has been run designed to SPAM. The signature of 114 static const char signature[] = "\n0 root "; local 116 benchmark = strstr(cp, signature); 120 cp = benchmark + sizeof(signature);
|
/system/keymaster/ |
H A D | android_keymaster_test.cpp | 512 string signature; local 513 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); 526 string signature; local 527 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); 539 string signature; local 556 string signature; local 557 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); 569 string signature; local 570 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN); 588 string signature; local 603 string signature; local 617 string signature; local 693 string signature; local 720 string signature; local 740 string signature; local 751 string signature; local 762 string signature; local 773 string signature; local 799 string signature; local 827 string signature; local 840 string signature; local 853 string signature; local 867 string signature; local 880 string signature; local 894 string signature; local 1113 string signature; local 1128 string signature; local 1143 string signature; local 1178 string signature; local 1201 string signature; local 1223 string signature; local 1238 string signature; local 1272 string signature; local 1295 string signature; local 1392 string signature; local 1407 string signature; local 1419 string signature; local 1432 string signature; local 1450 string signature; local 1471 string signature; local 1495 string signature; local 1521 string signature; local 1534 string signature; local 1547 string signature; local 1560 string signature; local 1584 string signature; local 1597 string signature; local 1710 string signature; local 1768 string signature; local 1800 string signature; local 1852 string signature; local 3251 string signature; local 3268 string signature; local 3285 string signature; local 3305 string signature; local 3349 string signature; local 3685 string signature; local [all...] |
H A D | android_keymaster_test_utils.cpp | 301 keymaster_error_t Keymaster2Test::FinishOperation(const string& input, const string& signature, argument 305 return FinishOperation(additional_params, input, signature, &output_params, output); 309 const string& input, const string& signature, 312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), 313 signature.length()}; 365 EXPECT_EQ(KM_ERROR_OK, FinishOperation(message, "" /* signature */, &result)); 376 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, message, "" /* signature */, &result)); 381 const string& signature, const AuthorizationSet& begin_params, 387 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, message, signature, &result)); 392 const string& signature) { 308 FinishOperation(const AuthorizationSet& additional_params, const string& input, const string& signature, AuthorizationSet* output_params, string* output) argument 380 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* output_params) argument 391 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature) argument 400 SignMessage(const string& message, string* signature, keymaster_digest_t digest) argument 412 SignMessage(const string& message, string* signature, keymaster_digest_t digest, keymaster_padding_t padding) argument 425 MacMessage(const string& message, string* signature, size_t mac_length) argument 436 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest) argument 447 VerifyMessage(const string& message, const string& signature, keymaster_digest_t digest, keymaster_padding_t padding) argument 459 VerifyMac(const string& message, const string& signature) argument 627 string signature; local 871 finish(const struct keymaster1_device* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* in_params, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument [all...] |
H A D | soft_keymaster_device.cpp | 1377 const keymaster_blob_t* signature, 1388 return km1_dev->finish(km1_dev, operation_handle, params, signature, out_params, output); 1403 if (signature && signature->data_length > 0) 1404 request.signature.Reinitialize(signature->data, signature->data_length); 1441 const keymaster_blob_t* signature, 1510 signature, &finish_out_params, &finish_output); 1559 if (signature 1374 finish(const keymaster1_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* params, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument 1437 finish(const keymaster2_device_t* dev, keymaster_operation_handle_t operation_handle, const keymaster_key_param_set_t* params, const keymaster_blob_t* input, const keymaster_blob_t* signature, keymaster_key_param_set_t* out_params, keymaster_blob_t* output) argument [all...] |
/system/keymaster/include/keymaster/ |
H A D | android_keymaster_messages.h | 387 Buffer signature; member in struct:keymaster::FinishOperationRequest
|
/system/update_engine/payload_consumer/ |
H A D | delta_performer_integration_test.cc | 173 brillo::Blob signature; local 176 &signature)); 177 return signature.size(); 201 brillo::Blob signature; local 202 ASSERT_TRUE(PayloadSigner::SignHash(hash, private_key_path, &signature)); 204 payload_path, {signature}, {}, payload_path, out_metadata_size)); 263 brillo::Blob hash, signature; local 265 ASSERT_TRUE(PayloadSigner::SignHash(hash, private_key_path, &signature)); 268 ASSERT_TRUE(utils::MakeTempFile("signature.XXXXXX", &sig_file, nullptr)); 270 ASSERT_TRUE(test_utils::WriteFileVector(sig_file, signature)); 620 const Signatures_Signature& signature = sigs_message.signatures(0); local [all...] |
/system/bt/stack/btm/ |
H A D | btm_ble.cc | 2143 * signature: output parameter where data signature is going to 2150 uint16_t len, BLE_SIGNATURE signature) { 2159 uint8_t* p_mac = (uint8_t*)signature; 2199 * Description This function is called to verify the data signature 2202 * p_orig: original data before signature. 2205 * p_comp: signature to be compared against. 2207 * Returns true if signature verified correctly; otherwise false. 2217 BTM_TRACE_ERROR("can not verify signature for unknown device"); 2219 BTM_TRACE_ERROR("signature receive 2149 BTM_BleDataSignature(const RawAddress& bd_addr, uint8_t* p_text, uint16_t len, BLE_SIGNATURE signature) argument [all...] |
/system/vold/ |
H A D | cryptfs.cpp | 137 unsigned char **signature, 174 KEYMASTER_CRYPTFS_RATE_LIMIT, to_sign, to_sign_size, signature, signature_size); 1040 unsigned char* signature; local 1057 &signature, &signature_size)) { 1062 rc = crypto_scrypt(signature, signature_size, salt, SALT_LEN, 1064 free(signature); 134 keymaster_sign_object(struct crypt_mnt_ftr *ftr, const unsigned char *object, const size_t object_size, unsigned char **signature, size_t *signature_size) argument
|