Searched defs:digest (Results 1 - 25 of 40) sorted by relevance

12

/system/keymaster/km_openssl/
H A Drsa_key.cpp53 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { argument
57 return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256;
H A Dhmac.cpp59 uint8_t* digest = tmp; local
61 digest = out_digest;
63 if (nullptr == ::HMAC(EVP_sha256(), key_.get(), key_len_, data, data_len, digest, nullptr)) {
72 bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const {
73 return Verify(data.peek_read(), data.available_read(), digest.peek_read(),
74 digest.available_read());
77 bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest, argument
86 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
H A Decdsa_operation.cpp41 keymaster_digest_t digest; local
42 if (!GetAndValidateDigest(begin_params, ecdsa_key, &digest, error)) return nullptr;
46 digest, pkey.release()));
H A Dhmac_operation.cpp60 keymaster_digest_t digest; local
61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) {
69 move(key), purpose(), digest, mac_length_bits / 8, min_mac_length_bits / 8));
88 HmacOperation::HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, argument
96 switch (digest) {
170 uint8_t digest[EVP_MAX_MD_SIZE];
172 if (!HMAC_Final(&ctx_, digest, &digest_len)) return TranslateLastOpenSslError();
177 if (!output->reserve(mac_length_) || !output->write(digest, mac_length_))
185 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0)
/system/keymaster/tests/
H A Dhmac_test.cpp33 uint8_t digest[32]; member in struct:keymaster::test::HmacTest
70 uint8_t digest_copy[sizeof(test.digest)];
71 memcpy(digest_copy, test.digest, sizeof(test.digest));
/system/nvram/core/
H A Dcrypto_boringssl.cpp31 uint8_t* digest,
34 // |digest_size| might be less, so store the digest in a local buffer.
38 // Copy the result to |digest|.
40 memcpy(digest, buffer, digest_size);
42 memcpy(digest, buffer, sizeof(buffer));
43 memset(digest + sizeof(buffer), 0, digest_size - sizeof(buffer));
29 SHA256(const uint8_t* data, size_t data_size, uint8_t* digest, size_t digest_size) argument
/system/keymaster/include/keymaster/km_openssl/
H A Decdsa_operation.h33 keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key)
34 : Operation(purpose, move(hw_enforced), move(sw_enforced)), digest_(digest),
56 keymaster_digest_t digest, EVP_PKEY* key)
57 : EcdsaOperation(move(hw_enforced), move(sw_enforced), KM_PURPOSE_SIGN, digest, key) {}
71 keymaster_digest_t digest, EVP_PKEY* key)
72 : EcdsaOperation(move(hw_enforced), move(sw_enforced), KM_PURPOSE_VERIFY, digest, key) {}
93 keymaster_digest_t digest, EVP_PKEY* key) = 0;
100 keymaster_digest_t digest, EVP_PKEY* key) override {
102 EcdsaSignOperation(move(hw_enforced), move(sw_enforced), digest, key);
110 keymaster_digest_t digest, EVP_PKE
32 EcdsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) argument
55 EcdsaSignOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, EVP_PKEY* key) argument
70 EcdsaVerifyOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, EVP_PKEY* key) argument
[all...]
H A Drsa_operation.h37 keymaster_purpose_t purpose, keymaster_digest_t digest,
40 padding_(padding), digest_(digest), digest_algorithm_(nullptr) {}
51 keymaster_digest_t digest() const { return digest_; } function in class:keymaster::RsaOperation
77 keymaster_purpose_t purpose, keymaster_digest_t digest,
93 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key)
94 : RsaDigestingOperation(move(hw_enforced), move(sw_enforced), KM_PURPOSE_SIGN, digest,
117 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key)
118 : RsaDigestingOperation(move(hw_enforced), move(sw_enforced), KM_PURPOSE_VERIFY, digest,
141 keymaster_purpose_t purpose, keymaster_digest_t digest,
143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, paddin
36 RsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
92 RsaSignOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
116 RsaVerifyOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
140 RsaCryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
158 RsaEncryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
172 RsaDecryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
[all...]
/system/keymaster/legacy_support/
H A Decdsa_keymaster1_operation.cpp101 keymaster_digest_t digest; local
102 if (!GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr;
111 key.hw_enforced_move(), key.sw_enforced_move(), digest, ecdsa.release(), engine_));
H A Dec_keymaster1_key.cpp37 static bool is_supported(uint32_t digest) { argument
38 return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256;
52 LOG_D("Found request for unsupported digest %u", entry.enumerated);
H A Decdsa_keymaster1_operation.h57 keymaster_digest_t digest, EVP_PKEY* key,
59 : BaseOperation(move(hw_enforced), move(sw_enforced), digest, key),
56 EcdsaKeymaster1Operation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, EVP_PKEY* key, const Keymaster1Engine* engine) argument
H A Drsa_keymaster1_key.cpp36 static bool is_supported(uint32_t digest) { argument
37 return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256;
53 LOG_D("Found request for unsupported digest %u", entry.enumerated);
H A Drsa_keymaster1_operation.cpp117 keymaster_digest_t digest; local
118 if (!GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr;
130 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(),
134 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(),
H A Drsa_keymaster1_operation.h57 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key,
59 : BaseOperation(move(hw_enforced), move(sw_enforced), digest, padding, key),
56 RsaKeymaster1Operation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key, const Keymaster1Engine* engine) argument
H A Dkeymaster0_engine.cpp253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
255 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned)digest_len, ec_key);
257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key);
343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
351 // Truncate digest if it's too long
359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
378 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, ec_key);
H A Dkeymaster1_engine.cpp334 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
340 // Truncate digest if it's too long
345 keymaster_blob_t input = {digest, digest_len};
/system/keymaster/android_keymaster/
H A Doperation.cpp42 bool OperationFactory::supported(keymaster_digest_t digest) const {
46 if (digest == supported_digests[i])
115 keymaster_digest_t* digest,
118 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) {
121 } else if (!supported(*digest)) {
122 LOG_E("Digest %d not supported", *digest);
127 // Otherwise the key needs to authorize the specific digest.
128 !key.authorizations().Contains(TAG_DIGEST, *digest) &&
129 !key.authorizations().Contains(TAG_DIGEST_OLD, *digest)) {
130 LOG_E("Digest %d was specified, but not authorized by key", *digest);
114 GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, keymaster_digest_t* digest, keymaster_error_t* error) const argument
[all...]
/system/tpm/trunks/
H A Dpolicy_session_test.cc105 std::string digest; local
110 EXPECT_EQ(TPM_RC_SUCCESS, session.GetDigest(&digest));
111 EXPECT_EQ(static_cast<size_t>(SHA256_DIGEST_SIZE), digest.size());
116 std::string digest; local
119 EXPECT_EQ(TPM_RC_FAILURE, session.GetDigest(&digest));
157 std::string pcr_digest("digest");
H A Dpolicy_session_impl.cc75 TPM_RC PolicySessionImpl::GetDigest(std::string* digest) { argument
76 CHECK(digest);
83 LOG(ERROR) << "Error getting policy digest: " << GetErrorString(result);
86 *digest = StringFrom_TPM2B_DIGEST(policy_digest);
/system/update_engine/
H A Dcertificate_checker.cc148 uint8_t digest[EVP_MAX_MD_SIZE]; local
153 digest)) {
154 LOG(WARNING) << "Failed to generate digest of X509 certificate "
160 // We convert the raw bytes of the digest to an hex string, for storage in
162 string digest_string = base::HexEncode(digest, digest_length);
/system/core/gatekeeperd/
H A DSoftGateKeeper.h39 uint8_t digest[SHA256_DIGEST_LENGTH]; member in struct:gatekeeper::fast_hash_t
139 std::unique_ptr<uint8_t[]> digest(new uint8_t[digest_size]);
140 memcpy(digest.get(), &salt, sizeof(salt));
141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length);
143 SHA256(digest.get(), digest_size, (uint8_t *) &fast_hash.digest);
151 return memcmp(computed.digest, fast_hash.digest, SHA256_DIGEST_LENGTH) == 0;
/system/keymaster/ng/include/
H A Dauthorization_set.h260 AuthorizationSetBuilder& Digest(Digest digest) { argument
261 return Authorization(TAG_DIGEST, digest);
/system/netd/server/dns/
H A DDnsTlsSocket.cpp122 ALOGW("Server cert digest extraction failed");
126 ALOGW("Wrong digest length: %d", digest_len);
282 std::vector<uint8_t> digest; local
283 if (!getSPKIDigest(cert, &digest)) {
288 if (mServer.fingerprints.count(digest) > 0) {
/system/security/keystore/
H A Dblob.h60 uint8_t digest[MD5_DIGEST_LENGTH]; member in struct:blobv2
68 offsetof(blobv3, aead_tag) == offsetof(blobv2, digest) &&
/system/security/keystore-engine/
H A Dandroid_engine.cpp142 /* ecdsa_sign signs |digest_len| bytes from |digest| with |ec_key| and writes
145 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
147 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned) digest_len, ec_key);
162 key_id, digest, digest_len, &reply, &reply_len);
178 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len,

Completed in 724 milliseconds

12