/system/keymaster/km_openssl/ |
H A D | rsa_key.cpp | 53 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { argument 57 return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256;
|
H A D | hmac.cpp | 59 uint8_t* digest = tmp; local 61 digest = out_digest; 63 if (nullptr == ::HMAC(EVP_sha256(), key_.get(), key_len_, data, data_len, digest, nullptr)) { 72 bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const { 73 return Verify(data.peek_read(), data.available_read(), digest.peek_read(), 74 digest.available_read()); 77 bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest, argument 86 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
|
H A D | ecdsa_operation.cpp | 41 keymaster_digest_t digest; local 42 if (!GetAndValidateDigest(begin_params, ecdsa_key, &digest, error)) return nullptr; 46 digest, pkey.release()));
|
H A D | hmac_operation.cpp | 60 keymaster_digest_t digest; local 61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) { 69 move(key), purpose(), digest, mac_length_bits / 8, min_mac_length_bits / 8)); 88 HmacOperation::HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, argument 96 switch (digest) { 170 uint8_t digest[EVP_MAX_MD_SIZE]; 172 if (!HMAC_Final(&ctx_, digest, &digest_len)) return TranslateLastOpenSslError(); 177 if (!output->reserve(mac_length_) || !output->write(digest, mac_length_)) 185 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0)
|
/system/keymaster/tests/ |
H A D | hmac_test.cpp | 33 uint8_t digest[32]; member in struct:keymaster::test::HmacTest 70 uint8_t digest_copy[sizeof(test.digest)]; 71 memcpy(digest_copy, test.digest, sizeof(test.digest));
|
/system/nvram/core/ |
H A D | crypto_boringssl.cpp | 31 uint8_t* digest, 34 // |digest_size| might be less, so store the digest in a local buffer. 38 // Copy the result to |digest|. 40 memcpy(digest, buffer, digest_size); 42 memcpy(digest, buffer, sizeof(buffer)); 43 memset(digest + sizeof(buffer), 0, digest_size - sizeof(buffer)); 29 SHA256(const uint8_t* data, size_t data_size, uint8_t* digest, size_t digest_size) argument
|
/system/keymaster/include/keymaster/km_openssl/ |
H A D | ecdsa_operation.h | 33 keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) 34 : Operation(purpose, move(hw_enforced), move(sw_enforced)), digest_(digest), 56 keymaster_digest_t digest, EVP_PKEY* key) 57 : EcdsaOperation(move(hw_enforced), move(sw_enforced), KM_PURPOSE_SIGN, digest, key) {} 71 keymaster_digest_t digest, EVP_PKEY* key) 72 : EcdsaOperation(move(hw_enforced), move(sw_enforced), KM_PURPOSE_VERIFY, digest, key) {} 93 keymaster_digest_t digest, EVP_PKEY* key) = 0; 100 keymaster_digest_t digest, EVP_PKEY* key) override { 102 EcdsaSignOperation(move(hw_enforced), move(sw_enforced), digest, key); 110 keymaster_digest_t digest, EVP_PKE 32 EcdsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) argument 55 EcdsaSignOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, EVP_PKEY* key) argument 70 EcdsaVerifyOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, EVP_PKEY* key) argument [all...] |
H A D | rsa_operation.h | 37 keymaster_purpose_t purpose, keymaster_digest_t digest, 40 padding_(padding), digest_(digest), digest_algorithm_(nullptr) {} 51 keymaster_digest_t digest() const { return digest_; } function in class:keymaster::RsaOperation 77 keymaster_purpose_t purpose, keymaster_digest_t digest, 93 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) 94 : RsaDigestingOperation(move(hw_enforced), move(sw_enforced), KM_PURPOSE_SIGN, digest, 117 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) 118 : RsaDigestingOperation(move(hw_enforced), move(sw_enforced), KM_PURPOSE_VERIFY, digest, 141 keymaster_purpose_t purpose, keymaster_digest_t digest, 143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, paddin 36 RsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument 92 RsaSignOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument 116 RsaVerifyOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument 140 RsaCryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument 158 RsaEncryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument 172 RsaDecryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument [all...] |
/system/keymaster/legacy_support/ |
H A D | ecdsa_keymaster1_operation.cpp | 101 keymaster_digest_t digest; local 102 if (!GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr; 111 key.hw_enforced_move(), key.sw_enforced_move(), digest, ecdsa.release(), engine_));
|
H A D | ec_keymaster1_key.cpp | 37 static bool is_supported(uint32_t digest) { argument 38 return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256; 52 LOG_D("Found request for unsupported digest %u", entry.enumerated);
|
H A D | ecdsa_keymaster1_operation.h | 57 keymaster_digest_t digest, EVP_PKEY* key, 59 : BaseOperation(move(hw_enforced), move(sw_enforced), digest, key), 56 EcdsaKeymaster1Operation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, EVP_PKEY* key, const Keymaster1Engine* engine) argument
|
H A D | rsa_keymaster1_key.cpp | 36 static bool is_supported(uint32_t digest) { argument 37 return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256; 53 LOG_D("Found request for unsupported digest %u", entry.enumerated);
|
H A D | rsa_keymaster1_operation.cpp | 117 keymaster_digest_t digest; local 118 if (!GetAndValidateDigest(begin_params, key, &digest, error)) return nullptr; 130 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), 134 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(),
|
H A D | rsa_keymaster1_operation.h | 57 keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key, 59 : BaseOperation(move(hw_enforced), move(sw_enforced), digest, padding, key), 56 RsaKeymaster1Operation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key, const Keymaster1Engine* engine) argument
|
H A D | keymaster0_engine.cpp | 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 255 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned)digest_len, ec_key); 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); 343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 351 // Truncate digest if it's too long 359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, 378 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, ec_key);
|
H A D | keymaster1_engine.cpp | 334 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 340 // Truncate digest if it's too long 345 keymaster_blob_t input = {digest, digest_len};
|
/system/keymaster/android_keymaster/ |
H A D | operation.cpp | 42 bool OperationFactory::supported(keymaster_digest_t digest) const { 46 if (digest == supported_digests[i]) 115 keymaster_digest_t* digest, 118 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) { 121 } else if (!supported(*digest)) { 122 LOG_E("Digest %d not supported", *digest); 127 // Otherwise the key needs to authorize the specific digest. 128 !key.authorizations().Contains(TAG_DIGEST, *digest) && 129 !key.authorizations().Contains(TAG_DIGEST_OLD, *digest)) { 130 LOG_E("Digest %d was specified, but not authorized by key", *digest); 114 GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, keymaster_digest_t* digest, keymaster_error_t* error) const argument [all...] |
/system/tpm/trunks/ |
H A D | policy_session_test.cc | 105 std::string digest; local 110 EXPECT_EQ(TPM_RC_SUCCESS, session.GetDigest(&digest)); 111 EXPECT_EQ(static_cast<size_t>(SHA256_DIGEST_SIZE), digest.size()); 116 std::string digest; local 119 EXPECT_EQ(TPM_RC_FAILURE, session.GetDigest(&digest)); 157 std::string pcr_digest("digest");
|
H A D | policy_session_impl.cc | 75 TPM_RC PolicySessionImpl::GetDigest(std::string* digest) { argument 76 CHECK(digest); 83 LOG(ERROR) << "Error getting policy digest: " << GetErrorString(result); 86 *digest = StringFrom_TPM2B_DIGEST(policy_digest);
|
/system/update_engine/ |
H A D | certificate_checker.cc | 148 uint8_t digest[EVP_MAX_MD_SIZE]; local 153 digest)) { 154 LOG(WARNING) << "Failed to generate digest of X509 certificate " 160 // We convert the raw bytes of the digest to an hex string, for storage in 162 string digest_string = base::HexEncode(digest, digest_length);
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 39 uint8_t digest[SHA256_DIGEST_LENGTH]; member in struct:gatekeeper::fast_hash_t 139 std::unique_ptr<uint8_t[]> digest(new uint8_t[digest_size]); 140 memcpy(digest.get(), &salt, sizeof(salt)); 141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); 143 SHA256(digest.get(), digest_size, (uint8_t *) &fast_hash.digest); 151 return memcmp(computed.digest, fast_hash.digest, SHA256_DIGEST_LENGTH) == 0;
|
/system/keymaster/ng/include/ |
H A D | authorization_set.h | 260 AuthorizationSetBuilder& Digest(Digest digest) { argument 261 return Authorization(TAG_DIGEST, digest);
|
/system/netd/server/dns/ |
H A D | DnsTlsSocket.cpp | 122 ALOGW("Server cert digest extraction failed"); 126 ALOGW("Wrong digest length: %d", digest_len); 282 std::vector<uint8_t> digest; local 283 if (!getSPKIDigest(cert, &digest)) { 288 if (mServer.fingerprints.count(digest) > 0) {
|
/system/security/keystore/ |
H A D | blob.h | 60 uint8_t digest[MD5_DIGEST_LENGTH]; member in struct:blobv2 68 offsetof(blobv3, aead_tag) == offsetof(blobv2, digest) &&
|
/system/security/keystore-engine/ |
H A D | android_engine.cpp | 142 /* ecdsa_sign signs |digest_len| bytes from |digest| with |ec_key| and writes 145 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 147 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned) digest_len, ec_key); 162 key_id, digest, digest_len, &reply, &reply_len); 178 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len,
|