/system/keymaster/ |
D | android_keymaster_test.cpp | 526 string signature; in TEST_P() local 527 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P() 540 string signature; in TEST_P() local 541 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); in TEST_P() 553 string signature; in TEST_P() local 567 string signature; in TEST_P() local 568 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P() 580 string signature; in TEST_P() local 581 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P() 601 string signature; in TEST_P() local [all …]
|
D | android_keymaster_test_utils.cpp | 274 keymaster_error_t Keymaster1Test::FinishOperation(const string& signature, string* output) { in FinishOperation() argument 277 return FinishOperation(additional_params, signature, &output_params, output); in FinishOperation() 281 const string& signature, in FinishOperation() argument 283 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation() 284 signature.length()}; in FinishOperation() 335 const string& signature, const AuthorizationSet& begin_params, in ProcessMessage() argument 345 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, signature, &result)); in ProcessMessage() 350 const string& signature) { in ProcessMessage() argument 357 EXPECT_EQ(KM_ERROR_OK, FinishOperation(signature, &result)); in ProcessMessage() 361 void Keymaster1Test::SignMessage(const string& message, string* signature, in SignMessage() argument [all …]
|
D | keymaster0_engine.cpp | 282 unique_ptr<uint8_t[], Malloc_Delete>* signature, in Keymaster0Sign() argument 293 signature->reset(signed_data); in Keymaster0Sign() 322 unique_ptr<uint8_t[], Malloc_Delete> signature; in RsaPrivateTransform() local 324 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) in RsaPrivateTransform() 326 Eraser eraser(signature.get(), signature_length); in RsaPrivateTransform() 333 memcpy(out, signature.get() + signature_length - len, len); in RsaPrivateTransform() 340 memcpy(out + len - signature_length, signature.get(), signature_length); in RsaPrivateTransform() 342 memcpy(out, signature.get(), len); in RsaPrivateTransform() 374 unique_ptr<uint8_t[], Malloc_Delete> signature; in EcdsaSign() local 376 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, &signature_length)) in EcdsaSign() [all …]
|
D | android_keymaster_test_utils.h | 196 keymaster_error_t FinishOperation(const std::string& signature, std::string* output); 198 const std::string& signature, std::string* output) { in FinishOperation() argument 199 return FinishOperation(additional_params, signature, nullptr /* output_params */, output); in FinishOperation() 202 const std::string& signature, AuthorizationSet* output_params, 215 const std::string& signature, const AuthorizationSet& begin_params, 219 const std::string& signature); 221 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest); 222 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest, 224 void MacMessage(const std::string& message, std::string* signature, size_t mac_length); 226 void VerifyMessage(const std::string& message, const std::string& signature, [all …]
|
D | ecdsa_operation.cpp | 199 const Buffer& signature, in Finish() argument 209 signature.peek_read(), signature.available_read(), ecdsa.get()); in Finish() 214 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), in Finish() 215 signature.available_read())) in Finish()
|
D | rsa_operation.h | 98 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 119 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 123 keymaster_error_t VerifyUndigested(const Buffer& signature); 124 keymaster_error_t VerifyDigested(const Buffer& signature); 151 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 162 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
|
D | rsa_operation.cpp | 409 const Buffer& signature, in Finish() argument 413 return VerifyUndigested(signature); in Finish() 415 return VerifyDigested(signature); in Finish() 418 keymaster_error_t RsaVerifyOperation::VerifyUndigested(const Buffer& signature) { in VerifyUndigested() argument 429 if (key_len != signature.available_read()) in VerifyUndigested() 448 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(), in VerifyUndigested() 470 keymaster_error_t RsaVerifyOperation::VerifyDigested(const Buffer& signature) { in VerifyDigested() argument 471 if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), signature.available_read())) in VerifyDigested()
|
D | hmac_operation.cpp | 164 const Buffer& signature, in Finish() argument 179 size_t siglen = signature.available_read(); in Finish() 184 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0) in Finish()
|
D | aes_operation.h | 71 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 114 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 135 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
|
D | ecdsa_operation.h | 59 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature, 72 keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& signature,
|
/system/extras/verity/ |
D | KeystoreSigner.java | 89 private BootSignature signature; field in BootKeystore 120 v.add(signature); in toASN1Primitive() 140 signature = new BootSignature(sig.getEncoded()); in parse() 145 return Utils.verify(signature.getPublicKey(), innerKeystore, in verify() 146 signature.getSignature(), signature.getAlgorithmIdentifier()); in verify() 152 signature = new BootSignature("keystore", innerKeystore.length); in sign() 153 signature.setCertificate(certificate); in sign() 154 signature.setSignature(rawSignature, in sign()
|
D | VeritySigner.java | 48 byte[] signature = Utils.read(args[2]); in main() 51 if (Utils.verify(publicKey, content, signature, in main() 65 byte[] signature = Utils.sign(privateKey, content); in main() 66 Utils.write(signature, args[2]); in main()
|
D | BootSignature.java | 71 private DEROctetString signature; field in BootSignature 91 public BootSignature(byte[] signature) in BootSignature() argument 93 ASN1InputStream stream = new ASN1InputStream(signature); in BootSignature() 117 this.signature = (DEROctetString) sequence.getObjectAt(4); in BootSignature() 140 return signature.getOctets(); in getSignature() 145 signature = new DEROctetString(sig); in setSignature() 174 return Utils.verify(publicKey, signable, signature.getOctets(), in verify() 184 v.add(signature); in toASN1Primitive() 264 byte[] signature = Arrays.copyOfRange(image, signableSize, image.length); in verifySignature() 265 BootSignature bootsig = new BootSignature(signature); in verifySignature()
|
D | build_verity_metadata.py | 23 def build_metadata_block(verity_table, signature): argument 25 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len) 57 signature = sign_verity_table(verity_table, signer_path, signing_key) 59 metadata_block = build_metadata_block(verity_table, signature)
|
D | verify_boot_signature.c | 60 ASN1_OCTET_STRING *signature; member 68 ASN1_SIMPLE(BootSignature, signature, ASN1_OCTET_STRING) 347 bs->signature->data, bs->signature->length, rsa)) { in verify_signature()
|
D | VerityVerifier.java | 45 private byte[] signature; field in VerityVerifier 282 signature = new byte[VERITY_SIGNATURE_SIZE]; in readVerityData() 283 img.readFully(signature); in readVerityData() 301 return Utils.verify(key, table, signature, in verifyMetaData()
|
/system/core/gatekeeperd/ |
D | SoftGateKeeper.h | 79 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, in ComputePasswordSignature() argument 82 if (signature == NULL) return; in ComputePasswordSignature() 84 sizeof(salt), N, r, p, signature, signature_length); in ComputePasswordSignature() 92 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, in ComputeSignature() argument 94 if (signature == NULL) return; in ComputeSignature() 95 memset(signature, 0, signature_length); in ComputeSignature()
|
/system/core/libmincrypt/test/ |
D | ecdsa_test.c | 224 unsigned char* signature; in main() local 269 signature = parsehex(signature_##n, &slen); \ in main() 270 int result = dsa_sig_unpack(signature, slen, &r, &s); \ in main() 274 free(signature); \ in main()
|
D | rsa_test.c | 804 unsigned char* signature; in main() local 810 signature = parsehex(signature_##n, &slen); \ in main() 811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \ in main()
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.c | 111 static int verify_table(char *signature, char *table, int table_length) in verify_table() argument 129 (uint8_t*) signature, in verify_table() 207 static int read_verity_metadata(uint64_t device_size, char *block_device, char **signature, in read_verity_metadata() argument 216 *signature = NULL; in read_verity_metadata() 265 *signature = (char*) malloc(RSANUMBYTES); in read_verity_metadata() 266 if (!*signature) { in read_verity_metadata() 270 if (TEMP_FAILURE_RETRY(read(device, *signature, RSANUMBYTES)) != RSANUMBYTES) { in read_verity_metadata() 307 free(*signature); in read_verity_metadata() 308 *signature = NULL; in read_verity_metadata() 682 char *signature = NULL; in compare_last_signature() local [all …]
|
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 613 const uint8_t* signature, const size_t signatureLength) { in verify_dsa() argument 625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { in verify_dsa() 635 const uint8_t* signature, const size_t signatureLength) { in verify_ec() argument 647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= in verify_ec() 658 const uint8_t* signature, const size_t signatureLength) { in verify_rsa() argument 683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { in verify_rsa() 699 const uint8_t* signature, const size_t signatureLength) { in openssl_verify_data() argument 700 if (signedData == NULL || signature == NULL) { in openssl_verify_data() 715 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() 720 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() [all …]
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 194 ComputePasswordSignature(password_handle->signature, sizeof(password_handle->signature), in CreatePasswordHandle() 211 return memcmp_s(generated_handle->signature, expected_handle->signature, in DoVerify() 212 sizeof(expected_handle->signature)) == 0; in DoVerify()
|
/system/gatekeeper/include/gatekeeper/ |
D | gatekeeper.h | 89 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, 106 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length,
|
D | password_handle.h | 41 uint8_t signature[32]; member
|
/system/core/include/mincrypt/ |
D | rsa.h | 49 const uint8_t* signature,
|