/system/core/crash_reporter/ |
D | kernel_collector_test.cc | 296 std::string signature; in ComputeKernelStackSignatureCommon() local 301 collector_.ComputeKernelStackSignature(kStackButNoPC, &signature, false)); in ComputeKernelStackSignatureCommon() 302 EXPECT_EQ("kernel--83615F0A", signature); in ComputeKernelStackSignatureCommon() 308 &signature, in ComputeKernelStackSignatureCommon() 317 &signature, in ComputeKernelStackSignatureCommon() 320 signature); in ComputeKernelStackSignatureCommon() 368 std::string signature; in TEST_F() local 372 collector_.ComputeKernelStackSignature(kBugToPanic, &signature, false)); in TEST_F() 373 EXPECT_EQ("kernel-write_breakme-97D3E92F", signature); in TEST_F() 427 std::string signature; in TEST_F() local [all …]
|
D | kernel_warning_collector.cc | 43 std::string *signature) { in LoadKernelWarning() argument 55 *signature = content->substr(0, end_position); in LoadKernelWarning()
|
/system/keymaster/ |
D | android_keymaster_test.cpp | 448 string signature; in TEST_P() local 449 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P() 462 string signature; in TEST_P() local 463 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); in TEST_P() 475 string signature; in TEST_P() local 492 string signature; in TEST_P() local 493 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P() 505 string signature; in TEST_P() local 506 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P() 526 string signature; in TEST_P() local [all …]
|
D | keymaster0_engine.cpp | 280 unique_ptr<uint8_t[], Malloc_Delete>* signature, in Keymaster0Sign() argument 291 signature->reset(signed_data); in Keymaster0Sign() 326 unique_ptr<uint8_t[], Malloc_Delete> signature; in RsaPrivateTransform() local 328 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { in RsaPrivateTransform() 338 Eraser eraser(signature.get(), signature_length); in RsaPrivateTransform() 345 memcpy(out, signature.get() + signature_length - len, len); in RsaPrivateTransform() 352 memcpy(out + len - signature_length, signature.get(), signature_length); in RsaPrivateTransform() 354 memcpy(out, signature.get(), len); in RsaPrivateTransform() 375 unique_ptr<uint8_t[], Malloc_Delete> signature; in EcdsaSign() local 377 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, in EcdsaSign() [all …]
|
D | android_keymaster_test_utils.cpp | 297 keymaster_error_t Keymaster2Test::FinishOperation(const string& signature, string* output) { in FinishOperation() argument 300 return FinishOperation(additional_params, signature, &output_params, output); in FinishOperation() 304 const string& signature, in FinishOperation() argument 306 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation() 307 signature.length()}; in FinishOperation() 379 const string& signature, const AuthorizationSet& begin_params, in ProcessMessage() argument 389 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, signature, &result)); in ProcessMessage() 394 const string& signature) { in ProcessMessage() argument 401 EXPECT_EQ(KM_ERROR_OK, FinishOperation(signature, &result)); in ProcessMessage() 405 void Keymaster2Test::SignMessage(const string& message, string* signature, in SignMessage() argument [all …]
|
D | android_keymaster_test_utils.h | 204 keymaster_error_t FinishOperation(const std::string& signature, std::string* output); 206 const std::string& signature, std::string* output) { in FinishOperation() argument 207 return FinishOperation(additional_params, signature, nullptr /* output_params */, output); in FinishOperation() 210 const std::string& signature, AuthorizationSet* output_params, 227 const std::string& signature, const AuthorizationSet& begin_params, 231 const std::string& signature); 233 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest); 234 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest, 236 void MacMessage(const std::string& message, std::string* signature, size_t mac_length); 238 void VerifyMessage(const std::string& message, const std::string& signature, [all …]
|
D | ecdsa_operation.cpp | 204 const Buffer& input, const Buffer& signature, in Finish() argument 218 signature.peek_read(), signature.available_read(), ecdsa.get()); in Finish() 223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), in Finish() 224 signature.available_read())) in Finish()
|
D | rsa_operation.h | 99 const Buffer& signature, AuthorizationSet* output_params, 121 const Buffer& signature, AuthorizationSet* output_params, 125 keymaster_error_t VerifyUndigested(const Buffer& signature); 126 keymaster_error_t VerifyDigested(const Buffer& signature); 154 const Buffer& signature, AuthorizationSet* output_params, 166 const Buffer& signature, AuthorizationSet* output_params,
|
D | rsa_operation.cpp | 416 const Buffer& input, const Buffer& signature, in Finish() argument 424 return VerifyUndigested(signature); in Finish() 426 return VerifyDigested(signature); in Finish() 429 keymaster_error_t RsaVerifyOperation::VerifyUndigested(const Buffer& signature) { in VerifyUndigested() argument 440 if (key_len != signature.available_read()) in VerifyUndigested() 459 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(), in VerifyUndigested() 481 keymaster_error_t RsaVerifyOperation::VerifyDigested(const Buffer& signature) { in VerifyDigested() argument 482 if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), signature.available_read())) in VerifyDigested()
|
D | hmac_operation.cpp | 164 const Buffer& input, const Buffer& signature, in Finish() argument 183 size_t siglen = signature.available_read(); in Finish() 188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0) in Finish()
|
/system/extras/verity/ |
D | KeystoreSigner.java | 89 private BootSignature signature; field in BootKeystore 120 v.add(signature); in toASN1Primitive() 140 signature = new BootSignature(sig.getEncoded()); in parse() 145 return Utils.verify(signature.getPublicKey(), innerKeystore, in verify() 146 signature.getSignature(), signature.getAlgorithmIdentifier()); in verify() 152 signature = new BootSignature("keystore", innerKeystore.length); in sign() 153 signature.setCertificate(certificate); in sign() 154 signature.setSignature(rawSignature, in sign()
|
D | VeritySigner.java | 48 byte[] signature = Utils.read(args[2]); in main() 51 if (Utils.verify(publicKey, content, signature, in main() 65 byte[] signature = Utils.sign(privateKey, content); in main() 66 Utils.write(signature, args[2]); in main()
|
D | BootSignature.java | 71 private DEROctetString signature; field in BootSignature 91 public BootSignature(byte[] signature) in BootSignature() argument 93 ASN1InputStream stream = new ASN1InputStream(signature); in BootSignature() 117 this.signature = (DEROctetString) sequence.getObjectAt(4); in BootSignature() 140 return signature.getOctets(); in getSignature() 145 signature = new DEROctetString(sig); in setSignature() 175 return Utils.verify(publicKey, signable, signature.getOctets(), in verify() 185 v.add(signature); in toASN1Primitive() 265 byte[] signature = Arrays.copyOfRange(image, signableSize, image.length); in verifySignature() 266 BootSignature bootsig = new BootSignature(signature); in verifySignature()
|
D | build_verity_metadata.py | 23 def build_metadata_block(verity_table, signature): argument 25 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len) 57 signature = sign_verity_table(verity_table, signer_path, signing_key) 59 metadata_block = build_metadata_block(verity_table, signature)
|
/system/core/gatekeeperd/ |
D | SoftGateKeeper.h | 81 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, in ComputePasswordSignature() argument 84 if (signature == NULL) return; in ComputePasswordSignature() 86 sizeof(salt), N, r, p, signature, signature_length); in ComputePasswordSignature() 94 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, in ComputeSignature() argument 96 if (signature == NULL) return; in ComputeSignature() 97 memset(signature, 0, signature_length); in ComputeSignature()
|
/system/core/libmincrypt/test/ |
D | ecdsa_test.c | 224 unsigned char* signature; in main() local 269 signature = parsehex(signature_##n, &slen); \ in main() 270 int result = dsa_sig_unpack(signature, slen, &r, &s); \ in main() 274 free(signature); \ in main()
|
D | rsa_test.c | 804 unsigned char* signature; in main() local 810 signature = parsehex(signature_##n, &slen); \ in main() 811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \ in main()
|
/system/update_engine/payload_generator/ |
D | payload_signer.cc | 59 for (const brillo::Blob& signature : signatures) { in ConvertSignatureToProtobufBlob() local 63 sig_message->set_data(signature.data(), signature.size()); in ConvertSignatureToProtobufBlob() 365 brillo::Blob signature(RSA_size(rsa)); in SignHash() local 368 signature.data(), in SignHash() 378 signature.size()); in SignHash() 379 out_signature->swap(signature); in SignHash() 388 brillo::Blob signature; in SignHashWithKeys() local 389 TEST_AND_RETURN_FALSE(SignHash(hash_data, path, &signature)); in SignHashWithKeys() 390 signatures.push_back(signature); in SignHashWithKeys() 511 brillo::Blob signature; in GetMetadataSignature() local [all …]
|
/system/update_engine/payload_consumer/ |
D | payload_verifier.cc | 105 const Signatures_Signature& signature = signatures.signatures(i); in VerifySignature() local 106 brillo::Blob sig_data(signature.data().begin(), signature.data().end()); in VerifySignature()
|
/system/tpm/trunks/ |
D | mock_tpm.cc | 99 TPMT_SIGNATURE* signature, in CertifyCreationSync() argument 103 creation_ticket, certify_info, signature, in CertifyCreationSync() 116 TPMT_SIGNATURE* signature, in GetSessionAuditDigestSync() argument 120 in_scheme, audit_info, signature, in GetSessionAuditDigestSync() 248 TPMT_SIGNATURE* signature, in NV_CertifySync() argument 252 certify_info, signature, authorization_delegate); in NV_CertifySync()
|
D | tpm_utility_test.cc | 767 signature_out.signature.rsassa.sig.size = 2; in TEST_F() 768 signature_out.signature.rsassa.sig.buffer[0] = 'h'; in TEST_F() 769 signature_out.signature.rsassa.sig.buffer[1] = 'i'; in TEST_F() 770 std::string signature; in TEST_F() local 788 &signature)); in TEST_F() 789 EXPECT_EQ(0, signature.compare("hi")); in TEST_F() 796 std::string signature; in TEST_F() local 812 &signature)); in TEST_F() 819 std::string signature; in TEST_F() local 831 &signature)); in TEST_F() [all …]
|
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 613 const uint8_t* signature, const size_t signatureLength) { in verify_dsa() argument 625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { in verify_dsa() 635 const uint8_t* signature, const size_t signatureLength) { in verify_ec() argument 647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= in verify_ec() 658 const uint8_t* signature, const size_t signatureLength) { in verify_rsa() argument 683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { in verify_rsa() 699 const uint8_t* signature, const size_t signatureLength) { in openssl_verify_data() argument 700 if (signedData == NULL || signature == NULL) { in openssl_verify_data() 715 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() 720 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() [all …]
|
/system/tpm/attestation/common/ |
D | common.proto | 55 // The quote; a signature generated with the AIK. 80 // The wrapper message of any data and its signature. 84 // The signature of the data field. 85 optional bytes signature = 2; field
|
/system/tpm/attestation/client/ |
D | main.cc | 247 std::string signature; in ScheduleCommand() local 249 if (!base::ReadFileToString(filename2, &signature)) { in ScheduleCommand() 258 signature); in ScheduleCommand() 450 WriteOutput(reply.signature()); in OnSignComplete() 458 const std::string& signature) { in VerifySignature() argument 464 input, signature)); in VerifySignature() 468 const std::string& signature, in VerifySignature2() argument 471 if (crypto.VerifySignature(key_info.public_key(), input, signature)) { in VerifySignature2()
|
/system/vold/ |
D | Keymaster.cpp | 45 const keymaster_blob_t* signature, 93 const keymaster_blob_t* signature, in finish() argument 96 return mDevice->finish(mDevice, operation_handle, in_params, signature, out_params, output); in finish() 106 const keymaster_blob_t* signature, in finish() argument 109 return mDevice->finish(mDevice, operation_handle, in_params, nullptr, signature, out_params, in finish()
|