Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 107) sorted by relevance

12345

/system/core/crash_reporter/
Dkernel_collector_test.cc296 std::string signature; in ComputeKernelStackSignatureCommon() local
301 collector_.ComputeKernelStackSignature(kStackButNoPC, &signature, false)); in ComputeKernelStackSignatureCommon()
302 EXPECT_EQ("kernel--83615F0A", signature); in ComputeKernelStackSignatureCommon()
308 &signature, in ComputeKernelStackSignatureCommon()
317 &signature, in ComputeKernelStackSignatureCommon()
320 signature); in ComputeKernelStackSignatureCommon()
368 std::string signature; in TEST_F() local
372 collector_.ComputeKernelStackSignature(kBugToPanic, &signature, false)); in TEST_F()
373 EXPECT_EQ("kernel-write_breakme-97D3E92F", signature); in TEST_F()
427 std::string signature; in TEST_F() local
[all …]
Dkernel_warning_collector.cc43 std::string *signature) { in LoadKernelWarning() argument
55 *signature = content->substr(0, end_position); in LoadKernelWarning()
/system/keymaster/
Dandroid_keymaster_test.cpp448 string signature; in TEST_P() local
449 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
462 string signature; in TEST_P() local
463 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); in TEST_P()
475 string signature; in TEST_P() local
492 string signature; in TEST_P() local
493 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
505 string signature; in TEST_P() local
506 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
526 string signature; in TEST_P() local
[all …]
Dkeymaster0_engine.cpp280 unique_ptr<uint8_t[], Malloc_Delete>* signature, in Keymaster0Sign() argument
291 signature->reset(signed_data); in Keymaster0Sign()
326 unique_ptr<uint8_t[], Malloc_Delete> signature; in RsaPrivateTransform() local
328 if (!Keymaster0Sign(&sign_params, *key_blob, in, len, &signature, &signature_length)) { in RsaPrivateTransform()
338 Eraser eraser(signature.get(), signature_length); in RsaPrivateTransform()
345 memcpy(out, signature.get() + signature_length - len, len); in RsaPrivateTransform()
352 memcpy(out + len - signature_length, signature.get(), signature_length); in RsaPrivateTransform()
354 memcpy(out, signature.get(), len); in RsaPrivateTransform()
375 unique_ptr<uint8_t[], Malloc_Delete> signature; in EcdsaSign() local
377 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, in EcdsaSign()
[all …]
Dandroid_keymaster_test_utils.cpp297 keymaster_error_t Keymaster2Test::FinishOperation(const string& signature, string* output) { in FinishOperation() argument
300 return FinishOperation(additional_params, signature, &output_params, output); in FinishOperation()
304 const string& signature, in FinishOperation() argument
306 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation()
307 signature.length()}; in FinishOperation()
379 const string& signature, const AuthorizationSet& begin_params, in ProcessMessage() argument
389 EXPECT_EQ(KM_ERROR_OK, FinishOperation(update_params, signature, &result)); in ProcessMessage()
394 const string& signature) { in ProcessMessage() argument
401 EXPECT_EQ(KM_ERROR_OK, FinishOperation(signature, &result)); in ProcessMessage()
405 void Keymaster2Test::SignMessage(const string& message, string* signature, in SignMessage() argument
[all …]
Dandroid_keymaster_test_utils.h204 keymaster_error_t FinishOperation(const std::string& signature, std::string* output);
206 const std::string& signature, std::string* output) { in FinishOperation() argument
207 return FinishOperation(additional_params, signature, nullptr /* output_params */, output); in FinishOperation()
210 const std::string& signature, AuthorizationSet* output_params,
227 const std::string& signature, const AuthorizationSet& begin_params,
231 const std::string& signature);
233 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest);
234 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest,
236 void MacMessage(const std::string& message, std::string* signature, size_t mac_length);
238 void VerifyMessage(const std::string& message, const std::string& signature,
[all …]
Decdsa_operation.cpp204 const Buffer& input, const Buffer& signature, in Finish() argument
218 signature.peek_read(), signature.available_read(), ecdsa.get()); in Finish()
223 } else if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), in Finish()
224 signature.available_read())) in Finish()
Drsa_operation.h99 const Buffer& signature, AuthorizationSet* output_params,
121 const Buffer& signature, AuthorizationSet* output_params,
125 keymaster_error_t VerifyUndigested(const Buffer& signature);
126 keymaster_error_t VerifyDigested(const Buffer& signature);
154 const Buffer& signature, AuthorizationSet* output_params,
166 const Buffer& signature, AuthorizationSet* output_params,
Drsa_operation.cpp416 const Buffer& input, const Buffer& signature, in Finish() argument
424 return VerifyUndigested(signature); in Finish()
426 return VerifyDigested(signature); in Finish()
429 keymaster_error_t RsaVerifyOperation::VerifyUndigested(const Buffer& signature) { in VerifyUndigested() argument
440 if (key_len != signature.available_read()) in VerifyUndigested()
459 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(), in VerifyUndigested()
481 keymaster_error_t RsaVerifyOperation::VerifyDigested(const Buffer& signature) { in VerifyDigested() argument
482 if (!EVP_DigestVerifyFinal(&digest_ctx_, signature.peek_read(), signature.available_read())) in VerifyDigested()
Dhmac_operation.cpp164 const Buffer& input, const Buffer& signature, in Finish() argument
183 size_t siglen = signature.available_read(); in Finish()
188 if (CRYPTO_memcmp(signature.peek_read(), digest, siglen) != 0) in Finish()
/system/extras/verity/
DKeystoreSigner.java89 private BootSignature signature; field in BootKeystore
120 v.add(signature); in toASN1Primitive()
140 signature = new BootSignature(sig.getEncoded()); in parse()
145 return Utils.verify(signature.getPublicKey(), innerKeystore, in verify()
146 signature.getSignature(), signature.getAlgorithmIdentifier()); in verify()
152 signature = new BootSignature("keystore", innerKeystore.length); in sign()
153 signature.setCertificate(certificate); in sign()
154 signature.setSignature(rawSignature, in sign()
DVeritySigner.java48 byte[] signature = Utils.read(args[2]); in main()
51 if (Utils.verify(publicKey, content, signature, in main()
65 byte[] signature = Utils.sign(privateKey, content); in main()
66 Utils.write(signature, args[2]); in main()
DBootSignature.java71 private DEROctetString signature; field in BootSignature
91 public BootSignature(byte[] signature) in BootSignature() argument
93 ASN1InputStream stream = new ASN1InputStream(signature); in BootSignature()
117 this.signature = (DEROctetString) sequence.getObjectAt(4); in BootSignature()
140 return signature.getOctets(); in getSignature()
145 signature = new DEROctetString(sig); in setSignature()
175 return Utils.verify(publicKey, signable, signature.getOctets(), in verify()
185 v.add(signature); in toASN1Primitive()
265 byte[] signature = Arrays.copyOfRange(image, signableSize, image.length); in verifySignature()
266 BootSignature bootsig = new BootSignature(signature); in verifySignature()
Dbuild_verity_metadata.py23 def build_metadata_block(verity_table, signature): argument
25 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len)
57 signature = sign_verity_table(verity_table, signer_path, signing_key)
59 metadata_block = build_metadata_block(verity_table, signature)
/system/core/gatekeeperd/
DSoftGateKeeper.h81 virtual void ComputePasswordSignature(uint8_t *signature, uint32_t signature_length, in ComputePasswordSignature() argument
84 if (signature == NULL) return; in ComputePasswordSignature()
86 sizeof(salt), N, r, p, signature, signature_length); in ComputePasswordSignature()
94 virtual void ComputeSignature(uint8_t *signature, uint32_t signature_length, in ComputeSignature() argument
96 if (signature == NULL) return; in ComputeSignature()
97 memset(signature, 0, signature_length); in ComputeSignature()
/system/core/libmincrypt/test/
Decdsa_test.c224 unsigned char* signature; in main() local
269 signature = parsehex(signature_##n, &slen); \ in main()
270 int result = dsa_sig_unpack(signature, slen, &r, &s); \ in main()
274 free(signature); \ in main()
Drsa_test.c804 unsigned char* signature; in main() local
810 signature = parsehex(signature_##n, &slen); \ in main()
811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \ in main()
/system/update_engine/payload_generator/
Dpayload_signer.cc59 for (const brillo::Blob& signature : signatures) { in ConvertSignatureToProtobufBlob() local
63 sig_message->set_data(signature.data(), signature.size()); in ConvertSignatureToProtobufBlob()
365 brillo::Blob signature(RSA_size(rsa)); in SignHash() local
368 signature.data(), in SignHash()
378 signature.size()); in SignHash()
379 out_signature->swap(signature); in SignHash()
388 brillo::Blob signature; in SignHashWithKeys() local
389 TEST_AND_RETURN_FALSE(SignHash(hash_data, path, &signature)); in SignHashWithKeys()
390 signatures.push_back(signature); in SignHashWithKeys()
511 brillo::Blob signature; in GetMetadataSignature() local
[all …]
/system/update_engine/payload_consumer/
Dpayload_verifier.cc105 const Signatures_Signature& signature = signatures.signatures(i); in VerifySignature() local
106 brillo::Blob sig_data(signature.data().begin(), signature.data().end()); in VerifySignature()
/system/tpm/trunks/
Dmock_tpm.cc99 TPMT_SIGNATURE* signature, in CertifyCreationSync() argument
103 creation_ticket, certify_info, signature, in CertifyCreationSync()
116 TPMT_SIGNATURE* signature, in GetSessionAuditDigestSync() argument
120 in_scheme, audit_info, signature, in GetSessionAuditDigestSync()
248 TPMT_SIGNATURE* signature, in NV_CertifySync() argument
252 certify_info, signature, authorization_delegate); in NV_CertifySync()
Dtpm_utility_test.cc767 signature_out.signature.rsassa.sig.size = 2; in TEST_F()
768 signature_out.signature.rsassa.sig.buffer[0] = 'h'; in TEST_F()
769 signature_out.signature.rsassa.sig.buffer[1] = 'i'; in TEST_F()
770 std::string signature; in TEST_F() local
788 &signature)); in TEST_F()
789 EXPECT_EQ(0, signature.compare("hi")); in TEST_F()
796 std::string signature; in TEST_F() local
812 &signature)); in TEST_F()
819 std::string signature; in TEST_F() local
831 &signature)); in TEST_F()
[all …]
/system/security/softkeymaster/
Dkeymaster_openssl.cpp613 const uint8_t* signature, const size_t signatureLength) { in verify_dsa() argument
625 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { in verify_dsa()
635 const uint8_t* signature, const size_t signatureLength) { in verify_ec() argument
647 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= in verify_ec()
658 const uint8_t* signature, const size_t signatureLength) { in verify_rsa() argument
683 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { in verify_rsa()
699 const uint8_t* signature, const size_t signatureLength) { in openssl_verify_data() argument
700 if (signedData == NULL || signature == NULL) { in openssl_verify_data()
715 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data()
720 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data()
[all …]
/system/tpm/attestation/common/
Dcommon.proto55 // The quote; a signature generated with the AIK.
80 // The wrapper message of any data and its signature.
84 // The signature of the data field.
85 optional bytes signature = 2; field
/system/tpm/attestation/client/
Dmain.cc247 std::string signature; in ScheduleCommand() local
249 if (!base::ReadFileToString(filename2, &signature)) { in ScheduleCommand()
258 signature); in ScheduleCommand()
450 WriteOutput(reply.signature()); in OnSignComplete()
458 const std::string& signature) { in VerifySignature() argument
464 input, signature)); in VerifySignature()
468 const std::string& signature, in VerifySignature2() argument
471 if (crypto.VerifySignature(key_info.public_key(), input, signature)) { in VerifySignature2()
/system/vold/
DKeymaster.cpp45 const keymaster_blob_t* signature,
93 const keymaster_blob_t* signature, in finish() argument
96 return mDevice->finish(mDevice, operation_handle, in_params, signature, out_params, output); in finish()
106 const keymaster_blob_t* signature, in finish() argument
109 return mDevice->finish(mDevice, operation_handle, in_params, nullptr, signature, out_params, in finish()

12345