Home
last modified time | relevance | path

Searched refs:hash_buf (Results 1 – 4 of 4) sorted by relevance

/system/extras/verity/
Dverity_verifier.cpp54 uint8_t hash_buf[SHA256_DIGEST_LENGTH]; in verify_table() local
55 SHA256(const_cast<uint8_t*>(reinterpret_cast<const uint8_t*>(table)), table_length, hash_buf); in verify_table()
65 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) { in verify_table()
/system/keymaster/key_blob_utils/
Docb_utils.cpp81 UniquePtr<uint8_t[]> hash_buf(new (std::nothrow) uint8_t[SHA256_DIGEST_LENGTH]); in InitializeKeyWrappingContext() local
82 if (!hash_buf.get()) in InitializeKeyWrappingContext()
84 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH); in InitializeKeyWrappingContext()
90 if (!ctx->get() || !hash_buf.get() || !derived_key.get()) in InitializeKeyWrappingContext()
97 SHA256_Final(hash_buf.get(), &sha256_ctx); in InitializeKeyWrappingContext()
106 AES_encrypt(hash_buf.get(), derived_key.get(), &aes_key); in InitializeKeyWrappingContext()
/system/core/fs_mgr/
Dfs_mgr_verity.cpp120 uint8_t hash_buf[SHA256_DIGEST_LENGTH]; in verify_table() local
124 SHA256((uint8_t*)table, table_length, hash_buf); in verify_table()
134 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, in verify_table()
/system/core/fastboot/fuzzy_fastboot/
Dmain.cpp1298 std::string err_msg, hash_before, hash_buf, hash_after; in TEST_P() local
1306 ASSERT_TRUE(PartitionHash(fb.get(), "userdata", &hash_buf, &retcode, &err_msg)) << err_msg; in TEST_P()
1310 EXPECT_NE(hash_before, hash_buf) in TEST_P()
1318 EXPECT_NE(hash_after, hash_buf) << "Unlocking the device did not cause the hash of userdata to " in TEST_P()