Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 31) sorted by relevance

12

/system/extras/verity/
DBootSignature.java56 private DEROctetString signature; field in BootSignature
78 signature = new DEROctetString(sig); in setSignature()
92 byte[] signature = Utils.sign(key, signable); in sign()
93 byte[] signed = Arrays.copyOf(image, image.length + signature.length); in sign()
94 for (int i=0; i < signature.length; i++) { in sign()
95 signed[i+image.length] = signature[i]; in sign()
105 v.add(signature); in toASN1Primitive()
116 byte[] signature = bootsig.sign(image, key); in doSignature()
117 Utils.write(signature, outPath); in doSignature()
Dbuild_verity_metadata.py23 def build_metadata_block(verity_table, signature): argument
25 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len)
57 signature = sign_verity_table(verity_table, signer_path, signing_key)
59 metadata_block = build_metadata_block(verity_table, signature)
DVeritySigner.java30 byte[] signature = Utils.sign(privateKey, content); in main()
31 Utils.write(signature, args[2]); in main()
DKeystoreSigner.java84 private BootSignature signature; field in BootKeystore
108 v.add(signature); in toASN1Primitive()
115 signature = new BootSignature("keystore", innerKeystore.length); in sign()
116 signature.setSignature(rawSignature); in sign()
/system/keymaster/
Drsa_operation.cpp62 keymaster_error_t RsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { in Finish() argument
66 if (data_.available_read() != signature.available_read()) in Finish()
70 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(), in Finish()
Decdsa_operation.cpp56 keymaster_error_t EcdsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { in Finish() argument
58 signature.peek_read(), signature.available_read(), ecdsa_key_); in Finish()
Ddsa_operation.cpp56 keymaster_error_t DsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { in Finish() argument
61 signature.peek_read(), signature.available_read(), dsa_key_); in Finish()
Decdsa_operation.h55 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
63 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
Drsa_operation.h53 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
61 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
Ddsa_operation.h55 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
63 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
Dgoogle_keymaster_test.cpp446 Buffer* signature() { in signature() function in keymaster::test::SigningOperationsTest
671 ASSERT_TRUE(signature() != NULL); in TEST_F()
694 finish_request.signature.Reinitialize(*signature()); in TEST_F()
707 ASSERT_TRUE(signature() != NULL); in TEST_F()
730 finish_request.signature.Reinitialize(*signature()); in TEST_F()
743 ASSERT_TRUE(signature() != NULL); in TEST_F()
766 finish_request.signature.Reinitialize(*signature()); in TEST_F()
901 ASSERT_TRUE(signature() != NULL); in TEST_F()
924 finish_request.signature.Reinitialize(*signature()); in TEST_F()
971 ASSERT_TRUE(signature() != NULL); in TEST_F()
[all …]
Doperation.h45 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output) = 0;
Dgoogle_keymaster_messages.cpp203 return sizeof(op_handle) + signature.SerializedSize(); in SerializedSize()
208 return signature.Serialize(buf, end); in Serialize()
212 return copy_uint64_from_buf(buf_ptr, end, &op_handle) && signature.Deserialize(buf_ptr, end); in Deserialize()
Dgoogle_keymaster_messages_test.cpp227 msg.signature.Reinitialize("bar", 3); in TEST()
231 EXPECT_EQ(3U, deserialized->signature.available_read()); in TEST()
232 EXPECT_EQ(0, memcmp(deserialized->signature.peek_read(), "bar", 3)); in TEST()
/system/core/fs_mgr/
Dfs_mgr_verity.c87 static int verify_table(char *signature, char *table, int table_length) in verify_table() argument
105 (uint8_t*) signature, in verify_table()
151 static int read_verity_metadata(char *block_device, char **signature, char **table) in read_verity_metadata() argument
197 *signature = (char*) malloc(RSANUMBYTES * sizeof(char)); in read_verity_metadata()
198 if (!*signature) { in read_verity_metadata()
202 if (!fread(*signature, RSANUMBYTES, 1, device)) { in read_verity_metadata()
204 free(*signature); in read_verity_metadata()
211 free(*signature); in read_verity_metadata()
225 free(*signature); in read_verity_metadata()
/system/core/libmincrypt/test/
Decdsa_test.c224 unsigned char* signature; in main() local
269 signature = parsehex(signature_##n, &slen); \ in main()
270 int result = dsa_sig_unpack(signature, slen, &r, &s); \ in main()
274 free(signature); \ in main()
Drsa_test.c804 unsigned char* signature; in main() local
810 signature = parsehex(signature_##n, &slen); \ in main()
811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \ in main()
/system/security/softkeymaster/
Dkeymaster_openssl.cpp629 const uint8_t* signature, const size_t signatureLength) { in verify_dsa() argument
641 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { in verify_dsa()
651 const uint8_t* signature, const size_t signatureLength) { in verify_ec() argument
663 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= in verify_ec()
674 const uint8_t* signature, const size_t signatureLength) { in verify_rsa() argument
699 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { in verify_rsa()
715 const uint8_t* signature, const size_t signatureLength) { in openssl_verify_data() argument
717 if (signedData == NULL || signature == NULL) { in openssl_verify_data()
732 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data()
737 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data()
[all …]
/system/core/include/mincrypt/
Drsa.h49 const uint8_t* signature,
/system/security/softkeymaster/include/keymaster/
Dsoftkeymaster.h38 const size_t signedDataLength, const uint8_t* signature,
/system/core/libmincrypt/
Drsa.c250 const uint8_t *signature, in RSA_verify() argument
276 buf[i] = signature[i]; in RSA_verify()
/system/core/fastbootd/commands/
Dpartitions.h81 uint8_t signature[8]; member
Dpartitions.c149 table->second_valid = strcmp("EFI PART", (char *) table->second_header->signature) == 0; in GPT_map_from_content()
176 if (strcmp("EFI PART", (char *) header->signature)) { in GPT_map()
594 strncpy((char *)content->header.signature, "EFI PART", 8); in GPT_default_content()
/system/core/fastboot/
Dfastboot_protocol.txt119 "verify:%08x" Send a digital signature to verify the downloaded
166 bootloader requiring a signature before
/system/security/keystore/include/keystore/
DIKeystoreService.h108 const uint8_t* signature, size_t signatureLength) = 0;

12