/system/extras/verity/ |
D | BootSignature.java | 56 private DEROctetString signature; field in BootSignature 78 signature = new DEROctetString(sig); in setSignature() 92 byte[] signature = Utils.sign(key, signable); in sign() 93 byte[] signed = Arrays.copyOf(image, image.length + signature.length); in sign() 94 for (int i=0; i < signature.length; i++) { in sign() 95 signed[i+image.length] = signature[i]; in sign() 105 v.add(signature); in toASN1Primitive() 116 byte[] signature = bootsig.sign(image, key); in doSignature() 117 Utils.write(signature, outPath); in doSignature()
|
D | build_verity_metadata.py | 23 def build_metadata_block(verity_table, signature): argument 25 block = struct.pack("II256sI", MAGIC_NUMBER, VERSION, signature, table_len) 57 signature = sign_verity_table(verity_table, signer_path, signing_key) 59 metadata_block = build_metadata_block(verity_table, signature)
|
D | VeritySigner.java | 30 byte[] signature = Utils.sign(privateKey, content); in main() 31 Utils.write(signature, args[2]); in main()
|
D | KeystoreSigner.java | 84 private BootSignature signature; field in BootKeystore 108 v.add(signature); in toASN1Primitive() 115 signature = new BootSignature("keystore", innerKeystore.length); in sign() 116 signature.setSignature(rawSignature); in sign()
|
/system/keymaster/ |
D | rsa_operation.cpp | 62 keymaster_error_t RsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { in Finish() argument 66 if (data_.available_read() != signature.available_read()) in Finish() 70 int bytes_decrypted = RSA_public_decrypt(signature.available_read(), signature.peek_read(), in Finish()
|
D | ecdsa_operation.cpp | 56 keymaster_error_t EcdsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { in Finish() argument 58 signature.peek_read(), signature.available_read(), ecdsa_key_); in Finish()
|
D | dsa_operation.cpp | 56 keymaster_error_t DsaVerifyOperation::Finish(const Buffer& signature, Buffer* /* output */) { in Finish() argument 61 signature.peek_read(), signature.available_read(), dsa_key_); in Finish()
|
D | ecdsa_operation.h | 55 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output); 63 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
|
D | rsa_operation.h | 53 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output); 61 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
|
D | dsa_operation.h | 55 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output); 63 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output);
|
D | google_keymaster_test.cpp | 446 Buffer* signature() { in signature() function in keymaster::test::SigningOperationsTest 671 ASSERT_TRUE(signature() != NULL); in TEST_F() 694 finish_request.signature.Reinitialize(*signature()); in TEST_F() 707 ASSERT_TRUE(signature() != NULL); in TEST_F() 730 finish_request.signature.Reinitialize(*signature()); in TEST_F() 743 ASSERT_TRUE(signature() != NULL); in TEST_F() 766 finish_request.signature.Reinitialize(*signature()); in TEST_F() 901 ASSERT_TRUE(signature() != NULL); in TEST_F() 924 finish_request.signature.Reinitialize(*signature()); in TEST_F() 971 ASSERT_TRUE(signature() != NULL); in TEST_F() [all …]
|
D | operation.h | 45 virtual keymaster_error_t Finish(const Buffer& signature, Buffer* output) = 0;
|
D | google_keymaster_messages.cpp | 203 return sizeof(op_handle) + signature.SerializedSize(); in SerializedSize() 208 return signature.Serialize(buf, end); in Serialize() 212 return copy_uint64_from_buf(buf_ptr, end, &op_handle) && signature.Deserialize(buf_ptr, end); in Deserialize()
|
D | google_keymaster_messages_test.cpp | 227 msg.signature.Reinitialize("bar", 3); in TEST() 231 EXPECT_EQ(3U, deserialized->signature.available_read()); in TEST() 232 EXPECT_EQ(0, memcmp(deserialized->signature.peek_read(), "bar", 3)); in TEST()
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.c | 87 static int verify_table(char *signature, char *table, int table_length) in verify_table() argument 105 (uint8_t*) signature, in verify_table() 151 static int read_verity_metadata(char *block_device, char **signature, char **table) in read_verity_metadata() argument 197 *signature = (char*) malloc(RSANUMBYTES * sizeof(char)); in read_verity_metadata() 198 if (!*signature) { in read_verity_metadata() 202 if (!fread(*signature, RSANUMBYTES, 1, device)) { in read_verity_metadata() 204 free(*signature); in read_verity_metadata() 211 free(*signature); in read_verity_metadata() 225 free(*signature); in read_verity_metadata()
|
/system/core/libmincrypt/test/ |
D | ecdsa_test.c | 224 unsigned char* signature; in main() local 269 signature = parsehex(signature_##n, &slen); \ in main() 270 int result = dsa_sig_unpack(signature, slen, &r, &s); \ in main() 274 free(signature); \ in main()
|
D | rsa_test.c | 804 unsigned char* signature; in main() local 810 signature = parsehex(signature_##n, &slen); \ in main() 811 int result = RSA_verify(&key_15, signature, slen, hash, sizeof(hash)); \ in main()
|
/system/security/softkeymaster/ |
D | keymaster_openssl.cpp | 629 const uint8_t* signature, const size_t signatureLength) { in verify_dsa() argument 641 if (DSA_verify(0, signedData, signedDataLength, signature, signatureLength, dsa.get()) <= 0) { in verify_dsa() 651 const uint8_t* signature, const size_t signatureLength) { in verify_ec() argument 663 if (ECDSA_verify(0, signedData, signedDataLength, signature, signatureLength, eckey.get()) <= in verify_ec() 674 const uint8_t* signature, const size_t signatureLength) { in verify_rsa() argument 699 if (!RSA_public_decrypt(signatureLength, signature, tmp, rsa.get(), RSA_NO_PADDING)) { in verify_rsa() 715 const uint8_t* signature, const size_t signatureLength) { in openssl_verify_data() argument 717 if (signedData == NULL || signature == NULL) { in openssl_verify_data() 732 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() 737 signedData, signedDataLength, signature, signatureLength); in openssl_verify_data() [all …]
|
/system/core/include/mincrypt/ |
D | rsa.h | 49 const uint8_t* signature,
|
/system/security/softkeymaster/include/keymaster/ |
D | softkeymaster.h | 38 const size_t signedDataLength, const uint8_t* signature,
|
/system/core/libmincrypt/ |
D | rsa.c | 250 const uint8_t *signature, in RSA_verify() argument 276 buf[i] = signature[i]; in RSA_verify()
|
/system/core/fastbootd/commands/ |
D | partitions.h | 81 uint8_t signature[8]; member
|
D | partitions.c | 149 table->second_valid = strcmp("EFI PART", (char *) table->second_header->signature) == 0; in GPT_map_from_content() 176 if (strcmp("EFI PART", (char *) header->signature)) { in GPT_map() 594 strncpy((char *)content->header.signature, "EFI PART", 8); in GPT_default_content()
|
/system/core/fastboot/ |
D | fastboot_protocol.txt | 119 "verify:%08x" Send a digital signature to verify the downloaded 166 bootloader requiring a signature before
|
/system/security/keystore/include/keystore/ |
D | IKeystoreService.h | 108 const uint8_t* signature, size_t signatureLength) = 0;
|