/hardware/interfaces/gatekeeper/1.0/software/ |
D | SoftGateKeeper.h | 73 virtual void ComputePasswordSignature(uint8_t* signature, uint32_t signature_length, in ComputePasswordSignature() argument 76 if (signature == NULL) return; in ComputePasswordSignature() 78 r, p, signature, signature_length); in ComputePasswordSignature() 86 virtual void ComputeSignature(uint8_t* signature, uint32_t signature_length, const uint8_t*, in ComputeSignature() argument 88 if (signature == NULL) return; in ComputeSignature() 89 memset(signature, 0, signature_length); in ComputeSignature()
|
/hardware/interfaces/drm/1.3/vts/functional/ |
D | drm_hal_test.cpp | 48 [&](StatusV1_0 status, const hidl_vec<uint8_t>& signature) { in TEST_P() argument 50 EXPECT_EQ(signature.size(), 0); in TEST_P()
|
/hardware/interfaces/oemlock/1.0/ |
D | IOemLock.hal | 41 * The implementation may require a vendor defined signature to prove the 45 * @param signature to prove validity of this request or empty if not 48 * INVALID_SIGNATURE if a signature is required but the wrong one 51 setOemUnlockAllowedByCarrier(bool allowed, vec<uint8_t> signature)
|
D | types.hal | 26 /** An invalid signature was provided so the operation was not performed. */
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | KeymasterHidlTest.cpp | 314 const string& input, const string& signature, in Finish() argument 320 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature), in Finish() 346 ErrorCode KeymasterHidlTest::Finish(const string& message, const string& signature, in Finish() argument 350 ErrorCode error = Finish(op_handle_, AuthorizationSet() /* in_params */, message, signature, in Finish() 429 string signature = ProcessMessage(key_blob, KeyPurpose::SIGN, message, params, &out_params); in SignMessage() local 431 return signature; in SignMessage() 456 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector() local 457 EXPECT_EQ(expected_mac, signature) in CheckHmacTestVector() 503 const string& signature, const AuthorizationSet& params) { in VerifyMessage() argument 521 EXPECT_EQ(ErrorCode::OK, Finish(op_handle_, finish_params, message.substr(consumed), signature, in VerifyMessage() [all …]
|
D | keymaster_hidl_hal_test.cpp | 200 const std::string& signature) { in verify_chain() argument 223 reinterpret_cast<const uint8_t*>(signature.c_str()), in verify_chain() 224 signature.size()))); in verify_chain() 865 string signature = SignMessage( in TEST_P() local 945 string signature = SignMessage( in TEST_P() local 962 string signature; in TEST_P() local 990 string signature; in TEST_P() local 991 EXPECT_EQ(ErrorCode::NO_USER_CONFIRMATION, Finish(message, &signature)); in TEST_P() 1006 string signature = SignMessage(message, AuthorizationSetBuilder() in TEST_P() local 1023 string signature = SignMessage( in TEST_P() local [all …]
|
D | KeymasterHidlTest.h | 145 const string& input, const string& signature, AuthorizationSet* out_params, 148 ErrorCode Finish(const string& message, const string& signature, string* output); 179 void VerifyMessage(const HidlBuf& key_blob, const string& message, const string& signature, 181 void VerifyMessage(const string& message, const string& signature,
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 641 const string& input, const string& signature, AuthorizationSet* out_params, in Finish() argument 647 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature), in Finish() 672 ErrorCode Finish(const string& message, const string& signature, string* output) { in Finish() argument 675 ErrorCode error = Finish(op_handle_, AuthorizationSet() /* in_params */, message, signature, in Finish() 747 string signature = ProcessMessage(key_blob, KeyPurpose::SIGN, message, params, &out_params); in SignMessage() local 749 return signature; in SignMessage() 774 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector() local 775 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest; in CheckHmacTestVector() 799 void VerifyMessage(const HidlBuf& key_blob, const string& message, const string& signature, in VerifyMessage() argument 810 EXPECT_EQ(ErrorCode::OK, Finish(op_handle_, finish_params, message, signature, in VerifyMessage() [all …]
|
/hardware/libhardware/include/hardware/ |
D | keymaster1.h | 121 const uint8_t* signature, const size_t signature_length); 524 const keymaster_blob_t* signature,
|
D | keymaster0.h | 126 const uint8_t* signature, const size_t signature_length);
|
D | keymaster2.h | 408 const keymaster_blob_t* input, const keymaster_blob_t* signature,
|
/hardware/interfaces/drm/1.0/ |
D | IDrmPlugin.hal | 212 * material to be used by signRSA when computing an RSA signature on a 231 * message to a server which verifies the signature to confirm that the 436 * Compute a signature over the provided message using the mac algorithm 438 * the signature. 442 * @param message the message to compute a signature over 448 * @return signature the computed signature 451 generates (Status status, vec<uint8_t> signature); 461 * @param signature the signature to verify 467 * @return match true if the signature is verified positively, 471 vec<uint8_t> signature) generates (Status status, bool match); [all …]
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | Keymaster4_1HidlTest.h | 126 auto [result, signature, out_params] = ProcessMessage( in UseRsaKey() 133 auto [result, signature, out_params] = in UseEcdsaKey()
|
/hardware/interfaces/automotive/evs/1.0/default/ |
D | EvsDisplay.cpp | 306 uint32_t signature = pixels[0] & 0xFF; in returnTargetBufferForDisplay() local 307 if (prevSignature == signature) { in returnTargetBufferForDisplay()
|
/hardware/interfaces/automotive/evs/1.1/default/ |
D | EvsDisplay.cpp | 315 uint32_t signature = pixels[0] & 0xFF; in returnTargetBufferForDisplayImpl() local 316 if (prevSignature == signature) { in returnTargetBufferForDisplayImpl()
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | Keymaster4.h | 141 const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature, in finish() argument 144 return km4_0_dev_->finish(operationHandle, inParams, input, signature, authToken, in finish()
|
/hardware/qcom/keymaster/ |
D | keymaster_qcom.h | 204 uint32_t signature; member
|
D | keymaster_qcom.cpp | 574 const uint8_t* signature, const size_t signatureLength) in qcom_km_verify_data() argument 581 if (signedData == NULL || signature == NULL) { in qcom_km_verify_data() 633 send_cmd->signature = signedDataLength; in qcom_km_verify_data() 636 signature, signatureLength); in qcom_km_verify_data()
|
/hardware/interfaces/identity/support/tests/ |
D | IdentityCredentialSupportTest.cpp | 161 optional<vector<uint8_t>> signature = support::signEcDsa(privKey.value(), data); in TEST() local 163 support::checkEcDsaSignature(support::sha256(data), signature.value(), pubKey.value())); in TEST() 166 vector<uint8_t> modifiedSignature = signature.value(); in TEST() 174 ASSERT_FALSE(support::checkEcDsaSignature(modifiedDigest, signature.value(), pubKey.value())); in TEST()
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
D | eapol.h | 80 unsigned char signature[EAPOL_KEY_SIG_LEN]; /* Key Signature */
|
/hardware/interfaces/identity/aidl/default/ |
D | WritableIdentityCredential.cpp | 416 optional<vector<uint8_t>> signature = support::coseSignEcDsa(credentialPrivKey_, in finishAddingEntries() local 420 if (!signature) { in finishAddingEntries() 440 *outProofOfProvisioningSignature = byteStringToSigned(signature.value()); in finishAddingEntries()
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 762 bool checkEcDsaSignature(const vector<uint8_t>& digest, const vector<uint8_t>& signature, in checkEcDsaSignature() argument 764 const unsigned char* p = (unsigned char*)signature.data(); in checkEcDsaSignature() 765 auto sig = ECDSA_SIG_Ptr(d2i_ECDSA_SIG(nullptr, &p, signature.size())); in checkEcDsaSignature() 836 vector<uint8_t> signature; in signEcDsaDigest() local 837 signature.resize(len); in signEcDsaDigest() 838 unsigned char* p = (unsigned char*)signature.data(); in signEcDsaDigest() 841 return signature; in signEcDsaDigest() 1669 vector<char> signature(psig->length); in certificateFindSignature() local 1670 memcpy(signature.data(), psig->data, psig->length); in certificateFindSignature() 1675 (const void*)signature.data(), signature.size()); in certificateFindSignature() [all …]
|
/hardware/interfaces/keymaster/4.0/vts/performance/ |
D | Benchmark.cpp | 267 const string& signature = "") { in ProcessMessage() argument 294 HidlBuf(message.substr(input_consumed)), HidlBuf(signature), in ProcessMessage() 526 optional<string> signature = in verify() local 528 if (!signature) { in verify() 542 if (!keymaster->ProcessMessage(*opHandle, message, in_params, &out_params, *signature)) { in verify()
|
/hardware/qcom/sm8150/media/mm-video-v4l2/vidc/common/inc/ |
D | vidc_debug.h | 195 uint8_t signature[4]; member
|
/hardware/qcom/sdm845/media/mm-video-v4l2/vidc/common/inc/ |
D | vidc_debug.h | 204 uint8_t signature[4]; member
|