Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 43) sorted by relevance

12

/hardware/interfaces/gatekeeper/1.0/software/
DSoftGateKeeper.h73 virtual void ComputePasswordSignature(uint8_t* signature, uint32_t signature_length, in ComputePasswordSignature() argument
76 if (signature == NULL) return; in ComputePasswordSignature()
78 r, p, signature, signature_length); in ComputePasswordSignature()
86 virtual void ComputeSignature(uint8_t* signature, uint32_t signature_length, const uint8_t*, in ComputeSignature() argument
88 if (signature == NULL) return; in ComputeSignature()
89 memset(signature, 0, signature_length); in ComputeSignature()
/hardware/interfaces/drm/1.3/vts/functional/
Ddrm_hal_test.cpp48 [&](StatusV1_0 status, const hidl_vec<uint8_t>& signature) { in TEST_P() argument
50 EXPECT_EQ(signature.size(), 0); in TEST_P()
/hardware/interfaces/oemlock/1.0/
DIOemLock.hal41 * The implementation may require a vendor defined signature to prove the
45 * @param signature to prove validity of this request or empty if not
48 * INVALID_SIGNATURE if a signature is required but the wrong one
51 setOemUnlockAllowedByCarrier(bool allowed, vec<uint8_t> signature)
Dtypes.hal26 /** An invalid signature was provided so the operation was not performed. */
/hardware/interfaces/keymaster/4.0/vts/functional/
DKeymasterHidlTest.cpp314 const string& input, const string& signature, in Finish() argument
320 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature), in Finish()
346 ErrorCode KeymasterHidlTest::Finish(const string& message, const string& signature, in Finish() argument
350 ErrorCode error = Finish(op_handle_, AuthorizationSet() /* in_params */, message, signature, in Finish()
429 string signature = ProcessMessage(key_blob, KeyPurpose::SIGN, message, params, &out_params); in SignMessage() local
431 return signature; in SignMessage()
456 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector() local
457 EXPECT_EQ(expected_mac, signature) in CheckHmacTestVector()
503 const string& signature, const AuthorizationSet& params) { in VerifyMessage() argument
521 EXPECT_EQ(ErrorCode::OK, Finish(op_handle_, finish_params, message.substr(consumed), signature, in VerifyMessage()
[all …]
Dkeymaster_hidl_hal_test.cpp200 const std::string& signature) { in verify_chain() argument
223 reinterpret_cast<const uint8_t*>(signature.c_str()), in verify_chain()
224 signature.size()))); in verify_chain()
865 string signature = SignMessage( in TEST_P() local
945 string signature = SignMessage( in TEST_P() local
962 string signature; in TEST_P() local
990 string signature; in TEST_P() local
991 EXPECT_EQ(ErrorCode::NO_USER_CONFIRMATION, Finish(message, &signature)); in TEST_P()
1006 string signature = SignMessage(message, AuthorizationSetBuilder() in TEST_P() local
1023 string signature = SignMessage( in TEST_P() local
[all …]
DKeymasterHidlTest.h145 const string& input, const string& signature, AuthorizationSet* out_params,
148 ErrorCode Finish(const string& message, const string& signature, string* output);
179 void VerifyMessage(const HidlBuf& key_blob, const string& message, const string& signature,
181 void VerifyMessage(const string& message, const string& signature,
/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp641 const string& input, const string& signature, AuthorizationSet* out_params, in Finish() argument
647 ->finish(op_handle, in_params.hidl_data(), HidlBuf(input), HidlBuf(signature), in Finish()
672 ErrorCode Finish(const string& message, const string& signature, string* output) { in Finish() argument
675 ErrorCode error = Finish(op_handle_, AuthorizationSet() /* in_params */, message, signature, in Finish()
747 string signature = ProcessMessage(key_blob, KeyPurpose::SIGN, message, params, &out_params); in SignMessage() local
749 return signature; in SignMessage()
774 string signature = MacMessage(message, digest, expected_mac.size() * 8); in CheckHmacTestVector() local
775 EXPECT_EQ(expected_mac, signature) << "Test vector didn't match for digest " << (int)digest; in CheckHmacTestVector()
799 void VerifyMessage(const HidlBuf& key_blob, const string& message, const string& signature, in VerifyMessage() argument
810 EXPECT_EQ(ErrorCode::OK, Finish(op_handle_, finish_params, message, signature, in VerifyMessage()
[all …]
/hardware/libhardware/include/hardware/
Dkeymaster1.h121 const uint8_t* signature, const size_t signature_length);
524 const keymaster_blob_t* signature,
Dkeymaster0.h126 const uint8_t* signature, const size_t signature_length);
Dkeymaster2.h408 const keymaster_blob_t* input, const keymaster_blob_t* signature,
/hardware/interfaces/drm/1.0/
DIDrmPlugin.hal212 * material to be used by signRSA when computing an RSA signature on a
231 * message to a server which verifies the signature to confirm that the
436 * Compute a signature over the provided message using the mac algorithm
438 * the signature.
442 * @param message the message to compute a signature over
448 * @return signature the computed signature
451 generates (Status status, vec<uint8_t> signature);
461 * @param signature the signature to verify
467 * @return match true if the signature is verified positively,
471 vec<uint8_t> signature) generates (Status status, bool match);
[all …]
/hardware/interfaces/keymaster/4.1/vts/functional/
DKeymaster4_1HidlTest.h126 auto [result, signature, out_params] = ProcessMessage( in UseRsaKey()
133 auto [result, signature, out_params] = in UseEcdsaKey()
/hardware/interfaces/automotive/evs/1.0/default/
DEvsDisplay.cpp306 uint32_t signature = pixels[0] & 0xFF; in returnTargetBufferForDisplay() local
307 if (prevSignature == signature) { in returnTargetBufferForDisplay()
/hardware/interfaces/automotive/evs/1.1/default/
DEvsDisplay.cpp315 uint32_t signature = pixels[0] & 0xFF; in returnTargetBufferForDisplayImpl() local
316 if (prevSignature == signature) { in returnTargetBufferForDisplayImpl()
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/
DKeymaster4.h141 const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature, in finish() argument
144 return km4_0_dev_->finish(operationHandle, inParams, input, signature, authToken, in finish()
/hardware/qcom/keymaster/
Dkeymaster_qcom.h204 uint32_t signature; member
Dkeymaster_qcom.cpp574 const uint8_t* signature, const size_t signatureLength) in qcom_km_verify_data() argument
581 if (signedData == NULL || signature == NULL) { in qcom_km_verify_data()
633 send_cmd->signature = signedDataLength; in qcom_km_verify_data()
636 signature, signatureLength); in qcom_km_verify_data()
/hardware/interfaces/identity/support/tests/
DIdentityCredentialSupportTest.cpp161 optional<vector<uint8_t>> signature = support::signEcDsa(privKey.value(), data); in TEST() local
163 support::checkEcDsaSignature(support::sha256(data), signature.value(), pubKey.value())); in TEST()
166 vector<uint8_t> modifiedSignature = signature.value(); in TEST()
174 ASSERT_FALSE(support::checkEcDsaSignature(modifiedDigest, signature.value(), pubKey.value())); in TEST()
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
Deapol.h80 unsigned char signature[EAPOL_KEY_SIG_LEN]; /* Key Signature */
/hardware/interfaces/identity/aidl/default/
DWritableIdentityCredential.cpp416 optional<vector<uint8_t>> signature = support::coseSignEcDsa(credentialPrivKey_, in finishAddingEntries() local
420 if (!signature) { in finishAddingEntries()
440 *outProofOfProvisioningSignature = byteStringToSigned(signature.value()); in finishAddingEntries()
/hardware/interfaces/identity/support/src/
DIdentityCredentialSupport.cpp762 bool checkEcDsaSignature(const vector<uint8_t>& digest, const vector<uint8_t>& signature, in checkEcDsaSignature() argument
764 const unsigned char* p = (unsigned char*)signature.data(); in checkEcDsaSignature()
765 auto sig = ECDSA_SIG_Ptr(d2i_ECDSA_SIG(nullptr, &p, signature.size())); in checkEcDsaSignature()
836 vector<uint8_t> signature; in signEcDsaDigest() local
837 signature.resize(len); in signEcDsaDigest()
838 unsigned char* p = (unsigned char*)signature.data(); in signEcDsaDigest()
841 return signature; in signEcDsaDigest()
1669 vector<char> signature(psig->length); in certificateFindSignature() local
1670 memcpy(signature.data(), psig->data, psig->length); in certificateFindSignature()
1675 (const void*)signature.data(), signature.size()); in certificateFindSignature()
[all …]
/hardware/interfaces/keymaster/4.0/vts/performance/
DBenchmark.cpp267 const string& signature = "") { in ProcessMessage() argument
294 HidlBuf(message.substr(input_consumed)), HidlBuf(signature), in ProcessMessage()
526 optional<string> signature = in verify() local
528 if (!signature) { in verify()
542 if (!keymaster->ProcessMessage(*opHandle, message, in_params, &out_params, *signature)) { in verify()
/hardware/qcom/sm8150/media/mm-video-v4l2/vidc/common/inc/
Dvidc_debug.h195 uint8_t signature[4]; member
/hardware/qcom/sdm845/media/mm-video-v4l2/vidc/common/inc/
Dvidc_debug.h204 uint8_t signature[4]; member

12