Searched refs:hash_buf (Results 1 – 4 of 4) sorted by relevance
/system/extras/verity/ |
D | verity_verifier.cpp | 54 uint8_t hash_buf[SHA256_DIGEST_LENGTH]; in verify_table() local 55 SHA256(const_cast<uint8_t*>(reinterpret_cast<const uint8_t*>(table)), table_length, hash_buf); in verify_table() 65 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) { in verify_table()
|
/system/keymaster/key_blob_utils/ |
D | ocb_utils.cpp | 80 UniquePtr<uint8_t[]> hash_buf(new (std::nothrow) uint8_t[SHA256_DIGEST_LENGTH]); in InitializeKeyWrappingContext() local 81 if (!hash_buf.get()) in InitializeKeyWrappingContext() 83 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH); in InitializeKeyWrappingContext() 89 if (!ctx->get() || !hash_buf.get() || !derived_key.get()) in InitializeKeyWrappingContext() 96 SHA256_Final(hash_buf.get(), &sha256_ctx); in InitializeKeyWrappingContext() 105 AES_encrypt(hash_buf.get(), derived_key.get(), &aes_key); in InitializeKeyWrappingContext()
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.cpp | 121 uint8_t hash_buf[SHA256_DIGEST_LENGTH]; in verify_table() local 125 SHA256((uint8_t*)table, table_length, hash_buf); in verify_table() 135 if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, in verify_table()
|
/system/core/fastboot/fuzzy_fastboot/ |
D | main.cpp | 1278 std::string err_msg, hash_before, hash_buf, hash_after; in TEST_P() local 1286 ASSERT_TRUE(PartitionHash(fb.get(), "userdata", &hash_buf, &retcode, &err_msg)) << err_msg; in TEST_P() 1290 EXPECT_NE(hash_before, hash_buf) in TEST_P() 1298 EXPECT_NE(hash_after, hash_buf) << "Unlocking the device did not cause the hash of userdata to " in TEST_P()
|