/external/epid-sdk/epid/common/src/ |
sigrlvalid.c | 27 bool IsSigRlValid(GroupId const* gid, SigRl const* sig_rl, size_t sig_rl_size) { 30 if (!gid || !sig_rl || kMinSigRlSize > sig_rl_size) { 38 if (input_sig_rl_size != sig_rl_size) {
|
sigrlvalid.h | 37 \param[in] sig_rl_size 43 bool IsSigRlValid(GroupId const* gid, SigRl const* sig_rl, size_t sig_rl_size);
|
/external/epid-sdk/example/verifysig/src/ |
verifysig11.c | 111 size_t sig_rl_size = 0; local 113 NULL, &sig_rl_size); 118 sig_rl = calloc(1, sig_rl_size); 126 sig_rl, &sig_rl_size); 132 result = Epid11VerifierSetSigRl(ctx, sig_rl, sig_rl_size);
|
verifysig.c | 118 size_t sig_rl_size = 0; local 120 NULL, &sig_rl_size); 125 sig_rl = calloc(1, sig_rl_size); 133 sig_rl, &sig_rl_size); 139 result = EpidVerifierSetSigRl(ctx, sig_rl, sig_rl_size);
|
/external/epid-sdk/epid/member/tiny/src/ |
setsigrl.c | 27 size_t sig_rl_size) { 46 if (calculated_sig_rl_size != sig_rl_size) {
|
/external/epid-sdk/example/signmsg/src/ |
signmsg.c | 51 size_t sig_rl_size = 0; local 139 &sig_rl_size); 147 sig_rl = calloc(1, sig_rl_size); 155 sig_rl, &sig_rl_size); 164 sts = EpidMemberSetSigRl(member, sig_rl, sig_rl_size);
|
/external/epid-sdk/epid/member/tiny/unittests/ |
context-test.cc | 287 size_t sig_rl_size = this->kGrpXSigRl.size(); local 289 EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 310 size_t sig_rl_size = this->kGrpXSigRl.size(); local 311 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 331 size_t sig_rl_size = sizeof(srl) - sizeof(srl.bk); local 333 EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 340 size_t sig_rl_size = this->kGrpXSigRl.size(); local 341 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 358 size_t sig_rl_size = sizeof(sig_rl_data_n2_zero); local 359 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 367 size_t sig_rl_size = this->kGrpXSigRlSingleEntry.size(); local [all...] |
/external/epid-sdk/epid/verifier/1.1/ |
api.h | 219 \param[in] sig_rl_size 235 size_t sig_rl_size);
|
/external/epid-sdk/epid/member/ |
api.h | 259 \param[in] sig_rl_size 275 size_t sig_rl_size);
|
/external/epid-sdk/epid/verifier/ |
api.h | 193 \param[in] sig_rl_size 209 size_t sig_rl_size);
|
/external/epid-sdk/epid/member/unittests/ |
context-test.cc | 330 size_t sig_rl_size = this->kGrpXSigRl.size(); local 332 EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 353 size_t sig_rl_size = this->kGrpXSigRl.size(); local 354 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 374 size_t sig_rl_size = this->kGrpXSigRl.size(); local 375 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 392 size_t sig_rl_size = sizeof(sig_rl_data_n2_zero); local 393 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 401 size_t sig_rl_size = this->kGrpXSigRlSingleEntry.size(); local 402 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); 418 size_t sig_rl_size = sizeof(sig_rl_data); local [all...] |
/external/epid-sdk/epid/verifier/1.1/src/ |
context.c | 66 size_t sig_rl_size) { 69 if (!gid || !sig_rl || kMinSigRlSize > sig_rl_size) { 77 if (input_sig_rl_size != sig_rl_size) { 252 size_t sig_rl_size) { 266 if (!Epid11IsSigRlValid(&ctx->pub_key->gid, sig_rl, sig_rl_size)) {
|
/external/epid-sdk/epid/member/src/ |
context.c | 237 size_t sig_rl_size) { 244 if (!IsSigRlValid(&ctx->pub_key.gid, sig_rl, sig_rl_size)) {
|
/external/epid-sdk/epid/verifier/1.1/unittests/ |
context-test.cc | 272 size_t sig_rl_size = empty_sig_rl_buf.size() * sizeof(uint8_t); local 274 Epid11VerifierSetSigRl(verifier, empty_sig_rl, sig_rl_size)); 310 size_t sig_rl_size = this->kSigRl.size() * sizeof(uint8_t); local 311 EXPECT_EQ(kEpidNoErr, Epid11VerifierSetSigRl(ctx, sig_rl, sig_rl_size));
|
verify-test.cc | 230 auto sig_rl_size = sig_rl.size(); local 235 Epid11VerifierSetSigRl(verifier, &sig_rl_wrong_ver, sig_rl_size)); 249 size_t sig_rl_size = this->kGrpXSigRlMember0Bsn0Msg0MiddleEntry.size(); local 253 THROW_ON_EPIDERR(Epid11VerifierSetSigRl(verifier, sig_rl, sig_rl_size));
|
/external/epid-sdk/epid/verifier/unittests/ |
context-test.cc | 298 size_t sig_rl_size = this->kGrp01SigRl.size(); local 299 EXPECT_EQ(kEpidNoErr, EpidVerifierSetSigRl(ctx, sig_rl, sig_rl_size)); 306 size_t sig_rl_size = this->kSigRlIkgf.size(); local 307 EXPECT_EQ(kEpidNoErr, EpidVerifierSetSigRl(ctx, sig_rl, sig_rl_size)); 324 size_t sig_rl_size = sizeof(sig_rl_data_n2_zero); local 325 EXPECT_EQ(kEpidNoErr, EpidVerifierSetSigRl(verifier, sig_rl, sig_rl_size)); 360 size_t sig_rl_size = sizeof(sig_rl_data_n2_one); local 361 EXPECT_EQ(kEpidNoErr, EpidVerifierSetSigRl(verifier, sig_rl, sig_rl_size)); [all...] |
verify-test.cc | 715 size_t sig_rl_size = this->kGrpXSigRlMember0Sha256Bsn0Msg0OnlyEntry.size(); local 722 THROW_ON_EPIDERR(EpidVerifierSetSigRl(verifier, sig_rl, sig_rl_size)); [all...] |
/external/epid-sdk/epid/verifier/src/ |
context.c | 291 size_t sig_rl_size) { 295 if (!IsSigRlValid(&ctx->pub_key->gid, sig_rl, sig_rl_size)) {
|