HomeSort by relevance Sort by last modified time
    Searched refs:sign_key (Results 1 - 5 of 5) sorted by null

  /external/vboot_reference/futility/
cmd_show.c 59 int sign_key, int good_sig)
66 sign_key ? (good_sig ? "valid" : "invalid") : "ignored");
228 VbPublicKey *sign_key = option.k; local
239 if (sign_key && VBOOT_SUCCESS ==
240 KeyBlockVerify(block, state->my_area->len, sign_key, 0))
243 if (option.strict && (!sign_key || !good_sig))
246 show_keyblock(block, state->in_filename, !!sign_key, good_sig);
280 VbPublicKey *sign_key = option.k; local
295 if (!sign_key && (state->rootkey._flags & AREA_IS_VALID))
297 sign_key = (VbPublicKey *)state->rootkey.buf
415 VbPublicKey *sign_key = option.k; local
    [all...]
cmd_vbutil_keyblock.c 157 VbPublicKey *sign_key = NULL; local
174 sign_key = PublicKeyRead(signpubkey);
175 if (!sign_key) {
181 KeyBlockVerify(block, block->key_block_size, sign_key, 0)) {
186 free(sign_key);
190 printf("Signature %s\n", sign_key ? "valid" : "ignored");
cmd_vbutil_firmware.c 179 VbPublicKey *sign_key; local
195 sign_key = PublicKeyRead(signpubkey);
196 if (!sign_key) {
217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) {
221 free(sign_key);
  /external/openssh/regress/unittests/sshkey/
test_sshkey.c 55 const struct sshkey *sign_key, const struct sshkey *ca_key,
102 ASSERT_INT_EQ(sshkey_sign(sign_key, &sigblob, &siglen,
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 675 u8 sign_key[IEEE8021X_SIGN_KEY_LEN]; member in struct:eap_key_data
738 os_memcpy(keydata.sign_key, keydata.encr_key, 16);
762 hmac_md5(keydata.sign_key, sign_key_len,
    [all...]

Completed in 559 milliseconds