/external/vboot_reference/futility/ |
cmd_show.c | 59 int sign_key, int good_sig) 66 sign_key ? (good_sig ? "valid" : "invalid") : "ignored"); 228 VbPublicKey *sign_key = option.k; local 239 if (sign_key && VBOOT_SUCCESS == 240 KeyBlockVerify(block, state->my_area->len, sign_key, 0)) 243 if (option.strict && (!sign_key || !good_sig)) 246 show_keyblock(block, state->in_filename, !!sign_key, good_sig); 280 VbPublicKey *sign_key = option.k; local 295 if (!sign_key && (state->rootkey._flags & AREA_IS_VALID)) 297 sign_key = (VbPublicKey *)state->rootkey.buf 415 VbPublicKey *sign_key = option.k; local [all...] |
cmd_vbutil_keyblock.c | 157 VbPublicKey *sign_key = NULL; local 174 sign_key = PublicKeyRead(signpubkey); 175 if (!sign_key) { 181 KeyBlockVerify(block, block->key_block_size, sign_key, 0)) { 186 free(sign_key); 190 printf("Signature %s\n", sign_key ? "valid" : "ignored");
|
cmd_vbutil_firmware.c | 179 VbPublicKey *sign_key; local 195 sign_key = PublicKeyRead(signpubkey); 196 if (!sign_key) { 217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) { 221 free(sign_key);
|
/external/openssh/ |
krl.h | 46 void ssh_krl_set_sign_key(struct ssh_krl *krl, const struct sshkey *sign_key);
|
/external/vboot_reference/utility/ |
load_kernel_test.c | 133 fprintf(stderr, "usage: %s [options] <drive_image> [<sign_key>]\n",
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 645 u8 sign_key[IEEE8021X_SIGN_KEY_LEN]; member in struct:eap_key_data 706 os_memcpy(keydata.sign_key, keydata.encr_key, 16); 730 hmac_md5(keydata.sign_key, sign_key_len, [all...] |
/external/libvncserver/x11vnc/ |
ssltools.h | 479 "sign_key() {\n" 745 "sign_key\n" [all...] |