/external/libconstrainedcrypto/include/constrainedcrypto/ |
dsa_sig.h | 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
|
/external/kmod/libkmod/ |
libkmod-signature.c | 91 uint32_t sig_len; /* Length of signature data (big endian) */ member in struct:module_signature 112 size_t sig_len; local 131 sig_len = be32toh(get_unaligned(&modsig->sig_len)); 132 if (sig_len == 0 || 133 size < (int64_t)(modsig->signer_len + modsig->key_id_len + sig_len)) 136 size -= modsig->key_id_len + sig_len;
|
/external/vboot_reference/utility/ |
verify_data.c | 52 int i, algorithm, sig_len; local 74 sig_len = siglen_map[algorithm]; 76 (signature = read_signature(argv[3], sig_len)) && 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) {
|
/external/libconstrainedcrypto/ |
dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { 87 if ((seq_len <= 0) || (seq_len + 2 != sig_len)) {
|
/external/boringssl/src/crypto/evp/ |
sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); local 97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { 100 *out_sig_len = sig_len; 123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, 145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
|
digestsign.c | 146 size_t sig_len) { 155 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
|
evp_ctx.c | 223 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, 233 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len); 245 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, 255 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len); 312 const uint8_t *sig, size_t sig_len) { 321 return ctx->pmeth->verify_recover(ctx, out, out_len, sig, sig_len);
|
/external/boringssl/src/include/openssl/ |
ecdsa.h | 73 * space. On successful exit, |*sig_len| is set to the actual number of bytes 78 unsigned int *sig_len, const EC_KEY *key); 80 /* ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid 86 size_t sig_len, const EC_KEY *key); 145 unsigned int *sig_len, const BIGNUM *kinv,
|
ec_key.h | 248 unsigned int *sig_len, EC_KEY *eckey); 252 size_t sig_len, EC_KEY *eckey);
|
evp.h | 272 /* EVP_DigestVerifyFinal verifies that |sig_len| bytes of |sig| are a valid 276 size_t sig_len); 334 /* EVP_VerifyFinal verifies that |sig_len| bytes of |sig| are a valid 343 size_t sig_len, EVP_PKEY *pkey); 420 * |out_sig_len|. Otherwise, |*sig_len| must contain the number of bytes of 422 * |sig| and |*sig_len| updated with the true length. 430 size_t *sig_len, const uint8_t *data, 439 /* EVP_PKEY_verify verifies that |sig_len| bytes from |sig| are a valid 444 size_t sig_len, const uint8_t *data, 498 /* EVP_PKEY_verify_recover decrypts |sig_len| bytes from |sig|. If |out| i [all...] |
dsa.h | 216 size_t sig_len, const DSA *dsa); 226 size_t sig_len, const DSA *dsa);
|
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 58 signature = BufferFromFile(file_name, &sig_len); 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest))
|
/system/core/adb/ |
adb_auth.h | 52 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len);
|
adbd_auth.cpp | 49 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len) { 83 reinterpret_cast<const uint8_t*>(sig), sig_len, key) == 1);
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa.c | 132 const uint32_t sig_len, 143 if (sig_len != (key->len * sizeof(uint32_t))) { 158 buf = (uint8_t*) VbExMalloc(sig_len); 161 Memcpy(buf, sig, sig_len); 179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) {
|
/external/boringssl/src/crypto/ecdsa/ |
ecdsa.c | 69 unsigned int *sig_len, const EC_KEY *eckey) { 71 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, 75 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 80 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) { 86 s = ECDSA_SIG_from_bytes(sig, sig_len); 94 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) { 445 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, 452 *sig_len = 0; 458 *sig_len = 0 [all...] |
ecdsa_test.cc | 212 unsigned sig_len = ECDSA_size(eckey.get()); local 213 std::vector<uint8_t> signature(sig_len); 214 if (!ECDSA_sign(0, digest, 20, signature.data(), &sig_len, eckey.get())) { 218 signature.resize(sig_len);
|
/external/vboot_reference/firmware/lib/cryptolib/include/ |
rsa.h | 33 /* Verify a RSA PKCS1.5 signature [sig] of [sig_type] and length [sig_len] 38 const uint32_t sig_len,
|
/system/keymaster/ |
keymaster0_engine.h | 76 unsigned int* sig_len, EC_KEY* ec_key); 88 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
keymaster0_engine.cpp | 254 unsigned int* sig_len, EC_KEY* ec_key) { 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); 344 unsigned int* sig_len, EC_KEY* ec_key) const { 375 *sig_len = signature_length;
|
keymaster1_engine.h | 108 unsigned int* sig_len, EC_KEY* ec_key);
|
/external/syslinux/gpxe/src/crypto/axtls/ |
rsa.c | 291 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len, 299 block = (uint8_t *)malloc(sig_len); 302 dat_bi = bi_import(ctx, sig, sig_len); 308 bi_export(ctx, decrypted_bi, block, sig_len); 312 while (block[i++] && i < sig_len); 313 size = sig_len - i;
|
crypto.h | 178 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len, 236 uint16_t sig_len; member in struct:_x509_ctx
|
/external/boringssl/src/tool/ |
speed.cc | 150 unsigned sig_len; local 154 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool { 159 sig.get(), &sig_len, key); 168 [key, &fake_sha256_hash, &sig, sig_len]() -> bool { 185 sizeof(fake_sha256_hash), sig.get(), sig_len, key); 427 unsigned sig_len; local 430 if (!TimeFunction(&results, [&key, &signature, &digest, &sig_len]() -> bool { 431 return ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len, 439 if (!TimeFunction(&results, [&key, &signature, &digest, sig_len]() -> bool { 440 return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len, [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 173 * sig_len : Signed data length 179 size_t sig_len; member in struct:keymaster_sign_data_resp
|