HomeSort by relevance Sort by last modified time
    Searched refs:sig_len (Results 1 - 25 of 41) sorted by null

1 2

  /external/libconstrainedcrypto/include/constrainedcrypto/
dsa_sig.h 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
  /external/kmod/libkmod/
libkmod-signature.c 91 uint32_t sig_len; /* Length of signature data (big endian) */ member in struct:module_signature
112 size_t sig_len; local
131 sig_len = be32toh(get_unaligned(&modsig->sig_len));
132 if (sig_len == 0 ||
133 size < (int64_t)(modsig->signer_len + modsig->key_id_len + sig_len))
136 size -= modsig->key_id_len + sig_len;
  /external/vboot_reference/utility/
verify_data.c 52 int i, algorithm, sig_len; local
74 sig_len = siglen_map[algorithm];
76 (signature = read_signature(argv[3], sig_len)) &&
78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) {
  /external/libconstrainedcrypto/
dsa_sig.c 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) {
82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) {
87 if ((seq_len <= 0) || (seq_len + 2 != sig_len)) {
  /external/boringssl/src/crypto/evp/
sign.c 84 size_t sig_len = EVP_PKEY_size(pkey); local
97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) {
100 *out_sig_len = sig_len;
123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len,
145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
digestsign.c 146 size_t sig_len) {
155 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
evp_ctx.c 223 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len,
233 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len);
245 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len,
255 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len);
312 const uint8_t *sig, size_t sig_len) {
321 return ctx->pmeth->verify_recover(ctx, out, out_len, sig, sig_len);
  /external/boringssl/src/include/openssl/
ecdsa.h 73 * space. On successful exit, |*sig_len| is set to the actual number of bytes
78 unsigned int *sig_len, const EC_KEY *key);
80 /* ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid
86 size_t sig_len, const EC_KEY *key);
145 unsigned int *sig_len, const BIGNUM *kinv,
ec_key.h 248 unsigned int *sig_len, EC_KEY *eckey);
252 size_t sig_len, EC_KEY *eckey);
evp.h 272 /* EVP_DigestVerifyFinal verifies that |sig_len| bytes of |sig| are a valid
276 size_t sig_len);
334 /* EVP_VerifyFinal verifies that |sig_len| bytes of |sig| are a valid
343 size_t sig_len, EVP_PKEY *pkey);
420 * |out_sig_len|. Otherwise, |*sig_len| must contain the number of bytes of
422 * |sig| and |*sig_len| updated with the true length.
430 size_t *sig_len, const uint8_t *data,
439 /* EVP_PKEY_verify verifies that |sig_len| bytes from |sig| are a valid
444 size_t sig_len, const uint8_t *data,
498 /* EVP_PKEY_verify_recover decrypts |sig_len| bytes from |sig|. If |out| i
    [all...]
dsa.h 216 size_t sig_len, const DSA *dsa);
226 size_t sig_len, const DSA *dsa);
  /external/vboot_reference/tests/
rsa_verify_benchmark.c 25 uint64_t digest_len, sig_len; local
58 signature = BufferFromFile(file_name, &sig_len);
67 if (!RSAVerify(key, signature, sig_len, algorithm, digest))
  /system/core/adb/
adb_auth.h 52 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len);
adbd_auth.cpp 49 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len) {
83 reinterpret_cast<const uint8_t*>(sig), sig_len, key) == 1);
  /external/vboot_reference/firmware/lib/cryptolib/
rsa.c 132 const uint32_t sig_len,
143 if (sig_len != (key->len * sizeof(uint32_t))) {
158 buf = (uint8_t*) VbExMalloc(sig_len);
161 Memcpy(buf, sig, sig_len);
179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) {
  /external/boringssl/src/crypto/ecdsa/
ecdsa.c 69 unsigned int *sig_len, const EC_KEY *eckey) {
71 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len,
75 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
80 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) {
86 s = ECDSA_SIG_from_bytes(sig, sig_len);
94 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) {
445 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv,
452 *sig_len = 0;
458 *sig_len = 0
    [all...]
ecdsa_test.cc 212 unsigned sig_len = ECDSA_size(eckey.get()); local
213 std::vector<uint8_t> signature(sig_len);
214 if (!ECDSA_sign(0, digest, 20, signature.data(), &sig_len, eckey.get())) {
218 signature.resize(sig_len);
  /external/vboot_reference/firmware/lib/cryptolib/include/
rsa.h 33 /* Verify a RSA PKCS1.5 signature [sig] of [sig_type] and length [sig_len]
38 const uint32_t sig_len,
  /system/keymaster/
keymaster0_engine.h 76 unsigned int* sig_len, EC_KEY* ec_key);
88 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
keymaster0_engine.cpp 254 unsigned int* sig_len, EC_KEY* ec_key) {
257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key);
344 unsigned int* sig_len, EC_KEY* ec_key) const {
375 *sig_len = signature_length;
keymaster1_engine.h 108 unsigned int* sig_len, EC_KEY* ec_key);
  /external/syslinux/gpxe/src/crypto/axtls/
rsa.c 291 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len,
299 block = (uint8_t *)malloc(sig_len);
302 dat_bi = bi_import(ctx, sig, sig_len);
308 bi_export(ctx, decrypted_bi, block, sig_len);
312 while (block[i++] && i < sig_len);
313 size = sig_len - i;
crypto.h 178 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len,
236 uint16_t sig_len; member in struct:_x509_ctx
  /external/boringssl/src/tool/
speed.cc 150 unsigned sig_len; local
154 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool {
159 sig.get(), &sig_len, key);
168 [key, &fake_sha256_hash, &sig, sig_len]() -> bool {
185 sizeof(fake_sha256_hash), sig.get(), sig_len, key);
427 unsigned sig_len; local
430 if (!TimeFunction(&results, [&key, &signature, &digest, &sig_len]() -> bool {
431 return ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len,
439 if (!TimeFunction(&results, [&key, &signature, &digest, sig_len]() -> bool {
440 return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len,
    [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.h 173 * sig_len : Signed data length
179 size_t sig_len; member in struct:keymaster_sign_data_resp

Completed in 395 milliseconds

1 2