HomeSort by relevance Sort by last modified time
    Searched refs:sig_size (Results 1 - 25 of 26) sorted by null

1 2

  /external/vboot_reference/host/lib/include/
host_signature.h 19 uint64_t sig_size, uint64_t data_size);
22 /* Allocate a new signature with space for a [sig_size] byte signature. */
23 VbSignature* SignatureAlloc(uint64_t sig_size, uint64_t data_size);
  /external/vboot_reference/host/lib/
host_signature.c 24 VbSignature* SignatureAlloc(uint64_t sig_size, uint64_t data_size) {
25 VbSignature* sig = (VbSignature*)malloc(sizeof(VbSignature) + sig_size);
30 sig->sig_size = sig_size;
37 uint64_t sig_size, uint64_t data_size) {
39 sig->sig_size = sig_size;
45 if (dest->sig_size < src->sig_size)
47 dest->sig_size = src->sig_size
    [all...]
host_common.c 27 body_signature->sig_size);
42 block_sig_dest = body_sig_dest + body_signature->sig_size;
57 body_signature->sig_size, 0);
87 body_signature->sig_size);
104 block_sig_dest = body_sig_dest + body_signature->sig_size;
119 body_signature->sig_size, 0);
  /external/vboot_reference/firmware/2lib/
2rsa.c 193 uint32_t sig_size = vb2_rsa_sig_size(sig_alg); local
195 if (!sig_size)
203 return 2 * sig_size + 2 * sizeof(uint32_t);
246 uint32_t sig_size = vb2_rsa_sig_size(key->sig_alg); local
248 uint32_t pad_size = sig_size - hash_size;
254 if (!sig_size || !hash_size || hash_size > sig_size)
299 int sig_size; local
306 sig_size = vb2_rsa_sig_size(key->sig_alg);
307 if (!sig_size) {
    [all...]
  /external/vboot_reference/host/lib21/
host_keyblock.c 35 uint32_t sig_size; local
46 if (vb2_sig_size_for_keys(&sig_size, signing_keys, signing_key_count))
53 kb.c.total_size = kb.sig_offset + sig_size;
host_fw_preamble.c 39 uint32_t sig_size; local
53 if (vb2_sig_size_for_key(&sig_size, signing_key, NULL))
56 fp.c.total_size = fp.sig_offset + sig_size;
host_signature.c 113 s.sig_size = vb2_sig_size(key->sig_alg, key->hash_alg);
114 if (!s.sig_size)
117 s.c.total_size = s.sig_offset + s.sig_size;
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 92 int sig_size; local
99 sig_size = siglen_map[algorithm];
113 success = RSAVerify(verification_key, sig, (uint32_t)sig_size,
131 int sig_size; local
138 sig_size = siglen_map[algorithm];
151 success = RSAVerify(verification_key, sig, (uint32_t)sig_size,
  /external/vboot_reference/firmware/lib21/
packed_key.c 51 uint32_t sig_size; local
84 sig_size = vb2_rsa_sig_size(key->sig_alg);
85 if (!sig_size)
common.c 205 sig->sig_offset, sig->sig_size);
213 if (sig->sig_size != expect_sig_size)
242 if (sig->sig_size != key_sig_size)
  /external/vboot_reference/tests/
vboot_common2_tests.c 63 sig->sig_size -= 16;
66 sig->sig_size += 16;
100 sig->sig_size = 1;
180 h->preamble_signature.sig_size--;
194 h->body_signature.sig_size = 0;
vb20_common_tests.c 148 .sig_size = 128};
161 .sig_size = 4};
vboot_common3_tests.c 95 h->key_block_checksum.sig_size /= 2;
113 h->key_block_signature.sig_size--;
229 h->preamble_signature.sig_size--;
245 h->body_signature.sig_size = 0;
vb20_common2_tests.c 86 uint32_t sig_total_size = sig->sig_offset + sig->sig_size;
121 sig2->sig_size -= 16;
vb20_common3_tests.c 113 h->keyblock_signature.sig_size--;
259 h->preamble_signature.sig_size--;
277 h->body_signature.sig_size = 0;
vboot_firmware_tests.c 192 return sig->sig_size;
337 mpreamble[0].body_signature.sig_size = 1;
427 mpreamble[0].body_signature.sig_size = 1; /* Mock bad sig */
vb20_api_tests.c 82 pre->body_signature.sig_size = mock_sig_size;
382 pre->body_signature.sig_size++;
vb21_common2_tests.c 151 sig2->sig_size += 4;
215 sig2->sig_size -= 16;
  /external/vboot_reference/firmware/lib20/include/
vb2_struct.h 51 uint32_t sig_size; member in struct:vb2_signature
  /external/vboot_reference/firmware/lib/
vboot_common.c 100 sig->sig_offset, sig->sig_size);
149 VBDEBUG((" - sig_size=%d, expecting %d for algorithm %d\n",
150 (unsigned)sig->sig_size, siglen_map[key->algorithm],
152 if (sig->sig_size != siglen_map[key->algorithm]) {
154 "sig_size=%d, expected %d for algorithm %d.\n",
155 (int)sig->sig_size, siglen_map[key->algorithm],
174 if (sig->sig_size != siglen_map[key->algorithm]) {
231 if (sig->sig_size != SHA512_DIGEST_SIZE) {
  /external/vboot_reference/firmware/lib21/include/
vb2_struct.h 206 uint32_t sig_size; member in struct:vb2_signature
  /external/vboot_reference/firmware/lib20/
common.c 64 sig->sig_offset, sig->sig_size);
74 if (sig->sig_size != vb2_rsa_sig_size(key->sig_alg)) {
76 "sig_size=%d, expected %d for algorithm %d.\n",
77 sig->sig_size, vb2_rsa_sig_size(key->sig_alg),
  /external/vboot_reference/firmware/include/
vboot_struct.h 32 uint64_t sig_size; member in struct:VbSignature
  /external/vboot_reference/futility/
cmd_vbutil_keyblock.c 173 if (block->key_block_signature.sig_size && signpubkey) {
  /external/autotest/client/cros/faft/utils/
flashrom_handler.py 504 sig_size = os.path.getsize(sig_name)
523 pad = ('%c' % 0) * (sig_size - os.path.getsize(sig_name))

Completed in 133 milliseconds

1 2