/external/boringssl/src/crypto/dsa/ |
dsa.c | 736 const uint8_t *sig, size_t sig_len, const DSA *dsa) { 738 if (!DSA_check_signature(&valid, digest, digest_len, sig, sig_len, dsa)) { 745 size_t digest_len, const uint8_t *sig, size_t sig_len, 757 if (d2i_DSA_SIG(&s, &sigp, sig_len) == NULL || sigp != sig + sig_len) { 763 if (der_len < 0 || (size_t)der_len != sig_len || 764 OPENSSL_memcmp(sig, der, sig_len)) {
|
dsa_test.cc | 289 static bool TestVerify(const uint8_t *sig, size_t sig_len, int expect) { 296 DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa.get());
|
/system/keymaster/ |
keymaster1_engine.cpp | 336 unsigned int* sig_len, EC_KEY* ec_key) { 353 *sig_len = std::min(output.data_length, ECDSA_size(ec_key)); 354 memcpy(sig, output.data, *sig_len);
|
/external/boringssl/src/crypto/evp/ |
internal.h | 212 const uint8_t *sig, size_t sig_len);
|
evp_extra_test.cc | 385 size_t sig_len = 0; local 386 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)); 389 EXPECT_EQ(static_cast<size_t>(EVP_PKEY_size(pkey.get())), sig_len); 392 sig.resize(sig_len); 393 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), sig.data(), &sig_len)); 394 sig.resize(sig_len); 401 ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), sig.data(), sig_len)); 423 unsigned sig_len = sizeof(sig); local 425 &sig_len, rsa.get())); 433 EVP_PKEY_verify_recover(ctx.get(), nullptr, &out_len, sig, sig_len)); [all...] |
p_rsa.c | 267 size_t sig_len) { 287 const int ret = RSA_public_decrypt(sig_len, sig, rctx->tbuf, 312 if (!RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, sig_len,
|
/external/boringssl/src/ssl/ |
tls13_both.c | 554 size_t sig_len; local 569 sign_result = ssl_private_key_sign(ssl, sig, &sig_len, max_sig_len, 572 sign_result = ssl_private_key_complete(ssl, sig, &sig_len, max_sig_len); 580 if (!CBB_did_write(&child, sig_len) ||
|
handshake_client.c | 1749 size_t sig_len = max_sig_len; local [all...] |
handshake_server.c | 1257 size_t sig_len; local [all...] |
/system/security/keystore-engine/ |
android_engine.cpp | 237 unsigned int* sig_len, EC_KEY* ec_key) { 265 // Reviewer: should't sig_len be checked here? Or is it just assumed that it is at least ecdsa_size? 267 *sig_len = reply_len;
|
/external/vboot_reference/tests/ |
rsa_utility_tests.c | 31 const uint32_t sig_len,
|
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 532 resp->sig_len = KM_KEY_SIZE_MAX; 554 UniquePtr<uint8_t> signedDataPtr(reinterpret_cast<uint8_t*>(malloc(resp->sig_len))); 561 memcpy(p, (unsigned char *)(&resp->signed_data), resp->sig_len); 563 *signedDataLength = resp->sig_len;
|
/external/boringssl/src/include/openssl/ |
rsa.h | 230 /* RSA_verify verifies that |sig_len| bytes from |sig| are a valid, 242 const uint8_t *sig, size_t sig_len, RSA *rsa);
|
/external/boringssl/src/crypto/rsa/ |
rsa.c | 501 const uint8_t *sig, size_t sig_len, RSA *rsa) { 525 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len,
|
/external/openssh/ |
sshkey.c | 2379 size_t i, ca_len, sig_len; local [all...] |
/external/conscrypt/common/src/jni/main/cpp/ |
NativeCrypto.cpp | 739 unsigned int* sig_len, 774 *sig_len = static_cast<unsigned int>(signatureBytes.size()); 781 size_t /* sig_len */, [all...] |