HomeSort by relevance Sort by last modified time
    Searched refs:sig_len (Results 26 - 41 of 41) sorted by null

12

  /external/boringssl/src/crypto/dsa/
dsa.c 736 const uint8_t *sig, size_t sig_len, const DSA *dsa) {
738 if (!DSA_check_signature(&valid, digest, digest_len, sig, sig_len, dsa)) {
745 size_t digest_len, const uint8_t *sig, size_t sig_len,
757 if (d2i_DSA_SIG(&s, &sigp, sig_len) == NULL || sigp != sig + sig_len) {
763 if (der_len < 0 || (size_t)der_len != sig_len ||
764 OPENSSL_memcmp(sig, der, sig_len)) {
dsa_test.cc 289 static bool TestVerify(const uint8_t *sig, size_t sig_len, int expect) {
296 DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa.get());
  /system/keymaster/
keymaster1_engine.cpp 336 unsigned int* sig_len, EC_KEY* ec_key) {
353 *sig_len = std::min(output.data_length, ECDSA_size(ec_key));
354 memcpy(sig, output.data, *sig_len);
  /external/boringssl/src/crypto/evp/
internal.h 212 const uint8_t *sig, size_t sig_len);
evp_extra_test.cc 385 size_t sig_len = 0; local
386 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len));
389 EXPECT_EQ(static_cast<size_t>(EVP_PKEY_size(pkey.get())), sig_len);
392 sig.resize(sig_len);
393 ASSERT_TRUE(EVP_DigestSignFinal(md_ctx.get(), sig.data(), &sig_len));
394 sig.resize(sig_len);
401 ASSERT_TRUE(EVP_DigestVerifyFinal(md_ctx.get(), sig.data(), sig_len));
423 unsigned sig_len = sizeof(sig); local
425 &sig_len, rsa.get()));
433 EVP_PKEY_verify_recover(ctx.get(), nullptr, &out_len, sig, sig_len));
    [all...]
p_rsa.c 267 size_t sig_len) {
287 const int ret = RSA_public_decrypt(sig_len, sig, rctx->tbuf,
312 if (!RSA_verify_raw(rsa, &rslen, rctx->tbuf, key_len, sig, sig_len,
  /external/boringssl/src/ssl/
tls13_both.c 554 size_t sig_len; local
569 sign_result = ssl_private_key_sign(ssl, sig, &sig_len, max_sig_len,
572 sign_result = ssl_private_key_complete(ssl, sig, &sig_len, max_sig_len);
580 if (!CBB_did_write(&child, sig_len) ||
handshake_client.c 1749 size_t sig_len = max_sig_len; local
    [all...]
handshake_server.c 1257 size_t sig_len; local
    [all...]
  /system/security/keystore-engine/
android_engine.cpp 237 unsigned int* sig_len, EC_KEY* ec_key) {
265 // Reviewer: should't sig_len be checked here? Or is it just assumed that it is at least ecdsa_size?
267 *sig_len = reply_len;
  /external/vboot_reference/tests/
rsa_utility_tests.c 31 const uint32_t sig_len,
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 532 resp->sig_len = KM_KEY_SIZE_MAX;
554 UniquePtr<uint8_t> signedDataPtr(reinterpret_cast<uint8_t*>(malloc(resp->sig_len)));
561 memcpy(p, (unsigned char *)(&resp->signed_data), resp->sig_len);
563 *signedDataLength = resp->sig_len;
  /external/boringssl/src/include/openssl/
rsa.h 230 /* RSA_verify verifies that |sig_len| bytes from |sig| are a valid,
242 const uint8_t *sig, size_t sig_len, RSA *rsa);
  /external/boringssl/src/crypto/rsa/
rsa.c 501 const uint8_t *sig, size_t sig_len, RSA *rsa) {
525 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len,
  /external/openssh/
sshkey.c 2379 size_t i, ca_len, sig_len; local
    [all...]
  /external/conscrypt/common/src/jni/main/cpp/
NativeCrypto.cpp 739 unsigned int* sig_len,
774 *sig_len = static_cast<unsigned int>(signatureBytes.size());
781 size_t /* sig_len */,
    [all...]

Completed in 1046 milliseconds

12