Home | History | Annotate | Download | only in tests

Lines Matching refs:sig

47 	uint8_t sig[RSA1024NUMBYTES];
55 Memcpy(sig, signatures[0], sizeof(sig));
56 TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
57 "RSA Padding Test valid sig");
62 Memcpy(sig, signatures[i], sizeof(sig));
63 if (!vb2_rsa_verify_digest(key, sig,
80 uint8_t sig[RSA1024NUMBYTES];
86 Memcpy(sig, signatures[0], sizeof(sig));
87 TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
90 Memcpy(sig, signatures[0], sizeof(sig));
91 vb2_workbuf_init(&wb, workbuf, sizeof(sig) * 3 - 1);
92 TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
98 Memcpy(sig, signatures[0], sizeof(sig));
99 TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
105 Memcpy(sig, signatures[0], sizeof(sig));
106 TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
108 "vb2_rsa_verify_digest() bad sig len");
112 Memcpy(sig, signatures[0], sizeof(sig));
113 sig[3] ^= 0x42;
114 TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
115 VB2_ERROR_RSA_PADDING, "vb2_rsa_verify_digest() bad sig");
117 Memcpy(sig, signatures[0], sizeof(sig));
118 sig[RSA1024NUMBYTES - 3] ^= 0x56;
119 TEST_EQ(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
120 VB2_ERROR_RSA_PADDING, "vb2_rsa_verify_digest() bad sig end");