/external/libconstrainedcrypto/include/constrainedcrypto/ |
dsa_sig.h | 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
|
/external/boringssl/src/tool/ |
sign.cc | 70 size_t sig_len = EVP_PKEY_size(key.get()); local 71 std::unique_ptr<uint8_t[]> sig(new uint8_t[sig_len]); 72 if (!EVP_DigestSign(ctx.get(), sig.get(), &sig_len, data.data(), 77 if (fwrite(sig.get(), 1, sig_len, stdout) != sig_len) {
|
speed.cc | 151 unsigned sig_len; local 155 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool { 160 sig.get(), &sig_len, key); 169 [key, &fake_sha256_hash, &sig, sig_len]() -> bool { 186 sizeof(fake_sha256_hash), sig.get(), sig_len, key); 426 unsigned sig_len; local 429 if (!TimeFunction(&results, [&key, &signature, &digest, &sig_len]() -> bool { 430 return ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len, 438 if (!TimeFunction(&results, [&key, &signature, &digest, sig_len]() -> bool { 439 return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len, [all...] |
/external/kmod/libkmod/ |
libkmod-signature.c | 91 uint32_t sig_len; /* Length of signature data (big endian) */ member in struct:module_signature 112 size_t sig_len; local 131 sig_len = be32toh(get_unaligned(&modsig->sig_len)); 132 if (sig_len == 0 || 133 size < (int64_t)(modsig->signer_len + modsig->key_id_len + sig_len)) 136 size -= modsig->key_id_len + sig_len;
|
/external/vboot_reference/utility/ |
verify_data.c | 52 int i, algorithm, sig_len; local 74 sig_len = siglen_map[algorithm]; 76 (signature = read_signature(argv[3], sig_len)) && 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) {
|
/external/boringssl/src/crypto/ecdsa_extra/ |
ecdsa_asn1.c | 70 unsigned int *sig_len, const EC_KEY *eckey) { 72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, 76 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 81 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, 88 *sig_len = 0; 94 *sig_len = 0; 106 *sig_len = 0; 109 *sig_len = (unsigned)len; 118 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) { 124 s = ECDSA_SIG_from_bytes(sig, sig_len); [all...] |
/external/libconstrainedcrypto/ |
dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { 87 if ((seq_len <= 0) || (seq_len + 2 != sig_len)) {
|
/external/boringssl/src/crypto/evp/ |
sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); local 97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { 100 *out_sig_len = sig_len; 123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, 145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
|
digestsign.c | 176 size_t sig_len) { 190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); 218 int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, 222 EVP_DigestVerifyFinal(ctx, sig, sig_len); 230 return ctx->pctx->pmeth->verify_message(ctx->pctx, sig, sig_len, data, len);
|
evp_ctx.c | 226 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, 236 return ctx->pmeth->sign(ctx, sig, sig_len, digest, digest_len); 249 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, 259 return ctx->pmeth->verify(ctx, sig, sig_len, digest, digest_len); 316 const uint8_t *sig, size_t sig_len) { 325 return ctx->pmeth->verify_recover(ctx, out, out_len, sig, sig_len);
|
/external/boringssl/src/include/openssl/ |
ecdsa.h | 73 * space. On successful exit, |*sig_len| is set to the actual number of bytes 78 unsigned int *sig_len, const EC_KEY *key); 80 /* ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid 86 size_t sig_len, const EC_KEY *key); 145 unsigned int *sig_len, const BIGNUM *kinv,
|
evp.h | 312 /* EVP_DigestVerifyFinal verifies that |sig_len| bytes of |sig| are a valid 320 size_t sig_len); 322 /* EVP_DigestVerify verifies that |sig_len| bytes from |sig| are a valid 325 size_t sig_len, const uint8_t *data, 384 /* EVP_VerifyFinal verifies that |sig_len| bytes of |sig| are a valid 393 size_t sig_len, EVP_PKEY *pkey); 484 * |out_sig_len|. Otherwise, |*sig_len| must contain the number of bytes of 486 * |sig| and |*sig_len| updated with the true length. 498 size_t *sig_len, const uint8_t *digest, 507 /* EVP_PKEY_verify verifies that |sig_len| bytes from |sig| are a vali [all...] |
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 58 signature = BufferFromFile(file_name, &sig_len); 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest))
|
/system/core/adb/ |
adb_auth.h | 52 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len);
|
adbd_auth.cpp | 49 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len) { 83 reinterpret_cast<const uint8_t*>(sig), sig_len, key) == 1);
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa.c | 132 const uint32_t sig_len, 143 if (sig_len != (key->len * sizeof(uint32_t))) { 158 buf = (uint8_t*) VbExMalloc(sig_len); 161 Memcpy(buf, sig, sig_len); 179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) {
|
/external/boringssl/src/fipstools/ |
cavp_rsa2_siggen_test.cc | 80 size_t sig_len; local 87 if (!RSA_sign_pss_mgf1(ctx->key.get(), &sig_len, sig.data(), sig.size(), 97 sig_len = sig_len_u; 101 EncodeHex(sig.data(), sig_len).c_str());
|
test_fips.c | 186 unsigned sig_len; local 190 &sig_len, rsa_key)) { 195 hexdump(output, sig_len); 199 hexdump(output, sig_len); 201 output, sig_len, rsa_key)) {
|
/external/vboot_reference/firmware/lib/cryptolib/include/ |
rsa.h | 33 /* Verify a RSA PKCS1.5 signature [sig] of [sig_type] and length [sig_len] 38 const uint32_t sig_len,
|
/system/keymaster/ |
keymaster0_engine.h | 76 unsigned int* sig_len, EC_KEY* ec_key); 88 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
keymaster0_engine.cpp | 254 unsigned int* sig_len, EC_KEY* ec_key) { 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); 344 unsigned int* sig_len, EC_KEY* ec_key) const { 375 *sig_len = signature_length;
|
keymaster1_engine.h | 108 unsigned int* sig_len, EC_KEY* ec_key);
|
/external/syslinux/gpxe/src/crypto/axtls/ |
rsa.c | 291 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len, 299 block = (uint8_t *)malloc(sig_len); 302 dat_bi = bi_import(ctx, sig, sig_len); 308 bi_export(ctx, decrypted_bi, block, sig_len); 312 while (block[i++] && i < sig_len); 313 size = sig_len - i;
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 173 * sig_len : Signed data length 179 size_t sig_len; member in struct:keymaster_sign_data_resp
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
ecdsa_test.cc | 180 unsigned sig_len = ECDSA_size(eckey.get()); local 181 std::vector<uint8_t> signature(sig_len); 183 ECDSA_sign(0, digest, 20, signature.data(), &sig_len, eckey.get())); 184 signature.resize(sig_len);
|