HomeSort by relevance Sort by last modified time
    Searched refs:sig_alg (Results 1 - 25 of 43) sorted by null

1 2

  /external/vboot_reference/firmware/2lib/include/
2rsa.h 20 enum vb2_signature_algorithm sig_alg; /* Signature algorithm */ member in struct:vb2_public_key
41 * @param sig_alg Signature algorithm
44 uint32_t vb2_rsa_sig_size(enum vb2_signature_algorithm sig_alg);
49 * @param sig_alg Signature algorithm
52 uint32_t vb2_packed_key_size(enum vb2_signature_algorithm sig_alg);
2common.h 166 * @param sig_alg Signature algorithm
170 uint32_t vb2_sig_size(enum vb2_signature_algorithm sig_alg,
178 * sig_alg=VB2_SIG_NONE, or NULL if error.
  /external/vboot_reference/firmware/lib21/
packed_key.c 18 uint32_t expected_key_size = vb2_packed_key_size(key->sig_alg);
33 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg))
82 key->sig_alg = pkey->sig_alg;
83 if (key->sig_alg != VB2_SIG_NONE) {
84 sig_size = vb2_rsa_sig_size(key->sig_alg);
common.c 129 uint32_t vb2_sig_size(enum vb2_signature_algorithm sig_alg,
139 if (sig_alg == VB2_SIG_NONE)
142 return vb2_rsa_sig_size(sig_alg);
210 expect_sig_size = vb2_sig_size(sig->sig_alg, sig->hash_alg);
232 uint32_t key_sig_size = vb2_sig_size(key->sig_alg, key->hash_alg);
239 if (key->sig_alg != sig->sig_alg || key->hash_alg != sig->hash_alg)
245 if (key->sig_alg == VB2_SIG_NONE) {
425 if (sig->sig_alg != VB2_SIG_NONE)
  /device/linaro/bootloader/arm-trusted-firmware/include/drivers/auth/
crypto_mod.h 34 void *sig_alg, unsigned int sig_alg_len,
46 void *sig_alg, unsigned int sig_alg_len,
  /external/vboot_reference/firmware/lib20/
packed_key.c 42 key->sig_alg = vb2_crypto_to_signature(packed_key->algorithm);
43 if (key->sig_alg == VB2_SIG_INVALID) {
54 expected_key_size = vb2_packed_key_size(key->sig_alg);
67 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg))
  /external/vboot_reference/host/lib21/
host_key.c 129 key->sig_alg = pkey->sig_alg;
134 if (pkey->sig_alg == VB2_SIG_NONE) {
238 .sig_alg = key->sig_alg,
251 if (key->sig_alg != VB2_SIG_NONE) {
297 .sig_alg = VB2_SIG_NONE,
310 .sig_alg = VB2_SIG_NONE,
323 .sig_alg = VB2_SIG_NONE,
337 enum vb2_signature_algorithm sig_alg)
383 enum vb2_signature_algorithm sig_alg; local
    [all...]
host_signature.c 90 .sig_alg = key->sig_alg,
113 s.sig_size = vb2_sig_size(key->sig_alg, key->hash_alg);
120 if (s.sig_alg != VB2_SIG_NONE) {
162 if (s.sig_alg == VB2_SIG_NONE) {
187 uint32_t size = vb2_sig_size(key->sig_alg, key->hash_alg);
  /external/vboot_reference/futility/
cmd_create.c 84 enum vb2_signature_algorithm sig_alg; local
103 sig_alg = vb2_rsa_sig_alg(rsa_key);
104 if (sig_alg == VB2_SIG_INVALID) {
109 /* combine the sig_alg with the hash_alg to get the vb1 algorithm */
110 vb1_algorithm = (sig_alg - VB2_SIG_RSA1024) * 3
166 enum vb2_signature_algorithm sig_alg; local
186 sig_alg = vb2_rsa_sig_alg(rsa_key);
187 if (sig_alg == VB2_SIG_INVALID) {
199 privkey->sig_alg = sig_alg;
    [all...]
  /external/vboot_reference/firmware/lib21/include/
vb2_struct.h 128 uint16_t sig_alg; member in struct:vb2_packed_key
170 uint16_t sig_alg; member in struct:vb2_packed_private_key
212 uint16_t sig_alg; member in struct:vb2_signature
226 * being hashed. There is no key GUID, because sig_alg=VB2_ALG_NONE.
326 * the various firmware components. These have sig_alg=VB2_SIG_NONE,
  /external/vboot_reference/tests/
vb21_host_key_tests.c 23 enum vb2_signature_algorithm sig_alg; member in struct:alg_combo
74 key->sig_alg = combo->sig_alg;
87 TEST_EQ(k2->sig_alg, key->sig_alg, " sig alg");
142 pkey->sig_alg = VB2_SIG_NONE;
159 TEST_EQ(ckey->sig_alg, VB2_SIG_NONE, " sig_alg");
186 TEST_EQ(key->sig_alg, combo->sig_alg, " sig_alg")
    [all...]
vb20_rsa_padding_tests.c 36 k2->sig_alg = vb2_crypto_to_signature(key->algorithm);
82 enum vb2_signature_algorithm orig_key_alg = key->sig_alg;
97 key->sig_alg = VB2_SIG_INVALID;
102 key->sig_alg = orig_key_alg;
vb21_common2_tests.c 83 key2->sig_alg = VB2_SIG_INVALID;
156 sig2->sig_alg = VB2_SIG_INVALID;
161 sig2->sig_alg = (sig2->sig_alg == VB2_SIG_NONE ?
191 pubk.sig_alg = VB2_SIG_INVALID;
244 enum vb2_signature_algorithm sig_alg = local
259 prik->sig_alg = sig_alg;
vb21_host_sig_tests.c 23 enum vb2_signature_algorithm sig_alg; member in struct:alg_combo
65 prik->sig_alg = combo->sig_alg;
114 prik2.sig_alg = VB2_SIG_INVALID;
168 int rsa_bits = vb2_rsa_sig_size(combo->sig_alg) * 8;
vb21_host_keyblock_tests.c 61 prik4096->sig_alg = VB2_SIG_RSA4096;
68 prik8192->sig_alg = VB2_SIG_RSA8192;
114 pubk4096->sig_alg = VB2_SIG_INVALID;
vb20_common2_tests.c 39 TEST_EQ(pubk.sig_alg, vb2_crypto_to_signature(key->algorithm),
40 "vb2_unpack_key() sig_alg");
99 pubk.sig_alg = VB2_SIG_INVALID;
102 pubk.sig_alg = pubk_orig.sig_alg;
vb2_rsa_utility_tests.c 39 struct vb2_public_key kbad = {.sig_alg = VB2_SIG_INVALID,
  /external/vboot_reference/host/lib21/include/
host_key2.h 19 enum vb2_signature_algorithm sig_alg; /* Signature algorithm */ member in struct:vb2_private_key
130 * This only initializes the sig_alg field and the guid field to an empty
135 * @param sig_alg Signature algorithm for key.
139 enum vb2_signature_algorithm sig_alg);
  /device/linaro/bootloader/arm-trusted-firmware/drivers/auth/tbbr/
tbbr_cot.c 52 static auth_param_type_desc_t sig_alg = AUTH_PARAM_TYPE_DESC( variable
109 .alg = &sig_alg,
158 .alg = &sig_alg,
200 .alg = &sig_alg,
232 .alg = &sig_alg,
281 .alg = &sig_alg,
313 .alg = &sig_alg,
362 .alg = &sig_alg,
394 .alg = &sig_alg,
485 .alg = &sig_alg,
    [all...]
  /external/boringssl/src/crypto/x509/
x_req.c 103 ASN1_SIMPLE(X509_REQ, sig_alg, X509_ALGOR),
t_crl.c 92 X509_signature_print(out, x->sig_alg, NULL);
124 X509_signature_print(out, x->sig_alg, x->signature);
x_all.c 68 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
70 return (ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF), a->sig_alg,
77 a->sig_alg, a->signature, a->req_info, r));
84 x->sig_alg, x->signature, x->cert_info, pkey, md));
92 x->sig_alg, x->signature, x->cert_info, ctx);
97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO), x->sig_alg, NULL,
104 x->sig_alg, NULL, x->signature, x->req_info,
111 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO), x->crl->sig_alg,
112 x->sig_alg, x->signature, x->crl, pkey, md));
119 x->crl->sig_alg, x->sig_alg, x->signature
    [all...]
  /external/vboot_reference/firmware/2lib/
2rsa.c 175 uint32_t vb2_rsa_sig_size(enum vb2_signature_algorithm sig_alg)
177 switch (sig_alg) {
191 uint32_t vb2_packed_key_size(enum vb2_signature_algorithm sig_alg)
193 uint32_t sig_size = vb2_rsa_sig_size(sig_alg);
246 uint32_t sig_size = vb2_rsa_sig_size(key->sig_alg);
306 sig_size = vb2_rsa_sig_size(key->sig_alg);
  /device/linaro/bootloader/arm-trusted-firmware/drivers/auth/mbedtls/
mbedtls_x509_parser.c 41 static mbedtls_asn1_buf sig_alg; variable
58 ZERO_AND_CLEAN(sig_alg);
375 memcpy(&sig_alg, &sig_alg1, sizeof(sig_alg));
435 * extracted the relevant data (v3_ext, pk, sig_alg, etc) */
460 *param = (void *)sig_alg.p;
461 *param_len = (unsigned int)sig_alg.len;
mbedtls_crypto.c 55 void *sig_alg, unsigned int sig_alg_len,
70 p = (unsigned char *)sig_alg;

Completed in 317 milliseconds

1 2