/external/vboot_reference/firmware/2lib/include/ |
2rsa.h | 20 enum vb2_signature_algorithm sig_alg; /* Signature algorithm */ member in struct:vb2_public_key 41 * @param sig_alg Signature algorithm 44 uint32_t vb2_rsa_sig_size(enum vb2_signature_algorithm sig_alg); 49 * @param sig_alg Signature algorithm 52 uint32_t vb2_packed_key_size(enum vb2_signature_algorithm sig_alg);
|
2common.h | 166 * @param sig_alg Signature algorithm 170 uint32_t vb2_sig_size(enum vb2_signature_algorithm sig_alg, 178 * sig_alg=VB2_SIG_NONE, or NULL if error.
|
/external/vboot_reference/firmware/lib21/ |
packed_key.c | 18 uint32_t expected_key_size = vb2_packed_key_size(key->sig_alg); 33 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg)) 82 key->sig_alg = pkey->sig_alg; 83 if (key->sig_alg != VB2_SIG_NONE) { 84 sig_size = vb2_rsa_sig_size(key->sig_alg);
|
common.c | 129 uint32_t vb2_sig_size(enum vb2_signature_algorithm sig_alg, 139 if (sig_alg == VB2_SIG_NONE) 142 return vb2_rsa_sig_size(sig_alg); 210 expect_sig_size = vb2_sig_size(sig->sig_alg, sig->hash_alg); 232 uint32_t key_sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); 239 if (key->sig_alg != sig->sig_alg || key->hash_alg != sig->hash_alg) 245 if (key->sig_alg == VB2_SIG_NONE) { 425 if (sig->sig_alg != VB2_SIG_NONE)
|
/device/linaro/bootloader/arm-trusted-firmware/include/drivers/auth/ |
crypto_mod.h | 34 void *sig_alg, unsigned int sig_alg_len, 46 void *sig_alg, unsigned int sig_alg_len,
|
/external/vboot_reference/firmware/lib20/ |
packed_key.c | 42 key->sig_alg = vb2_crypto_to_signature(packed_key->algorithm); 43 if (key->sig_alg == VB2_SIG_INVALID) { 54 expected_key_size = vb2_packed_key_size(key->sig_alg); 67 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg))
|
/external/vboot_reference/host/lib21/ |
host_key.c | 129 key->sig_alg = pkey->sig_alg; 134 if (pkey->sig_alg == VB2_SIG_NONE) { 238 .sig_alg = key->sig_alg, 251 if (key->sig_alg != VB2_SIG_NONE) { 297 .sig_alg = VB2_SIG_NONE, 310 .sig_alg = VB2_SIG_NONE, 323 .sig_alg = VB2_SIG_NONE, 337 enum vb2_signature_algorithm sig_alg) 383 enum vb2_signature_algorithm sig_alg; local [all...] |
host_signature.c | 90 .sig_alg = key->sig_alg, 113 s.sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); 120 if (s.sig_alg != VB2_SIG_NONE) { 162 if (s.sig_alg == VB2_SIG_NONE) { 187 uint32_t size = vb2_sig_size(key->sig_alg, key->hash_alg);
|
/external/vboot_reference/futility/ |
cmd_create.c | 84 enum vb2_signature_algorithm sig_alg; local 103 sig_alg = vb2_rsa_sig_alg(rsa_key); 104 if (sig_alg == VB2_SIG_INVALID) { 109 /* combine the sig_alg with the hash_alg to get the vb1 algorithm */ 110 vb1_algorithm = (sig_alg - VB2_SIG_RSA1024) * 3 166 enum vb2_signature_algorithm sig_alg; local 186 sig_alg = vb2_rsa_sig_alg(rsa_key); 187 if (sig_alg == VB2_SIG_INVALID) { 199 privkey->sig_alg = sig_alg; [all...] |
/external/vboot_reference/firmware/lib21/include/ |
vb2_struct.h | 128 uint16_t sig_alg; member in struct:vb2_packed_key 170 uint16_t sig_alg; member in struct:vb2_packed_private_key 212 uint16_t sig_alg; member in struct:vb2_signature 226 * being hashed. There is no key GUID, because sig_alg=VB2_ALG_NONE. 326 * the various firmware components. These have sig_alg=VB2_SIG_NONE,
|
/external/vboot_reference/tests/ |
vb21_host_key_tests.c | 23 enum vb2_signature_algorithm sig_alg; member in struct:alg_combo 74 key->sig_alg = combo->sig_alg; 87 TEST_EQ(k2->sig_alg, key->sig_alg, " sig alg"); 142 pkey->sig_alg = VB2_SIG_NONE; 159 TEST_EQ(ckey->sig_alg, VB2_SIG_NONE, " sig_alg"); 186 TEST_EQ(key->sig_alg, combo->sig_alg, " sig_alg") [all...] |
vb20_rsa_padding_tests.c | 36 k2->sig_alg = vb2_crypto_to_signature(key->algorithm); 82 enum vb2_signature_algorithm orig_key_alg = key->sig_alg; 97 key->sig_alg = VB2_SIG_INVALID; 102 key->sig_alg = orig_key_alg;
|
vb21_common2_tests.c | 83 key2->sig_alg = VB2_SIG_INVALID; 156 sig2->sig_alg = VB2_SIG_INVALID; 161 sig2->sig_alg = (sig2->sig_alg == VB2_SIG_NONE ? 191 pubk.sig_alg = VB2_SIG_INVALID; 244 enum vb2_signature_algorithm sig_alg = local 259 prik->sig_alg = sig_alg;
|
vb21_host_sig_tests.c | 23 enum vb2_signature_algorithm sig_alg; member in struct:alg_combo 65 prik->sig_alg = combo->sig_alg; 114 prik2.sig_alg = VB2_SIG_INVALID; 168 int rsa_bits = vb2_rsa_sig_size(combo->sig_alg) * 8;
|
vb21_host_keyblock_tests.c | 61 prik4096->sig_alg = VB2_SIG_RSA4096; 68 prik8192->sig_alg = VB2_SIG_RSA8192; 114 pubk4096->sig_alg = VB2_SIG_INVALID;
|
vb20_common2_tests.c | 39 TEST_EQ(pubk.sig_alg, vb2_crypto_to_signature(key->algorithm), 40 "vb2_unpack_key() sig_alg"); 99 pubk.sig_alg = VB2_SIG_INVALID; 102 pubk.sig_alg = pubk_orig.sig_alg;
|
vb2_rsa_utility_tests.c | 39 struct vb2_public_key kbad = {.sig_alg = VB2_SIG_INVALID,
|
/external/vboot_reference/host/lib21/include/ |
host_key2.h | 19 enum vb2_signature_algorithm sig_alg; /* Signature algorithm */ member in struct:vb2_private_key 130 * This only initializes the sig_alg field and the guid field to an empty 135 * @param sig_alg Signature algorithm for key. 139 enum vb2_signature_algorithm sig_alg);
|
/device/linaro/bootloader/arm-trusted-firmware/drivers/auth/tbbr/ |
tbbr_cot.c | 52 static auth_param_type_desc_t sig_alg = AUTH_PARAM_TYPE_DESC( variable 109 .alg = &sig_alg, 158 .alg = &sig_alg, 200 .alg = &sig_alg, 232 .alg = &sig_alg, 281 .alg = &sig_alg, 313 .alg = &sig_alg, 362 .alg = &sig_alg, 394 .alg = &sig_alg, 485 .alg = &sig_alg, [all...] |
/external/boringssl/src/crypto/x509/ |
x_req.c | 103 ASN1_SIMPLE(X509_REQ, sig_alg, X509_ALGOR),
|
t_crl.c | 92 X509_signature_print(out, x->sig_alg, NULL); 124 X509_signature_print(out, x->sig_alg, x->signature);
|
x_all.c | 68 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) 70 return (ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF), a->sig_alg, 77 a->sig_alg, a->signature, a->req_info, r)); 84 x->sig_alg, x->signature, x->cert_info, pkey, md)); 92 x->sig_alg, x->signature, x->cert_info, ctx); 97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO), x->sig_alg, NULL, 104 x->sig_alg, NULL, x->signature, x->req_info, 111 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO), x->crl->sig_alg, 112 x->sig_alg, x->signature, x->crl, pkey, md)); 119 x->crl->sig_alg, x->sig_alg, x->signature [all...] |
/external/vboot_reference/firmware/2lib/ |
2rsa.c | 175 uint32_t vb2_rsa_sig_size(enum vb2_signature_algorithm sig_alg) 177 switch (sig_alg) { 191 uint32_t vb2_packed_key_size(enum vb2_signature_algorithm sig_alg) 193 uint32_t sig_size = vb2_rsa_sig_size(sig_alg); 246 uint32_t sig_size = vb2_rsa_sig_size(key->sig_alg); 306 sig_size = vb2_rsa_sig_size(key->sig_alg);
|
/device/linaro/bootloader/arm-trusted-firmware/drivers/auth/mbedtls/ |
mbedtls_x509_parser.c | 41 static mbedtls_asn1_buf sig_alg; variable 58 ZERO_AND_CLEAN(sig_alg); 375 memcpy(&sig_alg, &sig_alg1, sizeof(sig_alg)); 435 * extracted the relevant data (v3_ext, pk, sig_alg, etc) */ 460 *param = (void *)sig_alg.p; 461 *param_len = (unsigned int)sig_alg.len;
|
mbedtls_crypto.c | 55 void *sig_alg, unsigned int sig_alg_len, 70 p = (unsigned char *)sig_alg;
|