/external/libconstrainedcrypto/include/constrainedcrypto/ |
dsa_sig.h | 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
|
/external/boringssl/src/tool/ |
sign.cc | 70 size_t sig_len = EVP_PKEY_size(key.get()); local 71 std::unique_ptr<uint8_t[]> sig(new uint8_t[sig_len]); 72 if (!EVP_DigestSign(ctx.get(), sig.get(), &sig_len, data.data(), 77 if (fwrite(sig.get(), 1, sig_len, stdout) != sig_len) {
|
speed.cc | 151 unsigned sig_len; local 155 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool { 160 sig.get(), &sig_len, key); 169 [key, &fake_sha256_hash, &sig, sig_len]() -> bool { 186 sizeof(fake_sha256_hash), sig.get(), sig_len, key); 440 unsigned sig_len; local 443 if (!TimeFunction(&results, [&key, &signature, &digest, &sig_len]() -> bool { 444 return ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len, 452 if (!TimeFunction(&results, [&key, &signature, &digest, sig_len]() -> bool { 453 return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len, [all...] |
/device/linaro/bootloader/arm-trusted-firmware/include/drivers/auth/ |
crypto_mod.h | 33 void *sig_ptr, unsigned int sig_len, 45 void *sig_ptr, unsigned int sig_len,
|
/external/kmod/libkmod/ |
libkmod-signature.c | 91 uint32_t sig_len; /* Length of signature data (big endian) */ member in struct:module_signature 112 size_t sig_len; local 131 sig_len = be32toh(get_unaligned(&modsig->sig_len)); 132 if (sig_len == 0 || 133 size < (int64_t)(modsig->signer_len + modsig->key_id_len + sig_len)) 136 size -= modsig->key_id_len + sig_len;
|
/external/vboot_reference/utility/ |
verify_data.c | 52 int i, algorithm, sig_len; local 74 sig_len = siglen_map[algorithm]; 76 (signature = read_signature(argv[3], sig_len)) && 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) {
|
/device/linaro/bootloader/arm-trusted-firmware/drivers/auth/ |
crypto_mod.c | 63 * sig_ptr, sig_len: the digital signature 68 void *sig_ptr, unsigned int sig_len, 75 assert(sig_len != 0); 82 sig_ptr, sig_len,
|
auth_mod.c | 149 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; local 160 img, img_len, &sig_ptr, &sig_len); 192 sig_ptr, sig_len, 208 sig_ptr, sig_len,
|
/external/libconstrainedcrypto/ |
dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { 87 if ((seq_len <= 0) || (seq_len + 2 != sig_len)) {
|
/external/boringssl/src/crypto/evp/ |
sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); local 97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { 100 *out_sig_len = sig_len; 123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, 145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
|
digestsign.c | 176 size_t sig_len) { 190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); 218 int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, 222 EVP_DigestVerifyFinal(ctx, sig, sig_len); 230 return ctx->pctx->pmeth->verify_message(ctx->pctx, sig, sig_len, data, len);
|
evp_ctx.c | 226 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, 236 return ctx->pmeth->sign(ctx, sig, sig_len, digest, digest_len); 249 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, 259 return ctx->pmeth->verify(ctx, sig, sig_len, digest, digest_len); 316 const uint8_t *sig, size_t sig_len) { 325 return ctx->pmeth->verify_recover(ctx, out, out_len, sig, sig_len);
|
/external/boringssl/src/crypto/ecdsa_extra/ |
ecdsa_asn1.c | 70 unsigned int *sig_len, const EC_KEY *eckey) { 72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, 81 *sig_len = 0; 87 *sig_len = 0; 99 *sig_len = 0; 102 *sig_len = (unsigned)len; 111 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) { 117 s = ECDSA_SIG_from_bytes(sig, sig_len); 125 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) [all...] |
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 58 signature = BufferFromFile(file_name, &sig_len); 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest))
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa.c | 132 const uint32_t sig_len, 143 if (sig_len != (key->len * sizeof(uint32_t))) { 158 buf = (uint8_t*) VbExMalloc(sig_len); 161 Memcpy(buf, sig, sig_len); 179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) {
|
/external/boringssl/src/fipstools/ |
cavp_rsa2_siggen_test.cc | 80 size_t sig_len; local 87 if (!RSA_sign_pss_mgf1(ctx->key.get(), &sig_len, sig.data(), sig.size(), 97 sig_len = sig_len_u; 101 EncodeHex(sig.data(), sig_len).c_str());
|
test_fips.c | 186 unsigned sig_len; local 190 &sig_len, rsa_key)) { 195 hexdump(output, sig_len); 199 hexdump(output, sig_len); 201 output, sig_len, rsa_key)) {
|
/external/vboot_reference/firmware/lib/cryptolib/include/ |
rsa.h | 33 /* Verify a RSA PKCS1.5 signature [sig] of [sig_type] and length [sig_len] 38 const uint32_t sig_len,
|
/system/iot/attestation/atap/test/ |
fake_atap_ops.cpp | 75 uint32_t* sig_len) {
|
fake_atap_ops.h | 63 uint32_t* sig_len) override;
|
/external/boringssl/src/include/openssl/ |
ecdsa.h | 73 // space. On successful exit, |*sig_len| is set to the actual number of bytes 78 unsigned int *sig_len, const EC_KEY *key); 80 // ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid 86 size_t sig_len, const EC_KEY *key);
|
/external/syslinux/gpxe/src/crypto/axtls/ |
rsa.c | 291 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len, 299 block = (uint8_t *)malloc(sig_len); 302 dat_bi = bi_import(ctx, sig, sig_len); 308 bi_export(ctx, decrypted_bi, block, sig_len); 312 while (block[i++] && i < sig_len); 313 size = sig_len - i;
|
/system/keymaster/include/keymaster/legacy_support/ |
keymaster0_engine.h | 77 unsigned int* sig_len, EC_KEY* ec_key); 89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
/external/tensorflow/tensorflow/core/platform/cloud/ |
oauth_client.cc | 114 size_t sig_len = 0; local 115 if (EVP_DigestSignFinal(md_ctx.get(), nullptr, &sig_len) != 1) { 118 std::unique_ptr<unsigned char[]> sig(new unsigned char[sig_len]); 119 if (EVP_DigestSignFinal(md_ctx.get(), sig.get(), &sig_len) != 1) { 123 return Base64Encode(StringPiece(reinterpret_cast<char*>(sig.get()), sig_len),
|
/device/linaro/bootloader/arm-trusted-firmware/drivers/auth/mbedtls/ |
mbedtls_crypto.c | 54 void *sig_ptr, unsigned int sig_len, 95 end = (unsigned char *)(p + sig_len);
|