HomeSort by relevance Sort by last modified time
    Searched refs:sig_len (Results 1 - 25 of 54) sorted by null

1 2 3

  /external/libconstrainedcrypto/include/constrainedcrypto/
dsa_sig.h 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
  /external/boringssl/src/tool/
sign.cc 70 size_t sig_len = EVP_PKEY_size(key.get()); local
71 std::unique_ptr<uint8_t[]> sig(new uint8_t[sig_len]);
72 if (!EVP_DigestSign(ctx.get(), sig.get(), &sig_len, data.data(),
77 if (fwrite(sig.get(), 1, sig_len, stdout) != sig_len) {
speed.cc 151 unsigned sig_len; local
155 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool {
160 sig.get(), &sig_len, key);
169 [key, &fake_sha256_hash, &sig, sig_len]() -> bool {
186 sizeof(fake_sha256_hash), sig.get(), sig_len, key);
440 unsigned sig_len; local
443 if (!TimeFunction(&results, [&key, &signature, &digest, &sig_len]() -> bool {
444 return ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len,
452 if (!TimeFunction(&results, [&key, &signature, &digest, sig_len]() -> bool {
453 return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len,
    [all...]
  /device/linaro/bootloader/arm-trusted-firmware/include/drivers/auth/
crypto_mod.h 33 void *sig_ptr, unsigned int sig_len,
45 void *sig_ptr, unsigned int sig_len,
  /external/kmod/libkmod/
libkmod-signature.c 91 uint32_t sig_len; /* Length of signature data (big endian) */ member in struct:module_signature
112 size_t sig_len; local
131 sig_len = be32toh(get_unaligned(&modsig->sig_len));
132 if (sig_len == 0 ||
133 size < (int64_t)(modsig->signer_len + modsig->key_id_len + sig_len))
136 size -= modsig->key_id_len + sig_len;
  /external/vboot_reference/utility/
verify_data.c 52 int i, algorithm, sig_len; local
74 sig_len = siglen_map[algorithm];
76 (signature = read_signature(argv[3], sig_len)) &&
78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) {
  /device/linaro/bootloader/arm-trusted-firmware/drivers/auth/
crypto_mod.c 63 * sig_ptr, sig_len: the digital signature
68 void *sig_ptr, unsigned int sig_len,
75 assert(sig_len != 0);
82 sig_ptr, sig_len,
auth_mod.c 149 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; local
160 img, img_len, &sig_ptr, &sig_len);
192 sig_ptr, sig_len,
208 sig_ptr, sig_len,
  /external/libconstrainedcrypto/
dsa_sig.c 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) {
82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) {
87 if ((seq_len <= 0) || (seq_len + 2 != sig_len)) {
  /external/boringssl/src/crypto/evp/
sign.c 84 size_t sig_len = EVP_PKEY_size(pkey); local
97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) {
100 *out_sig_len = sig_len;
123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len,
145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
digestsign.c 176 size_t sig_len) {
190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
218 int EVP_DigestVerify(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len,
222 EVP_DigestVerifyFinal(ctx, sig, sig_len);
230 return ctx->pctx->pmeth->verify_message(ctx->pctx, sig, sig_len, data, len);
evp_ctx.c 226 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len,
236 return ctx->pmeth->sign(ctx, sig, sig_len, digest, digest_len);
249 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len,
259 return ctx->pmeth->verify(ctx, sig, sig_len, digest, digest_len);
316 const uint8_t *sig, size_t sig_len) {
325 return ctx->pmeth->verify_recover(ctx, out, out_len, sig, sig_len);
  /external/boringssl/src/crypto/ecdsa_extra/
ecdsa_asn1.c 70 unsigned int *sig_len, const EC_KEY *eckey) {
72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len,
81 *sig_len = 0;
87 *sig_len = 0;
99 *sig_len = 0;
102 *sig_len = (unsigned)len;
111 const uint8_t *sig, size_t sig_len, const EC_KEY *eckey) {
117 s = ECDSA_SIG_from_bytes(sig, sig_len);
125 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0)
    [all...]
  /external/vboot_reference/tests/
rsa_verify_benchmark.c 25 uint64_t digest_len, sig_len; local
58 signature = BufferFromFile(file_name, &sig_len);
67 if (!RSAVerify(key, signature, sig_len, algorithm, digest))
  /external/vboot_reference/firmware/lib/cryptolib/
rsa.c 132 const uint32_t sig_len,
143 if (sig_len != (key->len * sizeof(uint32_t))) {
158 buf = (uint8_t*) VbExMalloc(sig_len);
161 Memcpy(buf, sig, sig_len);
179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) {
  /external/boringssl/src/fipstools/
cavp_rsa2_siggen_test.cc 80 size_t sig_len; local
87 if (!RSA_sign_pss_mgf1(ctx->key.get(), &sig_len, sig.data(), sig.size(),
97 sig_len = sig_len_u;
101 EncodeHex(sig.data(), sig_len).c_str());
test_fips.c 186 unsigned sig_len; local
190 &sig_len, rsa_key)) {
195 hexdump(output, sig_len);
199 hexdump(output, sig_len);
201 output, sig_len, rsa_key)) {
  /external/vboot_reference/firmware/lib/cryptolib/include/
rsa.h 33 /* Verify a RSA PKCS1.5 signature [sig] of [sig_type] and length [sig_len]
38 const uint32_t sig_len,
  /system/iot/attestation/atap/test/
fake_atap_ops.cpp 75 uint32_t* sig_len) {
fake_atap_ops.h 63 uint32_t* sig_len) override;
  /external/boringssl/src/include/openssl/
ecdsa.h 73 // space. On successful exit, |*sig_len| is set to the actual number of bytes
78 unsigned int *sig_len, const EC_KEY *key);
80 // ECDSA_verify verifies that |sig_len| bytes from |sig| constitute a valid
86 size_t sig_len, const EC_KEY *key);
  /external/syslinux/gpxe/src/crypto/axtls/
rsa.c 291 bigint *RSA_sign_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len,
299 block = (uint8_t *)malloc(sig_len);
302 dat_bi = bi_import(ctx, sig, sig_len);
308 bi_export(ctx, decrypted_bi, block, sig_len);
312 while (block[i++] && i < sig_len);
313 size = sig_len - i;
  /system/keymaster/include/keymaster/legacy_support/
keymaster0_engine.h 77 unsigned int* sig_len, EC_KEY* ec_key);
89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
  /external/tensorflow/tensorflow/core/platform/cloud/
oauth_client.cc 114 size_t sig_len = 0; local
115 if (EVP_DigestSignFinal(md_ctx.get(), nullptr, &sig_len) != 1) {
118 std::unique_ptr<unsigned char[]> sig(new unsigned char[sig_len]);
119 if (EVP_DigestSignFinal(md_ctx.get(), sig.get(), &sig_len) != 1) {
123 return Base64Encode(StringPiece(reinterpret_cast<char*>(sig.get()), sig_len),
  /device/linaro/bootloader/arm-trusted-firmware/drivers/auth/mbedtls/
mbedtls_crypto.c 54 void *sig_ptr, unsigned int sig_len,
95 end = (unsigned char *)(p + sig_len);

Completed in 515 milliseconds

1 2 3