/external/vboot_reference/host/lib/include/ |
H A D | host_signature.h | 19 uint64_t sig_size, uint64_t data_size); 22 /* Allocate a new signature with space for a [sig_size] byte signature. */ 23 VbSignature* SignatureAlloc(uint64_t sig_size, uint64_t data_size);
|
/external/vboot_reference/host/lib/ |
H A D | host_signature.c | 24 VbSignature* SignatureAlloc(uint64_t sig_size, uint64_t data_size) { argument 25 VbSignature* sig = (VbSignature*)malloc(sizeof(VbSignature) + sig_size); 30 sig->sig_size = sig_size; 37 uint64_t sig_size, uint64_t data_size) { 39 sig->sig_size = sig_size; 45 if (dest->sig_size < src->sig_size) 47 dest->sig_size 36 SignatureInit(VbSignature* sig, uint8_t* sig_data, uint64_t sig_size, uint64_t data_size) argument [all...] |
H A D | host_common.c | 27 body_signature->sig_size); 42 block_sig_dest = body_sig_dest + body_signature->sig_size; 57 body_signature->sig_size, 0); 87 body_signature->sig_size); 104 block_sig_dest = body_sig_dest + body_signature->sig_size; 119 body_signature->sig_size, 0);
|
/external/vboot_reference/firmware/2lib/ |
H A D | 2rsa.c | 193 uint32_t sig_size = vb2_rsa_sig_size(sig_alg); local 195 if (!sig_size) 203 return 2 * sig_size + 2 * sizeof(uint32_t); 246 uint32_t sig_size = vb2_rsa_sig_size(key->sig_alg); local 248 uint32_t pad_size = sig_size - hash_size; 254 if (!sig_size || !hash_size || hash_size > sig_size) 299 int sig_size; local 306 sig_size = vb2_rsa_sig_size(key->sig_alg); 307 if (!sig_size) { [all...] |
/external/vboot_reference/host/lib21/ |
H A D | host_keyblock.c | 35 uint32_t sig_size; local 46 if (vb2_sig_size_for_keys(&sig_size, signing_keys, signing_key_count)) 53 kb.c.total_size = kb.sig_offset + sig_size;
|
H A D | host_fw_preamble.c | 39 uint32_t sig_size; local 53 if (vb2_sig_size_for_key(&sig_size, signing_key, NULL)) 56 fp.c.total_size = fp.sig_offset + sig_size;
|
H A D | host_signature.c | 113 s.sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); 114 if (!s.sig_size) 117 s.c.total_size = s.sig_offset + s.sig_size;
|
/external/vboot_reference/firmware/lib/cryptolib/ |
H A D | rsa_utility.c | 92 int sig_size; local 99 sig_size = siglen_map[algorithm]; 113 success = RSAVerify(verification_key, sig, (uint32_t)sig_size, 131 int sig_size; local 138 sig_size = siglen_map[algorithm]; 151 success = RSAVerify(verification_key, sig, (uint32_t)sig_size,
|
/external/vboot_reference/firmware/lib21/ |
H A D | packed_key.c | 51 uint32_t sig_size; local 84 sig_size = vb2_rsa_sig_size(key->sig_alg); 85 if (!sig_size)
|
H A D | common.c | 205 sig->sig_offset, sig->sig_size); 213 if (sig->sig_size != expect_sig_size) 242 if (sig->sig_size != key_sig_size)
|
/external/vboot_reference/tests/ |
H A D | vboot_common2_tests.c | 63 sig->sig_size -= 16; 66 sig->sig_size += 16; 100 sig->sig_size = 1; 180 h->preamble_signature.sig_size--; 194 h->body_signature.sig_size = 0;
|
H A D | vb20_common_tests.c | 148 .sig_size = 128}; 161 .sig_size = 4};
|
H A D | vboot_common3_tests.c | 95 h->key_block_checksum.sig_size /= 2; 113 h->key_block_signature.sig_size--; 229 h->preamble_signature.sig_size--; 245 h->body_signature.sig_size = 0;
|
H A D | vb20_common2_tests.c | 86 uint32_t sig_total_size = sig->sig_offset + sig->sig_size; 121 sig2->sig_size -= 16;
|
H A D | vb20_common3_tests.c | 113 h->keyblock_signature.sig_size--; 259 h->preamble_signature.sig_size--; 277 h->body_signature.sig_size = 0;
|
H A D | vboot_firmware_tests.c | 192 return sig->sig_size; 337 mpreamble[0].body_signature.sig_size = 1; 427 mpreamble[0].body_signature.sig_size = 1; /* Mock bad sig */
|
H A D | vb20_api_tests.c | 82 pre->body_signature.sig_size = mock_sig_size; 382 pre->body_signature.sig_size++;
|
H A D | vb21_common2_tests.c | 151 sig2->sig_size += 4; 215 sig2->sig_size -= 16;
|
H A D | vb21_common_tests.c | 478 sig->sig_size /= 2;
|
/external/vboot_reference/firmware/lib20/include/ |
H A D | vb2_struct.h | 51 uint32_t sig_size; member in struct:vb2_signature
|
/external/vboot_reference/firmware/lib/ |
H A D | vboot_common.c | 100 sig->sig_offset, sig->sig_size); 149 VBDEBUG((" - sig_size=%d, expecting %d for algorithm %d\n", 150 (unsigned)sig->sig_size, siglen_map[key->algorithm], 152 if (sig->sig_size != siglen_map[key->algorithm]) { 154 "sig_size=%d, expected %d for algorithm %d.\n", 155 (int)sig->sig_size, siglen_map[key->algorithm], 174 if (sig->sig_size != siglen_map[key->algorithm]) { 231 if (sig->sig_size != SHA512_DIGEST_SIZE) {
|
/external/vboot_reference/firmware/lib21/include/ |
H A D | vb2_struct.h | 206 uint32_t sig_size; member in struct:vb2_signature
|
/external/vboot_reference/firmware/lib20/ |
H A D | common.c | 64 sig->sig_offset, sig->sig_size); 74 if (sig->sig_size != vb2_rsa_sig_size(key->sig_alg)) { 76 "sig_size=%d, expected %d for algorithm %d.\n", 77 sig->sig_size, vb2_rsa_sig_size(key->sig_alg),
|
/external/vboot_reference/firmware/include/ |
H A D | vboot_struct.h | 32 uint64_t sig_size; member in struct:VbSignature
|
/external/vboot_reference/futility/ |
H A D | cmd_vbutil_keyblock.c | 173 if (block->key_block_signature.sig_size && signpubkey) {
|