/external/vboot_reference/tests/ |
H A D | vb21_common2_tests.c | 27 struct vb2_public_key pubk; local 35 TEST_SUCC(vb2_unpack_key(&pubk, (uint8_t *)key2, size), 40 TEST_EQ(vb2_unpack_key(&pubk, (uint8_t *)key2, size), 46 TEST_EQ(vb2_unpack_key(&pubk, (uint8_t *)key2, size), 52 TEST_SUCC(vb2_unpack_key(&pubk, (uint8_t *)key2, size), 54 TEST_EQ(strcmp(pubk.desc, ""), 0, " empty desc string"); 58 TEST_EQ(vb2_unpack_key(&pubk, (uint8_t *)key2, size), 64 TEST_EQ(vb2_unpack_key(&pubk, (uint8_t *)key2, size), 79 TEST_SUCC(vb2_unpack_key(&pubk, (uint8_t *)key2, size), 84 TEST_EQ(vb2_unpack_key(&pubk, (uint8_ 176 struct vb2_public_key pubk; local 250 struct vb2_public_key *pubk = NULL; local [all...] |
H A D | vb20_common2_tests.c | 26 struct vb2_public_key pubk; local 37 TEST_SUCC(vb2_unpack_key(&pubk, buf, size), "vb2_unpack_key() ok"); 39 TEST_EQ(pubk.sig_alg, vb2_crypto_to_signature(key->algorithm), 41 TEST_EQ(pubk.hash_alg, vb2_crypto_to_hash(key->algorithm), 47 TEST_EQ(vb2_unpack_key(&pubk, buf, size), 53 TEST_EQ(vb2_unpack_key(&pubk, buf, size), 59 TEST_EQ(vb2_unpack_key(&pubk, buf, size + 1), 65 TEST_EQ(vb2_unpack_key(&pubk, buf, size), 70 TEST_EQ(vb2_unpack_key(&pubk, buf, size - 1), 85 struct vb2_public_key pubk, pubk_ori local [all...] |
H A D | vb21_common_tests.c | 222 struct vb2_public_key pubk; local 231 TEST_SUCC(vb2_public_key_hash(&pubk, VB2_HASH_SHA256), 239 sig, &pubk, &wb), 243 TEST_EQ(vb2_verify_data(test_data, sizeof(test_data), sig, &pubk, &wb), 256 struct vb2_public_key pubk, pubk2, pubk3; local 266 TEST_SUCC(vb2_public_key_hash(&pubk, VB2_HASH_SHA256), 292 TEST_SUCC(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), 306 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), 312 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk, &wb), 318 TEST_EQ(vb2_verify_keyblock(kbuf, buf_size, &pubk, 383 struct vb2_public_key pubk; local [all...] |
H A D | vb21_host_sig_tests.c | 45 struct vb2_public_key *pubk, pubhash; local 68 TEST_SUCC(vb2_public_key_read_keyb(&pubk, keybfile), "Read pub key"); 69 pubk->guid = &test_guid; 70 pubk->hash_alg = combo->hash_alg; 71 vb2_public_key_set_desc(pubk, test_desc); 90 TEST_SUCC(vb2_verify_data(test_data, test_size, sig, pubk, &wb), 129 TEST_SUCC(vb2_verify_data(buf, c_sig_offs, sig, pubk, &wb), 147 TEST_SUCC(vb2_verify_data(buf, c_sig_offs, sig, pubk, &wb), 163 vb2_public_key_free(pubk);
|
/external/vboot_reference/host/lib21/ |
H A D | host_key.c | 458 const struct vb2_public_key *pubk) 472 key.c.desc_size = vb2_desc_size(pubk->desc); 475 if (pubk->sig_alg != VB2_SIG_NONE) { 476 key.key_size = vb2_packed_key_size(pubk->sig_alg); 484 key.key_version = pubk->version; 485 key.sig_alg = pubk->sig_alg; 486 key.hash_alg = pubk->hash_alg; 487 key.guid = *pubk->guid; 496 if (pubk->desc && *pubk 457 vb2_public_key_pack(struct vb2_packed_key **key_ptr, const struct vb2_public_key *pubk) argument [all...] |
/external/vboot_reference/host/lib21/include/ |
H A D | host_key2.h | 197 * @param pubk Public key to pack 204 const struct vb2_public_key *pubk);
|
/external/boringssl/include/openssl/ |
H A D | pem.h | 405 OPENSSL_EXPORT int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk);
|
/external/boringssl/src/include/openssl/ |
H A D | pem.h | 405 OPENSSL_EXPORT int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk);
|