/external/vboot_reference/tests/ |
H A D | rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 58 signature = BufferFromFile(file_name, &sig_len); 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest))
|
H A D | rsa_utility_tests.c | 31 const uint32_t sig_len, 29 RSAVerify(const RSAPublicKey *key, const uint8_t* sig, const uint32_t sig_len, const uint8_t sig_type, const uint8_t* hash) argument
|
/external/vboot_reference/utility/ |
H A D | verify_data.c | 52 int i, algorithm, sig_len; local 74 sig_len = siglen_map[algorithm]; 76 (signature = read_signature(argv[3], sig_len)) && 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) {
|
/external/boringssl/src/crypto/evp/ |
H A D | digestsign.c | 146 size_t sig_len) { 155 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); 145 EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len) argument
|
H A D | sign.c | 84 size_t sig_len = EVP_PKEY_size(pkey); local 97 !EVP_PKEY_sign(pkctx, sig, &sig_len, m, m_len)) { 100 *out_sig_len = sig_len; 123 int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, argument 145 ret = EVP_PKEY_verify(pkctx, sig, sig_len, m, m_len);
|
H A D | evp_ctx.c | 244 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, argument 254 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len); 274 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, argument 284 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len);
|
H A D | evp_extra_test.cc | 463 size_t sig_len = 0; local 464 if (!EVP_DigestSignFinal(md_ctx.get(), NULL, &sig_len)) { 468 if (sig_len != (size_t)EVP_PKEY_size(pkey.get())) { 469 fprintf(stderr, "sig_len mismatch\n"); 474 sig.resize(sig_len); 475 if (!EVP_DigestSignFinal(md_ctx.get(), sig.data(), &sig_len)) { 478 sig.resize(sig_len); 485 !EVP_DigestVerifyFinal(md_ctx.get(), sig.data(), sig_len)) { 520 size_t sig_len = 0; local 521 if (!EVP_DigestSignFinal(md_ctx, NULL, &sig_len)) { [all...] |
/external/dbus/dbus/ |
H A D | dbus-marshal-byteswap.c | 147 dbus_uint32_t sig_len; local 149 sig_len = *p; 151 p += (sig_len + 2); /* +2 for len and nul */ 160 dbus_uint32_t sig_len; local 165 sig_len = *p; 168 _dbus_string_init_const_len (&sig, p, sig_len); 170 p += (sig_len + 1); /* 1 for nul */
|
H A D | dbus-marshal-recursive.c | 277 int sig_len; local 286 sig_len = _dbus_string_get_byte (sub->value_str, sub->value_pos); 291 sub->value_pos = sub->type_pos + sig_len + 1; 2461 int sig_len; local 2496 &sig_start, &sig_len); 2513 sig_str, sig_start, sig_len,
|
H A D | dbus-marshal-recursive-util.c | 1154 int sig_len; local 1162 sig_len = _dbus_string_get_length (nid->signature); 1185 _dbus_assert (sig_len == _dbus_string_get_length (nid->signature));
|
/external/vboot_reference/firmware/lib/cryptolib/ |
H A D | rsa.c | 132 const uint32_t sig_len, 143 if (sig_len != (key->len * sizeof(uint32_t))) { 158 buf = (uint8_t*) VbExMalloc(sig_len); 161 Memcpy(buf, sig, sig_len); 179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) { 130 RSAVerify(const RSAPublicKey *key, const uint8_t *sig, const uint32_t sig_len, const uint8_t sig_type, const uint8_t *hash) argument
|
/external/boringssl/src/crypto/dsa/ |
H A D | dsa_test.c | 257 static int test_verify(const uint8_t *sig, size_t sig_len, int expect) { argument 264 int ret = DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa);
|
H A D | dsa.c | 704 const uint8_t *sig, size_t sig_len, const DSA *dsa) { 706 if (!DSA_check_signature(&valid, digest, digest_len, sig, sig_len, dsa)) { 713 size_t digest_len, const uint8_t *sig, size_t sig_len, 725 if (d2i_DSA_SIG(&s, &sigp, sig_len) == NULL || sigp != sig + sig_len) { 731 if (der_len < 0 || (size_t)der_len != sig_len || memcmp(sig, der, sig_len)) { 703 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument 712 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
|
/external/boringssl/src/crypto/ecdsa/ |
H A D | ecdsa_test.cc | 214 unsigned sig_len = ECDSA_size(eckey.get()); local 215 std::vector<uint8_t> signature(sig_len); 216 if (!ECDSA_sign(0, digest, 20, signature.data(), &sig_len, eckey.get())) { 220 signature.resize(sig_len);
|
H A D | ecdsa.c | 67 unsigned int *sig_len, EC_KEY *eckey) { 69 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); 72 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 77 const uint8_t *sig, size_t sig_len, EC_KEY *eckey) { 83 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); 87 s = ECDSA_SIG_from_bytes(sig, sig_len); 95 der_len != sig_len || memcmp(sig, der, sig_len) != 0) { 462 uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, 469 *sig_len 66 ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, EC_KEY *eckey) argument 76 ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, EC_KEY *eckey) argument 461 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument [all...] |
/external/boringssl/src/tool/ |
H A D | speed.cc | 141 unsigned sig_len; local 145 [key, &sig, &fake_sha256_hash, &sig_len]() -> bool { 147 sig.get(), &sig_len, key); 156 [key, &fake_sha256_hash, &sig, sig_len]() -> bool { 158 sizeof(fake_sha256_hash), sig.get(), sig_len, key); 363 unsigned sig_len; local 366 if (!TimeFunction(&results, [&key, &signature, &digest, &sig_len]() -> bool { 367 return ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len, 375 if (!TimeFunction(&results, [&key, &signature, &digest, sig_len]() -> bool { 376 return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len, [all...] |
/external/boringssl/src/crypto/rsa/ |
H A D | rsa.c | 475 const uint8_t *sig, size_t sig_len, RSA *rsa) { 484 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa); 487 if (sig_len != rsa_size) { 503 if (!RSA_verify_raw(rsa, &len, buf, rsa_size, sig, sig_len, 474 RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, const uint8_t *sig, size_t sig_len, RSA *rsa) argument
|
/external/boringssl/src/ssl/ |
H A D | s3_clnt.c | 1792 size_t sig_len; local 1823 sign_result = ssl_private_key_sign(ssl, ptr, &sig_len, max_sig_len, md, 1837 ssl_private_key_sign_complete(ssl, ptr, &sig_len, max_sig_len); 1854 if (!CBB_did_write(&child, sig_len) ||
|
H A D | s3_srvr.c | 1296 size_t sig_len; local 1339 sign_result = ssl_private_key_sign(ssl, ptr, &sig_len, max_sig_len, md, 1351 ssl_private_key_sign_complete(ssl, ptr, &sig_len, max_sig_len); 1357 if (!CBB_did_write(&child, sig_len)) {
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 2083 unsigned int* sig_len, 2118 *sig_len = signatureBytes.size(); 2125 size_t /* sig_len */, 2080 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument
|