/external/vboot_reference/host/lib21/ |
D | host_key.c | 129 key->sig_alg = pkey->sig_alg; in vb2_private_key_unpack() 134 if (pkey->sig_alg == VB2_SIG_NONE) { in vb2_private_key_unpack() 238 .sig_alg = key->sig_alg, in vb2_private_key_write() 251 if (key->sig_alg != VB2_SIG_NONE) { in vb2_private_key_write() 297 .sig_alg = VB2_SIG_NONE, in vb2_private_key_hash() 310 .sig_alg = VB2_SIG_NONE, in vb2_private_key_hash() 323 .sig_alg = VB2_SIG_NONE, in vb2_private_key_hash() 337 enum vb2_signature_algorithm sig_alg) in vb2_public_key_alloc() argument 340 uint32_t key_data_size = vb2_packed_key_size(sig_alg); in vb2_public_key_alloc() 354 key->sig_alg = sig_alg; in vb2_public_key_alloc() [all …]
|
D | host_signature.c | 90 .sig_alg = key->sig_alg, in vb2_sign_data() 113 s.sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); in vb2_sign_data() 120 if (s.sig_alg != VB2_SIG_NONE) { in vb2_sign_data() 162 if (s.sig_alg == VB2_SIG_NONE) { in vb2_sign_data() 187 uint32_t size = vb2_sig_size(key->sig_alg, key->hash_alg); in vb2_sig_size_for_key()
|
/external/vboot_reference/tests/ |
D | vb21_host_key_tests.c | 23 enum vb2_signature_algorithm sig_alg; member 74 key->sig_alg = combo->sig_alg; in private_key_tests() 87 TEST_EQ(k2->sig_alg, key->sig_alg, " sig alg"); in private_key_tests() 142 pkey->sig_alg = VB2_SIG_NONE; in private_key_tests() 159 TEST_EQ(ckey->sig_alg, VB2_SIG_NONE, " sig_alg"); in private_key_tests() 186 TEST_EQ(key->sig_alg, combo->sig_alg, " sig_alg"); in public_key_tests() 190 bufsize = vb2_packed_key_size(combo->sig_alg); in public_key_tests() 223 TEST_EQ(pkey->sig_alg, key->sig_alg, " sig_alg"); in public_key_tests() 256 key->sig_alg = VB2_SIG_INVALID; in public_key_tests() 268 TEST_EQ(k2.sig_alg, VB2_SIG_NONE, " sig_alg"); in public_key_tests() [all …]
|
D | vb21_common2_tests.c | 83 key2->sig_alg = VB2_SIG_INVALID; in test_unpack_key() 156 sig2->sig_alg = VB2_SIG_INVALID; in test_verify_signature() 161 sig2->sig_alg = (sig2->sig_alg == VB2_SIG_NONE ? in test_verify_signature() 191 pubk.sig_alg = VB2_SIG_INVALID; in test_verify_data() 244 enum vb2_signature_algorithm sig_alg = in test_algorithm() local 259 prik->sig_alg = sig_alg; in test_algorithm()
|
D | vb20_rsa_padding_tests.c | 36 k2->sig_alg = vb2_crypto_to_signature(key->algorithm); in vb2_public_key_to_vb2() 82 enum vb2_signature_algorithm orig_key_alg = key->sig_alg; in test_verify_digest() 97 key->sig_alg = VB2_SIG_INVALID; in test_verify_digest() 102 key->sig_alg = orig_key_alg; in test_verify_digest()
|
D | vb21_host_sig_tests.c | 23 enum vb2_signature_algorithm sig_alg; member 65 prik->sig_alg = combo->sig_alg; in sig_tests() 114 prik2.sig_alg = VB2_SIG_INVALID; in sig_tests() 168 int rsa_bits = vb2_rsa_sig_size(combo->sig_alg) * 8; in test_algorithm()
|
D | vb20_common2_tests.c | 39 TEST_EQ(pubk.sig_alg, vb2_crypto_to_signature(key->algorithm), in test_unpack_key() 99 pubk.sig_alg = VB2_SIG_INVALID; in test_verify_data() 102 pubk.sig_alg = pubk_orig.sig_alg; in test_verify_data()
|
D | vb21_host_keyblock_tests.c | 61 prik4096->sig_alg = VB2_SIG_RSA4096; in keyblock_tests() 68 prik8192->sig_alg = VB2_SIG_RSA8192; in keyblock_tests() 114 pubk4096->sig_alg = VB2_SIG_INVALID; in keyblock_tests()
|
D | vb21_misc_tests.c | 94 mock_gbb.rootkey.sig_alg = VB2_SIG_RSA8192; in reset_common_data() 105 dk->sig_alg = VB2_SIG_RSA4096; in reset_common_data() 204 TEST_EQ(k->sig_alg, VB2_SIG_RSA4096, "data key algorithm"); in load_keyblock_tests()
|
/external/vboot_reference/firmware/lib21/ |
D | packed_key.c | 18 uint32_t expected_key_size = vb2_packed_key_size(key->sig_alg); in vb2_unpack_key_data() 33 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg)) in vb2_unpack_key_data() 82 key->sig_alg = pkey->sig_alg; in vb2_unpack_key() 83 if (key->sig_alg != VB2_SIG_NONE) { in vb2_unpack_key() 84 sig_size = vb2_rsa_sig_size(key->sig_alg); in vb2_unpack_key()
|
D | common.c | 129 uint32_t vb2_sig_size(enum vb2_signature_algorithm sig_alg, in vb2_sig_size() argument 139 if (sig_alg == VB2_SIG_NONE) in vb2_sig_size() 142 return vb2_rsa_sig_size(sig_alg); in vb2_sig_size() 210 expect_sig_size = vb2_sig_size(sig->sig_alg, sig->hash_alg); in vb2_verify_signature() 232 uint32_t key_sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); in vb2_verify_digest() 239 if (key->sig_alg != sig->sig_alg || key->hash_alg != sig->hash_alg) in vb2_verify_digest() 245 if (key->sig_alg == VB2_SIG_NONE) { in vb2_verify_digest() 425 if (sig->sig_alg != VB2_SIG_NONE) in vb2_verify_fw_preamble()
|
/external/vboot_reference/futility/ |
D | cmd_create.c | 84 enum vb2_signature_algorithm sig_alg; in vb1_make_keypair() local 103 sig_alg = vb2_rsa_sig_alg(rsa_key); in vb1_make_keypair() 104 if (sig_alg == VB2_SIG_INVALID) { in vb1_make_keypair() 110 vb1_algorithm = (sig_alg - VB2_SIG_RSA1024) * 3 in vb1_make_keypair() 166 enum vb2_signature_algorithm sig_alg; in vb2_make_keypair() local 186 sig_alg = vb2_rsa_sig_alg(rsa_key); in vb2_make_keypair() 187 if (sig_alg == VB2_SIG_INVALID) { in vb2_make_keypair() 199 privkey->sig_alg = sig_alg; in vb2_make_keypair() 216 if (vb2_public_key_alloc(&pubkey, sig_alg)) { in vb2_make_keypair()
|
/external/boringssl/src/crypto/x509/ |
D | x_all.c | 72 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) { in X509_verify() 76 return (ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF), a->sig_alg, in X509_verify() 83 a->sig_alg, a->signature, a->req_info, r)); in X509_REQ_verify() 90 x->sig_alg, x->signature, x->cert_info, pkey, md)); in X509_sign() 98 x->sig_alg, x->signature, x->cert_info, ctx); in X509_sign_ctx() 103 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO), x->sig_alg, NULL, in X509_REQ_sign() 110 x->sig_alg, NULL, x->signature, x->req_info, in X509_REQ_sign_ctx() 117 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO), x->crl->sig_alg, in X509_CRL_sign() 118 x->sig_alg, x->signature, x->crl, pkey, md)); in X509_CRL_sign() 125 x->crl->sig_alg, x->sig_alg, x->signature, in X509_CRL_sign_ctx()
|
D | t_crl.c | 89 X509_signature_print(out, x->sig_alg, NULL); in X509_CRL_print() 121 X509_signature_print(out, x->sig_alg, x->signature); in X509_CRL_print()
|
D | x_x509.c | 146 ASN1_SIMPLE(X509, sig_alg, X509_ALGOR), 328 *palg = x->sig_alg; in X509_get0_signature() 333 return OBJ_obj2nid(x->sig_alg->algorithm); in X509_get_signature_nid()
|
D | x509cset.c | 154 *palg = crl->sig_alg; in X509_CRL_get0_signature() 159 return OBJ_obj2nid(crl->sig_alg->algorithm); in X509_CRL_get_signature_nid()
|
D | x_crl.c | 138 ASN1_SIMPLE(X509_CRL_INFO, sig_alg, X509_ALGOR), 360 ASN1_SIMPLE(X509_CRL, sig_alg, X509_ALGOR), 419 crl->sig_alg, crl->signature, crl->crl, r)); in def_crl_verify()
|
D | x_req.c | 103 ASN1_SIMPLE(X509_REQ, sig_alg, X509_ALGOR),
|
/external/vboot_reference/firmware/lib20/ |
D | packed_key.c | 42 key->sig_alg = vb2_crypto_to_signature(packed_key->algorithm); in vb2_unpack_key() 43 if (key->sig_alg == VB2_SIG_INVALID) { in vb2_unpack_key() 54 expected_key_size = vb2_packed_key_size(key->sig_alg); in vb2_unpack_key() 67 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg)) in vb2_unpack_key()
|
D | common.c | 74 if (sig->sig_size != vb2_rsa_sig_size(key->sig_alg)) { in vb2_verify_digest() 77 sig->sig_size, vb2_rsa_sig_size(key->sig_alg), in vb2_verify_digest() 78 key->sig_alg); in vb2_verify_digest()
|
/external/vboot_reference/firmware/2lib/include/ |
D | 2rsa.h | 20 enum vb2_signature_algorithm sig_alg; /* Signature algorithm */ member 44 uint32_t vb2_rsa_sig_size(enum vb2_signature_algorithm sig_alg); 52 uint32_t vb2_packed_key_size(enum vb2_signature_algorithm sig_alg);
|
/external/vboot_reference/firmware/2lib/ |
D | 2rsa.c | 175 uint32_t vb2_rsa_sig_size(enum vb2_signature_algorithm sig_alg) in vb2_rsa_sig_size() argument 177 switch (sig_alg) { in vb2_rsa_sig_size() 191 uint32_t vb2_packed_key_size(enum vb2_signature_algorithm sig_alg) in vb2_packed_key_size() argument 193 uint32_t sig_size = vb2_rsa_sig_size(sig_alg); in vb2_packed_key_size() 246 uint32_t sig_size = vb2_rsa_sig_size(key->sig_alg); in vb2_check_padding() 306 sig_size = vb2_rsa_sig_size(key->sig_alg); in vb2_rsa_verify_digest()
|
/external/vboot_reference/firmware/lib21/include/ |
D | vb2_struct.h | 128 uint16_t sig_alg; member 170 uint16_t sig_alg; member 212 uint16_t sig_alg; member
|
/external/vboot_reference/host/lib21/include/ |
D | host_key2.h | 19 enum vb2_signature_algorithm sig_alg; /* Signature algorithm */ member 139 enum vb2_signature_algorithm sig_alg);
|
/external/openssh/regress/unittests/sshkey/ |
D | test_sshkey.c | 56 const char *sig_alg) in build_cert() argument 103 sshbuf_ptr(b), sshbuf_len(b), sig_alg, 0), 0); in build_cert() 115 signature_test(struct sshkey *k, struct sshkey *bad, const char *sig_alg, in signature_test() argument 121 ASSERT_INT_EQ(sshkey_sign(k, &sig, &len, d, l, sig_alg, 0), 0); in signature_test() 148 signature_tests(struct sshkey *k, struct sshkey *bad, const char *sig_alg) in signature_tests() argument 160 signature_test(k, bad, sig_alg, buf, lens[i]); in signature_tests()
|