/external/epid-sdk/example/verifysig/src/ |
D | verifysig11.c | 111 size_t sig_rl_size = 0; in Verify11() local 113 NULL, &sig_rl_size); in Verify11() 118 sig_rl = calloc(1, sig_rl_size); in Verify11() 126 sig_rl, &sig_rl_size); in Verify11() 132 result = Epid11VerifierSetSigRl(ctx, sig_rl, sig_rl_size); in Verify11()
|
D | verifysig.c | 118 size_t sig_rl_size = 0; in Verify() local 120 NULL, &sig_rl_size); in Verify() 125 sig_rl = calloc(1, sig_rl_size); in Verify() 133 sig_rl, &sig_rl_size); in Verify() 139 result = EpidVerifierSetSigRl(ctx, sig_rl, sig_rl_size); in Verify()
|
/external/epid-sdk/example/signmsg/src/ |
D | signmsg.c | 51 size_t sig_rl_size = 0; in SignMsg() local 139 &sig_rl_size); in SignMsg() 147 sig_rl = calloc(1, sig_rl_size); in SignMsg() 155 sig_rl, &sig_rl_size); in SignMsg() 164 sts = EpidMemberSetSigRl(member, sig_rl, sig_rl_size); in SignMsg()
|
/external/epid-sdk/epid/common/src/ |
D | sigrlvalid.c | 27 bool IsSigRlValid(GroupId const* gid, SigRl const* sig_rl, size_t sig_rl_size) { in IsSigRlValid() argument 30 if (!gid || !sig_rl || kMinSigRlSize > sig_rl_size) { in IsSigRlValid() 38 if (input_sig_rl_size != sig_rl_size) { in IsSigRlValid()
|
D | sigrlvalid.h | 43 bool IsSigRlValid(GroupId const* gid, SigRl const* sig_rl, size_t sig_rl_size);
|
/external/epid-sdk/epid/member/tiny/unittests/ |
D | context-test.cc | 287 size_t sig_rl_size = this->kGrpXSigRl.size(); in TEST_F() local 289 EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() 310 size_t sig_rl_size = this->kGrpXSigRl.size(); in TEST_F() local 311 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() 331 size_t sig_rl_size = sizeof(srl) - sizeof(srl.bk); in TEST_F() local 333 EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() 340 size_t sig_rl_size = this->kGrpXSigRl.size(); in TEST_F() local 341 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() 358 size_t sig_rl_size = sizeof(sig_rl_data_n2_zero); in TEST_F() local 359 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() [all …]
|
/external/epid-sdk/epid/member/unittests/ |
D | context-test.cc | 330 size_t sig_rl_size = this->kGrpXSigRl.size(); in TEST_F() local 332 EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() 353 size_t sig_rl_size = this->kGrpXSigRl.size(); in TEST_F() local 354 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() 374 size_t sig_rl_size = this->kGrpXSigRl.size(); in TEST_F() local 375 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() 392 size_t sig_rl_size = sizeof(sig_rl_data_n2_zero); in TEST_F() local 393 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() 401 size_t sig_rl_size = this->kGrpXSigRlSingleEntry.size(); in TEST_F() local 402 EXPECT_EQ(kEpidNoErr, EpidMemberSetSigRl(member_ctx, sig_rl, sig_rl_size)); in TEST_F() [all …]
|
/external/epid-sdk/epid/member/tiny/src/ |
D | setsigrl.c | 27 size_t sig_rl_size) { in EpidMemberSetSigRl() argument 46 if (calculated_sig_rl_size != sig_rl_size) { in EpidMemberSetSigRl()
|
/external/epid-sdk/epid/verifier/1.1/src/ |
D | context.c | 66 size_t sig_rl_size) { in Epid11IsSigRlValid() argument 69 if (!gid || !sig_rl || kMinSigRlSize > sig_rl_size) { in Epid11IsSigRlValid() 77 if (input_sig_rl_size != sig_rl_size) { in Epid11IsSigRlValid() 252 size_t sig_rl_size) { in Epid11VerifierSetSigRl() argument 266 if (!Epid11IsSigRlValid(&ctx->pub_key->gid, sig_rl, sig_rl_size)) { in Epid11VerifierSetSigRl()
|
/external/epid-sdk/epid/verifier/1.1/unittests/ |
D | context-test.cc | 272 size_t sig_rl_size = empty_sig_rl_buf.size() * sizeof(uint8_t); in TEST_F() local 274 Epid11VerifierSetSigRl(verifier, empty_sig_rl, sig_rl_size)); in TEST_F() 310 size_t sig_rl_size = this->kSigRl.size() * sizeof(uint8_t); in TEST_F() local 311 EXPECT_EQ(kEpidNoErr, Epid11VerifierSetSigRl(ctx, sig_rl, sig_rl_size)); in TEST_F()
|
D | verify-test.cc | 230 auto sig_rl_size = sig_rl.size(); in TEST_F() local 235 Epid11VerifierSetSigRl(verifier, &sig_rl_wrong_ver, sig_rl_size)); in TEST_F() 249 size_t sig_rl_size = this->kGrpXSigRlMember0Bsn0Msg0MiddleEntry.size(); in TEST_F() local 253 THROW_ON_EPIDERR(Epid11VerifierSetSigRl(verifier, sig_rl, sig_rl_size)); in TEST_F()
|
/external/epid-sdk/epid/verifier/unittests/ |
D | context-test.cc | 298 size_t sig_rl_size = this->kGrp01SigRl.size(); in TEST_F() local 299 EXPECT_EQ(kEpidNoErr, EpidVerifierSetSigRl(ctx, sig_rl, sig_rl_size)); in TEST_F() 306 size_t sig_rl_size = this->kSigRlIkgf.size(); in TEST_F() local 307 EXPECT_EQ(kEpidNoErr, EpidVerifierSetSigRl(ctx, sig_rl, sig_rl_size)); in TEST_F() 324 size_t sig_rl_size = sizeof(sig_rl_data_n2_zero); in TEST_F() local 325 EXPECT_EQ(kEpidNoErr, EpidVerifierSetSigRl(verifier, sig_rl, sig_rl_size)); in TEST_F() 360 size_t sig_rl_size = sizeof(sig_rl_data_n2_one); in TEST_F() local 361 EXPECT_EQ(kEpidNoErr, EpidVerifierSetSigRl(verifier, sig_rl, sig_rl_size)); in TEST_F()
|
D | verify-test.cc | 715 size_t sig_rl_size = this->kGrpXSigRlMember0Sha256Bsn0Msg0OnlyEntry.size(); in TEST_F() local 722 THROW_ON_EPIDERR(EpidVerifierSetSigRl(verifier, sig_rl, sig_rl_size)); in TEST_F()
|
/external/epid-sdk/epid/verifier/1.1/ |
D | api.h | 235 size_t sig_rl_size);
|
/external/epid-sdk/epid/member/src/ |
D | context.c | 237 size_t sig_rl_size) { in EpidMemberSetSigRl() argument 244 if (!IsSigRlValid(&ctx->pub_key.gid, sig_rl, sig_rl_size)) { in EpidMemberSetSigRl()
|
/external/epid-sdk/epid/verifier/ |
D | api.h | 209 size_t sig_rl_size);
|
/external/epid-sdk/epid/member/ |
D | api.h | 275 size_t sig_rl_size);
|
/external/epid-sdk/epid/verifier/src/ |
D | context.c | 291 size_t sig_rl_size) { in EpidVerifierSetSigRl() argument 295 if (!IsSigRlValid(&ctx->pub_key->gid, sig_rl, sig_rl_size)) { in EpidVerifierSetSigRl()
|