Searched refs:sign_key (Results 1 – 5 of 5) sorted by relevance
/external/vboot_reference/futility/ |
D | cmd_show.c | 59 int sign_key, int good_sig) in show_keyblock() argument 66 sign_key ? (good_sig ? "valid" : "invalid") : "ignored"); in show_keyblock() 228 VbPublicKey *sign_key = option.k; in futil_cb_show_keyblock() local 239 if (sign_key && VBOOT_SUCCESS == in futil_cb_show_keyblock() 240 KeyBlockVerify(block, state->my_area->len, sign_key, 0)) in futil_cb_show_keyblock() 243 if (option.strict && (!sign_key || !good_sig)) in futil_cb_show_keyblock() 246 show_keyblock(block, state->in_filename, !!sign_key, good_sig); in futil_cb_show_keyblock() 280 VbPublicKey *sign_key = option.k; in futil_cb_show_fw_preamble() local 295 if (!sign_key && (state->rootkey._flags & AREA_IS_VALID)) in futil_cb_show_fw_preamble() 297 sign_key = (VbPublicKey *)state->rootkey.buf; in futil_cb_show_fw_preamble() [all …]
|
D | cmd_vbutil_keyblock.c | 157 VbPublicKey *sign_key = NULL; in Unpack() local 174 sign_key = PublicKeyRead(signpubkey); in Unpack() 175 if (!sign_key) { in Unpack() 181 KeyBlockVerify(block, block->key_block_size, sign_key, 0)) { in Unpack() 186 free(sign_key); in Unpack() 190 printf("Signature %s\n", sign_key ? "valid" : "ignored"); in Unpack()
|
D | cmd_vbutil_firmware.c | 179 VbPublicKey *sign_key; in Verify() local 195 sign_key = PublicKeyRead(signpubkey); in Verify() 196 if (!sign_key) { in Verify() 217 if (0 != KeyBlockVerify(key_block, blob_size, sign_key, 0)) { in Verify() 221 free(sign_key); in Verify()
|
/external/openssh/regress/unittests/sshkey/ |
D | test_sshkey.c | 55 const struct sshkey *sign_key, const struct sshkey *ca_key, in build_cert() argument 102 ASSERT_INT_EQ(sshkey_sign(sign_key, &sigblob, &siglen, in build_cert()
|
/external/wpa_supplicant_8/src/eapol_supp/ |
D | eapol_supp_sm.c | 675 u8 sign_key[IEEE8021X_SIGN_KEY_LEN]; member 738 os_memcpy(keydata.sign_key, keydata.encr_key, 16); in eapol_sm_processKey() 762 hmac_md5(keydata.sign_key, sign_key_len, in eapol_sm_processKey()
|