Home
last modified time | relevance | path

Searched refs:sig_data (Results 1 – 5 of 5) sorted by relevance

/system/update_engine/payload_consumer/
Dpayload_verifier.cc70 brillo::Blob sig_data(signature.data().begin(), signature.data().end()); in VerifySignature() local
72 if (!GetRawHashFromSignature(sig_data, pem_public_key, &sig_hash_data)) in VerifySignature()
94 bool PayloadVerifier::GetRawHashFromSignature(const brillo::Blob& sig_data, in GetRawHashFromSignature() argument
109 if (sig_data.size() > 2 * keysize) { in GetRawHashFromSignature()
118 sig_data.size(), sig_data.data(), hash_data.data(), rsa, RSA_NO_PADDING); in GetRawHashFromSignature()
Dpayload_verifier.h48 static bool GetRawHashFromSignature(const brillo::Blob& sig_data,
/system/update_engine/payload_generator/
Dpayload_signer_unittest.cc119 const string& sig_data = sig.data(); in TEST_F() local
120 ASSERT_EQ(arraysize(kDataSignature), sig_data.size()); in TEST_F()
122 EXPECT_EQ(kDataSignature[i], static_cast<uint8_t>(sig_data[i])); in TEST_F()
/system/update_engine/scripts/update_payload/
Dchecker_unittest.py287 sig_data, sig_asn1_header, argument
304 mox.IsA(list), send_data=sig_data).AndReturn(
310 sig_data, 'foo', expected_signed_hash, 'bar'))
314 sig_data, 'foo', expected_signed_hash, 'bar')
320 sig_data = 'fake-signature'.ljust(256)
322 self.DoCheckSha256SignatureTest(True, True, sig_data,
328 sig_data = 'fake-signature' # Malformed (not 256 bytes in length).
330 self.DoCheckSha256SignatureTest(False, False, sig_data,
336 sig_data = 'fake-signature'.ljust(256)
338 self.DoCheckSha256SignatureTest(False, True, sig_data,
[all …]
Dchecker.py509 def _CheckSha256Signature(sig_data, pubkey_file_name, actual_hash, sig_name): argument
521 if len(sig_data) != 256:
524 (sig_name, len(sig_data)))
527 send_data=sig_data)