/external/vboot_reference/host/lib21/ |
D | host_key.c | 129 key->sig_alg = pkey->sig_alg; in vb2_private_key_unpack() 134 if (pkey->sig_alg == VB2_SIG_NONE) { in vb2_private_key_unpack() 238 .sig_alg = key->sig_alg, in vb2_private_key_write() 251 if (key->sig_alg != VB2_SIG_NONE) { in vb2_private_key_write() 297 .sig_alg = VB2_SIG_NONE, in vb2_private_key_hash() 310 .sig_alg = VB2_SIG_NONE, in vb2_private_key_hash() 323 .sig_alg = VB2_SIG_NONE, in vb2_private_key_hash() 337 enum vb2_signature_algorithm sig_alg) in vb2_public_key_alloc() argument 340 uint32_t key_data_size = vb2_packed_key_size(sig_alg); in vb2_public_key_alloc() 354 key->sig_alg = sig_alg; in vb2_public_key_alloc() [all …]
|
D | host_signature.c | 90 .sig_alg = key->sig_alg, in vb2_sign_data() 113 s.sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); in vb2_sign_data() 120 if (s.sig_alg != VB2_SIG_NONE) { in vb2_sign_data() 162 if (s.sig_alg == VB2_SIG_NONE) { in vb2_sign_data() 187 uint32_t size = vb2_sig_size(key->sig_alg, key->hash_alg); in vb2_sig_size_for_key()
|
/external/vboot_reference/tests/ |
D | vb21_host_key_tests.c | 23 enum vb2_signature_algorithm sig_alg; member 74 key->sig_alg = combo->sig_alg; in private_key_tests() 87 TEST_EQ(k2->sig_alg, key->sig_alg, " sig alg"); in private_key_tests() 142 pkey->sig_alg = VB2_SIG_NONE; in private_key_tests() 159 TEST_EQ(ckey->sig_alg, VB2_SIG_NONE, " sig_alg"); in private_key_tests() 186 TEST_EQ(key->sig_alg, combo->sig_alg, " sig_alg"); in public_key_tests() 190 bufsize = vb2_packed_key_size(combo->sig_alg); in public_key_tests() 223 TEST_EQ(pkey->sig_alg, key->sig_alg, " sig_alg"); in public_key_tests() 256 key->sig_alg = VB2_SIG_INVALID; in public_key_tests() 268 TEST_EQ(k2.sig_alg, VB2_SIG_NONE, " sig_alg"); in public_key_tests() [all …]
|
D | vb21_common2_tests.c | 83 key2->sig_alg = VB2_SIG_INVALID; in test_unpack_key() 156 sig2->sig_alg = VB2_SIG_INVALID; in test_verify_signature() 161 sig2->sig_alg = (sig2->sig_alg == VB2_SIG_NONE ? in test_verify_signature() 191 pubk.sig_alg = VB2_SIG_INVALID; in test_verify_data() 244 enum vb2_signature_algorithm sig_alg = in test_algorithm() local 259 prik->sig_alg = sig_alg; in test_algorithm()
|
D | vb20_rsa_padding_tests.c | 36 k2->sig_alg = vb2_crypto_to_signature(key->algorithm); in vb2_public_key_to_vb2() 82 enum vb2_signature_algorithm orig_key_alg = key->sig_alg; in test_verify_digest() 97 key->sig_alg = VB2_SIG_INVALID; in test_verify_digest() 102 key->sig_alg = orig_key_alg; in test_verify_digest()
|
D | vb21_host_sig_tests.c | 23 enum vb2_signature_algorithm sig_alg; member 65 prik->sig_alg = combo->sig_alg; in sig_tests() 114 prik2.sig_alg = VB2_SIG_INVALID; in sig_tests() 168 int rsa_bits = vb2_rsa_sig_size(combo->sig_alg) * 8; in test_algorithm()
|
D | vb20_common2_tests.c | 39 TEST_EQ(pubk.sig_alg, vb2_crypto_to_signature(key->algorithm), in test_unpack_key() 99 pubk.sig_alg = VB2_SIG_INVALID; in test_verify_data() 102 pubk.sig_alg = pubk_orig.sig_alg; in test_verify_data()
|
D | vb21_host_keyblock_tests.c | 61 prik4096->sig_alg = VB2_SIG_RSA4096; in keyblock_tests() 68 prik8192->sig_alg = VB2_SIG_RSA8192; in keyblock_tests() 114 pubk4096->sig_alg = VB2_SIG_INVALID; in keyblock_tests()
|
/external/vboot_reference/firmware/lib21/ |
D | packed_key.c | 18 uint32_t expected_key_size = vb2_packed_key_size(key->sig_alg); in vb2_unpack_key_data() 33 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg)) in vb2_unpack_key_data() 82 key->sig_alg = pkey->sig_alg; in vb2_unpack_key() 83 if (key->sig_alg != VB2_SIG_NONE) { in vb2_unpack_key() 84 sig_size = vb2_rsa_sig_size(key->sig_alg); in vb2_unpack_key()
|
D | common.c | 129 uint32_t vb2_sig_size(enum vb2_signature_algorithm sig_alg, in vb2_sig_size() argument 139 if (sig_alg == VB2_SIG_NONE) in vb2_sig_size() 142 return vb2_rsa_sig_size(sig_alg); in vb2_sig_size() 210 expect_sig_size = vb2_sig_size(sig->sig_alg, sig->hash_alg); in vb2_verify_signature() 232 uint32_t key_sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); in vb2_verify_digest() 239 if (key->sig_alg != sig->sig_alg || key->hash_alg != sig->hash_alg) in vb2_verify_digest() 245 if (key->sig_alg == VB2_SIG_NONE) { in vb2_verify_digest() 425 if (sig->sig_alg != VB2_SIG_NONE) in vb2_verify_fw_preamble()
|
/external/vboot_reference/futility/ |
D | cmd_create.c | 84 enum vb2_signature_algorithm sig_alg; in vb1_make_keypair() local 103 sig_alg = vb2_rsa_sig_alg(rsa_key); in vb1_make_keypair() 104 if (sig_alg == VB2_SIG_INVALID) { in vb1_make_keypair() 110 vb1_algorithm = (sig_alg - VB2_SIG_RSA1024) * 3 in vb1_make_keypair() 166 enum vb2_signature_algorithm sig_alg; in vb2_make_keypair() local 186 sig_alg = vb2_rsa_sig_alg(rsa_key); in vb2_make_keypair() 187 if (sig_alg == VB2_SIG_INVALID) { in vb2_make_keypair() 199 privkey->sig_alg = sig_alg; in vb2_make_keypair() 216 if (vb2_public_key_alloc(&pubkey, sig_alg)) { in vb2_make_keypair()
|
/external/vboot_reference/firmware/lib20/ |
D | packed_key.c | 42 key->sig_alg = vb2_crypto_to_signature(packed_key->algorithm); in vb2_unpack_key() 43 if (key->sig_alg == VB2_SIG_INVALID) { in vb2_unpack_key() 54 expected_key_size = vb2_packed_key_size(key->sig_alg); in vb2_unpack_key() 67 if (key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg)) in vb2_unpack_key()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/x509/ |
D | x_all.c | 71 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) { in X509_verify() 75 return (ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF), a->sig_alg, in X509_verify() 82 a->sig_alg, a->signature, a->req_info, r)); in X509_REQ_verify() 89 x->sig_alg, x->signature, x->cert_info, pkey, md)); in X509_sign() 97 x->sig_alg, x->signature, x->cert_info, ctx); in X509_sign_ctx() 102 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO), x->sig_alg, NULL, in X509_REQ_sign() 109 x->sig_alg, NULL, x->signature, x->req_info, in X509_REQ_sign_ctx() 116 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO), x->crl->sig_alg, in X509_CRL_sign() 117 x->sig_alg, x->signature, x->crl, pkey, md)); in X509_CRL_sign() 124 x->crl->sig_alg, x->sig_alg, x->signature, in X509_CRL_sign_ctx()
|
/external/boringssl/src/crypto/x509/ |
D | x_all.c | 71 if (X509_ALGOR_cmp(x509->sig_alg, x509->cert_info->signature)) { in X509_verify() 75 return ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF), x509->sig_alg, in X509_verify() 82 req->sig_alg, req->signature, req->req_info, pkey); in X509_REQ_verify() 89 x->sig_alg, x->signature, x->cert_info, pkey, md)); in X509_sign() 97 x->sig_alg, x->signature, x->cert_info, ctx); in X509_sign_ctx() 102 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO), x->sig_alg, NULL, in X509_REQ_sign() 109 x->sig_alg, NULL, x->signature, x->req_info, in X509_REQ_sign_ctx() 116 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO), x->crl->sig_alg, in X509_CRL_sign() 117 x->sig_alg, x->signature, x->crl, pkey, md)); in X509_CRL_sign() 124 x->crl->sig_alg, x->sig_alg, x->signature, in X509_CRL_sign_ctx()
|
D | x_x509.c | 170 ASN1_SIMPLE(X509, sig_alg, X509_ALGOR), 364 X509_ALGOR_free(x509->sig_alg); in X509_set1_signature_algo() 365 x509->sig_alg = copy1; in X509_set1_signature_algo() 387 *palg = x->sig_alg; in X509_get0_signature() 392 return OBJ_obj2nid(x->sig_alg->algorithm); in X509_get_signature_nid()
|
/external/vboot_reference/firmware/2lib/include/ |
D | 2rsa.h | 20 enum vb2_signature_algorithm sig_alg; /* Signature algorithm */ member 44 uint32_t vb2_rsa_sig_size(enum vb2_signature_algorithm sig_alg); 52 uint32_t vb2_packed_key_size(enum vb2_signature_algorithm sig_alg);
|
/external/vboot_reference/firmware/2lib/ |
D | 2rsa.c | 175 uint32_t vb2_rsa_sig_size(enum vb2_signature_algorithm sig_alg) in vb2_rsa_sig_size() argument 177 switch (sig_alg) { in vb2_rsa_sig_size() 191 uint32_t vb2_packed_key_size(enum vb2_signature_algorithm sig_alg) in vb2_packed_key_size() argument 193 uint32_t sig_size = vb2_rsa_sig_size(sig_alg); in vb2_packed_key_size() 246 uint32_t sig_size = vb2_rsa_sig_size(key->sig_alg); in vb2_check_padding() 306 sig_size = vb2_rsa_sig_size(key->sig_alg); in vb2_rsa_verify_digest()
|
/external/arm-trusted-firmware/drivers/auth/dualroot/ |
D | cot.c | 51 static auth_param_type_desc_t sig_alg = AUTH_PARAM_TYPE_DESC( variable 138 .alg = &sig_alg, 261 .alg = &sig_alg, 295 .alg = &sig_alg, 328 .alg = &sig_alg, 377 .alg = &sig_alg, 410 .alg = &sig_alg, 482 .alg = &sig_alg, 515 .alg = &sig_alg, 631 .alg = &sig_alg, [all …]
|
/external/arm-trusted-firmware/drivers/auth/tbbr/ |
D | tbbr_cot_bl2.c | 98 .alg = &sig_alg, 140 .alg = &sig_alg, 172 .alg = &sig_alg, 221 .alg = &sig_alg, 253 .alg = &sig_alg, 324 .alg = &sig_alg, 356 .alg = &sig_alg, 469 .alg = &sig_alg, 501 .alg = &sig_alg, 571 .alg = &sig_alg,
|
/external/vboot_reference/firmware/lib21/include/ |
D | vb2_struct.h | 128 uint16_t sig_alg; member 170 uint16_t sig_alg; member 212 uint16_t sig_alg; member
|
/external/arm-trusted-firmware/drivers/auth/mbedtls/ |
D | mbedtls_x509_parser.c | 42 static mbedtls_asn1_buf sig_alg; variable 59 ZERO_AND_CLEAN(sig_alg); in clear_temp_vars() 376 memcpy(&sig_alg, &sig_alg1, sizeof(sig_alg)); in cert_parse() 461 *param = (void *)sig_alg.p; in get_auth_param() 462 *param_len = (unsigned int)sig_alg.len; in get_auth_param()
|
/external/python/pyasn1-modules/tests/ |
D | test_rfc3770.py | 64 sig_alg = asn1Object['tbsCertificate']['signature'] 65 assert sig_alg['algorithm'] == rfc5480.ecdsa_with_SHA384 66 assert not sig_alg['parameters'].hasValue()
|
D | test_rfc5280.py | 125 sig_alg = asn1Object['tbsCertificate']['signature'] 126 assert sig_alg['parameters'] == univ.Null("") 173 sig_alg = asn1Object['tbsCertList']['signature'] 174 assert sig_alg['parameters'] == univ.Null("")
|
D | test_rfc6402.py | 137 sig_alg = cr['signatureAlgorithm'] 138 assert sig_alg['algorithm'] in openTypeMap.keys() 139 assert sig_alg['parameters'] == univ.Null("")
|
/external/vboot_reference/host/lib21/include/ |
D | host_key2.h | 19 enum vb2_signature_algorithm sig_alg; /* Signature algorithm */ member 139 enum vb2_signature_algorithm sig_alg);
|