• Home
  • Raw
  • Download

Lines Matching refs:sig2

117 	struct vb2_signature *sig2;  in test_verify_signature()  local
124 sig2 = (struct vb2_signature *)buf2; in test_verify_signature()
127 TEST_SUCC(vb2_verify_signature(sig2, size), "verify_sig ok"); in test_verify_signature()
128 sig2->c.magic = VB2_MAGIC_PACKED_KEY; in test_verify_signature()
129 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_SIG_MAGIC, in test_verify_signature()
133 sig2->c.total_size += 4; in test_verify_signature()
134 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_COMMON_TOTAL_SIZE, in test_verify_signature()
138 sig2->c.struct_version_minor++; in test_verify_signature()
139 TEST_SUCC(vb2_verify_signature(sig2, size), "verify_sig minor ver"); in test_verify_signature()
140 sig2->c.struct_version_major++; in test_verify_signature()
141 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_SIG_VERSION, in test_verify_signature()
145 sig2->c.fixed_size -= 4; in test_verify_signature()
146 sig2->c.desc_size += 4; in test_verify_signature()
147 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_SIG_HEADER_SIZE, in test_verify_signature()
151 sig2->sig_size += 4; in test_verify_signature()
152 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_COMMON_MEMBER_SIZE, in test_verify_signature()
156 sig2->sig_alg = VB2_SIG_INVALID; in test_verify_signature()
157 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_SIG_ALGORITHM, in test_verify_signature()
161 sig2->sig_alg = (sig2->sig_alg == VB2_SIG_NONE ? in test_verify_signature()
163 TEST_EQ(vb2_verify_signature(sig2, size), VB2_ERROR_SIG_SIZE, in test_verify_signature()
177 struct vb2_signature *sig2; in test_verify_data() local
188 sig2 = (struct vb2_signature *)buf2; in test_verify_data()
192 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data()
198 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data()
205 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data()
211 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data()
215 sig2->sig_size -= 16; in test_verify_data()
216 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data()
220 TEST_EQ(vb2_verify_data(test_data, test_size - 1, sig2, &pubk, &wb), in test_verify_data()
224 sig2->hash_alg = (sig2->hash_alg == VB2_HASH_SHA1 ? in test_verify_data()
226 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data()
232 buf2[sig2->sig_offset] ^= 0x5A; in test_verify_data()
233 TEST_EQ(vb2_verify_data(test_data, test_size, sig2, &pubk, &wb), in test_verify_data()
249 struct vb2_signature *sig2 = NULL; in test_algorithm() local
270 TEST_SUCC(vb2_sign_data(&sig2, test_data, test_size, prik, ""), in test_algorithm()
274 test_verify_data(pubk, sig2); in test_algorithm()
275 test_verify_signature(sig2); in test_algorithm()
278 free(sig2); in test_algorithm()