Home
last modified time | relevance | path

Searched refs:sign_len (Results 1 – 3 of 3) sorted by relevance

/external/u-boot/board/freescale/common/
Dfsl_validate.c723 if (get_key_len(img) == 2 * hdr->sign_len) { in read_validate_esbc_client_header()
725 if (!((hdr->sign_len == KEY_SIZE_BYTES / 4) || in read_validate_esbc_client_header()
726 (hdr->sign_len == KEY_SIZE_BYTES / 2) || in read_validate_esbc_client_header()
727 (hdr->sign_len == KEY_SIZE_BYTES))) in read_validate_esbc_client_header()
733 memcpy(&img->img_sign, esbc + hdr->psign, hdr->sign_len); in read_validate_esbc_client_header()
754 if (!(memcmp(s, k, hdr->sign_len) < 0)) in read_validate_esbc_client_header()
811 ret = rsa_mod_exp(mod_exp_dev, img->img_sign, img->hdr.sign_len, in calculate_cmp_img_sig()
822 img->hdr.sign_len); in calculate_cmp_img_sig()
/external/u-boot/include/
Dfsl_validate.h48 u32 sign_len; /* length of the signature in bytes */ member
120 u32 sign_len; /* length of the signature in bytes */ member
/external/wpa_supplicant_8/src/eap_common/
Dikev2_common.c377 size_t sign_len, buf_len; in ikev2_derive_auth_data() local
402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data()
403 sign_data = os_malloc(sign_len); in ikev2_derive_auth_data()
417 (const u8 **) &sign_data, &sign_len, auth_data) < 0) in ikev2_derive_auth_data()