Searched refs:sign_len (Results 1 – 3 of 3) sorted by relevance
/external/u-boot/board/freescale/common/ |
D | fsl_validate.c | 723 if (get_key_len(img) == 2 * hdr->sign_len) { in read_validate_esbc_client_header() 725 if (!((hdr->sign_len == KEY_SIZE_BYTES / 4) || in read_validate_esbc_client_header() 726 (hdr->sign_len == KEY_SIZE_BYTES / 2) || in read_validate_esbc_client_header() 727 (hdr->sign_len == KEY_SIZE_BYTES))) in read_validate_esbc_client_header() 733 memcpy(&img->img_sign, esbc + hdr->psign, hdr->sign_len); in read_validate_esbc_client_header() 754 if (!(memcmp(s, k, hdr->sign_len) < 0)) in read_validate_esbc_client_header() 811 ret = rsa_mod_exp(mod_exp_dev, img->img_sign, img->hdr.sign_len, in calculate_cmp_img_sig() 822 img->hdr.sign_len); in calculate_cmp_img_sig()
|
/external/u-boot/include/ |
D | fsl_validate.h | 48 u32 sign_len; /* length of the signature in bytes */ member 120 u32 sign_len; /* length of the signature in bytes */ member
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 377 size_t sign_len, buf_len; in ikev2_derive_auth_data() local 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 403 sign_data = os_malloc(sign_len); in ikev2_derive_auth_data() 417 (const u8 **) &sign_data, &sign_len, auth_data) < 0) in ikev2_derive_auth_data()
|