Lines Matching refs:i
179 size_t i; in verify_file() local
180 for (i = 4; i < eocd_size-3; ++i) { in verify_file()
181 if (eocd[i ] == 0x50 && eocd[i+1] == 0x4b && in verify_file()
182 eocd[i+2] == 0x05 && eocd[i+3] == 0x06) { in verify_file()
196 for (i = 0; i < numKeys; ++i) { in verify_file()
197 switch (pKeys[i].hash_len) { in verify_file()
243 for (i = 0; i < numKeys; ++i) { in verify_file()
245 switch (pKeys[i].hash_len) { in verify_file()
253 if (pKeys[i].key_type == Certificate::RSA) { in verify_file()
256 LOGI("signature is too short for RSA key %zu\n", i); in verify_file()
260 if (!RSA_verify(pKeys[i].rsa, sig_der, RSANUMBYTES, in verify_file()
261 hash, pKeys[i].hash_len)) { in verify_file()
262 LOGI("failed to verify against RSA key %zu\n", i); in verify_file()
266 LOGI("whole-file signature verified against RSA key %zu\n", i); in verify_file()
269 } else if (pKeys[i].key_type == Certificate::EC in verify_file()
270 && pKeys[i].hash_len == SHA256_DIGEST_SIZE) { in verify_file()
273 LOGI("Not a DSA signature block for EC key %zu\n", i); in verify_file()
279 if (!p256_ecdsa_verify(&(pKeys[i].ec->x), &(pKeys[i].ec->y), in verify_file()
281 LOGI("failed to verify against EC key %zu\n", i); in verify_file()
285 LOGI("whole-file signature verified against EC key %zu\n", i); in verify_file()
289 LOGI("Unknown key type %d\n", pKeys[i].key_type); in verify_file()
339 int i; in load_keys() local
397 for (i = 1; i < key->len; ++i) { in load_keys()
398 if (fscanf(f, " , %u", &(key->n[i])) != 1) goto exit; in load_keys()
401 for (i = 1; i < key->len; ++i) { in load_keys()
402 if (fscanf(f, " , %u", &(key->rr[i])) != 1) goto exit; in load_keys()
419 for (i = P256_NBYTES - 2; i >= 0; --i) { in load_keys()
421 x_bytes[i] = byte; in load_keys()
425 for (i = P256_NBYTES - 2; i >= 0; --i) { in load_keys()
427 y_bytes[i] = byte; in load_keys()