Searched refs:RSA_BYTES (Results 1 – 6 of 6) sorted by relevance
/device/google/contexthub/lib/nanohub/ |
D | rsa.c | 35 memcpy(tmp + 1, denum, RSA_BYTES); in biModIterative() 90 memcpy(tmp + 1, denum, RSA_BYTES); in biModIterative() 119 memset(ret, 0, RSA_BYTES * 2); in biMulIterative() 174 memcpy(state->tmpB, a, RSA_BYTES); in rsaPubOpIterative() 203 memcpy(state->tmpB, state->tmpA, RSA_BYTES); in rsaPubOpIterative() 248 memcpy(state->tmpC, a, RSA_BYTES); //tC will hold our powers of a in rsaPrivOp() 250 memset(state->tmpA, 0, RSA_BYTES * 2); //tA will hold result in rsaPrivOp() 256 memcpy(state->tmpB, state->tmpA, RSA_BYTES); in rsaPrivOp() 263 memcpy(state->tmpB, state->tmpA, RSA_BYTES); //save tA in rsaPrivOp() 266 memcpy(state->tmpC, state->tmpA, RSA_BYTES); in rsaPrivOp() [all …]
|
/device/google/contexthub/util/nanoapp_sign/ |
D | nanoapp_sign.c | 136 memcpy(rsa->modulus, sigPack + RSA_BYTES, RSA_BYTES); in validateSignature() 189 #define SIGNATURE_BLOCK_SIZE (2 * RSA_BYTES) 199 for (i = 0; i < (int)RSA_BYTES; i++) { in handleConvertKey() 220 ret = fwrite(rsa->num, 1, RSA_BYTES, out) == RSA_BYTES ? 0 : 2; in handleConvertKey() 232 memcpy(masterPubKey, rsa->modulus, RSA_BYTES); in handleVerify() 270 if (memcmp(masterPubKey, rsa->modulus, RSA_BYTES) == 0) { in handleVerify() 278 sha2processBytes(&shaState, sigPack+RSA_BYTES, RSA_BYTES); in handleVerify() 295 printHashRev(stderr, "File PubKey", (uint32_t *)(sigPack + RSA_BYTES), RSA_LIMBS); in handleVerify() 300 if (memcmp(masterPubKey, sigPack + RSA_BYTES, RSA_BYTES) == 0) { in handleVerify() 355 sha2processBytes(&shaState, buf + bufUsed- RSA_BYTES, RSA_BYTES); in handleSign() [all …]
|
/device/google/contexthub/lib/include/nanohub/ |
D | rsa.h | 24 #define RSA_BYTES sizeof(uint32_t[RSA_LIMBS]) macro 25 #define RSA_WORDS (RSA_BYTES / sizeof(uint32_t)) //limbs may change in size, but words are always…
|
/device/google/contexthub/firmware/os/core/ |
D | nanohubCommand.c | 198 if (!memcmp(gotKey, ptr, RSA_BYTES)) { in pubKeyFindCbk() 1206 if (ptr && numKeys * RSA_BYTES > req->offset) { in halLegacyQueryRsaKeys() 1207 len = numKeys * RSA_BYTES - req->offset; in halLegacyQueryRsaKeys() 1744 if (req->dataOffset < RSA_BYTES) { in halKeyInfo() 1745 resp->keyLength = RSA_BYTES; in halKeyInfo() 1746 if (RSA_BYTES - req->dataOffset > NANOHUB_RSA_KEY_CHUNK_LEN) in halKeyInfo() 1749 dataLength = RSA_BYTES - req->dataOffset; in halKeyInfo() 1750 …memcpy(resp->data, (const uint8_t *)ptr + (req->keyNum * RSA_BYTES) + req->dataOffset, dataLength); in halKeyInfo()
|
D | bl.c | 365 if (memcmp(rsaKey, osSigPubkey, RSA_BYTES) == 0) in blVerifyOsImage() 615 expectedSize = sizeof(*hdr) + hdr->size + 2 * RSA_BYTES; in blLoader()
|
D | appSec.c | 34 #define APP_SIG_SIZE RSA_BYTES
|