/arm-trusted-firmware-2.8.0/drivers/auth/ |
A D | auth_mod.c | 154 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local 178 &pk_ptr, &pk_len); in auth_signature() 180 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature() 189 pk_hash_len = pk_len; in auth_signature() 192 &pk_ptr, &pk_len); in auth_signature() 199 pk_ptr, pk_len); in auth_signature() 207 rc = plat_convert_pk(pk_ptr, pk_len, &pk_ptr, &pk_len); in auth_signature() 211 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature() 219 pk_ptr, pk_len); in auth_signature()
|
A D | crypto_mod.c | 82 void *pk_ptr, unsigned int pk_len) in crypto_mod_verify_signature() argument 91 assert(pk_len != 0); in crypto_mod_verify_signature() 96 pk_ptr, pk_len); in crypto_mod_verify_signature()
|
/arm-trusted-firmware-2.8.0/drivers/nxp/crypto/caam/src/auth/ |
A D | nxp_crypto.c | 44 void *pk_ptr, unsigned int pk_len) in verify_signature() argument 54 pk_ptr, pk_len); in verify_signature()
|
A D | rsa.c | 152 void *pk_ptr, unsigned int pk_len) in rsa_verify_signature() argument 160 pk_len); in rsa_verify_signature() 166 ret = rsa_public_verif_sec(sig_ptr, encoded_hash, pk_ptr, pk_len / 2); in rsa_verify_signature()
|
/arm-trusted-firmware-2.8.0/drivers/measured_boot/rss/ |
A D | rss_measured_boot.c | 108 size_t pk_len) in rss_mboot_set_signer_id() argument 127 pk_len, hash_data); in rss_mboot_set_signer_id()
|
/arm-trusted-firmware-2.8.0/include/drivers/nxp/crypto/caam/ |
A D | rsa.h | 38 void *pk_ptr, unsigned int pk_len);
|
/arm-trusted-firmware-2.8.0/include/drivers/auth/ |
A D | crypto_mod.h | 60 void *pk_ptr, unsigned int pk_len); 102 void *pk_ptr, unsigned int pk_len);
|
/arm-trusted-firmware-2.8.0/include/drivers/measured_boot/rss/ |
A D | rss_measured_boot.h | 53 int rss_mboot_set_signer_id(unsigned int img_id, const void *pk_ptr, size_t pk_len);
|
/arm-trusted-firmware-2.8.0/plat/st/common/ |
A D | stm32mp_crypto_lib.c | 81 int get_plain_pk_from_asn1(void *pk_ptr, unsigned int pk_len, void **plain_pk, in get_plain_pk_from_asn1() argument 96 end = (unsigned char *)(p + pk_len); in get_plain_pk_from_asn1() 299 void *pk_ptr, unsigned int pk_len) in crypto_verify_signature() argument 341 ret = get_plain_pk_from_asn1(pk_ptr, pk_len, &pk_ptr, &pk_len, &curve_id); in crypto_verify_signature() 348 if (pk_len != sizeof(my_pk)) { in crypto_verify_signature() 349 VERBOSE("%s: pk_len=%u sizeof(my_pk)=%zu)\n", __func__, pk_len, sizeof(my_pk)); in crypto_verify_signature()
|
/arm-trusted-firmware-2.8.0/drivers/auth/cryptocell/713/ |
A D | cryptocell_crypto.c | 80 void *pk_ptr, unsigned int pk_len) in verify_signature() argument 132 end = p + pk_len; in verify_signature()
|
/arm-trusted-firmware-2.8.0/drivers/auth/cryptocell/712/ |
A D | cryptocell_crypto.c | 93 void *pk_ptr, unsigned int pk_len) in verify_signature() argument 142 end = p + pk_len; in verify_signature()
|
/arm-trusted-firmware-2.8.0/drivers/auth/mbedtls/ |
A D | mbedtls_crypto.c | 76 void *pk_ptr, unsigned int pk_len) in verify_signature() argument 106 end = (unsigned char *)(p + pk_len); in verify_signature()
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | auth-framework.rst | 238 void *pk_ptr, unsigned int pk_len); 947 void *pk_ptr, unsigned int pk_len);
|