Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 17 of 17) sorted by relevance

/optee_os-3.20.0/core/drivers/crypto/versal/
A Drsa.c226 p->signature.data, in do_ssa_sign()
227 &p->signature.length); in do_ssa_sign()
235 p->signature.data, in do_ssa_sign()
236 &p->signature.length); in do_ssa_sign()
247 p->signature.data, in do_ssa_sign()
248 &p->signature.length); in do_ssa_sign()
273 p->signature.data, in do_ssa_verify()
274 p->signature.length); in do_ssa_verify()
282 p->signature.data, in do_ssa_verify()
283 p->signature.length); in do_ssa_verify()
[all …]
A Decc.c354 sdata->signature.data, in do_sign()
355 &sdata->signature.length); in do_sign()
364 sdata->signature.data, in do_verify()
365 sdata->signature.length); in do_verify()
/optee_os-3.20.0/core/drivers/crypto/crypto_api/acipher/
A Ddsa.c164 sdata.signature.data = sig; in crypto_acipher_dsa_sign()
165 sdata.signature.length = *sig_len; in crypto_acipher_dsa_sign()
170 *sig_len = sdata.signature.length; in crypto_acipher_dsa_sign()
218 sdata.signature.data = (uint8_t *)sig; in crypto_acipher_dsa_verify()
219 sdata.signature.length = sig_len; in crypto_acipher_dsa_verify()
A Decc.c199 sdata.signature.data = (uint8_t *)sig; in ecc_sign()
200 sdata.signature.length = *sig_len; in ecc_sign()
205 *sig_len = sdata.signature.length; in ecc_sign()
262 sdata.signature.data = (uint8_t *)sig; in ecc_verify()
263 sdata.signature.length = sig_len; in ecc_verify()
A Drsassa.c215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign()
216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign()
225 ssa_data->signature.length = rsa_data.message.length; in rsassa_pkcs1_v1_5_sign()
270 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify()
271 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_verify()
775 rsa_data.message.data = ssa_data->signature.data; in rsassa_pss_sign()
776 rsa_data.message.length = ssa_data->signature.length; in rsassa_pss_sign()
784 ssa_data->signature.length = rsa_data.message.length; in rsassa_pss_sign()
845 rsa_data.message.data = ssa_data->signature.data; in rsassa_pss_verify()
846 rsa_data.message.length = ssa_data->signature.length; in rsassa_pss_verify()
A Drsa.c404 rsa_ssa.signature.data = (uint8_t *)sig; in crypto_acipher_rsassa_sign()
405 rsa_ssa.signature.length = rsa_ssa.key.n_size; in crypto_acipher_rsassa_sign()
417 *sig_len = rsa_ssa.signature.length; in crypto_acipher_rsassa_sign()
482 rsa_ssa.signature.data = (uint8_t *)sig; in crypto_acipher_rsassa_verify()
483 rsa_ssa.signature.length = sig_len; in crypto_acipher_rsassa_verify()
/optee_os-3.20.0/core/drivers/crypto/se050/core/
A Decc.c595 uint8_t signature[128]; in verify() local
596 size_t signature_len = sizeof(signature); in verify()
626 st = sss_se05x_signature_bin2der(signature, &signature_len, in verify()
634 msg_len, (uint8_t *)signature, in verify()
729 sdata->signature.data, in do_sign()
730 &sdata->signature.length); in do_sign()
739 sdata->signature.data, in do_verify()
740 sdata->signature.length); in do_verify()
A Drsa.c832 p->signature.data, in sign_ssa_fallback()
833 &p->signature.length); in sign_ssa_fallback()
866 ssa_data->signature.data, in do_ssa_sign()
867 &ssa_data->signature.length); in do_ssa_sign()
881 p->signature.data, in verify_ssa_fallback()
882 p->signature.length); in verify_ssa_fallback()
912 ssa_data->signature.data, in do_ssa_verify()
913 ssa_data->signature.length); in do_ssa_verify()
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/
A Ddrvcrypt_acipher.h52 struct drvcrypt_buf signature; /* Signature of the message */ member
123 struct drvcrypt_buf signature; /* Signature of the message */ member
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/
A Dcaam_ecc.c388 ret = caam_dmaobj_output_sgtbuf(&sign_c, sdata->signature.data, in do_sign()
389 sdata->signature.length, sign_len); in do_sign()
435 sdata->signature.length = caam_dmaobj_copy_to_orig(&sign_c); in do_sign()
437 ECC_DUMPBUF("Signature", sdata->signature.data, in do_sign()
438 sdata->signature.length); in do_sign()
515 ret = caam_dmaobj_input_sgtbuf(&sign_c, sdata->signature.data, in do_verify()
516 sdata->signature.length); in do_verify()
A Dcaam_dsa.c539 ret = caam_dmaobj_output_sgtbuf(&sign_c, sdata->signature.data, in do_sign()
540 sdata->signature.length, sign_len); in do_sign()
595 sdata->signature.length = caam_dmaobj_copy_to_orig(&sign_c); in do_sign()
597 DSA_DUMPBUF("Signature", sdata->signature.data, in do_sign()
598 sdata->signature.length); in do_sign()
672 ret = caam_dmaobj_input_sgtbuf(&sign_c, sdata->signature.data, in do_verify()
673 sdata->signature.length); in do_verify()
/optee_os-3.20.0/core/include/kernel/
A Dtcg.h86 uint8_t signature[16]; member
/optee_os-3.20.0/core/drivers/bnxt/
A Dbnxt_fw.c119 uint32_t signature; member
188 uint32_t signature; member
274 if (hdr->signature != APE_BIN_HDR_SIGNATURE) { in ape_bin_hdr_valid()
601 info->signature = BNXT_CRASH_INFO_SIGNATURE; in bnxt_crash_config()
/optee_os-3.20.0/lib/libutee/include/
A Dtee_internal_api.h313 uint32_t digestLen, void *signature,
319 uint32_t digestLen, const void *signature,
/optee_os-3.20.0/core/kernel/
A Dtcg.c135 if (memcmp(spec_event->signature, TCG_EFI_SPEC_ID_EVENT_SIGNATURE_03, in tcg_parse_specid_event()
/optee_os-3.20.0/lib/libutee/
A Dtee_api_operations.c1713 uint32_t digestLen, void *signature, in TEE_AsymmetricSignDigest() argument
1737 digestLen, signature, &sl); in TEE_AsymmetricSignDigest()
1750 const void *signature, in TEE_AsymmetricVerifyDigest() argument
1758 (signature == NULL && signatureLen != 0)) in TEE_AsymmetricVerifyDigest()
1773 digestLen, signature, signatureLen); in TEE_AsymmetricVerifyDigest()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog244 signature with a specific salt length. This function allows to validate
265 signature, allowing the recovery of the private key after observing a
266 large number of signature operations. This completes a partial fix in
605 description part of the cert to the real signature. This meant that a
989 * Fix potential memory overread when performing an ECDSA signature
1329 due to an unacceptable hash signature. The certificate has been
1899 where an optional signature algorithms list is expected when the signature
2209 * Parse signature algorithm extension when renegotiating. Previously,
2391 * Fix insufficient support for signature-hash-algorithm extension,
4341 * X509 signature algorithm determination is now
[all …]

Completed in 28 milliseconds