Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 17 of 17) sorted by relevance

/optee_os-3.20.0/ta/pkcs11/
A Duser_ta.mk3 all: pkcs11-ta-verify-helpers
5 .PHONY: pkcs11-ta-verify-helpers
6 pkcs11-ta-verify-helpers:
8 ${q}ta/pkcs11/scripts/verify-helpers.sh --quiet
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/
A Dmemory_buffer_alloc.h86 void mbedtls_memory_buffer_set_verify( int verify );
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Dmemory_buffer_alloc.c67 int verify; member
308 if( ( heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC ) && verify_chain() != 0 ) in buffer_alloc_calloc()
366 if( ( heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC ) && verify_chain() != 0 ) in buffer_alloc_calloc()
488 if( ( heap.verify & MBEDTLS_MEMORY_VERIFY_FREE ) && verify_chain() != 0 ) in buffer_alloc_free()
492 void mbedtls_memory_buffer_set_verify( int verify ) in mbedtls_memory_buffer_set_verify() argument
494 heap.verify = verify; in mbedtls_memory_buffer_set_verify()
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/
A Ddrvcrypt_acipher.h152 TEE_Result (*verify)(struct drvcrypt_sign_data *sdata); member
207 TEE_Result (*verify)(struct drvcrypt_sign_data *sdata, size_t l_bytes, member
/optee_os-3.20.0/scripts/
A Dcheckpatch_inc.sh15 ta/pkcs11/scripts/verify-helpers.sh \
A Dsign_encrypt.py776 pkey.verify(self.sig, self.img_digest, self.__get_padding(),
/optee_os-3.20.0/core/drivers/crypto/versal/
A Decc.c165 static TEE_Result verify(uint32_t algo, struct ecc_public_key *key, in verify() function
186 return pub_ops->verify(algo, key, msg, msg_len, sig, sig_len); in verify()
360 return verify(sdata->algo, in do_verify()
417 .verify = do_verify,
/optee_os-3.20.0/core/drivers/crypto/crypto_api/acipher/
A Decc.c265 ret = ecc->verify(&sdata); in ecc_verify()
383 .verify = ecc_verify,
A Ddsa.c221 ret = dsa->verify(&sdata, l_bytes, n_bytes); in crypto_acipher_dsa_verify()
/optee_os-3.20.0/core/drivers/crypto/se050/core/
A Decc.c428 return pub_ops->verify(algo, key, msg, msg_len, sig, sig_len); in verify_fallback()
587 static TEE_Result verify(uint32_t algo, struct ecc_public_key *key, in verify() function
735 return verify(sdata->algo, in do_verify()
791 .verify = do_verify,
/optee_os-3.20.0/core/lib/libtomcrypt/
A Decc.c365 .verify = _ltc_ecc_verify,
375 .verify = sm2_ltc_dsa_verify,
/optee_os-3.20.0/lib/libmbedtls/core/
A Decc.c495 .verify = ecc_verify,
509 .verify = sm2_mbedtls_dsa_verify,
/optee_os-3.20.0/core/crypto/
A Dcrypto.c748 if (!key->ops->verify) in crypto_acipher_ecc_verify()
751 return key->ops->verify(algo, key, msg, msg_len, sig, sig_len); in crypto_acipher_ecc_verify()
/optee_os-3.20.0/core/include/crypto/
A Dcrypto_impl.h334 TEE_Result (*verify)(uint32_t algo, struct ecc_public_key *key, member
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/
A Dcaam_ecc.c702 .verify = do_verify,
A Dcaam_dsa.c764 .verify = do_verify,
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog184 all algorithms that can be used with psa_{sign,verify}_hash(), including
2324 chain was not verified due to an internal error (including in the verify
2328 a fatal error in the verify callback.
2550 * Added hardware entropy selftest to verify that the hardware entropy source
3613 prototypes for the RSA sign and verify functions changed as a result
3928 * During verify trust-CA is only checked for expiration and CRL presence
3936 * Depth that the certificate verify callback receives is now numbered
3984 * Changed certificate verify behaviour to comply with RFC 6125 section 6.3
4482 * Updated rsa_check_privkey() to verify that (D*E) = 1 % (P-1)*(Q-1)

Completed in 28 milliseconds