/optee_os-3.20.0/ta/pkcs11/ |
A D | user_ta.mk | 3 all: pkcs11-ta-verify-helpers 5 .PHONY: pkcs11-ta-verify-helpers 6 pkcs11-ta-verify-helpers: 8 ${q}ta/pkcs11/scripts/verify-helpers.sh --quiet
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | memory_buffer_alloc.h | 86 void mbedtls_memory_buffer_set_verify( int verify );
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | memory_buffer_alloc.c | 67 int verify; member 308 if( ( heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC ) && verify_chain() != 0 ) in buffer_alloc_calloc() 366 if( ( heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC ) && verify_chain() != 0 ) in buffer_alloc_calloc() 488 if( ( heap.verify & MBEDTLS_MEMORY_VERIFY_FREE ) && verify_chain() != 0 ) in buffer_alloc_free() 492 void mbedtls_memory_buffer_set_verify( int verify ) in mbedtls_memory_buffer_set_verify() argument 494 heap.verify = verify; in mbedtls_memory_buffer_set_verify()
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_acipher.h | 152 TEE_Result (*verify)(struct drvcrypt_sign_data *sdata); member 207 TEE_Result (*verify)(struct drvcrypt_sign_data *sdata, size_t l_bytes, member
|
/optee_os-3.20.0/scripts/ |
A D | checkpatch_inc.sh | 15 ta/pkcs11/scripts/verify-helpers.sh \
|
A D | sign_encrypt.py | 776 pkey.verify(self.sig, self.img_digest, self.__get_padding(),
|
/optee_os-3.20.0/core/drivers/crypto/versal/ |
A D | ecc.c | 165 static TEE_Result verify(uint32_t algo, struct ecc_public_key *key, in verify() function 186 return pub_ops->verify(algo, key, msg, msg_len, sig, sig_len); in verify() 360 return verify(sdata->algo, in do_verify() 417 .verify = do_verify,
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/acipher/ |
A D | ecc.c | 265 ret = ecc->verify(&sdata); in ecc_verify() 383 .verify = ecc_verify,
|
A D | dsa.c | 221 ret = dsa->verify(&sdata, l_bytes, n_bytes); in crypto_acipher_dsa_verify()
|
/optee_os-3.20.0/core/drivers/crypto/se050/core/ |
A D | ecc.c | 428 return pub_ops->verify(algo, key, msg, msg_len, sig, sig_len); in verify_fallback() 587 static TEE_Result verify(uint32_t algo, struct ecc_public_key *key, in verify() function 735 return verify(sdata->algo, in do_verify() 791 .verify = do_verify,
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | ecc.c | 365 .verify = _ltc_ecc_verify, 375 .verify = sm2_ltc_dsa_verify,
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | ecc.c | 495 .verify = ecc_verify, 509 .verify = sm2_mbedtls_dsa_verify,
|
/optee_os-3.20.0/core/crypto/ |
A D | crypto.c | 748 if (!key->ops->verify) in crypto_acipher_ecc_verify() 751 return key->ops->verify(algo, key, msg, msg_len, sig, sig_len); in crypto_acipher_ecc_verify()
|
/optee_os-3.20.0/core/include/crypto/ |
A D | crypto_impl.h | 334 TEE_Result (*verify)(uint32_t algo, struct ecc_public_key *key, member
|
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/ |
A D | caam_ecc.c | 702 .verify = do_verify,
|
A D | caam_dsa.c | 764 .verify = do_verify,
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 184 all algorithms that can be used with psa_{sign,verify}_hash(), including 2324 chain was not verified due to an internal error (including in the verify 2328 a fatal error in the verify callback. 2550 * Added hardware entropy selftest to verify that the hardware entropy source 3613 prototypes for the RSA sign and verify functions changed as a result 3928 * During verify trust-CA is only checked for expiration and CRL presence 3936 * Depth that the certificate verify callback receives is now numbered 3984 * Changed certificate verify behaviour to comply with RFC 6125 section 6.3 4482 * Updated rsa_check_privkey() to verify that (D*E) = 1 % (P-1)*(Q-1)
|