/optee_os/core/drivers/crypto/crypto_api/acipher/ |
A D | dsa.c | 164 sdata.signature.data = sig; in crypto_acipher_dsa_sign() 165 sdata.signature.length = *sig_len; in crypto_acipher_dsa_sign() 170 *sig_len = sdata.signature.length; in crypto_acipher_dsa_sign() 218 sdata.signature.data = (uint8_t *)sig; in crypto_acipher_dsa_verify() 219 sdata.signature.length = sig_len; in crypto_acipher_dsa_verify()
|
A D | ecc.c | 176 sdata.signature.data = (uint8_t *)sig; in ecc_sign() 177 sdata.signature.length = *sig_len; in ecc_sign() 182 *sig_len = sdata.signature.length; in ecc_sign() 239 sdata.signature.data = (uint8_t *)sig; in ecc_verify() 240 sdata.signature.length = sig_len; in ecc_verify()
|
A D | rsassa.c | 215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign() 216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign() 223 ssa_data->signature.length = rsa_data.message.length; in rsassa_pkcs1_v1_5_sign() 268 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify() 269 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_verify() 770 rsa_data.message.data = ssa_data->signature.data; in rsassa_pss_sign() 771 rsa_data.message.length = ssa_data->signature.length; in rsassa_pss_sign() 778 ssa_data->signature.length = rsa_data.message.length; in rsassa_pss_sign() 836 rsa_data.message.data = ssa_data->signature.data; in rsassa_pss_verify() 837 rsa_data.message.length = ssa_data->signature.length; in rsassa_pss_verify()
|
A D | rsa.c | 400 rsa_ssa.signature.data = (uint8_t *)sig; in crypto_acipher_rsassa_sign() 401 rsa_ssa.signature.length = rsa_ssa.key.n_size; in crypto_acipher_rsassa_sign() 413 *sig_len = rsa_ssa.signature.length; in crypto_acipher_rsassa_sign() 476 rsa_ssa.signature.data = (uint8_t *)sig; in crypto_acipher_rsassa_verify() 477 rsa_ssa.signature.length = sig_len; in crypto_acipher_rsassa_verify()
|
/optee_os/core/drivers/crypto/se050/core/ |
A D | ecc.c | 489 uint8_t signature[128]; in verify() local 490 size_t signature_len = sizeof(signature); in verify() 516 st = sss_se05x_signature_bin2der(signature, &signature_len, in verify() 524 msg_len, (uint8_t *)signature, in verify() 615 sdata->signature.data, in do_sign() 616 &sdata->signature.length); in do_sign() 625 sdata->signature.data, in do_verify() 626 sdata->signature.length); in do_verify()
|
A D | rsa.c | 715 ssa_data->signature.data, in do_ssa_sign() 716 &ssa_data->signature.length); in do_ssa_sign() 743 ssa_data->signature.data, in do_ssa_verify() 744 ssa_data->signature.length); in do_ssa_verify()
|
/optee_os/core/drivers/crypto/caam/acipher/ |
A D | caam_ecc.c | 385 ret = caam_dmaobj_output_sgtbuf(&sign_c, sdata->signature.data, in do_sign() 386 sdata->signature.length, sign_len); in do_sign() 432 sdata->signature.length = caam_dmaobj_copy_to_orig(&sign_c); in do_sign() 434 ECC_DUMPBUF("Signature", sdata->signature.data, in do_sign() 435 sdata->signature.length); in do_sign() 512 ret = caam_dmaobj_input_sgtbuf(&sign_c, sdata->signature.data, in do_verify() 513 sdata->signature.length); in do_verify()
|
A D | caam_dsa.c | 539 ret = caam_dmaobj_output_sgtbuf(&sign_c, sdata->signature.data, in do_sign() 540 sdata->signature.length, sign_len); in do_sign() 595 sdata->signature.length = caam_dmaobj_copy_to_orig(&sign_c); in do_sign() 597 DSA_DUMPBUF("Signature", sdata->signature.data, in do_sign() 598 sdata->signature.length); in do_sign() 672 ret = caam_dmaobj_input_sgtbuf(&sign_c, sdata->signature.data, in do_verify() 673 sdata->signature.length); in do_verify()
|
/optee_os/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_acipher.h | 52 struct drvcrypt_buf signature; /* Signature of the message */ member 122 struct drvcrypt_buf signature; /* Signature of the message */ member
|
/optee_os/core/drivers/bnxt/ |
A D | bnxt_fw.c | 119 uint32_t signature; member 188 uint32_t signature; member 274 if (hdr->signature != APE_BIN_HDR_SIGNATURE) { in ape_bin_hdr_valid() 601 info->signature = BNXT_CRASH_INFO_SIGNATURE; in bnxt_crash_config()
|
/optee_os/scripts/ |
A D | sign_encrypt.py | 355 signature = img[start:end] 374 signature, 384 signature,
|
/optee_os/out/arm/export-ta_arm32/scripts/ |
A D | sign_encrypt.py | 355 signature = img[start:end] 374 signature, 384 signature,
|
/optee_os/out/arm/export-ta_arm64/scripts/ |
A D | sign_encrypt.py | 355 signature = img[start:end] 374 signature, 384 signature,
|
/optee_os/out/arm/export-ta_arm64/host_include/ |
A D | tee_api.h | 306 uint32_t digestLen, void *signature, 312 uint32_t digestLen, const void *signature,
|
/optee_os/out/arm/export-ta_arm64/include/ |
A D | tee_api.h | 306 uint32_t digestLen, void *signature, 312 uint32_t digestLen, const void *signature,
|
/optee_os/lib/libutee/include/ |
A D | tee_api.h | 306 uint32_t digestLen, void *signature, 312 uint32_t digestLen, const void *signature,
|
/optee_os/out/arm/export-ta_arm32/host_include/ |
A D | tee_api.h | 306 uint32_t digestLen, void *signature, 312 uint32_t digestLen, const void *signature,
|
/optee_os/out/arm/export-ta_arm32/include/ |
A D | tee_api.h | 306 uint32_t digestLen, void *signature, 312 uint32_t digestLen, const void *signature,
|
/optee_os/lib/libutee/ |
A D | tee_api_operations.c | 1705 uint32_t digestLen, void *signature, in TEE_AsymmetricSignDigest() argument 1729 digestLen, signature, &sl); in TEE_AsymmetricSignDigest() 1742 const void *signature, in TEE_AsymmetricVerifyDigest() argument 1750 (signature == NULL && signatureLen != 0)) in TEE_AsymmetricVerifyDigest() 1765 digestLen, signature, signatureLen); in TEE_AsymmetricVerifyDigest()
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 29 signature with a specific salt length. This function allows to validate 50 signature, allowing the recovery of the private key after observing a 51 large number of signature operations. This completes a partial fix in 390 description part of the cert to the real signature. This meant that a 774 * Fix potential memory overread when performing an ECDSA signature 1114 due to an unacceptable hash signature. The certificate has been 1684 where an optional signature algorithms list is expected when the signature 1994 * Parse signature algorithm extension when renegotiating. Previously, 2176 * Fix insufficient support for signature-hash-algorithm extension, 4126 * X509 signature algorithm determination is now [all …]
|