Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 20 of 20) sorted by relevance

/optee_os/core/drivers/crypto/crypto_api/acipher/
A Ddsa.c164 sdata.signature.data = sig; in crypto_acipher_dsa_sign()
165 sdata.signature.length = *sig_len; in crypto_acipher_dsa_sign()
170 *sig_len = sdata.signature.length; in crypto_acipher_dsa_sign()
218 sdata.signature.data = (uint8_t *)sig; in crypto_acipher_dsa_verify()
219 sdata.signature.length = sig_len; in crypto_acipher_dsa_verify()
A Decc.c176 sdata.signature.data = (uint8_t *)sig; in ecc_sign()
177 sdata.signature.length = *sig_len; in ecc_sign()
182 *sig_len = sdata.signature.length; in ecc_sign()
239 sdata.signature.data = (uint8_t *)sig; in ecc_verify()
240 sdata.signature.length = sig_len; in ecc_verify()
A Drsassa.c215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign()
216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign()
223 ssa_data->signature.length = rsa_data.message.length; in rsassa_pkcs1_v1_5_sign()
268 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify()
269 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_verify()
770 rsa_data.message.data = ssa_data->signature.data; in rsassa_pss_sign()
771 rsa_data.message.length = ssa_data->signature.length; in rsassa_pss_sign()
778 ssa_data->signature.length = rsa_data.message.length; in rsassa_pss_sign()
836 rsa_data.message.data = ssa_data->signature.data; in rsassa_pss_verify()
837 rsa_data.message.length = ssa_data->signature.length; in rsassa_pss_verify()
A Drsa.c400 rsa_ssa.signature.data = (uint8_t *)sig; in crypto_acipher_rsassa_sign()
401 rsa_ssa.signature.length = rsa_ssa.key.n_size; in crypto_acipher_rsassa_sign()
413 *sig_len = rsa_ssa.signature.length; in crypto_acipher_rsassa_sign()
476 rsa_ssa.signature.data = (uint8_t *)sig; in crypto_acipher_rsassa_verify()
477 rsa_ssa.signature.length = sig_len; in crypto_acipher_rsassa_verify()
/optee_os/core/drivers/crypto/se050/core/
A Decc.c489 uint8_t signature[128]; in verify() local
490 size_t signature_len = sizeof(signature); in verify()
516 st = sss_se05x_signature_bin2der(signature, &signature_len, in verify()
524 msg_len, (uint8_t *)signature, in verify()
615 sdata->signature.data, in do_sign()
616 &sdata->signature.length); in do_sign()
625 sdata->signature.data, in do_verify()
626 sdata->signature.length); in do_verify()
A Drsa.c715 ssa_data->signature.data, in do_ssa_sign()
716 &ssa_data->signature.length); in do_ssa_sign()
743 ssa_data->signature.data, in do_ssa_verify()
744 ssa_data->signature.length); in do_ssa_verify()
/optee_os/core/drivers/crypto/caam/acipher/
A Dcaam_ecc.c385 ret = caam_dmaobj_output_sgtbuf(&sign_c, sdata->signature.data, in do_sign()
386 sdata->signature.length, sign_len); in do_sign()
432 sdata->signature.length = caam_dmaobj_copy_to_orig(&sign_c); in do_sign()
434 ECC_DUMPBUF("Signature", sdata->signature.data, in do_sign()
435 sdata->signature.length); in do_sign()
512 ret = caam_dmaobj_input_sgtbuf(&sign_c, sdata->signature.data, in do_verify()
513 sdata->signature.length); in do_verify()
A Dcaam_dsa.c539 ret = caam_dmaobj_output_sgtbuf(&sign_c, sdata->signature.data, in do_sign()
540 sdata->signature.length, sign_len); in do_sign()
595 sdata->signature.length = caam_dmaobj_copy_to_orig(&sign_c); in do_sign()
597 DSA_DUMPBUF("Signature", sdata->signature.data, in do_sign()
598 sdata->signature.length); in do_sign()
672 ret = caam_dmaobj_input_sgtbuf(&sign_c, sdata->signature.data, in do_verify()
673 sdata->signature.length); in do_verify()
/optee_os/core/drivers/crypto/crypto_api/include/
A Ddrvcrypt_acipher.h52 struct drvcrypt_buf signature; /* Signature of the message */ member
122 struct drvcrypt_buf signature; /* Signature of the message */ member
/optee_os/core/drivers/bnxt/
A Dbnxt_fw.c119 uint32_t signature; member
188 uint32_t signature; member
274 if (hdr->signature != APE_BIN_HDR_SIGNATURE) { in ape_bin_hdr_valid()
601 info->signature = BNXT_CRASH_INFO_SIGNATURE; in bnxt_crash_config()
/optee_os/scripts/
A Dsign_encrypt.py355 signature = img[start:end]
374 signature,
384 signature,
/optee_os/out/arm/export-ta_arm32/scripts/
A Dsign_encrypt.py355 signature = img[start:end]
374 signature,
384 signature,
/optee_os/out/arm/export-ta_arm64/scripts/
A Dsign_encrypt.py355 signature = img[start:end]
374 signature,
384 signature,
/optee_os/out/arm/export-ta_arm64/host_include/
A Dtee_api.h306 uint32_t digestLen, void *signature,
312 uint32_t digestLen, const void *signature,
/optee_os/out/arm/export-ta_arm64/include/
A Dtee_api.h306 uint32_t digestLen, void *signature,
312 uint32_t digestLen, const void *signature,
/optee_os/lib/libutee/include/
A Dtee_api.h306 uint32_t digestLen, void *signature,
312 uint32_t digestLen, const void *signature,
/optee_os/out/arm/export-ta_arm32/host_include/
A Dtee_api.h306 uint32_t digestLen, void *signature,
312 uint32_t digestLen, const void *signature,
/optee_os/out/arm/export-ta_arm32/include/
A Dtee_api.h306 uint32_t digestLen, void *signature,
312 uint32_t digestLen, const void *signature,
/optee_os/lib/libutee/
A Dtee_api_operations.c1705 uint32_t digestLen, void *signature, in TEE_AsymmetricSignDigest() argument
1729 digestLen, signature, &sl); in TEE_AsymmetricSignDigest()
1742 const void *signature, in TEE_AsymmetricVerifyDigest() argument
1750 (signature == NULL && signatureLen != 0)) in TEE_AsymmetricVerifyDigest()
1765 digestLen, signature, signatureLen); in TEE_AsymmetricVerifyDigest()
/optee_os/lib/libmbedtls/mbedtls/
A DChangeLog29 signature with a specific salt length. This function allows to validate
50 signature, allowing the recovery of the private key after observing a
51 large number of signature operations. This completes a partial fix in
390 description part of the cert to the real signature. This meant that a
774 * Fix potential memory overread when performing an ECDSA signature
1114 due to an unacceptable hash signature. The certificate has been
1684 where an optional signature algorithms list is expected when the signature
1994 * Parse signature algorithm extension when renegotiating. Previously,
2176 * Fix insufficient support for signature-hash-algorithm extension,
4126 * X509 signature algorithm determination is now
[all …]

Completed in 46 milliseconds