Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 39) sorted by relevance

12

/trusted-firmware-a/drivers/auth/mbedtls/
A Dmbedtls_crypto.c65 mbedtls_asn1_buf signature; in verify_signature() local
102 signature.tag = *p; in verify_signature()
103 rc = mbedtls_asn1_get_bitstring_null(&p, end, &signature.len); in verify_signature()
108 signature.p = p; in verify_signature()
126 signature.p, signature.len); in verify_signature()
A Dmbedtls_x509_parser.c43 static mbedtls_asn1_buf signature; variable
60 ZERO_AND_CLEAN(signature); in clear_temp_vars()
381 signature.p = p; in cert_parse()
386 signature.len = (p + len) - signature.p; in cert_parse()
466 *param = (void *)signature.p; in get_auth_param()
467 *param_len = (unsigned int)signature.len; in get_auth_param()
/trusted-firmware-a/plat/st/stm32mp1/include/
A Dboot_api.h172 uint8_t *signature,
176 uint8_t *signature,
/trusted-firmware-a/drivers/auth/cryptocell/713/
A Dcryptocell_crypto.c82 CCBsvSignature_t signature; in verify_signature() local
194 memcpy((uint8_t *)signature, p, BSV_CERT_RSA_KEY_SIZE_IN_BYTES); in verify_signature()
203 NULL, signature, digest, workspace, in verify_signature()
/trusted-firmware-a/include/drivers/measured_boot/event_log/
A Dtcg.h156 uint8_t signature[16]; member
296 uint8_t signature[16]; member
/trusted-firmware-a/drivers/auth/cryptocell/712/
A Dcryptocell_crypto.c97 CCSbSignature_t signature; in verify_signature() local
218 UTIL_ReverseMemCopy((uint8_t *)signature.sig, p, RSA_MOD_SIZE_IN_BYTES); in verify_signature()
228 (uint32_t *)data_ptr, &pk, &signature, in verify_signature()
/trusted-firmware-a/plat/st/common/include/
A Dstm32mp_auth.h13 uint8_t *signature, uint32_t ecc_algo);
/trusted-firmware-a/lib/coreboot/
A Dcoreboot_table.c23 char signature[4]; member
117 if (strncmp(header->signature, "LBIO", 4)) { in coreboot_table_setup()
/trusted-firmware-a/docs/resources/diagrams/plantuml/
A Dfip-secure-partitions.puml109 <i>signature</I>
121 <i>signature</I>
/trusted-firmware-a/include/drivers/partition/
A Dgpt.h30 unsigned char signature[8]; member
/trusted-firmware-a/include/drivers/arm/cryptocell/713/
A Dbsv_crypto_asym_api.h81 … CCBsvSignature_t signature, /*!< [in] The signature buffer to verify - big endian format. */
/trusted-firmware-a/docs/design/
A Dauth-framework.rst224 #. Verify a digital signature.
276 #. Digital signature
339 The digital signature will be represented by:
343 signature ::= BIT STRING
471 AUTH_PARAM_SIG, /* The image signature */
472 AUTH_PARAM_SIG_ALG, /* The image signature algorithm */
510 * Parameters for authentication by signature
697 - ``sig``: the digital signature (obtained from current image)
865 the signature from the certificate.
867 extract the signature algorithm from the certificate.
[all …]
A Dtrusted-board-boot.rst37 extensions. To sign the certificates, different signature schemes are available,
165 - BL2 loads and verifies the BL3x key certificate. The certificate signature
166 is verified using the trusted world public key. If the signature
170 - BL2 loads and verifies the BL3x content certificate. The signature is
171 verified using the BL3x public key. If the signature verification succeeds,
176 - BL2 loads and verifies the BL33 key certificate. If the signature
180 - BL2 loads and verifies the BL33 content certificate. If the signature
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/design/
A Dauth-framework.rst.txt224 #. Verify a digital signature.
276 #. Digital signature
339 The digital signature will be represented by:
343 signature ::= BIT STRING
471 AUTH_PARAM_SIG, /* The image signature */
472 AUTH_PARAM_SIG_ALG, /* The image signature algorithm */
510 * Parameters for authentication by signature
697 - ``sig``: the digital signature (obtained from current image)
865 the signature from the certificate.
867 extract the signature algorithm from the certificate.
[all …]
A Dtrusted-board-boot.rst.txt37 extensions. To sign the certificates, different signature schemes are available,
165 - BL2 loads and verifies the BL3x key certificate. The certificate signature
166 is verified using the trusted world public key. If the signature
170 - BL2 loads and verifies the BL3x content certificate. The signature is
171 verified using the BL3x public key. If the signature verification succeeds,
176 - BL2 loads and verifies the BL33 key certificate. If the signature
180 - BL2 loads and verifies the BL33 content certificate. If the signature
/trusted-firmware-a/plat/brcm/board/common/
A Dbcm_elog_ddr.h98 uint32_t signature; member
A Dbcm_elog_ddr.c43 global.signature = ELOG_GLOBAL_META_HDR_SIG; in elog_init_ddr_log()
/trusted-firmware-a/drivers/partition/
A Dpartition.c96 if (memcmp(header.signature, GPT_SIGNATURE, in load_gpt_header()
97 sizeof(header.signature)) != 0) { in load_gpt_header()
/trusted-firmware-a/drivers/measured_boot/event_log/
A Devent_print.c74 event->struct_header.signature); in id_event_print()
235 ((startup_locality_event_t *)ptr)->signature); in event2_print()
A Devent_log.c41 .signature = TCG_ID_EVENT_SIGNATURE_03,
/trusted-firmware-a/tools/marvell/doimage/
A Ddoimage.c274 uint8_t *signature) in create_rsa_signature() argument
320 memcpy(signature, buf, 256); in create_rsa_signature()
350 uint8_t *signature) in verify_rsa_signature() argument
397 hash, signature); in verify_rsa_signature()
553 uint8_t signature[RSA_SIGN_BYTE_LEN]; in verify_secure_header_signatures() local
557 memcpy(signature, sec_ext->header_sign, RSA_SIGN_BYTE_LEN); in verify_secure_header_signatures()
592 signature) != 0) { in verify_secure_header_signatures()
605 memcpy(sec_ext->header_sign, signature, RSA_SIGN_BYTE_LEN); in verify_secure_header_signatures()
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/diphda/
A Dindex.rst.txt16 processor. BL2 verification relies on the signature area at the
/trusted-firmware-a/docs/plat/arm/diphda/
A Dindex.rst16 processor. BL2 verification relies on the signature area at the
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/arm_fpga/
A Dindex.rst.txt56 To avoid random garbage, there needs to be a "CMD:" signature before the
61 containing the desired command line, prefixed by the "CMD:" signature.
/trusted-firmware-a/docs/plat/arm/arm_fpga/
A Dindex.rst56 To avoid random garbage, there needs to be a "CMD:" signature before the
61 containing the desired command line, prefixed by the "CMD:" signature.

Completed in 35 milliseconds

12