/trusted-firmware-a/drivers/auth/mbedtls/ |
A D | mbedtls_crypto.c | 65 mbedtls_asn1_buf signature; in verify_signature() local 102 signature.tag = *p; in verify_signature() 103 rc = mbedtls_asn1_get_bitstring_null(&p, end, &signature.len); in verify_signature() 108 signature.p = p; in verify_signature() 126 signature.p, signature.len); in verify_signature()
|
A D | mbedtls_x509_parser.c | 43 static mbedtls_asn1_buf signature; variable 60 ZERO_AND_CLEAN(signature); in clear_temp_vars() 381 signature.p = p; in cert_parse() 386 signature.len = (p + len) - signature.p; in cert_parse() 466 *param = (void *)signature.p; in get_auth_param() 467 *param_len = (unsigned int)signature.len; in get_auth_param()
|
/trusted-firmware-a/plat/st/stm32mp1/include/ |
A D | boot_api.h | 172 uint8_t *signature, 176 uint8_t *signature,
|
/trusted-firmware-a/drivers/auth/cryptocell/713/ |
A D | cryptocell_crypto.c | 82 CCBsvSignature_t signature; in verify_signature() local 194 memcpy((uint8_t *)signature, p, BSV_CERT_RSA_KEY_SIZE_IN_BYTES); in verify_signature() 203 NULL, signature, digest, workspace, in verify_signature()
|
/trusted-firmware-a/include/drivers/measured_boot/event_log/ |
A D | tcg.h | 156 uint8_t signature[16]; member 296 uint8_t signature[16]; member
|
/trusted-firmware-a/drivers/auth/cryptocell/712/ |
A D | cryptocell_crypto.c | 97 CCSbSignature_t signature; in verify_signature() local 218 UTIL_ReverseMemCopy((uint8_t *)signature.sig, p, RSA_MOD_SIZE_IN_BYTES); in verify_signature() 228 (uint32_t *)data_ptr, &pk, &signature, in verify_signature()
|
/trusted-firmware-a/plat/st/common/include/ |
A D | stm32mp_auth.h | 13 uint8_t *signature, uint32_t ecc_algo);
|
/trusted-firmware-a/lib/coreboot/ |
A D | coreboot_table.c | 23 char signature[4]; member 117 if (strncmp(header->signature, "LBIO", 4)) { in coreboot_table_setup()
|
/trusted-firmware-a/docs/resources/diagrams/plantuml/ |
A D | fip-secure-partitions.puml | 109 <i>signature</I> 121 <i>signature</I>
|
/trusted-firmware-a/include/drivers/partition/ |
A D | gpt.h | 30 unsigned char signature[8]; member
|
/trusted-firmware-a/include/drivers/arm/cryptocell/713/ |
A D | bsv_crypto_asym_api.h | 81 … CCBsvSignature_t signature, /*!< [in] The signature buffer to verify - big endian format. */
|
/trusted-firmware-a/docs/design/ |
A D | auth-framework.rst | 224 #. Verify a digital signature. 276 #. Digital signature 339 The digital signature will be represented by: 343 signature ::= BIT STRING 471 AUTH_PARAM_SIG, /* The image signature */ 472 AUTH_PARAM_SIG_ALG, /* The image signature algorithm */ 510 * Parameters for authentication by signature 697 - ``sig``: the digital signature (obtained from current image) 865 the signature from the certificate. 867 extract the signature algorithm from the certificate. [all …]
|
A D | trusted-board-boot.rst | 37 extensions. To sign the certificates, different signature schemes are available, 165 - BL2 loads and verifies the BL3x key certificate. The certificate signature 166 is verified using the trusted world public key. If the signature 170 - BL2 loads and verifies the BL3x content certificate. The signature is 171 verified using the BL3x public key. If the signature verification succeeds, 176 - BL2 loads and verifies the BL33 key certificate. If the signature 180 - BL2 loads and verifies the BL33 content certificate. If the signature
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/design/ |
A D | auth-framework.rst.txt | 224 #. Verify a digital signature. 276 #. Digital signature 339 The digital signature will be represented by: 343 signature ::= BIT STRING 471 AUTH_PARAM_SIG, /* The image signature */ 472 AUTH_PARAM_SIG_ALG, /* The image signature algorithm */ 510 * Parameters for authentication by signature 697 - ``sig``: the digital signature (obtained from current image) 865 the signature from the certificate. 867 extract the signature algorithm from the certificate. [all …]
|
A D | trusted-board-boot.rst.txt | 37 extensions. To sign the certificates, different signature schemes are available, 165 - BL2 loads and verifies the BL3x key certificate. The certificate signature 166 is verified using the trusted world public key. If the signature 170 - BL2 loads and verifies the BL3x content certificate. The signature is 171 verified using the BL3x public key. If the signature verification succeeds, 176 - BL2 loads and verifies the BL33 key certificate. If the signature 180 - BL2 loads and verifies the BL33 content certificate. If the signature
|
/trusted-firmware-a/plat/brcm/board/common/ |
A D | bcm_elog_ddr.h | 98 uint32_t signature; member
|
A D | bcm_elog_ddr.c | 43 global.signature = ELOG_GLOBAL_META_HDR_SIG; in elog_init_ddr_log()
|
/trusted-firmware-a/drivers/partition/ |
A D | partition.c | 96 if (memcmp(header.signature, GPT_SIGNATURE, in load_gpt_header() 97 sizeof(header.signature)) != 0) { in load_gpt_header()
|
/trusted-firmware-a/drivers/measured_boot/event_log/ |
A D | event_print.c | 74 event->struct_header.signature); in id_event_print() 235 ((startup_locality_event_t *)ptr)->signature); in event2_print()
|
A D | event_log.c | 41 .signature = TCG_ID_EVENT_SIGNATURE_03,
|
/trusted-firmware-a/tools/marvell/doimage/ |
A D | doimage.c | 274 uint8_t *signature) in create_rsa_signature() argument 320 memcpy(signature, buf, 256); in create_rsa_signature() 350 uint8_t *signature) in verify_rsa_signature() argument 397 hash, signature); in verify_rsa_signature() 553 uint8_t signature[RSA_SIGN_BYTE_LEN]; in verify_secure_header_signatures() local 557 memcpy(signature, sec_ext->header_sign, RSA_SIGN_BYTE_LEN); in verify_secure_header_signatures() 592 signature) != 0) { in verify_secure_header_signatures() 605 memcpy(sec_ext->header_sign, signature, RSA_SIGN_BYTE_LEN); in verify_secure_header_signatures()
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/diphda/ |
A D | index.rst.txt | 16 processor. BL2 verification relies on the signature area at the
|
/trusted-firmware-a/docs/plat/arm/diphda/ |
A D | index.rst | 16 processor. BL2 verification relies on the signature area at the
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/arm_fpga/ |
A D | index.rst.txt | 56 To avoid random garbage, there needs to be a "CMD:" signature before the 61 containing the desired command line, prefixed by the "CMD:" signature.
|
/trusted-firmware-a/docs/plat/arm/arm_fpga/ |
A D | index.rst | 56 To avoid random garbage, there needs to be a "CMD:" signature before the 61 containing the desired command line, prefixed by the "CMD:" signature.
|