| /OK3568_Linux_fs/kernel/scripts/ |
| H A D | extract-module-sig.pl | 59 my ($algo, $hash, $id_type, $name_len, $kid_len, $sig_len) = @info; 75 unless ($p >= $name_len + $kid_len + $sig_len); 77 $p -= $sig_len; 78 my $raw_sig = substr($buf, $p, $sig_len); 86 if ($sig_len > 0) { 87 print STDERR "Found $sig_len bytes of signature ["; 88 my $n = $sig_len > 16 ? 16 : $sig_len;
|
| /OK3568_Linux_fs/u-boot/lib/rsa/ |
| H A D | rsa-verify.c | 81 const uint32_t sig_len, const uint32_t key_len, in rsa_mod_exp_hw() argument 85 uint8_t sig_reverse[sig_len]; in rsa_mod_exp_hw() 86 uint8_t buf[sig_len]; in rsa_mod_exp_hw() 132 for (i = 0; i < sig_len; i++) in rsa_mod_exp_hw() 133 sig_reverse[sig_len-1-i] = sig[i]; in rsa_mod_exp_hw() 145 for (i = 0; i < sig_len; i++) in rsa_mod_exp_hw() 146 sig_reverse[sig_len-1-i] = buf[i]; in rsa_mod_exp_hw() 148 memcpy(output, sig_reverse, sig_len); in rsa_mod_exp_hw() 388 const uint32_t sig_len, const uint8_t *hash, in rsa_verify_key() argument 399 if (sig_len != (prop->num_bits / 8)) { in rsa_verify_key() [all …]
|
| /OK3568_Linux_fs/kernel/security/integrity/ima/ |
| H A D | ima_modsig.c | 46 size_t sig_len; in ima_read_modsig() local 64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig() 65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig() 68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig() 72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig() 79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig() 80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
|
| /OK3568_Linux_fs/kernel/kernel/ |
| H A D | module_signing.c | 23 size_t sig_len, modlen = info->len; in mod_verify_sig() local 37 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig() 38 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | verify_pefile.c | 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary() 107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary() 108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary() 129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper() 141 if (round_up(wrapper.length, 8) != ctx->sig_len) { in pefile_strip_sig_wrapper() 159 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper() 161 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper() 162 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper() 191 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper() 193 ctx->sig_len = len; in pefile_strip_sig_wrapper() [all …]
|
| /OK3568_Linux_fs/u-boot/include/u-boot/ |
| H A D | rsa.h | 55 int region_count, uint8_t **sigp, uint *sig_len); 73 uint8_t **sigp, uint *sig_len) in rsa_sign() argument 100 uint8_t *sig, uint sig_len); 120 uint8_t *sig, uint sig_len) in rsa_verify() argument
|
| H A D | rsa-mod-exp.h | 48 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, 51 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, 79 uint32_t sig_len, struct key_prop *node,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | pk_internal.h | 53 const unsigned char *sig, size_t sig_len ); 58 unsigned char *sig, size_t *sig_len, 66 const unsigned char *sig, size_t sig_len, 72 unsigned char *sig, size_t *sig_len,
|
| H A D | pk.h | 427 const unsigned char *sig, size_t sig_len ); 452 const unsigned char *sig, size_t sig_len, 487 const unsigned char *sig, size_t sig_len ); 521 unsigned char *sig, size_t *sig_len, 555 unsigned char *sig, size_t *sig_len,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | pk_internal.h | 53 const unsigned char *sig, size_t sig_len ); 58 unsigned char *sig, size_t *sig_len, 66 const unsigned char *sig, size_t sig_len, 72 unsigned char *sig, size_t *sig_len,
|
| H A D | pk.h | 427 const unsigned char *sig, size_t sig_len ); 452 const unsigned char *sig, size_t sig_len, 487 const unsigned char *sig, size_t sig_len ); 521 unsigned char *sig, size_t *sig_len, 555 unsigned char *sig, size_t *sig_len,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | pk_internal.h | 53 const unsigned char *sig, size_t sig_len ); 58 unsigned char *sig, size_t *sig_len, 66 const unsigned char *sig, size_t sig_len, 72 unsigned char *sig, size_t *sig_len,
|
| H A D | pk.h | 427 const unsigned char *sig, size_t sig_len ); 452 const unsigned char *sig, size_t sig_len, 487 const unsigned char *sig, size_t sig_len ); 521 unsigned char *sig, size_t *sig_len, 555 unsigned char *sig, size_t *sig_len,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | pk_internal.h | 53 const unsigned char *sig, size_t sig_len ); 58 unsigned char *sig, size_t *sig_len, 66 const unsigned char *sig, size_t sig_len, 72 unsigned char *sig, size_t *sig_len,
|
| H A D | pk.h | 427 const unsigned char *sig, size_t sig_len ); 452 const unsigned char *sig, size_t sig_len, 487 const unsigned char *sig, size_t sig_len ); 521 unsigned char *sig, size_t *sig_len, 555 unsigned char *sig, size_t *sig_len,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/tools/ta_resign_tool-release/linux/ |
| H A D | resign_ta.py | 88 sig_len = len(signer.sign(h)) 95 magic, img_type, img_size, algo, digest_len, sig_len) 129 sig_len = key.size_in_bytes() 136 magic, img_type, img_size, algo, digest_len, sig_len) 177 sig_len = key.size_in_bytes() 180 magic, img_type, img_size, algo, digest_len, sig_len)
|
| /OK3568_Linux_fs/kernel/arch/s390/kernel/ |
| H A D | machine_kexec_file.c | 31 unsigned long sig_len; in s390_verify_sig() local 49 sig_len = be32_to_cpu(ms->sig_len); in s390_verify_sig() 50 if (sig_len >= kernel_len) in s390_verify_sig() 52 kernel_len -= sig_len; in s390_verify_sig() 68 kernel + kernel_len, sig_len, in s390_verify_sig() 74 kernel + kernel_len, sig_len, in s390_verify_sig()
|
| /OK3568_Linux_fs/u-boot/drivers/crypto/fsl/ |
| H A D | fsl_rsa.c | 19 int fsl_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in fsl_mod_exp() argument 31 pkin.a_siz = sig_len; in fsl_mod_exp() 37 inline_cnstr_jobdesc_pkha_rsaexp(desc, &pkin, out, sig_len); in fsl_mod_exp()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/tools/ta_resign_tool-release/linux/ |
| H A D | resign_ta.py | 79 sig_len = len(signer.sign(h)) 86 magic, img_type, img_size, algo, digest_len, sig_len) 108 sig_len = len(signer.sign(h)) 115 magic, img_type, img_size, algo, digest_len, sig_len)
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | ecdsa.h | 78 unsigned int *sig_len, const EC_KEY *key); 86 size_t sig_len, const EC_KEY *key); 145 unsigned int *sig_len, const BIGNUM *kinv,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | ecdsa.h | 78 unsigned int *sig_len, const EC_KEY *key); 86 size_t sig_len, const EC_KEY *key); 145 unsigned int *sig_len, const BIGNUM *kinv,
|
| /OK3568_Linux_fs/kernel/drivers/md/ |
| H A D | dm-verity-verify-sig.c | 107 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument 114 if (!sig_data || sig_len == 0) { in verity_verify_root_hash() 122 sig_len, NULL, VERIFYING_UNSPECIFIED_SIGNATURE, in verity_verify_root_hash()
|
| H A D | dm-verity-verify-sig.h | 24 const void *sig_data, size_t sig_len); 38 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument
|
| /OK3568_Linux_fs/u-boot/drivers/crypto/rsa_mod_exp/ |
| H A D | mod_exp_uclass.c | 17 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp() argument 25 return ops->mod_exp(dev, sig, sig_len, node, out); in rsa_mod_exp()
|
| H A D | mod_exp_sw.c | 13 int mod_exp_sw(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in mod_exp_sw() argument 18 ret = rsa_mod_exp_sw(sig, sig_len, prop, out); in mod_exp_sw()
|