Home
last modified time | relevance | path

Searched refs:sig_len (Results 1 – 25 of 85) sorted by relevance

1234

/OK3568_Linux_fs/kernel/scripts/
H A Dextract-module-sig.pl59 my ($algo, $hash, $id_type, $name_len, $kid_len, $sig_len) = @info;
75 unless ($p >= $name_len + $kid_len + $sig_len);
77 $p -= $sig_len;
78 my $raw_sig = substr($buf, $p, $sig_len);
86 if ($sig_len > 0) {
87 print STDERR "Found $sig_len bytes of signature [";
88 my $n = $sig_len > 16 ? 16 : $sig_len;
/OK3568_Linux_fs/u-boot/lib/rsa/
H A Drsa-verify.c81 const uint32_t sig_len, const uint32_t key_len, in rsa_mod_exp_hw() argument
85 uint8_t sig_reverse[sig_len]; in rsa_mod_exp_hw()
86 uint8_t buf[sig_len]; in rsa_mod_exp_hw()
132 for (i = 0; i < sig_len; i++) in rsa_mod_exp_hw()
133 sig_reverse[sig_len-1-i] = sig[i]; in rsa_mod_exp_hw()
145 for (i = 0; i < sig_len; i++) in rsa_mod_exp_hw()
146 sig_reverse[sig_len-1-i] = buf[i]; in rsa_mod_exp_hw()
148 memcpy(output, sig_reverse, sig_len); in rsa_mod_exp_hw()
388 const uint32_t sig_len, const uint8_t *hash, in rsa_verify_key() argument
399 if (sig_len != (prop->num_bits / 8)) { in rsa_verify_key()
[all …]
/OK3568_Linux_fs/kernel/security/integrity/ima/
H A Dima_modsig.c46 size_t sig_len; in ima_read_modsig() local
64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig()
65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig()
68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig()
72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig()
79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig()
80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
/OK3568_Linux_fs/kernel/kernel/
H A Dmodule_signing.c23 size_t sig_len, modlen = info->len; in mod_verify_sig() local
37 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig()
38 modlen -= sig_len + sizeof(ms); in mod_verify_sig()
41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
/OK3568_Linux_fs/kernel/crypto/asymmetric_keys/
H A Dverify_pefile.c105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary()
107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary()
108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary()
129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper()
141 if (round_up(wrapper.length, 8) != ctx->sig_len) { in pefile_strip_sig_wrapper()
159 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper()
161 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper()
162 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper()
191 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper()
193 ctx->sig_len = len; in pefile_strip_sig_wrapper()
[all …]
/OK3568_Linux_fs/u-boot/include/u-boot/
H A Drsa.h55 int region_count, uint8_t **sigp, uint *sig_len);
73 uint8_t **sigp, uint *sig_len) in rsa_sign() argument
100 uint8_t *sig, uint sig_len);
120 uint8_t *sig, uint sig_len) in rsa_verify() argument
H A Drsa-mod-exp.h48 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len,
51 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len,
79 uint32_t sig_len, struct key_prop *node,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dpk_internal.h53 const unsigned char *sig, size_t sig_len );
58 unsigned char *sig, size_t *sig_len,
66 const unsigned char *sig, size_t sig_len,
72 unsigned char *sig, size_t *sig_len,
H A Dpk.h427 const unsigned char *sig, size_t sig_len );
452 const unsigned char *sig, size_t sig_len,
487 const unsigned char *sig, size_t sig_len );
521 unsigned char *sig, size_t *sig_len,
555 unsigned char *sig, size_t *sig_len,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dpk_internal.h53 const unsigned char *sig, size_t sig_len );
58 unsigned char *sig, size_t *sig_len,
66 const unsigned char *sig, size_t sig_len,
72 unsigned char *sig, size_t *sig_len,
H A Dpk.h427 const unsigned char *sig, size_t sig_len );
452 const unsigned char *sig, size_t sig_len,
487 const unsigned char *sig, size_t sig_len );
521 unsigned char *sig, size_t *sig_len,
555 unsigned char *sig, size_t *sig_len,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dpk_internal.h53 const unsigned char *sig, size_t sig_len );
58 unsigned char *sig, size_t *sig_len,
66 const unsigned char *sig, size_t sig_len,
72 unsigned char *sig, size_t *sig_len,
H A Dpk.h427 const unsigned char *sig, size_t sig_len );
452 const unsigned char *sig, size_t sig_len,
487 const unsigned char *sig, size_t sig_len );
521 unsigned char *sig, size_t *sig_len,
555 unsigned char *sig, size_t *sig_len,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dpk_internal.h53 const unsigned char *sig, size_t sig_len );
58 unsigned char *sig, size_t *sig_len,
66 const unsigned char *sig, size_t sig_len,
72 unsigned char *sig, size_t *sig_len,
H A Dpk.h427 const unsigned char *sig, size_t sig_len );
452 const unsigned char *sig, size_t sig_len,
487 const unsigned char *sig, size_t sig_len );
521 unsigned char *sig, size_t *sig_len,
555 unsigned char *sig, size_t *sig_len,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/tools/ta_resign_tool-release/linux/
H A Dresign_ta.py88 sig_len = len(signer.sign(h))
95 magic, img_type, img_size, algo, digest_len, sig_len)
129 sig_len = key.size_in_bytes()
136 magic, img_type, img_size, algo, digest_len, sig_len)
177 sig_len = key.size_in_bytes()
180 magic, img_type, img_size, algo, digest_len, sig_len)
/OK3568_Linux_fs/kernel/arch/s390/kernel/
H A Dmachine_kexec_file.c31 unsigned long sig_len; in s390_verify_sig() local
49 sig_len = be32_to_cpu(ms->sig_len); in s390_verify_sig()
50 if (sig_len >= kernel_len) in s390_verify_sig()
52 kernel_len -= sig_len; in s390_verify_sig()
68 kernel + kernel_len, sig_len, in s390_verify_sig()
74 kernel + kernel_len, sig_len, in s390_verify_sig()
/OK3568_Linux_fs/u-boot/drivers/crypto/fsl/
H A Dfsl_rsa.c19 int fsl_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in fsl_mod_exp() argument
31 pkin.a_siz = sig_len; in fsl_mod_exp()
37 inline_cnstr_jobdesc_pkha_rsaexp(desc, &pkin, out, sig_len); in fsl_mod_exp()
/OK3568_Linux_fs/external/security/rk_tee_user/v1/tools/ta_resign_tool-release/linux/
H A Dresign_ta.py79 sig_len = len(signer.sign(h))
86 magic, img_type, img_size, algo, digest_len, sig_len)
108 sig_len = len(signer.sign(h))
115 magic, img_type, img_size, algo, digest_len, sig_len)
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/
H A Decdsa.h78 unsigned int *sig_len, const EC_KEY *key);
86 size_t sig_len, const EC_KEY *key);
145 unsigned int *sig_len, const BIGNUM *kinv,
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/
H A Decdsa.h78 unsigned int *sig_len, const EC_KEY *key);
86 size_t sig_len, const EC_KEY *key);
145 unsigned int *sig_len, const BIGNUM *kinv,
/OK3568_Linux_fs/kernel/drivers/md/
H A Ddm-verity-verify-sig.c107 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument
114 if (!sig_data || sig_len == 0) { in verity_verify_root_hash()
122 sig_len, NULL, VERIFYING_UNSPECIFIED_SIGNATURE, in verity_verify_root_hash()
H A Ddm-verity-verify-sig.h24 const void *sig_data, size_t sig_len);
38 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument
/OK3568_Linux_fs/u-boot/drivers/crypto/rsa_mod_exp/
H A Dmod_exp_uclass.c17 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp() argument
25 return ops->mod_exp(dev, sig, sig_len, node, out); in rsa_mod_exp()
H A Dmod_exp_sw.c13 int mod_exp_sw(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in mod_exp_sw() argument
18 ret = rsa_mod_exp_sw(sig, sig_len, prop, out); in mod_exp_sw()

1234