Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 33) sorted by relevance

12

/rk3399_ARM-atf/drivers/auth/mbedtls/
H A Dmbedtls_crypto.c92 mbedtls_asn1_buf signature; in verify_signature() local
129 signature.tag = *p; in verify_signature()
130 rc = mbedtls_asn1_get_bitstring_null(&p, end, &signature.len); in verify_signature()
131 if ((rc != 0) || ((size_t)(end - p) != signature.len)) { in verify_signature()
135 signature.p = p; in verify_signature()
153 signature.p, signature.len); in verify_signature()
H A Dmbedtls_x509_parser.c43 static mbedtls_asn1_buf signature; variable
60 ZERO_AND_CLEAN(signature); in clear_temp_vars()
417 signature.p = p; in cert_parse()
422 signature.len = end - signature.p; in cert_parse()
496 *param = (void *)signature.p; in get_auth_param()
497 *param_len = (unsigned int)signature.len; in get_auth_param()
/rk3399_ARM-atf/docs/components/spd/
H A Doptee-dispatcher.rst16 way. ChromeOS uses a boot flow where it verifies the signature of the firmware
17 before executing it, and then only if the signature is valid will the 'secrets'
18 used by the TEE become accessible. The firmware then verifies the signature of
/rk3399_ARM-atf/include/drivers/measured_boot/event_log/
H A Dtcg.h156 uint8_t signature[16]; member
296 uint8_t signature[16]; member
/rk3399_ARM-atf/include/drivers/partition/
H A Dgpt.h29 unsigned char signature[8]; member
/rk3399_ARM-atf/docs/resources/diagrams/plantuml/
H A Dfip-secure-partitions.puml109 <i>signature</I>
121 <i>signature</I>
/rk3399_ARM-atf/plat/st/common/
H A Dstm32mp_crypto_lib.c41 uint8_t *signature, uint32_t ecc_algo);
145 uint8_t *signature, uint32_t ecc_algo) in verify_signature() argument
156 ret = auth_ops.verify_signature(hash_in, pubkey_in, signature, ecc_algo); in verify_signature()
185 uint8_t *signature, uint32_t ecc_algo) in verify_signature() argument
218 signature, BOOT_API_ECDSA_SIGNATURE_LEN_IN_BYTES / 2U, in verify_signature()
219 signature + BOOT_API_ECDSA_SIGNATURE_LEN_IN_BYTES / 2U, in verify_signature()
/rk3399_ARM-atf/lib/coreboot/
H A Dcoreboot_table.c23 char signature[4]; member
125 if (strncmp(header->signature, "LBIO", 4)) { in coreboot_table_setup()
/rk3399_ARM-atf/plat/brcm/board/common/
H A Dbcm_elog_ddr.h98 uint32_t signature; member
H A Dbcm_elog_ddr.c43 global.signature = ELOG_GLOBAL_META_HDR_SIG; in elog_init_ddr_log()
/rk3399_ARM-atf/docs/design/
H A Dauth-framework.rst224 #. Verify a digital signature.
238 /* Bit string of the signature in DER format. */
306 the signature to the buffer (a platform specific public key) which
345 #. Digital signature
408 The digital signature will be represented by:
412 signature ::= BIT STRING
452 example, The signature of a data image could be appended to the data image
540 AUTH_PARAM_SIG, /* The image signature */
541 AUTH_PARAM_SIG_ALG, /* The image signature algorithm */
580 * Parameters for authentication by signature
[all …]
H A Dtrusted-board-boot.rst59 the certificates, different signature schemes are available, please refer to the
238 - BL2 loads and verifies the BL3x key certificate. The certificate signature
239 is verified using the trusted world public key. If the signature
243 - BL2 loads and verifies the BL3x content certificate. The signature is
244 verified using the BL3x public key. If the signature verification succeeds,
249 - BL2 loads and verifies the BL33 key certificate. If the signature
253 - BL2 loads and verifies the BL33 content certificate. If the signature
/rk3399_ARM-atf/plat/st/stm32mp1/include/
H A Dboot_api.h240 uint8_t *signature,
/rk3399_ARM-atf/tools/marvell/doimage/
H A Ddoimage.c269 uint8_t *signature) in create_rsa_signature() argument
315 memcpy(signature, buf, 256); in create_rsa_signature()
345 uint8_t *signature) in verify_rsa_signature() argument
392 hash, signature); in verify_rsa_signature()
549 uint8_t signature[RSA_SIGN_BYTE_LEN]; in verify_secure_header_signatures() local
553 memcpy(signature, sec_ext->header_sign, RSA_SIGN_BYTE_LEN); in verify_secure_header_signatures()
588 signature) != 0) { in verify_secure_header_signatures()
601 memcpy(sec_ext->header_sign, signature, RSA_SIGN_BYTE_LEN); in verify_secure_header_signatures()
/rk3399_ARM-atf/docs/plat/arm/corstone1000/
H A Dindex.rst16 processor. BL2 verification relies on the signature area at the
/rk3399_ARM-atf/docs/security_advisories/
H A Dsecurity-advisory-tfv-10.rst98 ``drivers/auth/``) require that the certificate's signature has already been
101 ``fdts/tbbr_cot_descriptors.dts``) are also safe, as signature verification will
115 2. Retrieving the signature details from an X.509 certificate to check its
/rk3399_ARM-atf/docs/plat/arm/arm_fpga/
H A Dindex.rst56 To avoid random garbage, there needs to be a "CMD:" signature before the
61 containing the desired command line, prefixed by the "CMD:" signature.
/rk3399_ARM-atf/drivers/partition/
H A Dpartition.c112 if (memcmp(header->signature, GPT_SIGNATURE, in load_gpt_header()
113 sizeof(header->signature)) != 0) { in load_gpt_header()
/rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/
H A Dinput_bl2_ch267 # Specify the signature size.It is mandatory when neither public key nor private key is specified.
/rk3399_ARM-atf/docs/design_documents/
H A Ddrtm_poc.rst36 signature, and transfers control to it.
/rk3399_ARM-atf/docs/plat/qti/
H A Drb3gen2.rst47 the OEM test signature to allow it to work on devices in non-secure mode. In
H A Dmsm8916.rst125 boot disabled. In this case the signature does not provide any security,
/rk3399_ARM-atf/include/services/
H A Dffa_svc.h372 uint32_t signature; /* 0xFFA */ member
/rk3399_ARM-atf/docs/getting_started/
H A Drt-svc-writers-guide.rst110 - ``_setup`` is the initialization function with the ``rt_svc_init`` signature:
116 - ``_smch`` is the SMC handler function with the ``rt_svc_handle`` signature:
185 the following signature:
/rk3399_ARM-atf/services/std_svc/spm/el3_spmc/
H A Dspmc_setup.c390 boot_header->signature = FFA_INIT_DESC_SIGNATURE; in spmc_create_boot_info()

12