| /rk3399_ARM-atf/drivers/auth/mbedtls/ |
| H A D | mbedtls_crypto.c | 92 mbedtls_asn1_buf signature; in verify_signature() local 129 signature.tag = *p; in verify_signature() 130 rc = mbedtls_asn1_get_bitstring_null(&p, end, &signature.len); in verify_signature() 131 if ((rc != 0) || ((size_t)(end - p) != signature.len)) { in verify_signature() 135 signature.p = p; in verify_signature() 153 signature.p, signature.len); in verify_signature()
|
| H A D | mbedtls_x509_parser.c | 43 static mbedtls_asn1_buf signature; variable 60 ZERO_AND_CLEAN(signature); in clear_temp_vars() 417 signature.p = p; in cert_parse() 422 signature.len = end - signature.p; in cert_parse() 496 *param = (void *)signature.p; in get_auth_param() 497 *param_len = (unsigned int)signature.len; in get_auth_param()
|
| /rk3399_ARM-atf/docs/components/spd/ |
| H A D | optee-dispatcher.rst | 16 way. ChromeOS uses a boot flow where it verifies the signature of the firmware 17 before executing it, and then only if the signature is valid will the 'secrets' 18 used by the TEE become accessible. The firmware then verifies the signature of
|
| /rk3399_ARM-atf/include/drivers/measured_boot/event_log/ |
| H A D | tcg.h | 156 uint8_t signature[16]; member 296 uint8_t signature[16]; member
|
| /rk3399_ARM-atf/include/drivers/partition/ |
| H A D | gpt.h | 29 unsigned char signature[8]; member
|
| /rk3399_ARM-atf/docs/resources/diagrams/plantuml/ |
| H A D | fip-secure-partitions.puml | 109 <i>signature</I> 121 <i>signature</I>
|
| /rk3399_ARM-atf/plat/st/common/ |
| H A D | stm32mp_crypto_lib.c | 41 uint8_t *signature, uint32_t ecc_algo); 145 uint8_t *signature, uint32_t ecc_algo) in verify_signature() argument 156 ret = auth_ops.verify_signature(hash_in, pubkey_in, signature, ecc_algo); in verify_signature() 185 uint8_t *signature, uint32_t ecc_algo) in verify_signature() argument 218 signature, BOOT_API_ECDSA_SIGNATURE_LEN_IN_BYTES / 2U, in verify_signature() 219 signature + BOOT_API_ECDSA_SIGNATURE_LEN_IN_BYTES / 2U, in verify_signature()
|
| /rk3399_ARM-atf/lib/coreboot/ |
| H A D | coreboot_table.c | 23 char signature[4]; member 125 if (strncmp(header->signature, "LBIO", 4)) { in coreboot_table_setup()
|
| /rk3399_ARM-atf/plat/brcm/board/common/ |
| H A D | bcm_elog_ddr.h | 98 uint32_t signature; member
|
| H A D | bcm_elog_ddr.c | 43 global.signature = ELOG_GLOBAL_META_HDR_SIG; in elog_init_ddr_log()
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | auth-framework.rst | 224 #. Verify a digital signature. 238 /* Bit string of the signature in DER format. */ 306 the signature to the buffer (a platform specific public key) which 345 #. Digital signature 408 The digital signature will be represented by: 412 signature ::= BIT STRING 452 example, The signature of a data image could be appended to the data image 540 AUTH_PARAM_SIG, /* The image signature */ 541 AUTH_PARAM_SIG_ALG, /* The image signature algorithm */ 580 * Parameters for authentication by signature [all …]
|
| H A D | trusted-board-boot.rst | 59 the certificates, different signature schemes are available, please refer to the 238 - BL2 loads and verifies the BL3x key certificate. The certificate signature 239 is verified using the trusted world public key. If the signature 243 - BL2 loads and verifies the BL3x content certificate. The signature is 244 verified using the BL3x public key. If the signature verification succeeds, 249 - BL2 loads and verifies the BL33 key certificate. If the signature 253 - BL2 loads and verifies the BL33 content certificate. If the signature
|
| /rk3399_ARM-atf/plat/st/stm32mp1/include/ |
| H A D | boot_api.h | 240 uint8_t *signature,
|
| /rk3399_ARM-atf/tools/marvell/doimage/ |
| H A D | doimage.c | 269 uint8_t *signature) in create_rsa_signature() argument 315 memcpy(signature, buf, 256); in create_rsa_signature() 345 uint8_t *signature) in verify_rsa_signature() argument 392 hash, signature); in verify_rsa_signature() 549 uint8_t signature[RSA_SIGN_BYTE_LEN]; in verify_secure_header_signatures() local 553 memcpy(signature, sec_ext->header_sign, RSA_SIGN_BYTE_LEN); in verify_secure_header_signatures() 588 signature) != 0) { in verify_secure_header_signatures() 601 memcpy(sec_ext->header_sign, signature, RSA_SIGN_BYTE_LEN); in verify_secure_header_signatures()
|
| /rk3399_ARM-atf/docs/plat/arm/corstone1000/ |
| H A D | index.rst | 16 processor. BL2 verification relies on the signature area at the
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-10.rst | 98 ``drivers/auth/``) require that the certificate's signature has already been 101 ``fdts/tbbr_cot_descriptors.dts``) are also safe, as signature verification will 115 2. Retrieving the signature details from an X.509 certificate to check its
|
| /rk3399_ARM-atf/docs/plat/arm/arm_fpga/ |
| H A D | index.rst | 56 To avoid random garbage, there needs to be a "CMD:" signature before the 61 containing the desired command line, prefixed by the "CMD:" signature.
|
| /rk3399_ARM-atf/drivers/partition/ |
| H A D | partition.c | 112 if (memcmp(header->signature, GPT_SIGNATURE, in load_gpt_header() 113 sizeof(header->signature)) != 0) { in load_gpt_header()
|
| /rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/ |
| H A D | input_bl2_ch2 | 67 # Specify the signature size.It is mandatory when neither public key nor private key is specified.
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | drtm_poc.rst | 36 signature, and transfers control to it.
|
| /rk3399_ARM-atf/docs/plat/qti/ |
| H A D | rb3gen2.rst | 47 the OEM test signature to allow it to work on devices in non-secure mode. In
|
| H A D | msm8916.rst | 125 boot disabled. In this case the signature does not provide any security,
|
| /rk3399_ARM-atf/include/services/ |
| H A D | ffa_svc.h | 372 uint32_t signature; /* 0xFFA */ member
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | rt-svc-writers-guide.rst | 110 - ``_setup`` is the initialization function with the ``rt_svc_init`` signature: 116 - ``_smch`` is the SMC handler function with the ``rt_svc_handle`` signature: 185 the following signature:
|
| /rk3399_ARM-atf/services/std_svc/spm/el3_spmc/ |
| H A D | spmc_setup.c | 390 boot_header->signature = FFA_INIT_DESC_SIGNATURE; in spmc_create_boot_info()
|