| /optee_os/ta/pkcs11/ |
| H A D | user_ta.mk | 3 all: pkcs11-ta-verify-helpers 5 .PHONY: pkcs11-ta-verify-helpers 6 pkcs11-ta-verify-helpers: 8 ${q}ta/pkcs11/scripts/verify-helpers.sh --quiet
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | memory_buffer_alloc.c | 53 int verify; member 286 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc() 350 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc() 476 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_FREE) && verify_chain() != 0) { in buffer_alloc_free() 481 void mbedtls_memory_buffer_set_verify(int verify) in mbedtls_memory_buffer_set_verify() argument 483 heap.verify = verify; in mbedtls_memory_buffer_set_verify()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | memory_buffer_alloc.h | 71 void mbedtls_memory_buffer_set_verify(int verify);
|
| /optee_os/core/drivers/crypto/crypto_api/include/ |
| H A D | drvcrypt_acipher.h | 166 TEE_Result (*verify)(struct drvcrypt_sign_data *sdata); member 225 TEE_Result (*verify)(struct drvcrypt_sign_data *sdata, size_t l_bytes, member
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | ecc.c | 146 static TEE_Result verify(uint32_t algo, struct ecc_public_key *key, in verify() function 170 return pub_ops->verify(algo, key, msg, msg_len, sig, sig_len); in verify() 351 return verify(sdata->algo, in do_verify() 428 .verify = do_verify,
|
| /optee_os/scripts/ |
| H A D | checkpatch_inc.sh | 15 ta/pkcs11/scripts/verify-helpers.sh \
|
| H A D | sign_encrypt.py | 780 pkey.verify(self.sig, self.img_digest, self.__get_padding(),
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | ecc.c | 407 return pub_ops->verify(algo, key, msg, msg_len, sig, sig_len); in verify_fallback() 566 static TEE_Result verify(uint32_t algo, struct ecc_public_key *key, in verify() function 721 return verify(sdata->algo, in do_verify() 787 .verify = do_verify,
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | ecc.c | 221 static TEE_Result verify(uint32_t algo, struct ecc_public_key *key, in verify() function 283 return verify(sdata->algo, in stm32_verify() 499 .verify = stm32_verify,
|
| /optee_os/core/drivers/crypto/crypto_api/acipher/ |
| H A D | ecc.c | 272 ret = ecc->verify(&sdata); in ecc_verify() 549 .verify = ecc_verify,
|
| H A D | dsa.c | 221 ret = dsa->verify(&sdata, l_bytes, n_bytes); in crypto_acipher_dsa_verify()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | ecc.c | 360 .verify = _ltc_ecc_verify, 370 .verify = sm2_ltc_dsa_verify,
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | ecc.c | 456 .verify = ecc_verify, 470 .verify = sm2_mbedtls_dsa_verify,
|
| /optee_os/core/crypto/ |
| H A D | crypto.c | 779 if (!key->ops->verify) in crypto_acipher_ecc_verify() 782 return key->ops->verify(algo, key, msg, msg_len, sig, sig_len); in crypto_acipher_ecc_verify()
|
| /optee_os/core/include/crypto/ |
| H A D | crypto_impl.h | 414 TEE_Result (*verify)(uint32_t algo, struct ecc_public_key *key, member
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| H A D | caam_ecc.c | 899 .verify = do_verify,
|
| H A D | caam_dsa.c | 793 .verify = do_verify,
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | hpre_ecc.c | 1462 .verify = hpre_ecc_verify,
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 375 verify callbacks, set with mbedtls_ssl_set_verify() as opposed to 377 upgraded to TLS 1.3. Fixed by adding support for context-specific verify 603 RSA context was configured for PKCS#1 v2.1 (PSS/OAEP), the sign/verify 876 MBEDTLS_ECDSA_VERIFY_ALT, causing ecdsa verify to fail. Fixes #7498. 1025 * Add an interruptible version of sign and verify hash to the PSA interface, 1115 possible to verify RSA PSS signatures with the pk module, which was 1343 public key. This bug meant that it was possible to verify a 1666 Alternative GCM implementations are expected to verify 1769 * Remove PSA'a AEAD finish/verify output buffer limitation for GCM. 1788 all algorithms that can be used with psa_{sign,verify}_hash(), including [all …]
|
| /optee_os/core/lib/qcbor/ |
| H A D | README.md | 65 **Comprehensive test suite** – Easy to verify on a new platform or OS
|