Home
last modified time | relevance | path

Searched refs:sig_len (Results 1 – 25 of 37) sorted by relevance

12

/openbmc/linux/scripts/
H A Dextract-module-sig.pl59 my ($algo, $hash, $id_type, $name_len, $kid_len, $sig_len) = @info;
75 unless ($p >= $name_len + $kid_len + $sig_len);
77 $p -= $sig_len;
78 my $raw_sig = substr($buf, $p, $sig_len);
86 if ($sig_len > 0) {
87 print STDERR "Found $sig_len bytes of signature [";
88 my $n = $sig_len > 16 ? 16 : $sig_len;
/openbmc/linux/security/integrity/ima/
H A Dima_modsig.c46 size_t sig_len; in ima_read_modsig() local
64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig()
65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig()
68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig()
72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig()
79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig()
80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/
H A Dverify_pkcs7_sig.c49 __be32 sig_len; /* Length of signature data */ member
56 __u32 sig_len; member
151 data_item->sig_len = st.st_size; in populate_data_item_str()
159 ret = read(fd, data_item->sig, data_item->sig_len); in populate_data_item_str()
163 if (ret != data_item->sig_len) { in populate_data_item_str()
183 int ret, fd, modlen, marker_len, sig_len; in populate_data_item_mod() local
233 sig_len = __be32_to_cpu(ms.sig_len); in populate_data_item_mod()
234 modlen -= sig_len + sizeof(ms); in populate_data_item_mod()
244 if (sig_len > sizeof(data_item->sig)) { in populate_data_item_mod()
249 memcpy(data_item->sig, mod + modlen, sig_len); in populate_data_item_mod()
[all …]
/openbmc/u-boot/lib/rsa/
H A Drsa-verify.c289 const uint32_t sig_len, const uint8_t *hash, in rsa_verify_key() argument
303 if (sig_len != (prop->num_bits / 8)) { in rsa_verify_key()
304 debug("Signature is of incorrect length %d\n", sig_len); in rsa_verify_key()
311 if (sig_len > RSA_MAX_SIG_BITS / 8) { in rsa_verify_key()
317 uint8_t buf[sig_len]; in rsa_verify_key()
327 ret = rsa_mod_exp(mod_exp_dev, sig, sig_len, prop, buf); in rsa_verify_key()
329 ret = rsa_mod_exp_sw(sig, sig_len, prop, buf); in rsa_verify_key()
362 uint sig_len, int node) in rsa_verify_with_keynode() argument
393 ret = rsa_verify_key(info, &prop, sig, sig_len, hash, in rsa_verify_with_keynode()
401 uint8_t *sig, uint sig_len) in rsa_verify() argument
[all …]
H A Drsa-mod-exp.c249 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp_sw() argument
291 uint32_t buf[sig_len / sizeof(uint32_t)]; in rsa_mod_exp_sw()
293 memcpy(buf, sig, sig_len); in rsa_mod_exp_sw()
299 memcpy(out, buf, sig_len); in rsa_mod_exp_sw()
/openbmc/linux/kernel/module/
H A Dsigning.c46 size_t sig_len, modlen = info->len; in mod_verify_sig() local
60 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig()
61 modlen -= sig_len + sizeof(ms); in mod_verify_sig()
64 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
/openbmc/linux/crypto/asymmetric_keys/
H A Dverify_pefile.c105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary()
107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary()
108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary()
129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper()
144 if (wrapper.length > ctx->sig_len) { in pefile_strip_sig_wrapper()
146 ctx->sig_len, wrapper.length); in pefile_strip_sig_wrapper()
163 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper()
165 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper()
166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper()
195 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper()
[all …]
H A Dverify_pefile.h19 unsigned sig_len; member
/openbmc/u-boot/include/u-boot/
H A Drsa.h54 int region_count, uint8_t **sigp, uint *sig_len);
72 uint8_t **sigp, uint *sig_len) in rsa_sign() argument
99 uint8_t *sig, uint sig_len);
113 uint8_t *sig, uint sig_len) in rsa_verify() argument
H A Drsa-mod-exp.h39 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len,
42 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len,
74 uint32_t sig_len, struct key_prop *node,
/openbmc/google-misc/subprojects/libcr51sign/src/
H A Dlibcr51sign_support.c120 const uint8_t* sig, size_t sig_len, const uint8_t* data, in verify_signature() argument
126 CPRINTS(ctx, "sig_len %zu sig: ", sig_len); in verify_signature()
127 for (size_t i = 0; i < sig_len; i++) in verify_signature()
194 int ret = RSA_verify(hash_nid, data, data_len, sig, sig_len, pub_rsa); in verify_signature()
205 for (size_t i = 0; i < sig_len; i++) in verify_signature()
219 CPRINTS(ctx, "rsa size %d sig_len %d\n", rsa_size, (uint32_t)sig_len); in verify_signature()
/openbmc/u-boot/drivers/crypto/fsl/
H A Dfsl_rsa.c18 int fsl_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in fsl_mod_exp() argument
30 pkin.a_siz = sig_len; in fsl_mod_exp()
36 inline_cnstr_jobdesc_pkha_rsaexp(desc, &pkin, out, sig_len); in fsl_mod_exp()
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dtest_verify_pkcs7_sig.c32 __u32 sig_len; member
76 if (data_val->sig_len > sizeof(data_val->sig)) in BPF_PROG()
79 bpf_dynptr_from_mem(data_val->sig, data_val->sig_len, 0, &sig_ptr); in BPF_PROG()
/openbmc/u-boot/drivers/crypto/rsa_mod_exp/
H A Dmod_exp_uclass.c16 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp() argument
24 return ops->mod_exp(dev, sig, sig_len, node, out); in rsa_mod_exp()
H A Dmod_exp_sw.c12 int mod_exp_sw(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in mod_exp_sw() argument
17 ret = rsa_mod_exp_sw(sig, sig_len, prop, out); in mod_exp_sw()
/openbmc/u-boot/board/xilinx/zynq/
H A Dcmds.c148 const u8 *sig, const u32 sig_len, const u8 *hash) in zynq_rsa_verify_key() argument
156 if (sig_len != (key->len * sizeof(u32))) { in zynq_rsa_verify_key()
157 printf("Signature is of incorrect length %d\n", sig_len); in zynq_rsa_verify_key()
162 if (sig_len > ZYNQ_RSA_SPK_SIGNATURE_SIZE) { in zynq_rsa_verify_key()
163 printf("Signature length %u exceeds maximum %d\n", sig_len, in zynq_rsa_verify_key()
168 buf = malloc(sig_len); in zynq_rsa_verify_key()
172 memcpy(buf, sig, sig_len); in zynq_rsa_verify_key()
/openbmc/linux/drivers/md/
H A Ddm-verity-verify-sig.c107 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument
114 if (!sig_data || sig_len == 0) { in verity_verify_root_hash()
122 sig_len, in verity_verify_root_hash()
H A Ddm-verity-verify-sig.h24 const void *sig_data, size_t sig_len);
38 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument
/openbmc/qemu/hw/char/
H A Driscv_htif.c183 uint64_t sig_len = end_sig_addr - begin_sig_addr; in htif_handle_tohost_write() local
184 char *sig_data = g_malloc(sig_len); in htif_handle_tohost_write()
186 sig_data, sig_len, MEMTXATTRS_UNSPECIFIED); in htif_handle_tohost_write()
194 for (int i = 0; i < sig_len; i += line_size) { in htif_handle_tohost_write()
196 if (i + j <= sig_len) { in htif_handle_tohost_write()
/openbmc/linux/arch/s390/kernel/
H A Dmachine_kexec_file.c33 unsigned long sig_len; in s390_verify_sig() local
51 sig_len = be32_to_cpu(ms->sig_len); in s390_verify_sig()
52 if (sig_len >= kernel_len) in s390_verify_sig()
54 kernel_len -= sig_len; in s390_verify_sig()
70 kernel + kernel_len, sig_len, in s390_verify_sig()
76 kernel + kernel_len, sig_len, in s390_verify_sig()
/openbmc/qemu/crypto/
H A Dakcipher-nettle.c.inc250 void *sig, size_t sig_len, Error **errp)
271 if (sig_len < rsa->priv.size) {
273 "key size: %zu", sig_len, rsa->priv.size);
304 nettle_mpz_get_str_256(sig_len, (uint8_t *)sig, s);
314 const void *sig, size_t sig_len,
336 if (sig_len < rsa->pub.size) {
338 sig_len, rsa->pub.size);
342 nettle_mpz_init_set_str_256_u(s, sig_len, sig);
/openbmc/linux/fs/nfs/blocklayout/
H A Ddev.c80 b->simple.sigs[i].sig_len = be32_to_cpup(p++); in nfs4_block_decode_volume()
81 if (b->simple.sigs[i].sig_len > PNFS_BLOCK_UUID_LEN) { in nfs4_block_decode_volume()
83 b->simple.sigs[i].sig_len); in nfs4_block_decode_volume()
87 p = xdr_inline_decode(xdr, b->simple.sigs[i].sig_len); in nfs4_block_decode_volume()
91 b->simple.sigs[i].sig_len); in nfs4_block_decode_volume()
94 (XDR_QUADLEN(b->simple.sigs[i].sig_len) << 2); in nfs4_block_decode_volume()
/openbmc/linux/include/linux/
H A Dmodule_signature.h40 __be32 sig_len; /* Length of signature data */ member
/openbmc/linux/kernel/
H A Dmodule_signature.c24 if (be32_to_cpu(ms->sig_len) >= file_len - sizeof(*ms)) in mod_check_sig()
/openbmc/google-misc/subprojects/libcr51sign/include/libcr51sign/
H A Dlibcr51sign_support.h78 const uint8_t* sig, size_t sig_len, const uint8_t* data,

12