| /openbmc/google-misc/subprojects/libcr51sign/src/ |
| H A D | libcr51sign_support.c | 144 const uint8_t* sig, size_t sig_len, const uint8_t* data, in verify_signature() argument 150 CPRINTS(ctx, "sig_len %zu sig: ", sig_len); in verify_signature() 151 for (size_t i = 0; i < sig_len; i++) in verify_signature() 218 int ret = RSA_verify(hash_nid, data, data_len, sig, sig_len, pub_rsa); in verify_signature() 229 for (size_t i = 0; i < sig_len; i++) in verify_signature() 243 CPRINTS(ctx, "rsa size %d sig_len %d\n", rsa_size, (uint32_t)sig_len); in verify_signature() 272 int modulus_len, uint32_t exponent, const uint8_t* sig, int sig_len, in verify_rsa_signature_with_modulus_and_exponent() argument 375 if (sig_len != RSA_size(rsa)) in verify_rsa_signature_with_modulus_and_exponent() 380 __FUNCTION__, sig_len, RSA_size(rsa)); in verify_rsa_signature_with_modulus_and_exponent() 396 CPRINTS(ctx, "%s: sig_len %d, sig: \n", __FUNCTION__, sig_len); in verify_rsa_signature_with_modulus_and_exponent() [all …]
|
| /openbmc/u-boot/lib/rsa/ |
| H A D | rsa-verify.c | 289 const uint32_t sig_len, const uint8_t *hash, in rsa_verify_key() argument 303 if (sig_len != (prop->num_bits / 8)) { in rsa_verify_key() 304 debug("Signature is of incorrect length %d\n", sig_len); in rsa_verify_key() 311 if (sig_len > RSA_MAX_SIG_BITS / 8) { in rsa_verify_key() 312 debug("Signature length %u exceeds maximum %d\n", sig_len, in rsa_verify_key() 317 uint8_t buf[sig_len]; in rsa_verify_key() 327 ret = rsa_mod_exp(mod_exp_dev, sig, sig_len, prop, buf); in rsa_verify_key() 329 ret = rsa_mod_exp_sw(sig, sig_len, prop, buf); in rsa_verify_key() 362 uint sig_len, int node) in rsa_verify_with_keynode() argument 393 ret = rsa_verify_key(info, &prop, sig, sig_len, hash, in rsa_verify_with_keynode() [all …]
|
| H A D | rsa-mod-exp.c | 249 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp_sw() argument 291 uint32_t buf[sig_len / sizeof(uint32_t)]; in rsa_mod_exp_sw() 293 memcpy(buf, sig, sig_len); in rsa_mod_exp_sw() 299 memcpy(out, buf, sig_len); in rsa_mod_exp_sw()
|
| H A D | rsa-sign.c | 491 uint8_t **sigp, uint *sig_len) in rsa_sign() argument 511 region_count, sigp, sig_len); in rsa_sign()
|
| /openbmc/u-boot/include/u-boot/ |
| H A D | rsa.h | 54 int region_count, uint8_t **sigp, uint *sig_len); 72 uint8_t **sigp, uint *sig_len) in rsa_sign() argument 99 uint8_t *sig, uint sig_len); 113 uint8_t *sig, uint sig_len) in rsa_verify() argument
|
| H A D | rsa-mod-exp.h | 39 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, 42 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, 74 uint32_t sig_len, struct key_prop *node,
|
| /openbmc/u-boot/drivers/crypto/fsl/ |
| H A D | fsl_rsa.c | 18 int fsl_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in fsl_mod_exp() argument 30 pkin.a_siz = sig_len; in fsl_mod_exp() 36 inline_cnstr_jobdesc_pkha_rsaexp(desc, &pkin, out, sig_len); in fsl_mod_exp()
|
| /openbmc/u-boot/drivers/crypto/rsa_mod_exp/ |
| H A D | mod_exp_uclass.c | 16 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp() argument 24 return ops->mod_exp(dev, sig, sig_len, node, out); in rsa_mod_exp()
|
| H A D | mod_exp_sw.c | 12 int mod_exp_sw(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in mod_exp_sw() argument 17 ret = rsa_mod_exp_sw(sig, sig_len, prop, out); in mod_exp_sw()
|
| /openbmc/google-misc/subprojects/libcr51sign/include/libcr51sign/ |
| H A D | libcr51sign_support.h | 81 const uint8_t* sig, size_t sig_len, const uint8_t* data, 100 int modulus_len, uint32_t exponent, const uint8_t* sig, int sig_len,
|
| H A D | libcr51sign.h | 268 int modulus_len, uint32_t exponent, const uint8_t* sig, int sig_len,
|
| /openbmc/u-boot/board/xilinx/zynq/ |
| H A D | cmds.c | 148 const u8 *sig, const u32 sig_len, const u8 *hash) in zynq_rsa_verify_key() argument 156 if (sig_len != (key->len * sizeof(u32))) { in zynq_rsa_verify_key() 157 printf("Signature is of incorrect length %d\n", sig_len); in zynq_rsa_verify_key() 162 if (sig_len > ZYNQ_RSA_SPK_SIGNATURE_SIZE) { in zynq_rsa_verify_key() 163 printf("Signature length %u exceeds maximum %d\n", sig_len, in zynq_rsa_verify_key() 168 buf = malloc(sig_len); in zynq_rsa_verify_key() 172 memcpy(buf, sig, sig_len); in zynq_rsa_verify_key()
|
| /openbmc/qemu/hw/char/ |
| H A D | riscv_htif.c | 173 uint64_t sig_len = end_sig_addr - begin_sig_addr; in htif_handle_tohost_write() local 174 char *sig_data = g_malloc(sig_len); in htif_handle_tohost_write() 176 sig_data, sig_len, MEMTXATTRS_UNSPECIFIED); in htif_handle_tohost_write() 184 for (int i = 0; i < sig_len; i += line_size) { in htif_handle_tohost_write() 186 if (i + j <= sig_len) { in htif_handle_tohost_write()
|
| /openbmc/qemu/crypto/ |
| H A D | akcipher-nettle.c.inc | 250 void *sig, size_t sig_len, Error **errp) 271 if (sig_len < rsa->priv.size) { 273 "key size: %zu", sig_len, rsa->priv.size); 304 nettle_mpz_get_str_256(sig_len, (uint8_t *)sig, s); 314 const void *sig, size_t sig_len, 336 if (sig_len < rsa->pub.size) { 338 sig_len, rsa->pub.size); 342 nettle_mpz_init_set_str_256_u(s, sig_len, sig);
|
| /openbmc/u-boot/drivers/crypto/ |
| H A D | aspeed_acry.c | 52 static int aspeed_acry_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in aspeed_acry_mod_exp() argument 82 for (i = sig_len - 1, j = 0; i >= 0; --i) { in aspeed_acry_mod_exp()
|
| /openbmc/u-boot/arch/arm/mach-mediatek/mt7623/ |
| H A D | preloader.h | 69 u32 sig_len; member
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
| H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 454 unsigned int sig_len = sizeof(sig_buf); 457 &sig_len, pk); 470 buf.put(sig_buf, sig_len);
|
| /openbmc/u-boot/include/ |
| H A D | image.h | 1191 int region_count, uint8_t **sigp, uint *sig_len); 1218 uint8_t *sig, uint sig_len);
|