Home
last modified time | relevance | path

Searched refs:sig_len (Results 1 – 18 of 18) sorted by relevance

/openbmc/google-misc/subprojects/libcr51sign/src/
H A Dlibcr51sign_support.c144 const uint8_t* sig, size_t sig_len, const uint8_t* data, in verify_signature() argument
150 CPRINTS(ctx, "sig_len %zu sig: ", sig_len); in verify_signature()
151 for (size_t i = 0; i < sig_len; i++) in verify_signature()
218 int ret = RSA_verify(hash_nid, data, data_len, sig, sig_len, pub_rsa); in verify_signature()
229 for (size_t i = 0; i < sig_len; i++) in verify_signature()
243 CPRINTS(ctx, "rsa size %d sig_len %d\n", rsa_size, (uint32_t)sig_len); in verify_signature()
272 int modulus_len, uint32_t exponent, const uint8_t* sig, int sig_len, in verify_rsa_signature_with_modulus_and_exponent() argument
375 if (sig_len != RSA_size(rsa)) in verify_rsa_signature_with_modulus_and_exponent()
380 __FUNCTION__, sig_len, RSA_size(rsa)); in verify_rsa_signature_with_modulus_and_exponent()
396 CPRINTS(ctx, "%s: sig_len %d, sig: \n", __FUNCTION__, sig_len); in verify_rsa_signature_with_modulus_and_exponent()
[all …]
/openbmc/u-boot/lib/rsa/
H A Drsa-verify.c289 const uint32_t sig_len, const uint8_t *hash, in rsa_verify_key() argument
303 if (sig_len != (prop->num_bits / 8)) { in rsa_verify_key()
304 debug("Signature is of incorrect length %d\n", sig_len); in rsa_verify_key()
311 if (sig_len > RSA_MAX_SIG_BITS / 8) { in rsa_verify_key()
312 debug("Signature length %u exceeds maximum %d\n", sig_len, in rsa_verify_key()
317 uint8_t buf[sig_len]; in rsa_verify_key()
327 ret = rsa_mod_exp(mod_exp_dev, sig, sig_len, prop, buf); in rsa_verify_key()
329 ret = rsa_mod_exp_sw(sig, sig_len, prop, buf); in rsa_verify_key()
362 uint sig_len, int node) in rsa_verify_with_keynode() argument
393 ret = rsa_verify_key(info, &prop, sig, sig_len, hash, in rsa_verify_with_keynode()
[all …]
H A Drsa-mod-exp.c249 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp_sw() argument
291 uint32_t buf[sig_len / sizeof(uint32_t)]; in rsa_mod_exp_sw()
293 memcpy(buf, sig, sig_len); in rsa_mod_exp_sw()
299 memcpy(out, buf, sig_len); in rsa_mod_exp_sw()
H A Drsa-sign.c491 uint8_t **sigp, uint *sig_len) in rsa_sign() argument
511 region_count, sigp, sig_len); in rsa_sign()
/openbmc/u-boot/include/u-boot/
H A Drsa.h54 int region_count, uint8_t **sigp, uint *sig_len);
72 uint8_t **sigp, uint *sig_len) in rsa_sign() argument
99 uint8_t *sig, uint sig_len);
113 uint8_t *sig, uint sig_len) in rsa_verify() argument
H A Drsa-mod-exp.h39 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len,
42 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len,
74 uint32_t sig_len, struct key_prop *node,
/openbmc/u-boot/drivers/crypto/fsl/
H A Dfsl_rsa.c18 int fsl_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in fsl_mod_exp() argument
30 pkin.a_siz = sig_len; in fsl_mod_exp()
36 inline_cnstr_jobdesc_pkha_rsaexp(desc, &pkin, out, sig_len); in fsl_mod_exp()
/openbmc/u-boot/drivers/crypto/rsa_mod_exp/
H A Dmod_exp_uclass.c16 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp() argument
24 return ops->mod_exp(dev, sig, sig_len, node, out); in rsa_mod_exp()
H A Dmod_exp_sw.c12 int mod_exp_sw(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in mod_exp_sw() argument
17 ret = rsa_mod_exp_sw(sig, sig_len, prop, out); in mod_exp_sw()
/openbmc/google-misc/subprojects/libcr51sign/include/libcr51sign/
H A Dlibcr51sign_support.h81 const uint8_t* sig, size_t sig_len, const uint8_t* data,
100 int modulus_len, uint32_t exponent, const uint8_t* sig, int sig_len,
H A Dlibcr51sign.h268 int modulus_len, uint32_t exponent, const uint8_t* sig, int sig_len,
/openbmc/u-boot/board/xilinx/zynq/
H A Dcmds.c148 const u8 *sig, const u32 sig_len, const u8 *hash) in zynq_rsa_verify_key() argument
156 if (sig_len != (key->len * sizeof(u32))) { in zynq_rsa_verify_key()
157 printf("Signature is of incorrect length %d\n", sig_len); in zynq_rsa_verify_key()
162 if (sig_len > ZYNQ_RSA_SPK_SIGNATURE_SIZE) { in zynq_rsa_verify_key()
163 printf("Signature length %u exceeds maximum %d\n", sig_len, in zynq_rsa_verify_key()
168 buf = malloc(sig_len); in zynq_rsa_verify_key()
172 memcpy(buf, sig, sig_len); in zynq_rsa_verify_key()
/openbmc/qemu/hw/char/
H A Driscv_htif.c173 uint64_t sig_len = end_sig_addr - begin_sig_addr; in htif_handle_tohost_write() local
174 char *sig_data = g_malloc(sig_len); in htif_handle_tohost_write()
176 sig_data, sig_len, MEMTXATTRS_UNSPECIFIED); in htif_handle_tohost_write()
184 for (int i = 0; i < sig_len; i += line_size) { in htif_handle_tohost_write()
186 if (i + j <= sig_len) { in htif_handle_tohost_write()
/openbmc/qemu/crypto/
H A Dakcipher-nettle.c.inc250 void *sig, size_t sig_len, Error **errp)
271 if (sig_len < rsa->priv.size) {
273 "key size: %zu", sig_len, rsa->priv.size);
304 nettle_mpz_get_str_256(sig_len, (uint8_t *)sig, s);
314 const void *sig, size_t sig_len,
336 if (sig_len < rsa->pub.size) {
338 sig_len, rsa->pub.size);
342 nettle_mpz_init_set_str_256_u(s, sig_len, sig);
/openbmc/u-boot/drivers/crypto/
H A Daspeed_acry.c52 static int aspeed_acry_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in aspeed_acry_mod_exp() argument
82 for (i = sig_len - 1, j = 0; i >= 0; --i) { in aspeed_acry_mod_exp()
/openbmc/u-boot/arch/arm/mach-mediatek/mt7623/
H A Dpreloader.h69 u32 sig_len; member
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch454 unsigned int sig_len = sizeof(sig_buf);
457 &sig_len, pk);
470 buf.put(sig_buf, sig_len);
/openbmc/u-boot/include/
H A Dimage.h1191 int region_count, uint8_t **sigp, uint *sig_len);
1218 uint8_t *sig, uint sig_len);