/openbmc/linux/scripts/ |
H A D | extract-module-sig.pl | 59 my ($algo, $hash, $id_type, $name_len, $kid_len, $sig_len) = @info; 75 unless ($p >= $name_len + $kid_len + $sig_len); 77 $p -= $sig_len; 78 my $raw_sig = substr($buf, $p, $sig_len); 86 if ($sig_len > 0) { 87 print STDERR "Found $sig_len bytes of signature ["; 88 my $n = $sig_len > 16 ? 16 : $sig_len;
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_modsig.c | 46 size_t sig_len; in ima_read_modsig() local 64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig() 65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig() 68 hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL); in ima_read_modsig() 72 hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); in ima_read_modsig() 79 memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); in ima_read_modsig() 80 hdr->raw_pkcs7_len = sig_len; in ima_read_modsig()
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | verify_pkcs7_sig.c | 49 __be32 sig_len; /* Length of signature data */ member 56 __u32 sig_len; member 151 data_item->sig_len = st.st_size; in populate_data_item_str() 159 ret = read(fd, data_item->sig, data_item->sig_len); in populate_data_item_str() 163 if (ret != data_item->sig_len) { in populate_data_item_str() 183 int ret, fd, modlen, marker_len, sig_len; in populate_data_item_mod() local 233 sig_len = __be32_to_cpu(ms.sig_len); in populate_data_item_mod() 234 modlen -= sig_len + sizeof(ms); in populate_data_item_mod() 244 if (sig_len > sizeof(data_item->sig)) { in populate_data_item_mod() 249 memcpy(data_item->sig, mod + modlen, sig_len); in populate_data_item_mod() [all …]
|
/openbmc/u-boot/lib/rsa/ |
H A D | rsa-verify.c | 289 const uint32_t sig_len, const uint8_t *hash, in rsa_verify_key() argument 303 if (sig_len != (prop->num_bits / 8)) { in rsa_verify_key() 304 debug("Signature is of incorrect length %d\n", sig_len); in rsa_verify_key() 311 if (sig_len > RSA_MAX_SIG_BITS / 8) { in rsa_verify_key() 312 debug("Signature length %u exceeds maximum %d\n", sig_len, in rsa_verify_key() 317 uint8_t buf[sig_len]; in rsa_verify_key() 327 ret = rsa_mod_exp(mod_exp_dev, sig, sig_len, prop, buf); in rsa_verify_key() 329 ret = rsa_mod_exp_sw(sig, sig_len, prop, buf); in rsa_verify_key() 362 uint sig_len, int node) in rsa_verify_with_keynode() argument 393 ret = rsa_verify_key(info, &prop, sig, sig_len, hash, in rsa_verify_with_keynode() [all …]
|
H A D | rsa-mod-exp.c | 249 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp_sw() argument 291 uint32_t buf[sig_len / sizeof(uint32_t)]; in rsa_mod_exp_sw() 293 memcpy(buf, sig, sig_len); in rsa_mod_exp_sw() 299 memcpy(out, buf, sig_len); in rsa_mod_exp_sw()
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | verify_pefile.c | 105 ctx->sig_len = ddir->certs.size; in pefile_parse_binary() 107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary() 108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary() 129 if (ctx->sig_len < sizeof(wrapper)) { in pefile_strip_sig_wrapper() 144 if (wrapper.length > ctx->sig_len) { in pefile_strip_sig_wrapper() 146 ctx->sig_len, wrapper.length); in pefile_strip_sig_wrapper() 163 ctx->sig_len = wrapper.length; in pefile_strip_sig_wrapper() 165 ctx->sig_len -= sizeof(wrapper); in pefile_strip_sig_wrapper() 166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper() 195 if (len <= ctx->sig_len) { in pefile_strip_sig_wrapper() [all …]
|
H A D | verify_pefile.h | 19 unsigned sig_len; member
|
/openbmc/linux/kernel/module/ |
H A D | signing.c | 46 size_t sig_len, modlen = info->len; in mod_verify_sig() local 60 sig_len = be32_to_cpu(ms.sig_len); in mod_verify_sig() 61 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 64 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
/openbmc/google-misc/subprojects/libcr51sign/src/ |
H A D | libcr51sign_support.c | 120 const uint8_t* sig, size_t sig_len, const uint8_t* data, in verify_signature() argument 126 CPRINTS(ctx, "sig_len %zu sig: ", sig_len); in verify_signature() 127 for (size_t i = 0; i < sig_len; i++) in verify_signature() 194 int ret = RSA_verify(hash_nid, data, data_len, sig, sig_len, pub_rsa); in verify_signature() 205 for (size_t i = 0; i < sig_len; i++) in verify_signature() 219 CPRINTS(ctx, "rsa size %d sig_len %d\n", rsa_size, (uint32_t)sig_len); in verify_signature()
|
/openbmc/u-boot/include/u-boot/ |
H A D | rsa.h | 54 int region_count, uint8_t **sigp, uint *sig_len); 72 uint8_t **sigp, uint *sig_len) in rsa_sign() argument 99 uint8_t *sig, uint sig_len); 113 uint8_t *sig, uint sig_len) in rsa_verify() argument
|
H A D | rsa-mod-exp.h | 39 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, 42 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, 74 uint32_t sig_len, struct key_prop *node,
|
/openbmc/u-boot/drivers/crypto/fsl/ |
H A D | fsl_rsa.c | 18 int fsl_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in fsl_mod_exp() argument 30 pkin.a_siz = sig_len; in fsl_mod_exp() 36 inline_cnstr_jobdesc_pkha_rsaexp(desc, &pkin, out, sig_len); in fsl_mod_exp()
|
/openbmc/u-boot/board/xilinx/zynq/ |
H A D | cmds.c | 148 const u8 *sig, const u32 sig_len, const u8 *hash) in zynq_rsa_verify_key() argument 156 if (sig_len != (key->len * sizeof(u32))) { in zynq_rsa_verify_key() 157 printf("Signature is of incorrect length %d\n", sig_len); in zynq_rsa_verify_key() 162 if (sig_len > ZYNQ_RSA_SPK_SIGNATURE_SIZE) { in zynq_rsa_verify_key() 163 printf("Signature length %u exceeds maximum %d\n", sig_len, in zynq_rsa_verify_key() 168 buf = malloc(sig_len); in zynq_rsa_verify_key() 172 memcpy(buf, sig, sig_len); in zynq_rsa_verify_key()
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_verify_pkcs7_sig.c | 32 __u32 sig_len; member 76 if (data_val->sig_len > sizeof(data_val->sig)) in BPF_PROG() 79 bpf_dynptr_from_mem(data_val->sig, data_val->sig_len, 0, &sig_ptr); in BPF_PROG()
|
/openbmc/linux/arch/s390/kernel/ |
H A D | machine_kexec_file.c | 33 unsigned long sig_len; in s390_verify_sig() local 51 sig_len = be32_to_cpu(ms->sig_len); in s390_verify_sig() 52 if (sig_len >= kernel_len) in s390_verify_sig() 54 kernel_len -= sig_len; in s390_verify_sig() 70 kernel + kernel_len, sig_len, in s390_verify_sig() 76 kernel + kernel_len, sig_len, in s390_verify_sig()
|
/openbmc/qemu/hw/char/ |
H A D | riscv_htif.c | 182 uint64_t sig_len = end_sig_addr - begin_sig_addr; in htif_handle_tohost_write() local 183 char *sig_data = g_malloc(sig_len); in htif_handle_tohost_write() 185 sig_data, sig_len, MEMTXATTRS_UNSPECIFIED); in htif_handle_tohost_write() 193 for (int i = 0; i < sig_len; i += line_size) { in htif_handle_tohost_write() 195 if (i + j <= sig_len) { in htif_handle_tohost_write()
|
/openbmc/linux/drivers/md/ |
H A D | dm-verity-verify-sig.c | 107 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument 114 if (!sig_data || sig_len == 0) { in verity_verify_root_hash() 122 sig_len, in verity_verify_root_hash()
|
H A D | dm-verity-verify-sig.h | 24 const void *sig_data, size_t sig_len); 38 const void *sig_data, size_t sig_len) in verity_verify_root_hash() argument
|
/openbmc/u-boot/drivers/crypto/rsa_mod_exp/ |
H A D | mod_exp_uclass.c | 16 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp() argument 24 return ops->mod_exp(dev, sig, sig_len, node, out); in rsa_mod_exp()
|
H A D | mod_exp_sw.c | 12 int mod_exp_sw(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in mod_exp_sw() argument 17 ret = rsa_mod_exp_sw(sig, sig_len, prop, out); in mod_exp_sw()
|
/openbmc/qemu/crypto/ |
H A D | akcipher-nettle.c.inc | 250 void *sig, size_t sig_len, Error **errp) 271 if (sig_len < rsa->priv.size) { 273 "key size: %zu", sig_len, rsa->priv.size); 304 nettle_mpz_get_str_256(sig_len, (uint8_t *)sig, s); 314 const void *sig, size_t sig_len, 336 if (sig_len < rsa->pub.size) { 338 sig_len, rsa->pub.size); 342 nettle_mpz_init_set_str_256_u(s, sig_len, sig);
|
/openbmc/linux/fs/nfs/blocklayout/ |
H A D | dev.c | 80 b->simple.sigs[i].sig_len = be32_to_cpup(p++); in nfs4_block_decode_volume() 81 if (b->simple.sigs[i].sig_len > PNFS_BLOCK_UUID_LEN) { in nfs4_block_decode_volume() 83 b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 87 p = xdr_inline_decode(xdr, b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 91 b->simple.sigs[i].sig_len); in nfs4_block_decode_volume() 94 (XDR_QUADLEN(b->simple.sigs[i].sig_len) << 2); in nfs4_block_decode_volume()
|
/openbmc/u-boot/drivers/crypto/ |
H A D | aspeed_acry.c | 52 static int aspeed_acry_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in aspeed_acry_mod_exp() argument 82 for (i = sig_len - 1, j = 0; i >= 0; --i) { in aspeed_acry_mod_exp()
|
/openbmc/linux/include/linux/ |
H A D | module_signature.h | 40 __be32 sig_len; /* Length of signature data */ member
|
/openbmc/linux/kernel/ |
H A D | module_signature.c | 24 if (be32_to_cpu(ms->sig_len) >= file_len - sizeof(*ms)) in mod_check_sig()
|