/openbmc/linux/crypto/asymmetric_keys/ |
H A D | signature.c | 137 int verify_signature(const struct key *key, in verify_signature() function 151 if (!subtype->verify_signature) in verify_signature() 154 ret = subtype->verify_signature(key, sig); in verify_signature() 159 EXPORT_SYMBOL_GPL(verify_signature);
|
H A D | restrict.c | 106 ret = verify_signature(key, sig); in restrict_link_by_signature() 300 ret = verify_signature(key, sig); in key_or_keyring_common()
|
H A D | pkcs7_trust.c | 115 ret = verify_signature(key, sig); in pkcs7_validate_trust_one()
|
H A D | public_key.c | 471 .verify_signature = public_key_verify_signature_2,
|
H A D | asymmetric_type.c | 607 return verify_signature(params->key, &sig); in asymmetric_key_verify_signature()
|
/openbmc/openbmc/meta-ibm/recipes-phosphor/flash/ |
H A D | phosphor-software-manager_%.bbappend | 12 PACKAGECONFIG:append:ibm-ac-server = " verify_signature" 13 PACKAGECONFIG:append:p10bmc = " verify_signature"
|
/openbmc/openbmc/meta-yadro/meta-nicole/recipes-phosphor/flash/ |
H A D | phosphor-software-manager_%.bbappend | 1 PACKAGECONFIG:append = " verify_signature"
|
/openbmc/openbmc/meta-ibm/meta-romulus/recipes-phosphor/flash/ |
H A D | phosphor-software-manager_%.bbappend | 1 PACKAGECONFIG:append:romulus = " verify_signature"
|
/openbmc/google-misc/subprojects/libcr51sign/include/libcr51sign/ |
H A D | libcr51sign_support.h | 77 int verify_signature(const void* ctx, enum signature_scheme sig_scheme,
|
H A D | libcr51sign.h | 161 int (*verify_signature)(const void*, enum signature_scheme, const uint8_t*, member
|
/openbmc/linux/include/keys/ |
H A D | asymmetric-subtype.h | 43 int (*verify_signature)(const struct key *key, member
|
/openbmc/linux/include/crypto/ |
H A D | public_key.h | 109 extern int verify_signature(const struct key *,
|
/openbmc/openbmc/meta-phosphor/recipes-phosphor/flash/ |
H A D | phosphor-software-manager_git.bb | 12 PACKAGECONFIG[verify_signature] = "-Dverify-signature=enabled, -Dverify-signature=disabled" 71 ${@bb.utils.contains('PACKAGECONFIG', 'verify_signature', 'phosphor-image-signing', '', d)} \
|
/openbmc/linux/security/integrity/ |
H A D | digsig_asymmetric.c | 129 ret = verify_signature(key, &pks); in asymmetric_verify()
|
/openbmc/google-misc/subprojects/libcr51sign/ |
H A D | README.md | 38 verify_signature: The implementation should check if the signature size passed
|
/openbmc/google-misc/subprojects/libcr51sign/src/ |
H A D | libcr51sign_support.c | 119 int verify_signature(const void* ctx, enum signature_scheme sig_scheme, in verify_signature() function
|
H A D | libcr51sign.c | 602 if (!intf->verify_signature) in validate_signature() 612 rv = intf->verify_signature(ctx, scheme, signature, key_size, in validate_signature()
|
/openbmc/linux/Documentation/crypto/ |
H A D | asymmetric-keys.rst | 125 int verify_signature(const struct key *key, 188 int (*verify_signature)(const struct key *key, 223 5) verify_signature().
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlx5/core/ |
H A D | cmd.c | 297 static int verify_signature(struct mlx5_cmd_work_ent *ent) in verify_signature() function 1717 ent->ret = verify_signature(ent); in mlx5_cmd_comp_handler()
|