| /kernel/linux/linux-6.6/crypto/ |
| D | ecdsa.c | 122 * Verify an ECDSA signature. 273 .cra_name = "ecdsa-nist-p384", 274 .cra_driver_name = "ecdsa-nist-p384-generic", 295 .cra_name = "ecdsa-nist-p256", 296 .cra_driver_name = "ecdsa-nist-p256-generic", 317 .cra_name = "ecdsa-nist-p192", 318 .cra_driver_name = "ecdsa-nist-p192-generic", 366 MODULE_DESCRIPTION("ECDSA generic algorithm"); 367 MODULE_ALIAS_CRYPTO("ecdsa-nist-p192"); 368 MODULE_ALIAS_CRYPTO("ecdsa-nist-p256"); [all …]
|
| D | Makefile | 55 $(obj)/ecdsa.o: $(obj)/ecdsasignature.asn1.h 56 ecdsa_generic-y += ecdsa.o
|
| /kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
| D | public_key.c | 106 } else if (strncmp(pkey->pkey_algo, "ecdsa", 5) == 0) { in software_key_determine_akcipher() 110 * ECDSA signatures are taken over a raw hash, so they don't in software_key_determine_akcipher() 113 * Unfortunately, in practice ECDSA is used with multiple SHAs, in software_key_determine_akcipher() 233 if (strncmp(pkey->pkey_algo, "ecdsa", 5) == 0) { in software_key_query() 235 * ECDSA key sizes are much smaller than RSA, and thus could in software_key_query() 244 * Verify takes ECDSA-Sig (described in RFC 5480) as input, in software_key_query() 398 * Small exception: ECDSA signatures don't specify the curve, but ECDSA in public_key_verify_signature() 400 * "ecdsa-nist-*" for the key, but "ecdsa" for the signature. in public_key_verify_signature() 404 (strncmp(pkey->pkey_algo, "ecdsa-", 6) != 0 || in public_key_verify_signature() 405 strcmp(sig->pkey_algo, "ecdsa") != 0)) in public_key_verify_signature()
|
| D | x509_cert_parser.c | 229 goto ecdsa; in x509_note_sig_algo() 233 goto ecdsa; in x509_note_sig_algo() 237 goto ecdsa; in x509_note_sig_algo() 241 goto ecdsa; in x509_note_sig_algo() 245 goto ecdsa; in x509_note_sig_algo() 275 ecdsa: in x509_note_sig_algo() 276 ctx->cert->sig->pkey_algo = "ecdsa"; in x509_note_sig_algo() 307 strcmp(ctx->cert->sig->pkey_algo, "ecdsa") == 0) { in x509_note_signature() 523 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data() 526 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data() [all …]
|
| /kernel/linux/linux-5.10/crypto/ |
| D | ecdsa.c | 135 * Verify an ECDSA signature. 282 .cra_name = "ecdsa-nist-p384", 283 .cra_driver_name = "ecdsa-nist-p384-generic", 304 .cra_name = "ecdsa-nist-p256", 305 .cra_driver_name = "ecdsa-nist-p256-generic", 326 .cra_name = "ecdsa-nist-p192", 327 .cra_driver_name = "ecdsa-nist-p192-generic", 375 MODULE_DESCRIPTION("ECDSA generic algorithm"); 376 MODULE_ALIAS_CRYPTO("ecdsa-generic");
|
| D | Makefile | 54 $(obj)/ecdsa.o: $(obj)/ecdsasignature.asn1.h 55 ecdsa_generic-y += ecdsa.o
|
| /kernel/linux/linux-6.6/tools/perf/pmu-events/arch/s390/cf_z16/ |
| D | pai_crypto.json | 909 "BriefDescription": "KDSA ECDSA VERIFY P256", 910 "PublicDescription": "KDSA-ECDSA-Verify-P256 function ending with CC=0 or CC=2" 916 "BriefDescription": "KDSA ECDSA VERIFY P384", 917 "PublicDescription": "KDSA-ECDSA-Verify-P384 function ending with CC=0 or CC=2" 923 "BriefDescription": "KDSA ECDSA VERIFY P521", 924 "PublicDescription": "KDSA-ECDSA-Verify-P521 function ending with CC=0 or CC=2" 930 "BriefDescription": "KDSA ECDSA SIGN P256", 931 "PublicDescription": "KDSA-ECDSA-Sign-P256 function ending with CC=0" 937 "BriefDescription": "KDSA ECDSA SIGN P384", 938 "PublicDescription": "KDSA-ECDSA-Sign-P384 function ending with CC=0" [all …]
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/crypto/ |
| D | aspeed,ast2600-acry.yaml | 7 title: ASPEED ACRY ECDSA/RSA Hardware Accelerator Engines 13 The ACRY ECDSA/RSA engines is designed to accelerate the throughput 14 of ECDSA/RSA signature and verification. Basically, ACRY can be
|
| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| D | public_key.c | 100 } else if (strncmp(pkey->pkey_algo, "ecdsa", 5) == 0) { in software_key_determine_akcipher() 104 * ECDSA signatures are taken over a raw hash, so they don't in software_key_determine_akcipher() 107 * Unfortunately, in practice ECDSA is used with multiple SHAs, in software_key_determine_akcipher() 379 * Small exception: ECDSA signatures don't specify the curve, but ECDSA in public_key_verify_signature() 381 * "ecdsa-nist-*" for the key, but "ecdsa" for the signature. in public_key_verify_signature() 385 (strncmp(pkey->pkey_algo, "ecdsa-", 6) != 0 || in public_key_verify_signature() 386 strcmp(sig->pkey_algo, "ecdsa") != 0)) in public_key_verify_signature()
|
| D | x509_cert_parser.c | 232 goto ecdsa; in x509_note_pkey_algo() 236 goto ecdsa; in x509_note_pkey_algo() 240 goto ecdsa; in x509_note_pkey_algo() 244 goto ecdsa; in x509_note_pkey_algo() 248 goto ecdsa; in x509_note_pkey_algo() 278 ecdsa: in x509_note_pkey_algo() 279 ctx->cert->sig->pkey_algo = "ecdsa"; in x509_note_pkey_algo() 305 strcmp(ctx->cert->sig->pkey_algo, "ecdsa") == 0) { in x509_note_signature() 508 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data() 511 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data() [all …]
|
| /kernel/linux/linux-5.10/Documentation/ABI/testing/ |
| D | debugfs-turris-mox-rwtm | 8 (Write) Message to sign with the ECDSA private key stored in 12 R and S values of the ECDSA signature, both in
|
| D | sysfs-firmware-turris-mox-rwtm | 19 Description: (Read) ECDSA public key (in pubkey hex compressed form) computed 20 as pair to the ECDSA private key burned into eFuses of this
|
| /kernel/linux/linux-6.6/Documentation/ABI/testing/ |
| D | debugfs-turris-mox-rwtm | 8 (Write) Message to sign with the ECDSA private key stored in 12 R and S values of the ECDSA signature, both in
|
| D | sysfs-firmware-turris-mox-rwtm | 19 Description: (Read) ECDSA public key (in pubkey hex compressed form) computed 20 as pair to the ECDSA private key burned into eFuses of this
|
| /kernel/linux/linux-5.10/certs/ |
| D | Kconfig | 32 bool "ECDSA" 39 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,
|
| /kernel/linux/linux-6.6/certs/ |
| D | Kconfig | 31 bool "ECDSA" 37 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,
|
| /kernel/linux/linux-5.10/include/crypto/ |
| D | sm2.h | 5 * described at https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
|
| /kernel/linux/linux-6.6/include/crypto/ |
| D | sm2.h | 5 * described at https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
|
| D | sig.h | 32 * signing algorithm e.g. "ecdsa"
|
| /kernel/linux/common_modules/code_sign/ |
| D | verify_cert_chain.c | 41 && (strncmp(cert->pub->pkey_algo, "ecdsa-", 6) != 0 in pkcs7_find_key() 42 || strcmp(cert->sig->pkey_algo, "ecdsa") != 0)) { in pkcs7_find_key()
|
| /kernel/linux/linux-5.10/drivers/bluetooth/ |
| D | btintel.c | 925 * iBT hardware variants 0x17, 0x18 onwards support both RSA and ECDSA in btintel_download_firmware_newgen() 927 * have RSA header of 644, ECDSA header of 320 bytes followed by in btintel_download_firmware_newgen() 931 * version: RSA(0x00010000) , ECDSA (0x00020000) in btintel_download_firmware_newgen() 954 /* Check if CSS header for ECDSA follows the RSA header */ in btintel_download_firmware_newgen() 958 /* Check if the CSS Header version is ECDSA(0x00020000) */ in btintel_download_firmware_newgen()
|
| /kernel/linux/linux-6.6/drivers/firmware/ |
| D | turris-mox-rwtm.c | 382 * 2. Address of the buffer where ECDSA signature value R shall be in do_sign_write() 384 * 3. Address of the buffer where ECDSA signature value S shall be in do_sign_write() 411 * Here we read the R and S values of the ECDSA signature in do_sign_write()
|
| /kernel/linux/linux-5.10/drivers/firmware/ |
| D | turris-mox-rwtm.c | 382 * 2. Address of the buffer where ECDSA signature value R shall be in do_sign_write() 384 * 3. Address of the buffer where ECDSA signature value S shall be in do_sign_write() 411 * Here we read the R and S values of the ECDSA signature in do_sign_write()
|
| /kernel/linux/linux-6.6/security/integrity/ |
| D | digsig_asymmetric.c | 114 } else if (!strncmp(pk->pkey_algo, "ecdsa-", 6)) { in asymmetric_verify()
|
| /kernel/liteos_a/lib/libmbedtls/ |
| D | BUILD.gn | 58 "$LITEOSTHIRDPARTY/mbedtls/library/ecdsa.c",
|