Home
last modified time | relevance | path

Searched full:ecdsa (Results 1 – 25 of 44) sorted by relevance

12

/kernel/linux/linux-6.6/crypto/
Decdsa.c122 * Verify an ECDSA signature.
273 .cra_name = "ecdsa-nist-p384",
274 .cra_driver_name = "ecdsa-nist-p384-generic",
295 .cra_name = "ecdsa-nist-p256",
296 .cra_driver_name = "ecdsa-nist-p256-generic",
317 .cra_name = "ecdsa-nist-p192",
318 .cra_driver_name = "ecdsa-nist-p192-generic",
366 MODULE_DESCRIPTION("ECDSA generic algorithm");
367 MODULE_ALIAS_CRYPTO("ecdsa-nist-p192");
368 MODULE_ALIAS_CRYPTO("ecdsa-nist-p256");
[all …]
DMakefile55 $(obj)/ecdsa.o: $(obj)/ecdsasignature.asn1.h
56 ecdsa_generic-y += ecdsa.o
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
Dpublic_key.c106 } else if (strncmp(pkey->pkey_algo, "ecdsa", 5) == 0) { in software_key_determine_akcipher()
110 * ECDSA signatures are taken over a raw hash, so they don't in software_key_determine_akcipher()
113 * Unfortunately, in practice ECDSA is used with multiple SHAs, in software_key_determine_akcipher()
233 if (strncmp(pkey->pkey_algo, "ecdsa", 5) == 0) { in software_key_query()
235 * ECDSA key sizes are much smaller than RSA, and thus could in software_key_query()
244 * Verify takes ECDSA-Sig (described in RFC 5480) as input, in software_key_query()
398 * Small exception: ECDSA signatures don't specify the curve, but ECDSA in public_key_verify_signature()
400 * "ecdsa-nist-*" for the key, but "ecdsa" for the signature. in public_key_verify_signature()
404 (strncmp(pkey->pkey_algo, "ecdsa-", 6) != 0 || in public_key_verify_signature()
405 strcmp(sig->pkey_algo, "ecdsa") != 0)) in public_key_verify_signature()
Dx509_cert_parser.c229 goto ecdsa; in x509_note_sig_algo()
233 goto ecdsa; in x509_note_sig_algo()
237 goto ecdsa; in x509_note_sig_algo()
241 goto ecdsa; in x509_note_sig_algo()
245 goto ecdsa; in x509_note_sig_algo()
275 ecdsa: in x509_note_sig_algo()
276 ctx->cert->sig->pkey_algo = "ecdsa"; in x509_note_sig_algo()
307 strcmp(ctx->cert->sig->pkey_algo, "ecdsa") == 0) { in x509_note_signature()
523 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data()
526 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data()
[all …]
/kernel/linux/linux-5.10/crypto/
Decdsa.c135 * Verify an ECDSA signature.
282 .cra_name = "ecdsa-nist-p384",
283 .cra_driver_name = "ecdsa-nist-p384-generic",
304 .cra_name = "ecdsa-nist-p256",
305 .cra_driver_name = "ecdsa-nist-p256-generic",
326 .cra_name = "ecdsa-nist-p192",
327 .cra_driver_name = "ecdsa-nist-p192-generic",
375 MODULE_DESCRIPTION("ECDSA generic algorithm");
376 MODULE_ALIAS_CRYPTO("ecdsa-generic");
DMakefile54 $(obj)/ecdsa.o: $(obj)/ecdsasignature.asn1.h
55 ecdsa_generic-y += ecdsa.o
/kernel/linux/linux-6.6/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json909 "BriefDescription": "KDSA ECDSA VERIFY P256",
910 "PublicDescription": "KDSA-ECDSA-Verify-P256 function ending with CC=0 or CC=2"
916 "BriefDescription": "KDSA ECDSA VERIFY P384",
917 "PublicDescription": "KDSA-ECDSA-Verify-P384 function ending with CC=0 or CC=2"
923 "BriefDescription": "KDSA ECDSA VERIFY P521",
924 "PublicDescription": "KDSA-ECDSA-Verify-P521 function ending with CC=0 or CC=2"
930 "BriefDescription": "KDSA ECDSA SIGN P256",
931 "PublicDescription": "KDSA-ECDSA-Sign-P256 function ending with CC=0"
937 "BriefDescription": "KDSA ECDSA SIGN P384",
938 "PublicDescription": "KDSA-ECDSA-Sign-P384 function ending with CC=0"
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/crypto/
Daspeed,ast2600-acry.yaml7 title: ASPEED ACRY ECDSA/RSA Hardware Accelerator Engines
13 The ACRY ECDSA/RSA engines is designed to accelerate the throughput
14 of ECDSA/RSA signature and verification. Basically, ACRY can be
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
Dpublic_key.c100 } else if (strncmp(pkey->pkey_algo, "ecdsa", 5) == 0) { in software_key_determine_akcipher()
104 * ECDSA signatures are taken over a raw hash, so they don't in software_key_determine_akcipher()
107 * Unfortunately, in practice ECDSA is used with multiple SHAs, in software_key_determine_akcipher()
379 * Small exception: ECDSA signatures don't specify the curve, but ECDSA in public_key_verify_signature()
381 * "ecdsa-nist-*" for the key, but "ecdsa" for the signature. in public_key_verify_signature()
385 (strncmp(pkey->pkey_algo, "ecdsa-", 6) != 0 || in public_key_verify_signature()
386 strcmp(sig->pkey_algo, "ecdsa") != 0)) in public_key_verify_signature()
Dx509_cert_parser.c232 goto ecdsa; in x509_note_pkey_algo()
236 goto ecdsa; in x509_note_pkey_algo()
240 goto ecdsa; in x509_note_pkey_algo()
244 goto ecdsa; in x509_note_pkey_algo()
248 goto ecdsa; in x509_note_pkey_algo()
278 ecdsa: in x509_note_pkey_algo()
279 ctx->cert->sig->pkey_algo = "ecdsa"; in x509_note_pkey_algo()
305 strcmp(ctx->cert->sig->pkey_algo, "ecdsa") == 0) { in x509_note_signature()
508 ctx->cert->pub->pkey_algo = "ecdsa-nist-p192"; in x509_extract_key_data()
511 ctx->cert->pub->pkey_algo = "ecdsa-nist-p256"; in x509_extract_key_data()
[all …]
/kernel/linux/linux-5.10/Documentation/ABI/testing/
Ddebugfs-turris-mox-rwtm8 (Write) Message to sign with the ECDSA private key stored in
12 R and S values of the ECDSA signature, both in
Dsysfs-firmware-turris-mox-rwtm19 Description: (Read) ECDSA public key (in pubkey hex compressed form) computed
20 as pair to the ECDSA private key burned into eFuses of this
/kernel/linux/linux-6.6/Documentation/ABI/testing/
Ddebugfs-turris-mox-rwtm8 (Write) Message to sign with the ECDSA private key stored in
12 R and S values of the ECDSA signature, both in
Dsysfs-firmware-turris-mox-rwtm19 Description: (Read) ECDSA public key (in pubkey hex compressed form) computed
20 as pair to the ECDSA private key burned into eFuses of this
/kernel/linux/linux-5.10/certs/
DKconfig32 bool "ECDSA"
39 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,
/kernel/linux/linux-6.6/certs/
DKconfig31 bool "ECDSA"
37 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,
/kernel/linux/linux-5.10/include/crypto/
Dsm2.h5 * described at https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
/kernel/linux/linux-6.6/include/crypto/
Dsm2.h5 * described at https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
Dsig.h32 * signing algorithm e.g. "ecdsa"
/kernel/linux/common_modules/code_sign/
Dverify_cert_chain.c41 && (strncmp(cert->pub->pkey_algo, "ecdsa-", 6) != 0 in pkcs7_find_key()
42 || strcmp(cert->sig->pkey_algo, "ecdsa") != 0)) { in pkcs7_find_key()
/kernel/linux/linux-5.10/drivers/bluetooth/
Dbtintel.c925 * iBT hardware variants 0x17, 0x18 onwards support both RSA and ECDSA in btintel_download_firmware_newgen()
927 * have RSA header of 644, ECDSA header of 320 bytes followed by in btintel_download_firmware_newgen()
931 * version: RSA(0x00010000) , ECDSA (0x00020000) in btintel_download_firmware_newgen()
954 /* Check if CSS header for ECDSA follows the RSA header */ in btintel_download_firmware_newgen()
958 /* Check if the CSS Header version is ECDSA(0x00020000) */ in btintel_download_firmware_newgen()
/kernel/linux/linux-6.6/drivers/firmware/
Dturris-mox-rwtm.c382 * 2. Address of the buffer where ECDSA signature value R shall be in do_sign_write()
384 * 3. Address of the buffer where ECDSA signature value S shall be in do_sign_write()
411 * Here we read the R and S values of the ECDSA signature in do_sign_write()
/kernel/linux/linux-5.10/drivers/firmware/
Dturris-mox-rwtm.c382 * 2. Address of the buffer where ECDSA signature value R shall be in do_sign_write()
384 * 3. Address of the buffer where ECDSA signature value S shall be in do_sign_write()
411 * Here we read the R and S values of the ECDSA signature in do_sign_write()
/kernel/linux/linux-6.6/security/integrity/
Ddigsig_asymmetric.c114 } else if (!strncmp(pk->pkey_algo, "ecdsa-", 6)) { in asymmetric_verify()
/kernel/liteos_a/lib/libmbedtls/
DBUILD.gn58 "$LITEOSTHIRDPARTY/mbedtls/library/ecdsa.c",

12