/linux-6.14.4/crypto/ |
D | ecdsa.c | 64 * Verify an ECDSA signature. 176 * ECDSA key sizes are much smaller than RSA, and thus could in ecdsa_digest_size() 199 .cra_name = "ecdsa-nist-p521", 200 .cra_driver_name = "ecdsa-nist-p521-generic", 222 .cra_name = "ecdsa-nist-p384", 223 .cra_driver_name = "ecdsa-nist-p384-generic", 245 .cra_name = "ecdsa-nist-p256", 246 .cra_driver_name = "ecdsa-nist-p256-generic", 268 .cra_name = "ecdsa-nist-p192", 269 .cra_driver_name = "ecdsa-nist-p192-generic", [all …]
|
D | ecdsa-x962.c | 3 * ECDSA X9.62 signature encoding 109 * Verify takes ECDSA-Sig-Value (described in RFC 5480) as input, in ecdsa_x962_max_size() 116 if (strcmp(alg->base.cra_name, "ecdsa-nist-p521") != 0) in ecdsa_x962_max_size() 201 if (strncmp(ecdsa_alg->base.cra_name, "ecdsa", 5) != 0) in ecdsa_x962_create()
|
D | Makefile | 55 $(obj)/ecdsa-x962.o: $(obj)/ecdsasignature.asn1.h 56 ecdsa_generic-y += ecdsa.o 57 ecdsa_generic-y += ecdsa-x962.o 58 ecdsa_generic-y += ecdsa-p1363.o
|
D | ecdsa-p1363.c | 3 * ECDSA P1363 signature encoding 123 if (strncmp(ecdsa_alg->base.cra_name, "ecdsa", 5) != 0) in ecdsa_p1363_create()
|
D | testmgr.c | 5184 .alg = "ecdsa-nist-p192", 5190 .alg = "ecdsa-nist-p256", 5197 .alg = "ecdsa-nist-p384", 5204 .alg = "ecdsa-nist-p521", 5500 .alg = "p1363(ecdsa-nist-p192)", 5503 .alg = "p1363(ecdsa-nist-p256)", 5510 .alg = "p1363(ecdsa-nist-p384)", 5514 .alg = "p1363(ecdsa-nist-p521)", 5753 .alg = "x962(ecdsa-nist-p192)", 5759 .alg = "x962(ecdsa-nist-p256)", [all …]
|
D | Kconfig | 292 tristate "ECDSA (Elliptic Curve Digital Signature Algorithm)" 297 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,
|
/linux-6.14.4/tools/perf/pmu-events/arch/s390/cf_z16/ |
D | pai_crypto.json | 909 "BriefDescription": "KDSA ECDSA VERIFY P256", 910 "PublicDescription": "KDSA-ECDSA-Verify-P256 function ending with CC=0 or CC=2" 916 "BriefDescription": "KDSA ECDSA VERIFY P384", 917 "PublicDescription": "KDSA-ECDSA-Verify-P384 function ending with CC=0 or CC=2" 923 "BriefDescription": "KDSA ECDSA VERIFY P521", 924 "PublicDescription": "KDSA-ECDSA-Verify-P521 function ending with CC=0 or CC=2" 930 "BriefDescription": "KDSA ECDSA SIGN P256", 931 "PublicDescription": "KDSA-ECDSA-Sign-P256 function ending with CC=0" 937 "BriefDescription": "KDSA ECDSA SIGN P384", 938 "PublicDescription": "KDSA-ECDSA-Sign-P384 function ending with CC=0" [all …]
|
/linux-6.14.4/Documentation/devicetree/bindings/crypto/ |
D | aspeed,ast2600-acry.yaml | 7 title: ASPEED ACRY ECDSA/RSA Hardware Accelerator Engines 13 The ACRY ECDSA/RSA engines is designed to accelerate the throughput 14 of ECDSA/RSA signature and verification. Basically, ACRY can be
|
/linux-6.14.4/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 211 goto ecdsa; in x509_note_sig_algo() 227 goto ecdsa; in x509_note_sig_algo() 231 goto ecdsa; in x509_note_sig_algo() 235 goto ecdsa; in x509_note_sig_algo() 239 goto ecdsa; in x509_note_sig_algo() 243 goto ecdsa; in x509_note_sig_algo() 247 goto ecdsa; in x509_note_sig_algo() 251 goto ecdsa; in x509_note_sig_algo() 272 ecdsa: in x509_note_sig_algo() 273 ctx->cert->sig->pkey_algo = "ecdsa"; in x509_note_sig_algo() [all …]
|
D | public_key.c | 112 } else if (strncmp(pkey->pkey_algo, "ecdsa", 5) == 0) { in software_key_determine_akcipher() 117 * ECDSA signatures are taken over a raw hash, so they don't in software_key_determine_akcipher() 120 * Unfortunately, in practice ECDSA is used with multiple SHAs, in software_key_determine_akcipher() 386 * Small exception: ECDSA signatures don't specify the curve, but ECDSA in public_key_verify_signature() 388 * "ecdsa-nist-*" for the key, but "ecdsa" for the signature. in public_key_verify_signature() 392 (strncmp(pkey->pkey_algo, "ecdsa-", 6) != 0 || in public_key_verify_signature() 393 strcmp(sig->pkey_algo, "ecdsa") != 0)) in public_key_verify_signature()
|
D | selftest_ecdsa.c | 2 /* Self-tests for PKCS#7 ECDSA signature verification. 15 /* P-256 ECDSA certificate */ 60 /* ECDSA signature using SHA-256 */ 81 fips_signature_selftest("ECDSA", in fips_signature_selftest_ecdsa()
|
D | pkcs7_parser.c | 292 ctx->sinfo->sig->pkey_algo = "ecdsa"; in pkcs7_sig_note_pkey_algo()
|
/linux-6.14.4/drivers/firmware/ |
D | turris-mox-rwtm.c | 80 * @has_pubkey: whether board ECDSA public key is present 81 * @pubkey: board ECDSA public key 82 * @last_sig: last ECDSA signature generated with board ECDSA private key 83 * @last_sig_done: whether the last ECDSA signing is complete 364 * 2. Address of the buffer where ECDSA signature value R shall be in do_sign_write() 366 * 3. Address of the buffer where ECDSA signature value S shall be in do_sign_write() 386 * Here we read the R and S values of the ECDSA signature in do_sign_write()
|
/linux-6.14.4/Documentation/ABI/testing/ |
D | debugfs-turris-mox-rwtm | 8 (Write) Message to sign with the ECDSA private key stored in 12 R and S values of the ECDSA signature, both in
|
D | sysfs-firmware-turris-mox-rwtm | 19 Description: (Read) ECDSA public key (in pubkey hex compressed form) computed 20 as pair to the ECDSA private key burned into eFuses of this
|
/linux-6.14.4/certs/ |
D | Kconfig | 31 bool "ECDSA" 39 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,
|
/linux-6.14.4/Documentation/devicetree/bindings/firmware/ |
D | cznic,turris-omnia-mcu.yaml | 45 14 ECDSA message signature computation done
|
/linux-6.14.4/security/integrity/ |
D | digsig_asymmetric.c | 114 } else if (!strncmp(pk->pkey_algo, "ecdsa-", 6)) { in asymmetric_verify()
|
/linux-6.14.4/Documentation/admin-guide/ |
D | module-signing.rst | 31 type. The built-in facility currently only supports the RSA & NIST P-384 ECDSA 149 One can select between RSA (``MODULE_SIG_KEY_TYPE_RSA``) and ECDSA
|
/linux-6.14.4/include/crypto/ |
D | sig.h | 82 * signing algorithm e.g. "ecdsa"
|
/linux-6.14.4/include/uapi/linux/ |
D | virtio_crypto.h | 231 struct virtio_crypto_ecdsa_session_para ecdsa; member
|
/linux-6.14.4/drivers/bluetooth/ |
D | btintel.c | 501 /* Secure boot engine type should be either 1 (ECDSA) or 0 (RSA) */ in btintel_version_info_tlv() 1188 * iBT hardware variants 0x17, 0x18 onwards support both RSA and ECDSA in btintel_download_fw_tlv() 1190 * have RSA header of 644, ECDSA header of 320 bytes followed by in btintel_download_fw_tlv() 1194 * version: RSA(0x00010000) , ECDSA (0x00020000) in btintel_download_fw_tlv() 1217 /* Check if CSS header for ECDSA follows the RSA header */ in btintel_download_fw_tlv() 1221 /* Check if the CSS Header version is ECDSA(0x00020000) */ in btintel_download_fw_tlv()
|
/linux-6.14.4/drivers/crypto/caam/ |
D | pdb.h | 432 * DSA/ECDSA Protocol Data Blocks
|
/linux-6.14.4/drivers/crypto/hisilicon/hpre/ |
D | hpre_main.c | 145 .alg = "ecdsa\n"
|
/linux-6.14.4/drivers/net/ethernet/sfc/siena/ |
D | mcdi_pcol.h | 16430 /* validation response to challenge in the form of ECDSA signature consisting 16509 * ECDSA license 16525 /* ECDSA license and signature */
|