Home
last modified time | relevance | path

Searched full:ecdsa (Results 1 – 25 of 27) sorted by relevance

12

/linux-6.14.4/crypto/
Decdsa.c64 * Verify an ECDSA signature.
176 * ECDSA key sizes are much smaller than RSA, and thus could in ecdsa_digest_size()
199 .cra_name = "ecdsa-nist-p521",
200 .cra_driver_name = "ecdsa-nist-p521-generic",
222 .cra_name = "ecdsa-nist-p384",
223 .cra_driver_name = "ecdsa-nist-p384-generic",
245 .cra_name = "ecdsa-nist-p256",
246 .cra_driver_name = "ecdsa-nist-p256-generic",
268 .cra_name = "ecdsa-nist-p192",
269 .cra_driver_name = "ecdsa-nist-p192-generic",
[all …]
Decdsa-x962.c3 * ECDSA X9.62 signature encoding
109 * Verify takes ECDSA-Sig-Value (described in RFC 5480) as input, in ecdsa_x962_max_size()
116 if (strcmp(alg->base.cra_name, "ecdsa-nist-p521") != 0) in ecdsa_x962_max_size()
201 if (strncmp(ecdsa_alg->base.cra_name, "ecdsa", 5) != 0) in ecdsa_x962_create()
DMakefile55 $(obj)/ecdsa-x962.o: $(obj)/ecdsasignature.asn1.h
56 ecdsa_generic-y += ecdsa.o
57 ecdsa_generic-y += ecdsa-x962.o
58 ecdsa_generic-y += ecdsa-p1363.o
Decdsa-p1363.c3 * ECDSA P1363 signature encoding
123 if (strncmp(ecdsa_alg->base.cra_name, "ecdsa", 5) != 0) in ecdsa_p1363_create()
Dtestmgr.c5184 .alg = "ecdsa-nist-p192",
5190 .alg = "ecdsa-nist-p256",
5197 .alg = "ecdsa-nist-p384",
5204 .alg = "ecdsa-nist-p521",
5500 .alg = "p1363(ecdsa-nist-p192)",
5503 .alg = "p1363(ecdsa-nist-p256)",
5510 .alg = "p1363(ecdsa-nist-p384)",
5514 .alg = "p1363(ecdsa-nist-p521)",
5753 .alg = "x962(ecdsa-nist-p192)",
5759 .alg = "x962(ecdsa-nist-p256)",
[all …]
DKconfig292 tristate "ECDSA (Elliptic Curve Digital Signature Algorithm)"
297 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,
/linux-6.14.4/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json909 "BriefDescription": "KDSA ECDSA VERIFY P256",
910 "PublicDescription": "KDSA-ECDSA-Verify-P256 function ending with CC=0 or CC=2"
916 "BriefDescription": "KDSA ECDSA VERIFY P384",
917 "PublicDescription": "KDSA-ECDSA-Verify-P384 function ending with CC=0 or CC=2"
923 "BriefDescription": "KDSA ECDSA VERIFY P521",
924 "PublicDescription": "KDSA-ECDSA-Verify-P521 function ending with CC=0 or CC=2"
930 "BriefDescription": "KDSA ECDSA SIGN P256",
931 "PublicDescription": "KDSA-ECDSA-Sign-P256 function ending with CC=0"
937 "BriefDescription": "KDSA ECDSA SIGN P384",
938 "PublicDescription": "KDSA-ECDSA-Sign-P384 function ending with CC=0"
[all …]
/linux-6.14.4/Documentation/devicetree/bindings/crypto/
Daspeed,ast2600-acry.yaml7 title: ASPEED ACRY ECDSA/RSA Hardware Accelerator Engines
13 The ACRY ECDSA/RSA engines is designed to accelerate the throughput
14 of ECDSA/RSA signature and verification. Basically, ACRY can be
/linux-6.14.4/crypto/asymmetric_keys/
Dx509_cert_parser.c211 goto ecdsa; in x509_note_sig_algo()
227 goto ecdsa; in x509_note_sig_algo()
231 goto ecdsa; in x509_note_sig_algo()
235 goto ecdsa; in x509_note_sig_algo()
239 goto ecdsa; in x509_note_sig_algo()
243 goto ecdsa; in x509_note_sig_algo()
247 goto ecdsa; in x509_note_sig_algo()
251 goto ecdsa; in x509_note_sig_algo()
272 ecdsa: in x509_note_sig_algo()
273 ctx->cert->sig->pkey_algo = "ecdsa"; in x509_note_sig_algo()
[all …]
Dpublic_key.c112 } else if (strncmp(pkey->pkey_algo, "ecdsa", 5) == 0) { in software_key_determine_akcipher()
117 * ECDSA signatures are taken over a raw hash, so they don't in software_key_determine_akcipher()
120 * Unfortunately, in practice ECDSA is used with multiple SHAs, in software_key_determine_akcipher()
386 * Small exception: ECDSA signatures don't specify the curve, but ECDSA in public_key_verify_signature()
388 * "ecdsa-nist-*" for the key, but "ecdsa" for the signature. in public_key_verify_signature()
392 (strncmp(pkey->pkey_algo, "ecdsa-", 6) != 0 || in public_key_verify_signature()
393 strcmp(sig->pkey_algo, "ecdsa") != 0)) in public_key_verify_signature()
Dselftest_ecdsa.c2 /* Self-tests for PKCS#7 ECDSA signature verification.
15 /* P-256 ECDSA certificate */
60 /* ECDSA signature using SHA-256 */
81 fips_signature_selftest("ECDSA", in fips_signature_selftest_ecdsa()
Dpkcs7_parser.c292 ctx->sinfo->sig->pkey_algo = "ecdsa"; in pkcs7_sig_note_pkey_algo()
/linux-6.14.4/drivers/firmware/
Dturris-mox-rwtm.c80 * @has_pubkey: whether board ECDSA public key is present
81 * @pubkey: board ECDSA public key
82 * @last_sig: last ECDSA signature generated with board ECDSA private key
83 * @last_sig_done: whether the last ECDSA signing is complete
364 * 2. Address of the buffer where ECDSA signature value R shall be in do_sign_write()
366 * 3. Address of the buffer where ECDSA signature value S shall be in do_sign_write()
386 * Here we read the R and S values of the ECDSA signature in do_sign_write()
/linux-6.14.4/Documentation/ABI/testing/
Ddebugfs-turris-mox-rwtm8 (Write) Message to sign with the ECDSA private key stored in
12 R and S values of the ECDSA signature, both in
Dsysfs-firmware-turris-mox-rwtm19 Description: (Read) ECDSA public key (in pubkey hex compressed form) computed
20 as pair to the ECDSA private key burned into eFuses of this
/linux-6.14.4/certs/
DKconfig31 bool "ECDSA"
39 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,
/linux-6.14.4/Documentation/devicetree/bindings/firmware/
Dcznic,turris-omnia-mcu.yaml45 14 ECDSA message signature computation done
/linux-6.14.4/security/integrity/
Ddigsig_asymmetric.c114 } else if (!strncmp(pk->pkey_algo, "ecdsa-", 6)) { in asymmetric_verify()
/linux-6.14.4/Documentation/admin-guide/
Dmodule-signing.rst31 type. The built-in facility currently only supports the RSA & NIST P-384 ECDSA
149 One can select between RSA (``MODULE_SIG_KEY_TYPE_RSA``) and ECDSA
/linux-6.14.4/include/crypto/
Dsig.h82 * signing algorithm e.g. "ecdsa"
/linux-6.14.4/include/uapi/linux/
Dvirtio_crypto.h231 struct virtio_crypto_ecdsa_session_para ecdsa; member
/linux-6.14.4/drivers/bluetooth/
Dbtintel.c501 /* Secure boot engine type should be either 1 (ECDSA) or 0 (RSA) */ in btintel_version_info_tlv()
1188 * iBT hardware variants 0x17, 0x18 onwards support both RSA and ECDSA in btintel_download_fw_tlv()
1190 * have RSA header of 644, ECDSA header of 320 bytes followed by in btintel_download_fw_tlv()
1194 * version: RSA(0x00010000) , ECDSA (0x00020000) in btintel_download_fw_tlv()
1217 /* Check if CSS header for ECDSA follows the RSA header */ in btintel_download_fw_tlv()
1221 /* Check if the CSS Header version is ECDSA(0x00020000) */ in btintel_download_fw_tlv()
/linux-6.14.4/drivers/crypto/caam/
Dpdb.h432 * DSA/ECDSA Protocol Data Blocks
/linux-6.14.4/drivers/crypto/hisilicon/hpre/
Dhpre_main.c145 .alg = "ecdsa\n"
/linux-6.14.4/drivers/net/ethernet/sfc/siena/
Dmcdi_pcol.h16430 /* validation response to challenge in the form of ECDSA signature consisting
16509 * ECDSA license
16525 /* ECDSA license and signature */

12