/optee_os/core/drivers/crypto/crypto_api/acipher/ |
A D | rsassa.c | 137 if (ps_size < ssa_data->message.length) in emsa_pkcs1_v1_5_encode_noasn1() 140 ps_size -= ssa_data->message.length; in emsa_pkcs1_v1_5_encode_noasn1() 165 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pkcs1_v1_5_encode_noasn1() 215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign() 216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign() 268 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify() 382 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_encode() 383 buf += ssa_data->message.length; in emsa_pss_encode() 677 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_verify() 678 buf += ssa_data->message.length; in emsa_pss_verify() [all …]
|
A D | rsa.c | 130 rsa_data.message.data = msg; in crypto_acipher_rsanopad_decrypt() 131 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt() 137 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt() 182 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsanopad_encrypt() 183 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt() 239 rsa_data.message.data = msg; in crypto_acipher_rsaes_decrypt() 240 rsa_data.message.length = *msg_len; in crypto_acipher_rsaes_decrypt() 250 *msg_len = rsa_data.message.length; in crypto_acipher_rsaes_decrypt() 326 rsa_data.message.length = msg_len; in crypto_acipher_rsaes_encrypt() 399 rsa_ssa.message.length = msg_len; in crypto_acipher_rsassa_sign() [all …]
|
A D | dsa.c | 162 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_sign() 163 sdata.message.length = msg_len; in crypto_acipher_dsa_sign() 216 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_verify() 217 sdata.message.length = msg_len; in crypto_acipher_dsa_verify()
|
A D | ecc.c | 174 sdata.message.data = (uint8_t *)msg; in ecc_sign() 175 sdata.message.length = msg_len; in ecc_sign() 237 sdata.message.data = (uint8_t *)msg; in ecc_verify() 238 sdata.message.length = msg_len; in ecc_verify()
|
/optee_os/core/drivers/crypto/se050/core/ |
A D | rsa.c | 622 rsa_data->message.data, in do_encrypt() 630 rsa_data->message.data, in do_encrypt() 631 rsa_data->message.length, in do_encrypt() 641 rsa_data->message.data, in do_encrypt() 642 rsa_data->message.length, in do_encrypt() 670 rsa_data->message.data, in do_decrypt() 681 rsa_data->message.data, in do_decrypt() 713 ssa_data->message.data, in do_ssa_sign() 714 ssa_data->message.length, in do_ssa_sign() 741 ssa_data->message.data, in do_ssa_verify() [all …]
|
A D | ecc.c | 613 sdata->message.data, in do_sign() 614 sdata->message.length, in do_sign() 623 sdata->message.data, in do_verify() 624 sdata->message.length, in do_verify()
|
/optee_os/core/drivers/crypto/caam/acipher/ |
A D | caam_rsa.c | 732 dec_data.message.data = EM.data; in do_oaep_decoding() 733 dec_data.message.length = EM.length; in do_oaep_decoding() 923 rsa_data->message.length = db_len; in do_oaep_decoding() 928 rsa_data->message.length = db_len; in do_oaep_decoding() 930 rsa_data->message.length); in do_oaep_decoding() 933 rsa_data->message.length); in do_oaep_decoding() 1024 rsa_data->message.length); in do_oaep_encoding() 1138 enc_data.message.data = EM.data; in do_oaep_encoding() 1139 enc_data.message.length = EM.length; in do_oaep_encoding() 1206 rsa_data->message.length); in do_caam_encrypt() [all …]
|
A D | caam_ecc.c | 363 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign() 364 sdata->message.length); in do_sign() 373 ECC_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign() 418 caam_desc_add_word(desc, sdata->message.length); in do_sign() 497 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify() 498 sdata->message.length); in do_verify() 554 caam_desc_add_word(desc, sdata->message.length); in do_verify()
|
A D | caam_dsa.c | 517 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign() 518 sdata->message.length); in do_sign() 527 DSA_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign() 580 caam_desc_add_word(desc, sdata->message.length); in do_sign() 657 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify() 658 sdata->message.length); in do_verify() 722 caam_desc_add_word(desc, sdata->message.length); in do_verify()
|
/optee_os/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_acipher.h | 51 struct drvcrypt_buf message; /* Message to sign or signed */ member 67 struct drvcrypt_buf message; /* Message to encrypt or decrypted */ member 121 struct drvcrypt_buf message; /* Message to sign or signed */ member
|
/optee_os/.github/workflows/ |
A D | stales.yml | 17 …stale-issue-message: 'This issue has been marked as a stale issue because it has been open (more t… 18 …stale-pr-message: 'This pull request has been marked as a stale pull request because it has been o…
|
/optee_os/core/tee/ |
A D | tee_fs_key_manager.c | 43 const void *message, size_t message_size) in do_hmac() argument 48 if (!out_key || !in_key || !message) in do_hmac() 59 res = crypto_mac_update(ctx, message, message_size); in do_hmac()
|
A D | tee_rpmb_fs.c | 314 uint8_t message[RPMB_EMMC_CID_SIZE]; in tee_rpmb_key_gen() local 329 memcpy(message, rpmb_ctx->cid, RPMB_EMMC_CID_SIZE); in tee_rpmb_key_gen() 330 memset(message + RPMB_CID_PRV_OFFSET, 0, 1); in tee_rpmb_key_gen() 331 memset(message + RPMB_CID_CRC_OFFSET, 0, 1); in tee_rpmb_key_gen() 332 return huk_subkey_derive(HUK_SUBKEY_RPMB, message, sizeof(message), in tee_rpmb_key_gen()
|
/optee_os/out/arm/export-ta_arm64/host_include/ |
A D | tee_api.h | 260 const void *message, uint32_t messageLen, 264 const void *message, uint32_t messageLen,
|
/optee_os/out/arm/export-ta_arm64/include/ |
A D | tee_api.h | 260 const void *message, uint32_t messageLen, 264 const void *message, uint32_t messageLen,
|
/optee_os/lib/libutee/include/ |
A D | tee_api.h | 260 const void *message, uint32_t messageLen, 264 const void *message, uint32_t messageLen,
|
/optee_os/out/arm/export-ta_arm32/host_include/ |
A D | tee_api.h | 260 const void *message, uint32_t messageLen, 264 const void *message, uint32_t messageLen,
|
/optee_os/out/arm/export-ta_arm32/include/ |
A D | tee_api.h | 260 const void *message, uint32_t messageLen, 264 const void *message, uint32_t messageLen,
|
/optee_os/core/lib/zlib/ |
A D | inffast.c | 13 # pragma message("Assembler code may have bugs -- use at your own risk")
|
/optee_os/lib/libutee/ |
A D | tee_api_operations.c | 1203 const void *message, uint32_t messageLen, in TEE_MACComputeFinal() argument 1209 if (operation == TEE_HANDLE_NULL || (!message && messageLen)) { in TEE_MACComputeFinal() 1231 res = _utee_hash_final(operation->state, message, messageLen, mac, &ml); in TEE_MACComputeFinal() 1249 const void *message, uint32_t messageLen, in TEE_MACCompareFinal() argument 1271 res = TEE_MACComputeFinal(operation, message, messageLen, computed_mac, in TEE_MACCompareFinal()
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 160 applicable RFC: on an invalid Finished message value, an 739 DTLS client when parsing the Hello Verify Request message. 869 * Fix an incorrect size in a debugging message. Reported and fix 1494 check in parsing the CertificateRequest message, 1708 internal message buffers. 1974 * Deprecate usage of message digest functions that return void 3690 * Removed timing differences during SSL message decryption in 3707 * Server not always sending correct CertificateRequest message 3838 * Removed timing differences during SSL message decryption in 4068 + Added generic message digest and cipher wrapper [all …]
|
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/ |
A D | ssl.h | 4129 unsigned char message );
|
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | ssl.h | 4129 unsigned char message );
|
/optee_os/out/arm/export-ta_arm64/include/mbedtls/ |
A D | ssl.h | 4129 unsigned char message );
|
/optee_os/out/arm/export-ta_arm32/include/mbedtls/ |
A D | ssl.h | 4129 unsigned char message );
|