Home
last modified time | relevance | path

Searched refs:message (Results 1 – 25 of 27) sorted by relevance

12

/optee_os/core/drivers/crypto/crypto_api/acipher/
A Drsassa.c137 if (ps_size < ssa_data->message.length) in emsa_pkcs1_v1_5_encode_noasn1()
140 ps_size -= ssa_data->message.length; in emsa_pkcs1_v1_5_encode_noasn1()
165 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pkcs1_v1_5_encode_noasn1()
215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign()
216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign()
268 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify()
382 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_encode()
383 buf += ssa_data->message.length; in emsa_pss_encode()
677 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_verify()
678 buf += ssa_data->message.length; in emsa_pss_verify()
[all …]
A Drsa.c130 rsa_data.message.data = msg; in crypto_acipher_rsanopad_decrypt()
131 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt()
137 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt()
182 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsanopad_encrypt()
183 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt()
239 rsa_data.message.data = msg; in crypto_acipher_rsaes_decrypt()
240 rsa_data.message.length = *msg_len; in crypto_acipher_rsaes_decrypt()
250 *msg_len = rsa_data.message.length; in crypto_acipher_rsaes_decrypt()
326 rsa_data.message.length = msg_len; in crypto_acipher_rsaes_encrypt()
399 rsa_ssa.message.length = msg_len; in crypto_acipher_rsassa_sign()
[all …]
A Ddsa.c162 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_sign()
163 sdata.message.length = msg_len; in crypto_acipher_dsa_sign()
216 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_verify()
217 sdata.message.length = msg_len; in crypto_acipher_dsa_verify()
A Decc.c174 sdata.message.data = (uint8_t *)msg; in ecc_sign()
175 sdata.message.length = msg_len; in ecc_sign()
237 sdata.message.data = (uint8_t *)msg; in ecc_verify()
238 sdata.message.length = msg_len; in ecc_verify()
/optee_os/core/drivers/crypto/se050/core/
A Drsa.c622 rsa_data->message.data, in do_encrypt()
630 rsa_data->message.data, in do_encrypt()
631 rsa_data->message.length, in do_encrypt()
641 rsa_data->message.data, in do_encrypt()
642 rsa_data->message.length, in do_encrypt()
670 rsa_data->message.data, in do_decrypt()
681 rsa_data->message.data, in do_decrypt()
713 ssa_data->message.data, in do_ssa_sign()
714 ssa_data->message.length, in do_ssa_sign()
741 ssa_data->message.data, in do_ssa_verify()
[all …]
A Decc.c613 sdata->message.data, in do_sign()
614 sdata->message.length, in do_sign()
623 sdata->message.data, in do_verify()
624 sdata->message.length, in do_verify()
/optee_os/core/drivers/crypto/caam/acipher/
A Dcaam_rsa.c732 dec_data.message.data = EM.data; in do_oaep_decoding()
733 dec_data.message.length = EM.length; in do_oaep_decoding()
923 rsa_data->message.length = db_len; in do_oaep_decoding()
928 rsa_data->message.length = db_len; in do_oaep_decoding()
930 rsa_data->message.length); in do_oaep_decoding()
933 rsa_data->message.length); in do_oaep_decoding()
1024 rsa_data->message.length); in do_oaep_encoding()
1138 enc_data.message.data = EM.data; in do_oaep_encoding()
1139 enc_data.message.length = EM.length; in do_oaep_encoding()
1206 rsa_data->message.length); in do_caam_encrypt()
[all …]
A Dcaam_ecc.c363 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign()
364 sdata->message.length); in do_sign()
373 ECC_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign()
418 caam_desc_add_word(desc, sdata->message.length); in do_sign()
497 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify()
498 sdata->message.length); in do_verify()
554 caam_desc_add_word(desc, sdata->message.length); in do_verify()
A Dcaam_dsa.c517 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign()
518 sdata->message.length); in do_sign()
527 DSA_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign()
580 caam_desc_add_word(desc, sdata->message.length); in do_sign()
657 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify()
658 sdata->message.length); in do_verify()
722 caam_desc_add_word(desc, sdata->message.length); in do_verify()
/optee_os/core/drivers/crypto/crypto_api/include/
A Ddrvcrypt_acipher.h51 struct drvcrypt_buf message; /* Message to sign or signed */ member
67 struct drvcrypt_buf message; /* Message to encrypt or decrypted */ member
121 struct drvcrypt_buf message; /* Message to sign or signed */ member
/optee_os/.github/workflows/
A Dstales.yml17 …stale-issue-message: 'This issue has been marked as a stale issue because it has been open (more t…
18 …stale-pr-message: 'This pull request has been marked as a stale pull request because it has been o…
/optee_os/core/tee/
A Dtee_fs_key_manager.c43 const void *message, size_t message_size) in do_hmac() argument
48 if (!out_key || !in_key || !message) in do_hmac()
59 res = crypto_mac_update(ctx, message, message_size); in do_hmac()
A Dtee_rpmb_fs.c314 uint8_t message[RPMB_EMMC_CID_SIZE]; in tee_rpmb_key_gen() local
329 memcpy(message, rpmb_ctx->cid, RPMB_EMMC_CID_SIZE); in tee_rpmb_key_gen()
330 memset(message + RPMB_CID_PRV_OFFSET, 0, 1); in tee_rpmb_key_gen()
331 memset(message + RPMB_CID_CRC_OFFSET, 0, 1); in tee_rpmb_key_gen()
332 return huk_subkey_derive(HUK_SUBKEY_RPMB, message, sizeof(message), in tee_rpmb_key_gen()
/optee_os/out/arm/export-ta_arm64/host_include/
A Dtee_api.h260 const void *message, uint32_t messageLen,
264 const void *message, uint32_t messageLen,
/optee_os/out/arm/export-ta_arm64/include/
A Dtee_api.h260 const void *message, uint32_t messageLen,
264 const void *message, uint32_t messageLen,
/optee_os/lib/libutee/include/
A Dtee_api.h260 const void *message, uint32_t messageLen,
264 const void *message, uint32_t messageLen,
/optee_os/out/arm/export-ta_arm32/host_include/
A Dtee_api.h260 const void *message, uint32_t messageLen,
264 const void *message, uint32_t messageLen,
/optee_os/out/arm/export-ta_arm32/include/
A Dtee_api.h260 const void *message, uint32_t messageLen,
264 const void *message, uint32_t messageLen,
/optee_os/core/lib/zlib/
A Dinffast.c13 # pragma message("Assembler code may have bugs -- use at your own risk")
/optee_os/lib/libutee/
A Dtee_api_operations.c1203 const void *message, uint32_t messageLen, in TEE_MACComputeFinal() argument
1209 if (operation == TEE_HANDLE_NULL || (!message && messageLen)) { in TEE_MACComputeFinal()
1231 res = _utee_hash_final(operation->state, message, messageLen, mac, &ml); in TEE_MACComputeFinal()
1249 const void *message, uint32_t messageLen, in TEE_MACCompareFinal() argument
1271 res = TEE_MACComputeFinal(operation, message, messageLen, computed_mac, in TEE_MACCompareFinal()
/optee_os/lib/libmbedtls/mbedtls/
A DChangeLog160 applicable RFC: on an invalid Finished message value, an
739 DTLS client when parsing the Hello Verify Request message.
869 * Fix an incorrect size in a debugging message. Reported and fix
1494 check in parsing the CertificateRequest message,
1708 internal message buffers.
1974 * Deprecate usage of message digest functions that return void
3690 * Removed timing differences during SSL message decryption in
3707 * Server not always sending correct CertificateRequest message
3838 * Removed timing differences during SSL message decryption in
4068 + Added generic message digest and cipher wrapper
[all …]
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/
A Dssl.h4129 unsigned char message );
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
A Dssl.h4129 unsigned char message );
/optee_os/out/arm/export-ta_arm64/include/mbedtls/
A Dssl.h4129 unsigned char message );
/optee_os/out/arm/export-ta_arm32/include/mbedtls/
A Dssl.h4129 unsigned char message );

Completed in 89 milliseconds

12