/optee_os/core/drivers/crypto/crypto_api/acipher/ |
A D | rsa.c | 108 size_t *msg_len) in crypto_acipher_rsanopad_decrypt() argument 118 key, msg, msg_len ? *msg_len : 0, in crypto_acipher_rsanopad_decrypt() 131 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt() 137 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt() 157 key, msg, msg_len, in crypto_acipher_rsanopad_encrypt() 183 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt() 202 size_t *msg_len) in crypto_acipher_rsaes_decrypt() argument 213 key, msg, msg_len ? *msg_len : 0, in crypto_acipher_rsaes_decrypt() 273 key, msg, msg_len, in crypto_acipher_rsaes_encrypt() 318 if (msg_len > in crypto_acipher_rsaes_encrypt() [all …]
|
A D | dsa.c | 122 const uint8_t *msg, size_t msg_len, in crypto_acipher_dsa_sign() argument 163 sdata.message.length = msg_len; in crypto_acipher_dsa_sign() 182 const uint8_t *msg, size_t msg_len, in crypto_acipher_dsa_verify() argument 217 sdata.message.length = msg_len; in crypto_acipher_dsa_verify()
|
A D | ecc.c | 132 const uint8_t *msg, size_t msg_len, uint8_t *sig, in ecc_sign() argument 175 sdata.message.length = msg_len; in ecc_sign() 204 const uint8_t *msg, size_t msg_len, in ecc_verify() argument 238 sdata.message.length = msg_len; in ecc_verify()
|
/optee_os/core/lib/libtomcrypt/ |
A D | acipher_helpers.h | 56 const uint8_t *msg, size_t msg_len, uint8_t *sig, 60 const uint8_t *msg, size_t msg_len, 65 const uint8_t *msg __unused, size_t msg_len __unused, in sm2_ltc_dsa_sign() 73 const uint8_t *msg __unused, size_t msg_len __unused, in sm2_ltc_dsa_verify()
|
A D | dsa.c | 96 const uint8_t *msg, size_t msg_len, in crypto_acipher_dsa_sign() argument 126 if (msg_len != hash_size) { in crypto_acipher_dsa_sign() 143 ltc_res = dsa_sign_hash_raw(msg, msg_len, r, s, NULL, in crypto_acipher_dsa_sign() 165 const uint8_t *msg, size_t msg_len, in crypto_acipher_dsa_verify() argument 194 ltc_res = dsa_verify_hash_raw(r, s, msg, msg_len, <c_stat, <c_key); in crypto_acipher_dsa_verify()
|
A D | sm2-dsa.c | 22 const uint8_t *msg, size_t msg_len, uint8_t *sig, in sm2_ltc_dsa_sign() argument 80 mp_read_unsigned_bin(e, (unsigned char *)msg, msg_len); in sm2_ltc_dsa_sign() 140 const uint8_t *msg, size_t msg_len, in sm2_ltc_dsa_verify() argument 235 mp_read_unsigned_bin(eprime, (unsigned char *)msg, msg_len); in sm2_ltc_dsa_verify()
|
A D | rsa.c | 434 size_t msg_len, uint8_t *sig, in crypto_acipher_rsassa_sign() argument 491 if (msg_len != hash_size) { in crypto_acipher_rsassa_sign() 507 ltc_res = rsa_sign_hash_ex(msg, msg_len, sig, <c_sig_len, in crypto_acipher_rsassa_sign() 526 size_t msg_len, const uint8_t *sig, in crypto_acipher_rsassa_verify() argument 545 if (msg_len != hash_size) { in crypto_acipher_rsassa_verify() 588 ltc_res = rsa_verify_hash_ex(sig, sig_len, msg, msg_len, ltc_rsa_algo, in crypto_acipher_rsassa_verify()
|
A D | ecc.c | 246 const uint8_t *msg, size_t msg_len, in _ltc_ecc_sign() argument 270 ltc_res = ecc_sign_hash_rfc7518(msg, msg_len, sig, <c_sig_len, in _ltc_ecc_sign() 285 const uint8_t *msg, size_t msg_len, in _ltc_ecc_verify() argument 307 ltc_res = ecc_verify_hash_rfc7518(sig, sig_len, msg, msg_len, <c_stat, in _ltc_ecc_verify()
|
/optee_os/core/drivers/crypto/se050/core/ |
A D | ecc.c | 151 size_t *msg_len, uint8_t **msg_padded) in ecc_prepare_msg() argument 173 if (*msg_len >= map[i].len) { in ecc_prepare_msg() 175 *msg_len = map[i].len; in ecc_prepare_msg() 184 memcpy(*msg_padded, msg, *msg_len); in ecc_prepare_msg() 185 *msg_len = map[i].len; in ecc_prepare_msg() 409 const uint8_t *msg, size_t msg_len, in sign() argument 436 res = ecc_prepare_msg(algo_tee2se050(algo), msg, &msg_len, &p); in sign() 453 msg_len, sig_der, &sig_der_len); in sign() 482 const uint8_t *msg, size_t msg_len, in verify() argument 500 res = ecc_prepare_msg(algo_tee2se050(algo), msg, &msg_len, &p); in verify() [all …]
|
A D | rsa.c | 403 const uint8_t *msg, size_t msg_len, in sign_ssa() argument 428 st = sss_se05x_asymmetric_sign_digest(&ctx, (uint8_t *)msg, msg_len, in sign_ssa() 442 const uint8_t *msg, size_t msg_len, in verify_ssa() argument 461 st = sss_se05x_asymmetric_verify_digest(&ctx, (uint8_t *)msg, msg_len, in verify_ssa()
|
/optee_os/lib/libmbedtls/core/ |
A D | sm2-dsa.h | 14 const uint8_t *msg, size_t msg_len, 18 const uint8_t *msg, size_t msg_len,
|
A D | sm2-dsa.c | 26 const uint8_t *msg, size_t msg_len, in sm2_mbedtls_dsa_sign() argument 82 mbedtls_mpi_read_binary(&e, (unsigned char *)msg, msg_len); in sm2_mbedtls_dsa_sign() 151 const uint8_t *msg, size_t msg_len, in sm2_mbedtls_dsa_verify() argument 243 mres = mbedtls_mpi_read_binary(&eprime, msg, msg_len); in sm2_mbedtls_dsa_verify()
|
A D | rsa.c | 511 size_t msg_len, uint8_t *sig, in crypto_acipher_rsassa_sign() argument 552 if (msg_len != hash_size) { in crypto_acipher_rsassa_sign() 580 lmd_res = pk_info->sign_func(&rsa, md_algo, msg, msg_len, sig, in crypto_acipher_rsassa_sign() 583 lmd_res = pk_info->sign_func(&rsa, md_algo, msg, msg_len, sig, in crypto_acipher_rsassa_sign() 600 size_t msg_len, const uint8_t *sig, in crypto_acipher_rsassa_verify() argument 623 if (msg_len != hash_size) { in crypto_acipher_rsassa_verify() 671 lmd_res = pk_info->verify_func(&rsa, md_algo, msg, msg_len, in crypto_acipher_rsassa_verify()
|
A D | ecc.c | 175 const uint8_t *msg, size_t msg_len, uint8_t *sig, in ecc_sign() argument 218 msg_len, mbd_rand, NULL); in ecc_sign() 244 const uint8_t *msg, size_t msg_len, in ecc_verify() argument 293 lmd_res = mbedtls_ecdsa_verify(&ecdsa.grp, msg, msg_len, &ecdsa.Q, in ecc_verify()
|
/optee_os/core/include/crypto/ |
A D | crypto.h | 226 size_t msg_len, uint8_t *sig, 231 size_t msg_len, const uint8_t *sig, 234 const uint8_t *msg, size_t msg_len, 237 const uint8_t *msg, size_t msg_len, 240 const uint8_t *msg, size_t msg_len, 243 const uint8_t *msg, size_t msg_len,
|
A D | crypto_impl.h | 329 const uint8_t *msg, size_t msg_len, 348 const uint8_t *msg, size_t msg_len, uint8_t *sig,
|
/optee_os/core/drivers/crypto/se050/glue/ |
A D | user.c | 45 sss_status_t glue_mac_one_go(void *mac, const uint8_t *msg, size_t msg_len, in glue_mac_one_go() argument 48 if (crypto_mac_update(mac, msg, msg_len)) in glue_mac_one_go()
|
/optee_os/core/crypto/ |
A D | crypto.c | 592 size_t msg_len __unused, in crypto_acipher_rsassa_sign() 603 size_t msg_len __unused, in crypto_acipher_rsassa_verify() 634 size_t msg_len __unused, in crypto_acipher_dsa_sign() 644 size_t msg_len __unused, in crypto_acipher_dsa_verify() 728 const uint8_t *msg, size_t msg_len, in crypto_acipher_ecc_sign() argument 736 return key->ops->sign(algo, key, msg, msg_len, sig, sig_len); in crypto_acipher_ecc_sign() 740 const uint8_t *msg, size_t msg_len, in crypto_acipher_ecc_verify() argument 748 return key->ops->verify(algo, key, msg, msg_len, sig, sig_len); in crypto_acipher_ecc_verify()
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | ssl_srv.c | 1543 msg_len = ( ssl->in_len[0] << 8 ) | ssl->in_len[1]; in ssl_parse_client_hello() 1549 msg_len = ssl->in_hslen; in ssl_parse_client_hello() 1554 if( msg_len > MBEDTLS_SSL_IN_CONTENT_LEN ) in ssl_parse_client_hello() 1580 ssl->handshake->update_checksum( ssl, buf, msg_len ); in ssl_parse_client_hello() 1590 if( msg_len < mbedtls_ssl_hs_hdr_len( ssl ) ) in ssl_parse_client_hello() 1662 msg_len -= mbedtls_ssl_hs_hdr_len( ssl ); in ssl_parse_client_hello() 1685 if( msg_len < 38 ) in ssl_parse_client_hello() 1839 comp_len + comp_offset + 1 > msg_len ) in ssl_parse_client_hello() 1877 if( msg_len > ext_offset ) in ssl_parse_client_hello() 1879 if( msg_len < ext_offset + 2 ) in ssl_parse_client_hello() [all …]
|
A D | ssl_msg.c | 3034 uint32_t msg_len, frag_off, frag_len; in ssl_check_hs_header() local 3036 msg_len = ssl_get_hs_total_len( ssl ); in ssl_check_hs_header() 3040 if( frag_off > msg_len ) in ssl_check_hs_header() 3043 if( frag_len > msg_len - frag_off ) in ssl_check_hs_header() 3123 alloc_len += msg_len / 8 + ( msg_len % 8 != 0 ); /* Bitmap */ in ssl_get_reassembly_buffer_size() 4179 size_t msg_len = ( hs_buf->data[1] << 16 ) | in ssl_load_buffered_message() local 4185 if( msg_len + 12 > MBEDTLS_SSL_IN_CONTENT_LEN ) in ssl_load_buffered_message() 4196 ssl->in_hslen = msg_len + 12; in ssl_load_buffered_message() 4197 ssl->in_msglen = msg_len + 12; in ssl_load_buffered_message() 4282 size_t msg_len = ssl->in_hslen - 12; in ssl_buffer_message() local [all …]
|