/optee_os/core/lib/libtomcrypt/src/hashes/ |
A D | sha3_test.c | 45 sha3_done(&c, hash); in sha3_224_test() 54 sha3_done(&c, hash); in sha3_224_test() 65 sha3_done(&c, hash); in sha3_224_test() 101 sha3_done(&c, hash); in sha3_256_test() 109 sha3_done(&c, hash); in sha3_256_test() 118 sha3_done(&c, hash); in sha3_256_test() 129 sha3_done(&c, hash); in sha3_256_test() 155 sha3_done(&c, hash); in sha3_256_test() 156 if(compare_testvector(hash, sizeof(hash), in sha3_256_test() 192 sha3_done(&c, hash); in sha3_384_test() [all …]
|
/optee_os/core/lib/libtomcrypt/src/mac/hmac/ |
A D | hmac_done.c | 19 #define LTC_HMAC_BLOCKSIZE hash_descriptor[hash]->blocksize 32 int hash, err; in hmac_done() local 38 hash = hmac->hash; in hmac_done() 39 if((err = hash_is_valid(hash)) != CRYPT_OK) { in hmac_done() 44 hashsize = hash_descriptor[hash]->hashsize; in hmac_done() 60 if ((err = hash_descriptor[hash]->done(&hmac->md, isha)) != CRYPT_OK) { in hmac_done() 70 if ((err = hash_descriptor[hash]->init(&hmac->md)) != CRYPT_OK) { in hmac_done() 73 if ((err = hash_descriptor[hash]->process(&hmac->md, buf, LTC_HMAC_BLOCKSIZE)) != CRYPT_OK) { in hmac_done() 76 if ((err = hash_descriptor[hash]->process(&hmac->md, isha, hashsize)) != CRYPT_OK) { in hmac_done() 79 if ((err = hash_descriptor[hash]->done(&hmac->md, buf)) != CRYPT_OK) { in hmac_done()
|
A D | hmac_init.c | 19 #define LTC_HMAC_BLOCKSIZE hash_descriptor[hash]->blocksize 29 int hmac_init(hmac_state *hmac, int hash, const unsigned char *key, unsigned long keylen) in hmac_init() argument 40 if ((err = hash_is_valid(hash)) != CRYPT_OK) { in hmac_init() 43 hmac->hash = hash; in hmac_init() 44 hashsize = hash_descriptor[hash]->hashsize; in hmac_init() 66 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) { in hmac_init() 84 if ((err = hash_descriptor[hash]->init(&hmac->md)) != CRYPT_OK) { in hmac_init() 88 if ((err = hash_descriptor[hash]->process(&hmac->md, buf, LTC_HMAC_BLOCKSIZE)) != CRYPT_OK) { in hmac_init()
|
A D | hmac_memory.c | 30 int hmac_memory(int hash, in hmac_memory() argument 44 if ((err = hash_is_valid(hash)) != CRYPT_OK) { in hmac_memory() 49 if (hash_descriptor[hash]->hmac_block != NULL) { in hmac_memory() 50 return hash_descriptor[hash]->hmac_block(key, keylen, in, inlen, out, outlen); in hmac_memory() 60 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { in hmac_memory()
|
/optee_os/core/lib/libtomcrypt/src/prngs/ |
A D | yarrow.c | 91 prng->u.yarrow.hash = register_hash(&sha256_desc); in yarrow_start() 93 prng->u.yarrow.hash = register_hash(&sha512_desc); in yarrow_start() 95 prng->u.yarrow.hash = register_hash(&tiger_desc); in yarrow_start() 97 prng->u.yarrow.hash = register_hash(&sha1_desc); in yarrow_start() 99 prng->u.yarrow.hash = register_hash(&rmd320_desc); in yarrow_start() 101 prng->u.yarrow.hash = register_hash(&rmd256_desc); in yarrow_start() 103 prng->u.yarrow.hash = register_hash(&rmd160_desc); in yarrow_start() 107 prng->u.yarrow.hash = register_hash(&md5_desc); in yarrow_start() 109 prng->u.yarrow.hash = register_hash(&md4_desc); in yarrow_start() 111 prng->u.yarrow.hash = register_hash(&md2_desc); in yarrow_start() [all …]
|
/optee_os/core/lib/libtomcrypt/src/hashes/helper/ |
A D | hash_memory.c | 27 int hash_memory(int hash, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigne… in hash_memory() argument 36 if ((err = hash_is_valid(hash)) != CRYPT_OK) { in hash_memory() 40 if (*outlen < hash_descriptor[hash]->hashsize) { in hash_memory() 41 *outlen = hash_descriptor[hash]->hashsize; in hash_memory() 50 if ((err = hash_descriptor[hash]->init(md)) != CRYPT_OK) { in hash_memory() 53 if ((err = hash_descriptor[hash]->process(md, in, inlen)) != CRYPT_OK) { in hash_memory() 56 err = hash_descriptor[hash]->done(md, out); in hash_memory() 57 *outlen = hash_descriptor[hash]->hashsize; in hash_memory()
|
A D | hash_filehandle.c | 26 int hash_filehandle(int hash, FILE *in, unsigned char *out, unsigned long *outlen) in hash_filehandle() argument 41 if ((err = hash_is_valid(hash)) != CRYPT_OK) { in hash_filehandle() 45 if (*outlen < hash_descriptor[hash]->hashsize) { in hash_filehandle() 46 *outlen = hash_descriptor[hash]->hashsize; in hash_filehandle() 50 if ((err = hash_descriptor[hash]->init(&md)) != CRYPT_OK) { in hash_filehandle() 56 if ((err = hash_descriptor[hash]->process(&md, buf, (unsigned long)x)) != CRYPT_OK) { in hash_filehandle() 60 if ((err = hash_descriptor[hash]->done(&md, out)) == CRYPT_OK) { in hash_filehandle() 61 *outlen = hash_descriptor[hash]->hashsize; in hash_filehandle()
|
A D | hash_memory_multi.c | 29 int hash_memory_multi(int hash, unsigned char *out, unsigned long *outlen, in hash_memory_multi() argument 42 if ((err = hash_is_valid(hash)) != CRYPT_OK) { in hash_memory_multi() 46 if (*outlen < hash_descriptor[hash]->hashsize) { in hash_memory_multi() 47 *outlen = hash_descriptor[hash]->hashsize; in hash_memory_multi() 56 if ((err = hash_descriptor[hash]->init(md)) != CRYPT_OK) { in hash_memory_multi() 65 if ((err = hash_descriptor[hash]->process(md, curptr, curlen)) != CRYPT_OK) { in hash_memory_multi() 75 err = hash_descriptor[hash]->done(md, out); in hash_memory_multi() 76 *outlen = hash_descriptor[hash]->hashsize; in hash_memory_multi()
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | pk_wrap.c | 78 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument 110 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument 124 md_alg, (unsigned int) hash_len, hash, sig ) ); in rsa_sign_wrap() 602 hash, hash_len, in ecdsa_verify_wrap() 659 hash, hash_len, sig, sig_len, in ecdsa_verify_rs_wrap() 798 unsigned char hash[32]; in rsa_alt_check_pair() local 805 memset( hash, 0x2a, sizeof( hash ) ); in rsa_alt_check_pair() 808 hash, sizeof( hash ), in rsa_alt_check_pair() 815 hash, sizeof( hash ), sig, sig_len ) != 0 ) in rsa_alt_check_pair() 1003 ((void) hash); in pk_opaque_sign_wrap() [all …]
|
A D | pk.c | 280 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_restartable() argument 286 hash != NULL ); in mbedtls_pk_verify_restartable() 327 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify() argument 330 return( mbedtls_pk_verify_restartable( ctx, md_alg, hash, hash_len, in mbedtls_pk_verify() 339 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_ext() argument 344 hash != NULL ); in mbedtls_pk_verify_ext() 374 md_alg, (unsigned int) hash_len, hash, in mbedtls_pk_verify_ext() 402 const unsigned char *hash, size_t hash_len, in mbedtls_pk_sign_restartable() argument 409 hash != NULL ); in mbedtls_pk_sign_restartable() 450 const unsigned char *hash, size_t hash_len, in mbedtls_pk_sign() argument [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/pkcs1/ |
A D | pkcs_1_pss_decode.c | 36 unsigned char *DB, *mask, *salt, *hash; in pkcs_1_pss_decode() local 66 hash = XMALLOC(modulus_len); in pkcs_1_pss_decode() 67 if (DB == NULL || mask == NULL || salt == NULL || hash == NULL) { in pkcs_1_pss_decode() 77 if (hash != NULL) { in pkcs_1_pss_decode() 78 XFREE(hash); in pkcs_1_pss_decode() 95 XMEMCPY(hash, sig + x, hLen); in pkcs_1_pss_decode() 105 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_decode() 152 if (XMEM_NEQ(mask, hash, hLen) == 0) { in pkcs_1_pss_decode() 162 zeromem(hash, modulus_len); in pkcs_1_pss_decode() 165 XFREE(hash); in pkcs_1_pss_decode()
|
A D | pkcs_1_pss_encode.c | 38 unsigned char *DB, *mask, *salt, *hash; in pkcs_1_pss_encode() local 68 hash = XMALLOC(modulus_len); in pkcs_1_pss_encode() 69 if (DB == NULL || mask == NULL || salt == NULL || hash == NULL) { in pkcs_1_pss_encode() 79 if (hash != NULL) { in pkcs_1_pss_encode() 80 XFREE(hash); in pkcs_1_pss_encode() 108 if ((err = hash_descriptor[hash_idx]->done(&md, hash)) != CRYPT_OK) { in pkcs_1_pss_encode() 121 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_encode() 143 XMEMCPY(out + y, hash, hLen); in pkcs_1_pss_encode() 160 zeromem(hash, modulus_len); in pkcs_1_pss_encode() 163 XFREE(hash); in pkcs_1_pss_encode()
|
/optee_os/ta/pkcs11/src/ |
A D | processing_rsa.c | 24 uint32_t hash = 0; in pkcs2tee_proc_params_rsa_pss() local 52 ctx->hash_alg = hash; in pkcs2tee_proc_params_rsa_pss() 122 uint32_t hash = 0; in pkcs2tee_algo_rsa_pss() local 148 if (hash == PKCS11_CKM_SHA224 && in pkcs2tee_algo_rsa_pss() 153 if (hash == PKCS11_CKM_SHA256 && in pkcs2tee_algo_rsa_pss() 158 if (hash == PKCS11_CKM_SHA384 && in pkcs2tee_algo_rsa_pss() 206 uint32_t hash = 0; in pkcs2tee_proc_params_rsa_oaep() local 245 ctx->hash_alg = hash; in pkcs2tee_proc_params_rsa_oaep() 266 uint32_t hash = 0; in pkcs2tee_algo_rsa_oaep() local 302 switch (hash) { in pkcs2tee_algo_rsa_oaep() [all …]
|
/optee_os/core/tee/ |
A D | fs_dirfile.c | 26 uint8_t hash[TEE_FS_HTREE_HASH_SIZE]; member 110 TEE_Result tee_fs_dirfile_open(bool create, uint8_t *hash, in tee_fs_dirfile_open() argument 122 res = fops->open(create, hash, NULL, NULL, &dirh->fh); in tee_fs_dirfile_open() 173 uint8_t *hash) in tee_fs_dirfile_commit_writes() argument 175 return dirh->fops->commit_writes(dirh->fh, hash); in tee_fs_dirfile_commit_writes() 235 memcpy(dfh->hash, dent.hash, sizeof(dent.hash)); in tee_fs_dirfile_find() 276 memcpy(dent.hash, dfh->hash, sizeof(dent.hash)); in tee_fs_dirfile_rename() 334 memcpy(&dent.hash, dfh->hash, sizeof(dent.hash)); in tee_fs_dirfile_update_hash()
|
/optee_os/core/lib/libtomcrypt/src/stream/salsa20/ |
A D | xsalsa20_test.c | 23 static int _sha256(unsigned char *hash, const unsigned char *data, const int datalen) { in _sha256() argument 27 sha256_done(&md, hash); in _sha256() 80 unsigned char hash[32]; in xsalsa20_test() 87 if ((err = _sha256(hash, keystream, keystreamlen)) != CRYPT_OK) return err; in xsalsa20_test() 88 …if (compare_testvector(hash, sizeof(hash), expecthash, sizeof(expecthash), "XSALSA20-TV3", 1)) … in xsalsa20_test()
|
/optee_os/core/lib/libtomcrypt/src/misc/crypt/ |
A D | crypt_register_hash.c | 22 int register_hash(const struct ltc_hash_descriptor *hash) in register_hash() argument 26 LTC_ARGCHK(hash != NULL); in register_hash() 31 if (hash_descriptor[x] == hash) { in register_hash() 40 hash_descriptor[x] = hash; in register_hash()
|
/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_encrypt_key.c | 34 prng_state *prng, int wprng, int hash, in ecc_encrypt_key() argument 47 if ((err = hash_is_valid(hash)) != CRYPT_OK) { in ecc_encrypt_key() 51 if (inlen > hash_descriptor[hash]->hashsize) { in ecc_encrypt_key() 97 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) { in ecc_encrypt_key() 107 … LTC_ASN1_OBJECT_IDENTIFIER, hash_descriptor[hash]->OIDlen, hash_descriptor[hash]->OID, in ecc_encrypt_key()
|
/optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
A D | dsa_encrypt_key.c | 33 prng_state *prng, int wprng, int hash, in dsa_encrypt_key() argument 51 if ((err = hash_is_valid(hash)) != CRYPT_OK) { in dsa_encrypt_key() 55 if (inlen > hash_descriptor[hash]->hashsize) { in dsa_encrypt_key() 96 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) { in dsa_encrypt_key() 106 … LTC_ASN1_OBJECT_IDENTIFIER, hash_descriptor[hash]->OIDlen, hash_descriptor[hash]->OID, in dsa_encrypt_key()
|
/optee_os/core/include/tee/ |
A D | fs_dirfile.h | 22 uint8_t hash[TEE_FS_HTREE_HASH_SIZE]; member 37 TEE_Result (*open)(bool create, uint8_t *hash, const TEE_UUID *uuid, 45 TEE_Result (*commit_writes)(struct tee_file_handle *fh, uint8_t *hash); 56 TEE_Result tee_fs_dirfile_open(bool create, uint8_t *hash, 74 uint8_t *hash);
|
/optee_os/out/arm/export-ta_arm32/include/mbedtls/ |
A D | rsa.h | 924 const unsigned char *hash, 972 const unsigned char *hash, 1026 const unsigned char *hash, 1091 const unsigned char *hash, 1144 const unsigned char *hash, 1190 const unsigned char *hash, 1246 const unsigned char *hash, 1299 const unsigned char *hash,
|
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | rsa.h | 924 const unsigned char *hash, 972 const unsigned char *hash, 1026 const unsigned char *hash, 1091 const unsigned char *hash, 1144 const unsigned char *hash, 1190 const unsigned char *hash, 1246 const unsigned char *hash, 1299 const unsigned char *hash,
|
/optee_os/out/arm/export-ta_arm64/include/mbedtls/ |
A D | rsa.h | 924 const unsigned char *hash, 972 const unsigned char *hash, 1026 const unsigned char *hash, 1091 const unsigned char *hash, 1144 const unsigned char *hash, 1190 const unsigned char *hash, 1246 const unsigned char *hash, 1299 const unsigned char *hash,
|
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/ |
A D | rsa.h | 924 const unsigned char *hash, 972 const unsigned char *hash, 1026 const unsigned char *hash, 1091 const unsigned char *hash, 1144 const unsigned char *hash, 1190 const unsigned char *hash, 1246 const unsigned char *hash, 1299 const unsigned char *hash,
|
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/ |
A D | rsa.h | 924 const unsigned char *hash, 972 const unsigned char *hash, 1026 const unsigned char *hash, 1091 const unsigned char *hash, 1144 const unsigned char *hash, 1190 const unsigned char *hash, 1246 const unsigned char *hash, 1299 const unsigned char *hash,
|
/optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_verify_hash.c | 33 const unsigned char *hash, unsigned long hashlen, in rsa_verify_hash_ex() argument 42 LTC_ARGCHK(hash != NULL); in rsa_verify_hash_ex() 97 … err = pkcs_1_pss_decode(hash, hashlen, tmpbuf+1, x-1, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 100 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 165 (XMEMCMP(siginfo[1].data, hash, hashlen) == 0)) { in rsa_verify_hash_ex() 171 (XMEMCMP(out, hash, hashlen) == 0)) { in rsa_verify_hash_ex()
|