Home
last modified time | relevance | path

Searched refs:message (Results 1 – 21 of 21) sorted by relevance

/optee_os-3.20.0/core/drivers/crypto/versal/
A Drsa.c50 rsa_data->message.data, in do_encrypt()
51 rsa_data->message.length, in do_encrypt()
59 rsa_data->message.data, in do_encrypt()
60 rsa_data->message.length, in do_encrypt()
65 rsa_data->message.data, in do_encrypt()
83 versal_mbox_alloc(rsa_data->message.length, rsa_data->message.data, in do_encrypt()
144 rsa_data->message.data, in do_decrypt()
153 rsa_data->message.data, in do_decrypt()
224 p->message.data, in do_ssa_sign()
233 p->message.data, in do_ssa_sign()
[all …]
A Decc.c352 sdata->message.data, in do_sign()
353 sdata->message.length, in do_sign()
362 sdata->message.data, in do_verify()
363 sdata->message.length, in do_verify()
/optee_os-3.20.0/core/drivers/crypto/se050/core/
A Drsa.c677 p->message.data, in encrypt_fallback()
678 p->message.length, in encrypt_fallback()
692 p->message.data, in encrypt_fallback()
754 p->message.data, in decrypt_fallback()
830 p->message.data, in sign_ssa_fallback()
831 p->message.length, in sign_ssa_fallback()
864 ssa_data->message.data, in do_ssa_sign()
865 ssa_data->message.length, in do_ssa_sign()
879 p->message.data, in verify_ssa_fallback()
910 ssa_data->message.data, in do_ssa_verify()
[all …]
A Decc.c727 sdata->message.data, in do_sign()
728 sdata->message.length, in do_sign()
737 sdata->message.data, in do_verify()
738 sdata->message.length, in do_verify()
/optee_os-3.20.0/core/drivers/crypto/crypto_api/acipher/
A Drsassa.c137 if (ps_size < ssa_data->message.length) in emsa_pkcs1_v1_5_encode_noasn1()
140 ps_size -= ssa_data->message.length; in emsa_pkcs1_v1_5_encode_noasn1()
165 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pkcs1_v1_5_encode_noasn1()
215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign()
216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign()
270 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify()
384 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_encode()
385 buf += ssa_data->message.length; in emsa_pss_encode()
679 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_verify()
680 buf += ssa_data->message.length; in emsa_pss_verify()
[all …]
A Drsa.c132 rsa_data.message.data = msg; in crypto_acipher_rsanopad_decrypt()
133 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt()
139 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt()
184 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsanopad_encrypt()
185 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt()
241 rsa_data.message.data = msg; in crypto_acipher_rsaes_decrypt()
242 rsa_data.message.length = *msg_len; in crypto_acipher_rsaes_decrypt()
253 *msg_len = rsa_data.message.length; in crypto_acipher_rsaes_decrypt()
329 rsa_data.message.length = msg_len; in crypto_acipher_rsaes_encrypt()
403 rsa_ssa.message.length = msg_len; in crypto_acipher_rsassa_sign()
[all …]
A Ddsa.c162 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_sign()
163 sdata.message.length = msg_len; in crypto_acipher_dsa_sign()
216 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_verify()
217 sdata.message.length = msg_len; in crypto_acipher_dsa_verify()
A Decc.c197 sdata.message.data = (uint8_t *)msg; in ecc_sign()
198 sdata.message.length = msg_len; in ecc_sign()
260 sdata.message.data = (uint8_t *)msg; in ecc_verify()
261 sdata.message.length = msg_len; in ecc_verify()
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/
A Ddrvcrypt_acipher.h51 struct drvcrypt_buf message; /* Message to sign or signed */ member
68 struct drvcrypt_buf message; /* Message to encrypt or decrypted */ member
122 struct drvcrypt_buf message; /* Message to sign or signed */ member
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/
A Dcaam_rsa.c732 dec_data.message.data = EM.data; in do_oaep_decoding()
733 dec_data.message.length = EM.length; in do_oaep_decoding()
923 rsa_data->message.length = db_len; in do_oaep_decoding()
928 rsa_data->message.length = db_len; in do_oaep_decoding()
930 rsa_data->message.length); in do_oaep_decoding()
933 rsa_data->message.length); in do_oaep_decoding()
1024 rsa_data->message.length); in do_oaep_encoding()
1138 enc_data.message.data = EM.data; in do_oaep_encoding()
1139 enc_data.message.length = EM.length; in do_oaep_encoding()
1206 rsa_data->message.length); in do_caam_encrypt()
[all …]
A Dcaam_ecc.c366 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign()
367 sdata->message.length); in do_sign()
376 ECC_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign()
421 caam_desc_add_word(desc, sdata->message.length); in do_sign()
500 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify()
501 sdata->message.length); in do_verify()
557 caam_desc_add_word(desc, sdata->message.length); in do_verify()
A Dcaam_dsa.c517 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign()
518 sdata->message.length); in do_sign()
527 DSA_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign()
580 caam_desc_add_word(desc, sdata->message.length); in do_sign()
657 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify()
658 sdata->message.length); in do_verify()
722 caam_desc_add_word(desc, sdata->message.length); in do_verify()
/optee_os-3.20.0/core/tee/
A Dtee_fs_key_manager.c43 const void *message, size_t message_size) in do_hmac() argument
48 if (!out_key || !in_key || !message) in do_hmac()
59 res = crypto_mac_update(ctx, message, message_size); in do_hmac()
A Dtee_rpmb_fs.c314 uint8_t message[RPMB_EMMC_CID_SIZE]; in tee_rpmb_key_gen() local
329 memcpy(message, rpmb_ctx->cid, RPMB_EMMC_CID_SIZE); in tee_rpmb_key_gen()
330 memset(message + RPMB_CID_PRV_OFFSET, 0, 1); in tee_rpmb_key_gen()
331 memset(message + RPMB_CID_CRC_OFFSET, 0, 1); in tee_rpmb_key_gen()
332 return huk_subkey_derive(HUK_SUBKEY_RPMB, message, sizeof(message), in tee_rpmb_key_gen()
/optee_os-3.20.0/lib/libutee/include/
A Dtee_internal_api.h267 const void *message, uint32_t messageLen,
271 const void *message, uint32_t messageLen,
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_cfg.h317 # define LTC_DEPRECATED_PRAGMA(s) __pragma(message(s))
/optee_os-3.20.0/core/lib/zlib/
A Dinffast.c13 # pragma message("Assembler code may have bugs -- use at your own risk")
/optee_os-3.20.0/lib/libutee/
A Dtee_api_operations.c1211 const void *message, uint32_t messageLen, in TEE_MACComputeFinal() argument
1217 if (operation == TEE_HANDLE_NULL || (!message && messageLen)) { in TEE_MACComputeFinal()
1239 res = _utee_hash_final(operation->state, message, messageLen, mac, &ml); in TEE_MACComputeFinal()
1257 const void *message, uint32_t messageLen, in TEE_MACCompareFinal() argument
1279 res = TEE_MACComputeFinal(operation, message, messageLen, computed_mac, in TEE_MACCompareFinal()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog375 applicable RFC: on an invalid Finished message value, an
954 DTLS client when parsing the Hello Verify Request message.
1084 * Fix an incorrect size in a debugging message. Reported and fix
1709 check in parsing the CertificateRequest message,
1923 internal message buffers.
2189 * Deprecate usage of message digest functions that return void
3905 * Removed timing differences during SSL message decryption in
3922 * Server not always sending correct CertificateRequest message
4053 * Removed timing differences during SSL message decryption in
4283 + Added generic message digest and cipher wrapper
[all …]
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/
A Dssl.h4200 unsigned char message );
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Dssl_msg.c4980 unsigned char message ) in mbedtls_ssl_send_alert_message() argument
4991 MBEDTLS_SSL_DEBUG_MSG( 3, ( "send alert level=%u message=%u", level, message )); in mbedtls_ssl_send_alert_message()
4996 ssl->out_msg[1] = message; in mbedtls_ssl_send_alert_message()

Completed in 57 milliseconds