/optee_os-3.20.0/core/drivers/crypto/versal/ |
A D | rsa.c | 50 rsa_data->message.data, in do_encrypt() 51 rsa_data->message.length, in do_encrypt() 59 rsa_data->message.data, in do_encrypt() 60 rsa_data->message.length, in do_encrypt() 65 rsa_data->message.data, in do_encrypt() 83 versal_mbox_alloc(rsa_data->message.length, rsa_data->message.data, in do_encrypt() 144 rsa_data->message.data, in do_decrypt() 153 rsa_data->message.data, in do_decrypt() 224 p->message.data, in do_ssa_sign() 233 p->message.data, in do_ssa_sign() [all …]
|
A D | ecc.c | 352 sdata->message.data, in do_sign() 353 sdata->message.length, in do_sign() 362 sdata->message.data, in do_verify() 363 sdata->message.length, in do_verify()
|
/optee_os-3.20.0/core/drivers/crypto/se050/core/ |
A D | rsa.c | 677 p->message.data, in encrypt_fallback() 678 p->message.length, in encrypt_fallback() 692 p->message.data, in encrypt_fallback() 754 p->message.data, in decrypt_fallback() 830 p->message.data, in sign_ssa_fallback() 831 p->message.length, in sign_ssa_fallback() 864 ssa_data->message.data, in do_ssa_sign() 865 ssa_data->message.length, in do_ssa_sign() 879 p->message.data, in verify_ssa_fallback() 910 ssa_data->message.data, in do_ssa_verify() [all …]
|
A D | ecc.c | 727 sdata->message.data, in do_sign() 728 sdata->message.length, in do_sign() 737 sdata->message.data, in do_verify() 738 sdata->message.length, in do_verify()
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/acipher/ |
A D | rsassa.c | 137 if (ps_size < ssa_data->message.length) in emsa_pkcs1_v1_5_encode_noasn1() 140 ps_size -= ssa_data->message.length; in emsa_pkcs1_v1_5_encode_noasn1() 165 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pkcs1_v1_5_encode_noasn1() 215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign() 216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign() 270 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify() 384 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_encode() 385 buf += ssa_data->message.length; in emsa_pss_encode() 679 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_verify() 680 buf += ssa_data->message.length; in emsa_pss_verify() [all …]
|
A D | rsa.c | 132 rsa_data.message.data = msg; in crypto_acipher_rsanopad_decrypt() 133 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt() 139 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt() 184 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsanopad_encrypt() 185 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt() 241 rsa_data.message.data = msg; in crypto_acipher_rsaes_decrypt() 242 rsa_data.message.length = *msg_len; in crypto_acipher_rsaes_decrypt() 253 *msg_len = rsa_data.message.length; in crypto_acipher_rsaes_decrypt() 329 rsa_data.message.length = msg_len; in crypto_acipher_rsaes_encrypt() 403 rsa_ssa.message.length = msg_len; in crypto_acipher_rsassa_sign() [all …]
|
A D | dsa.c | 162 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_sign() 163 sdata.message.length = msg_len; in crypto_acipher_dsa_sign() 216 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_verify() 217 sdata.message.length = msg_len; in crypto_acipher_dsa_verify()
|
A D | ecc.c | 197 sdata.message.data = (uint8_t *)msg; in ecc_sign() 198 sdata.message.length = msg_len; in ecc_sign() 260 sdata.message.data = (uint8_t *)msg; in ecc_verify() 261 sdata.message.length = msg_len; in ecc_verify()
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_acipher.h | 51 struct drvcrypt_buf message; /* Message to sign or signed */ member 68 struct drvcrypt_buf message; /* Message to encrypt or decrypted */ member 122 struct drvcrypt_buf message; /* Message to sign or signed */ member
|
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/ |
A D | caam_rsa.c | 732 dec_data.message.data = EM.data; in do_oaep_decoding() 733 dec_data.message.length = EM.length; in do_oaep_decoding() 923 rsa_data->message.length = db_len; in do_oaep_decoding() 928 rsa_data->message.length = db_len; in do_oaep_decoding() 930 rsa_data->message.length); in do_oaep_decoding() 933 rsa_data->message.length); in do_oaep_decoding() 1024 rsa_data->message.length); in do_oaep_encoding() 1138 enc_data.message.data = EM.data; in do_oaep_encoding() 1139 enc_data.message.length = EM.length; in do_oaep_encoding() 1206 rsa_data->message.length); in do_caam_encrypt() [all …]
|
A D | caam_ecc.c | 366 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign() 367 sdata->message.length); in do_sign() 376 ECC_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign() 421 caam_desc_add_word(desc, sdata->message.length); in do_sign() 500 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify() 501 sdata->message.length); in do_verify() 557 caam_desc_add_word(desc, sdata->message.length); in do_verify()
|
A D | caam_dsa.c | 517 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign() 518 sdata->message.length); in do_sign() 527 DSA_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign() 580 caam_desc_add_word(desc, sdata->message.length); in do_sign() 657 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify() 658 sdata->message.length); in do_verify() 722 caam_desc_add_word(desc, sdata->message.length); in do_verify()
|
/optee_os-3.20.0/core/tee/ |
A D | tee_fs_key_manager.c | 43 const void *message, size_t message_size) in do_hmac() argument 48 if (!out_key || !in_key || !message) in do_hmac() 59 res = crypto_mac_update(ctx, message, message_size); in do_hmac()
|
A D | tee_rpmb_fs.c | 314 uint8_t message[RPMB_EMMC_CID_SIZE]; in tee_rpmb_key_gen() local 329 memcpy(message, rpmb_ctx->cid, RPMB_EMMC_CID_SIZE); in tee_rpmb_key_gen() 330 memset(message + RPMB_CID_PRV_OFFSET, 0, 1); in tee_rpmb_key_gen() 331 memset(message + RPMB_CID_CRC_OFFSET, 0, 1); in tee_rpmb_key_gen() 332 return huk_subkey_derive(HUK_SUBKEY_RPMB, message, sizeof(message), in tee_rpmb_key_gen()
|
/optee_os-3.20.0/lib/libutee/include/ |
A D | tee_internal_api.h | 267 const void *message, uint32_t messageLen, 271 const void *message, uint32_t messageLen,
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_cfg.h | 317 # define LTC_DEPRECATED_PRAGMA(s) __pragma(message(s))
|
/optee_os-3.20.0/core/lib/zlib/ |
A D | inffast.c | 13 # pragma message("Assembler code may have bugs -- use at your own risk")
|
/optee_os-3.20.0/lib/libutee/ |
A D | tee_api_operations.c | 1211 const void *message, uint32_t messageLen, in TEE_MACComputeFinal() argument 1217 if (operation == TEE_HANDLE_NULL || (!message && messageLen)) { in TEE_MACComputeFinal() 1239 res = _utee_hash_final(operation->state, message, messageLen, mac, &ml); in TEE_MACComputeFinal() 1257 const void *message, uint32_t messageLen, in TEE_MACCompareFinal() argument 1279 res = TEE_MACComputeFinal(operation, message, messageLen, computed_mac, in TEE_MACCompareFinal()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 375 applicable RFC: on an invalid Finished message value, an 954 DTLS client when parsing the Hello Verify Request message. 1084 * Fix an incorrect size in a debugging message. Reported and fix 1709 check in parsing the CertificateRequest message, 1923 internal message buffers. 2189 * Deprecate usage of message digest functions that return void 3905 * Removed timing differences during SSL message decryption in 3922 * Server not always sending correct CertificateRequest message 4053 * Removed timing differences during SSL message decryption in 4283 + Added generic message digest and cipher wrapper [all …]
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | ssl.h | 4200 unsigned char message );
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | ssl_msg.c | 4980 unsigned char message ) in mbedtls_ssl_send_alert_message() argument 4991 MBEDTLS_SSL_DEBUG_MSG( 3, ( "send alert level=%u message=%u", level, message )); in mbedtls_ssl_send_alert_message() 4996 ssl->out_msg[1] = message; in mbedtls_ssl_send_alert_message()
|