/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ed25519/ |
A D | ed25519_verify.c | 12 static int s_ed25519_verify(const unsigned char *msg, unsigned long msglen, in s_ed25519_verify() argument 32 mlen = msglen + siglen; in s_ed25519_verify() 33 if ((mlen < msglen) || (mlen < siglen)) return CRYPT_OVERFLOW; in s_ed25519_verify() 39 XMEMCPY(m + siglen, msg, msglen); in s_ed25519_verify() 48 zeromem(m, msglen + siglen); in s_ed25519_verify() 67 int ed25519ctx_verify(const unsigned char *msg, unsigned long msglen, in ed25519ctx_verify() argument 81 return s_ed25519_verify(msg, msglen, sig, siglen, ctx_prefix, ctx_prefix_size, stat, public_key); in ed25519ctx_verify() 96 int ed25519ph_verify(const unsigned char *msg, unsigned long msglen, in ed25519ph_verify() argument 110 if ((err = tweetnacl_crypto_ph(msg_hash, msg, msglen)) != CRYPT_OK) in ed25519ph_verify() 126 int ed25519_verify(const unsigned char *msg, unsigned long msglen, in ed25519_verify() argument [all …]
|
A D | ed25519_sign.c | 12 static int s_ed25519_sign(const unsigned char *msg, unsigned long msglen, in s_ed25519_sign() argument 34 smlen = msglen + 64; in s_ed25519_sign() 39 msg, msglen, in s_ed25519_sign() 64 int ed25519ctx_sign(const unsigned char *msg, unsigned long msglen, in ed25519ctx_sign() argument 78 return s_ed25519_sign(msg, msglen, sig, siglen, ctx_prefix, ctx_prefix_size, private_key); in ed25519ctx_sign() 91 int ed25519ph_sign(const unsigned char *msg, unsigned long msglen, in ed25519ph_sign() argument 104 if ((err = tweetnacl_crypto_ph(msg_hash, msg, msglen)) != CRYPT_OK) in ed25519ph_sign() 119 int ed25519_sign(const unsigned char *msg, unsigned long msglen, in ed25519_sign() argument 123 return s_ed25519_sign(msg, msglen, sig, siglen, NULL, 0, private_key); in ed25519_sign()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/salsa20/ |
A D | xsalsa20_test.c | 38 unsigned char msglen = 17; /* includes trailing NULL */ in xsalsa20_test() 46 if ((err = salsa20_crypt(&st, msg, msglen, ciphertext)) != CRYPT_OK) return err; in xsalsa20_test() 50 if ((err = salsa20_crypt(&st, ciphertext, msglen, msg2)) != CRYPT_OK) return err; in xsalsa20_test() 53 …if (compare_testvector(msg, msglen, msg2, msglen, "XSALSA20-TV1", 1)) return CRYPT_FAIL_TESTVECTO… in xsalsa20_test() 57 …if ((err = xsalsa20_memory(key, sizeof(key), 20, nonce, sizeof(nonce), msg, msglen, ciphertext)) … in xsalsa20_test() 58 …if ((err = xsalsa20_memory(key, sizeof(key), 20, nonce, sizeof(nonce), ciphertext, msglen, msg2)) … in xsalsa20_test() 59 …if (compare_testvector(msg, msglen, msg2, msglen, "XSALSA20-TV2", 1)) return CRYPT_FAIL_TESTVECTO… in xsalsa20_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/eax/ |
A D | eax_test.c | 25 msglen; in eax_test() 223 tests[x].plaintext, tests[x].msglen, outct, outtag, &len)) != CRYPT_OK) { in eax_test() 227 … compare_testvector(outct, tests[x].msglen, tests[x].ciphertext, tests[x].msglen, "EAX CT", x)) { in eax_test() 234 outct, tests[x].msglen, outct, outtag, len, &res)) != CRYPT_OK) { in eax_test() 237 …if ((res != 1) || compare_testvector(outct, tests[x].msglen, tests[x].plaintext, tests[x].msglen, … in eax_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/modes/ctr/ |
A D | ctr_test.c | 18 int keylen, msglen; in ctr_test() 58 if ((err = ctr_encrypt(tests[x].pt, buf, tests[x].msglen, &ctr)) != CRYPT_OK) { in ctr_test() 62 if (compare_testvector(buf, tests[x].msglen, tests[x].ct, tests[x].msglen, "CTR", x)) { in ctr_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/pkcs1/ |
A D | pkcs_1_v1_5_decode.c | 25 unsigned long msglen, in pkcs_1_v1_5_decode() argument 42 if ((msglen > modulus_len) || (modulus_len < 11)) { in pkcs_1_v1_5_decode() 87 if (*outlen < (msglen - (2 + ps_len + 1))) { in pkcs_1_v1_5_decode() 92 *outlen = (msglen - (2 + ps_len + 1)); in pkcs_1_v1_5_decode()
|
A D | pkcs_1_v1_5_encode.c | 26 unsigned long msglen, in pkcs_1_v1_5_encode() argument 53 if ((msglen + 11) > modulus_len) { in pkcs_1_v1_5_encode() 65 ps_len = modulus_len - msglen - 3; in pkcs_1_v1_5_encode() 91 XMEMCPY(&out[2 + ps_len + 1], msg, msglen); in pkcs_1_v1_5_encode()
|
A D | pkcs_1_oaep_encode.c | 26 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, in pkcs_1_oaep_encode() argument 54 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { in pkcs_1_oaep_encode() 91 y = modulus_len - msglen - 2*hLen - 2; in pkcs_1_oaep_encode() 99 XMEMCPY(DB+x, msg, msglen); in pkcs_1_oaep_encode() 100 x += msglen; in pkcs_1_oaep_encode()
|
A D | pkcs_1_oaep_decode.c | 25 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen, in pkcs_1_oaep_decode() argument 51 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) { in pkcs_1_oaep_decode()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pkcs.h | 32 unsigned long msglen, 41 unsigned long msglen, 49 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, 55 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen,
|
A D | tomcrypt_pk.h | 358 int ed25519_sign(const unsigned char *msg, unsigned long msglen, 361 int ed25519ctx_sign(const unsigned char *msg, unsigned long msglen, 365 int ed25519ph_sign(const unsigned char *msg, unsigned long msglen, 369 int ed25519_verify(const unsigned char *msg, unsigned long msglen, 373 int ed25519ctx_verify(const unsigned char *msg, unsigned long msglen, 378 int ed25519ph_verify(const unsigned char *msg, unsigned long msglen,
|
A D | tomcrypt_private.h | 377 int tweetnacl_crypto_ph(unsigned char *out, const unsigned char *msg, unsigned long long msglen);
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/f9/ |
A D | f9_test.c | 21 int msglen; in f9_test() 53 … if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { in f9_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/xcbc/ |
A D | xcbc_test.c | 21 int msglen; in xcbc_test() 103 …if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK)… in xcbc_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/pmac/ |
A D | pmac_test.c | 23 int msglen; in pmac_test() 129 …if ((err = pmac_memory(idx, tests[x].key, 16, tests[x].msg, tests[x].msglen, outtag, &len)) != CRY… in pmac_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/omac/ |
A D | omac_test.c | 22 int keylen, msglen; in omac_test() 81 …if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &le… in omac_test()
|
/optee_os-3.20.0/core/crypto/ |
A D | sm3.c | 221 uint8_t msglen[8]; in sm3_final() local 226 PUT_UINT32_BE(high, msglen, 0); in sm3_final() 227 PUT_UINT32_BE(low, msglen, 4); in sm3_final() 233 sm3_update(ctx, msglen, 8); in sm3_final()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | md4.c | 307 unsigned char msglen[8]; in mbedtls_md4_finish_ret() local 313 MBEDTLS_PUT_UINT32_LE( low, msglen, 0 ); in mbedtls_md4_finish_ret() 314 MBEDTLS_PUT_UINT32_LE( high, msglen, 4 ); in mbedtls_md4_finish_ret() 323 if( ( ret = mbedtls_md4_update_ret( ctx, msglen, 8 ) ) != 0 ) in mbedtls_md4_finish_ret()
|
A D | ripemd160.c | 374 unsigned char msglen[8]; in mbedtls_ripemd160_finish_ret() local 380 MBEDTLS_PUT_UINT32_LE( low, msglen, 0 ); in mbedtls_ripemd160_finish_ret() 381 MBEDTLS_PUT_UINT32_LE( high, msglen, 4 ); in mbedtls_ripemd160_finish_ret() 390 ret = mbedtls_ripemd160_update_ret( ctx, msglen, 8 ); in mbedtls_ripemd160_finish_ret()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ec25519/ |
A D | tweetnacl.c | 488 int tweetnacl_crypto_ph(u8 *out,const u8 *msg,u64 msglen) in tweetnacl_crypto_ph() argument 490 return tweetnacl_crypto_hash(out, msg, msglen); in tweetnacl_crypto_ph()
|