Home
last modified time | relevance | path

Searched full:message (Results 1 – 25 of 234) sorted by relevance

12345678910

/optee_os/core/arch/riscv/include/
H A Dsbi_mpxy_rpmi.h22 /* RPMI message protocol specific MPXY attributes */
31 /* RPMI message protocol specific MPXY message types */
49 /* RPMI/MPXY message instance */
101 /** RPMI/MPXY message helper routines */
104 sbi_mpxy_rpmi_init_get_attribute(struct sbi_mpxy_rpmi_message *message, in sbi_mpxy_rpmi_init_get_attribute() argument
107 message->type = SBI_MPXY_RPMI_MSG_TYPE_GET_ATTRIBUTE; in sbi_mpxy_rpmi_init_get_attribute()
108 message->attribute.id = id; in sbi_mpxy_rpmi_init_get_attribute()
109 message->attribute.value = 0; in sbi_mpxy_rpmi_init_get_attribute()
110 message->error = 0; in sbi_mpxy_rpmi_init_get_attribute()
114 sbi_mpxy_rpmi_init_set_attribute(struct sbi_mpxy_rpmi_message *message, in sbi_mpxy_rpmi_init_set_attribute() argument
[all …]
H A Drpmi.h37 * struct rpmi_message_header - Header of an RPMI message
40 * @flags: Message flags (e.g., request/response indicators)
41 * @datalen: Length of the message data in bytes
42 * @token: Message token used for matching responses
53 * struct rpmi_message - RPMI message including header and payload
54 * @header: RPMI message header
55 * @data: Payload of the message (variable length)
57 * This structure represents a full RPMI message. The @data buffer
67 * struct rpmi_notification_event - Notification message for events
89 /* Acknowledgment for normal request message */
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dmd.h4 * \brief This file contains the generic functions for message-digest
37 * \brief Supported message digests.
39 * \warning MD5 and SHA-1 are considered weak message digests and
41 * stronger message digests instead.
49 MBEDTLS_MD_MD5=0x03, /**< The MD5 message digest. */
50 MBEDTLS_MD_RIPEMD160=0x04, /**< The RIPEMD-160 message digest. */
51 MBEDTLS_MD_SHA1=0x05, /**< The SHA-1 message digest. */
52 MBEDTLS_MD_SHA224=0x08, /**< The SHA-224 message digest. */
53 MBEDTLS_MD_SHA256=0x09, /**< The SHA-256 message digest. */
54 MBEDTLS_MD_SHA384=0x0a, /**< The SHA-384 message digest. */
[all …]
H A Dmd5.h4 * \brief MD5 message digest algorithm (hash function)
6 * \warning MD5 is considered a weak message digest and its use constitutes a
7 * security risk. We recommend considering stronger message
34 * \warning MD5 is considered a weak message digest and its use
36 * stronger message digests instead.
55 * \warning MD5 is considered a weak message digest and its use
57 * stronger message digests instead.
67 * \warning MD5 is considered a weak message digest and its use
69 * stronger message digests instead.
80 * \warning MD5 is considered a weak message digest and its use
[all …]
H A Dsha1.h9 * \warning SHA-1 is considered a weak message digest and its use constitutes
10 * a security risk. We recommend considering stronger message
40 * \warning SHA-1 is considered a weak message digest and its use
42 * stronger message digests instead.
59 * \warning SHA-1 is considered a weak message digest and its use
61 * stronger message digests instead.
72 * \warning SHA-1 is considered a weak message digest and its use
74 * stronger message digests instead.
87 * \warning SHA-1 is considered a weak message digest and its use
89 * stronger message digests instead.
[all …]
/optee_os/core/drivers/scmi-msg/
H A Dcommon.h65 * struct scmi_msg - SCMI message context
68 * @protocol_id: SCMI protocol ID for the related message, set by caller agent
69 * @message_id: SCMI message ID for the related message, set by caller agent
70 * @in: Address of the incoming message payload copied in secure memory
71 * @in_size: Byte length of the incoming message payload, set by caller agent
72 * @out: Address of of the output message payload message in non-secure memory
74 * @out_size_out: Byte length of the output message payload
89 * the handler function for the incoming message ID.
94 * Process Read, process and write response for input SCMI message
96 * @msg: SCMI message context
[all …]
H A Dsmt.c22 * @length: Byte size of message payload (variable) + ::message_header (32bit)
23 * payload: SCMI message payload data
35 /* Flag set in smt_header::status when SMT does not contain pending message */
63 * Creates a SCMI message instance in secure memory and push it in the SCMI
64 * message drivers. Message structure contains SCMI protocol meta-data and
65 * references to input payload in secure memory and output message buffer
110 /* Fill message */ in scmi_entry_smt()
127 /* Update message length with the length of the response message */ in scmi_entry_smt()
H A Dshm_msg.c21 * @payload: SCMI message payload data
39 * Creates a SCMI message instance in secure memory and push it in the SCMI
40 * message drivers. Message structure contains SCMI protocol meta-data and
41 * references to input payload in secure memory and output message buffer
74 /* Copy SCMI protocol data and message payload in secure memory */ in scmi_entry_msg()
86 /* Prepare output message buffer references */ in scmi_entry_msg()
/optee_os/core/arch/riscv/kernel/
H A Dsbi_mpxy_rpmi.c166 * @brief Sends a raw RPMI message over an MPXY channel.
168 * This function transmits a message to the associated platform microcontroller
172 * @param data Pointer to the message payload to send. It must be a
173 * properly initialized RPMI message structure.
179 struct sbi_mpxy_rpmi_message *message = data; in sbi_mpxy_rpmi_send_data() local
185 switch (message->type) { in sbi_mpxy_rpmi_send_data()
187 switch (message->attribute.id) { in sbi_mpxy_rpmi_send_data()
189 message->attribute.value = in sbi_mpxy_rpmi_send_data()
193 message->attribute.value = in sbi_mpxy_rpmi_send_data()
197 message->attribute.value = in sbi_mpxy_rpmi_send_data()
[all …]
H A Dsbi_mpxy.c18 * Holds MPXY-related per-hart data required for message exchange via
273 * sbi_mpxy_send_message_with_response - Send a message and receive response
276 * @message_id: ID of the message
277 * @message: Pointer to transmit buffer (can be NULL if message_len is 0)
284 * the message and receive a response. Copies the received response into
290 uint32_t message_id, void *message, in sbi_mpxy_send_message_with_response() argument
302 if (!message && message_len) in sbi_mpxy_send_message_with_response()
315 memcpy(mpxy->shmem, message, message_len); in sbi_mpxy_send_message_with_response()
341 * sbi_mpxy_send_message_without_response - Send a message via MPXY without
344 * @message_id: Message ID
[all …]
/optee_os/core/drivers/crypto/versal/
H A Drsa.c48 rsa_data->message.data, in do_encrypt()
49 rsa_data->message.length, in do_encrypt()
58 rsa_data->message.data, in do_encrypt()
59 rsa_data->message.length, in do_encrypt()
64 rsa_data->message.data, in do_encrypt()
65 rsa_data->message.length, in do_encrypt()
82 versal_mbox_alloc(rsa_data->message.length, rsa_data->message.data, in do_encrypt()
141 rsa_data->message.data, in do_decrypt()
142 &rsa_data->message.length); in do_decrypt()
151 rsa_data->message.data, in do_decrypt()
[all …]
/optee_os/lib/libutee/include/
H A Dpta_scmi_client.h22 * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL - Process SCMI message in SMT buffer
26 * Shared memory used for SCMI message/response exhange is expected
30 * protocol message ID).
35 * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE - Process SCMI message in
39 * [in/out] memref[1]: Message/response buffer (SMT and SCMI payload)
41 * Shared memory used for SCMI message/response is a SMT buffer
43 * payload whatever message playload size.
45 * protocol message ID).
62 * PTA_SCMI_CMD_PROCESS_MSG_CHANNEL - Process SCMI message in a MSG
66 * [in] memref[1]: Input message shared buffer
[all …]
/optee_os/core/drivers/crypto/crypto_api/acipher/
H A Drsassa.c26 * PKCS#1 V1.5 - Encode the message in Distinguished Encoding Rules
31 * @EM [out] Encoded Message
57 * where T represent the message DigestInfo in DER: in emsa_pkcs1_v1_5_encode()
109 memcpy(buf, ssa_data->message.data, ssa_data->digest_size); in emsa_pkcs1_v1_5_encode()
111 CRYPTO_DUMPBUF("Encoded Message", EM->data, (size_t)EM->length); in emsa_pkcs1_v1_5_encode()
117 * PKCS#1 V1.5 - Encode the message in Distinguished Encoding Rules
122 * @EM [out] Encoded Message
133 * EM Size (modulus size) - 3 bytes - Message Length in emsa_pkcs1_v1_5_encode_noasn1()
137 if (ps_size < ssa_data->message.length) in emsa_pkcs1_v1_5_encode_noasn1()
140 ps_size -= ssa_data->message.length; in emsa_pkcs1_v1_5_encode_noasn1()
[all …]
H A Drsa.c132 rsa_data.message.data = msg; in crypto_acipher_rsanopad_decrypt()
133 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt()
139 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt()
184 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsanopad_encrypt()
185 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt()
248 rsa_data.message.data = msg; in crypto_acipher_rsaes_decrypt()
249 rsa_data.message.length = *msg_len; in crypto_acipher_rsaes_decrypt()
259 /* Set the message size */ in crypto_acipher_rsaes_decrypt()
260 *msg_len = rsa_data.message.length; in crypto_acipher_rsaes_decrypt()
312 /* Message length <= (modulus_size - 11) */ in crypto_acipher_rsaes_encrypt()
[all …]
/optee_os/core/drivers/crypto/hisilicon/
H A Dhpre_rsa.c236 ret = hpre_bin_from_crypto_bin(msg->in, rsa_data->message.data, in hpre_rsa_encrypt_bn2bin()
238 rsa_data->message.length); in hpre_rsa_encrypt_bn2bin()
276 if (rsa_data->message.length > n_bytes) { in rsa_nopad_encrypt()
277 EMSG("Invalid msg length[%zu]", rsa_data->message.length); in rsa_nopad_encrypt()
322 size_t msg_len = rsa_data->message.length; in rsaes_pkcs_v1_5_encode()
343 memcpy(out + PKCS_V1_5_FIXED_LEN + ps_len, rsa_data->message.data, in rsaes_pkcs_v1_5_encode()
355 /* Alloc pkcs_v1.5 encode message data buf */ in rsa_pkcs_encrypt()
356 rsa_enc_info.message.data = malloc(n_bytes); in rsa_pkcs_encrypt()
357 if (!rsa_enc_info.message.data) { in rsa_pkcs_encrypt()
358 EMSG("Fail to alloc message data buf"); in rsa_pkcs_encrypt()
[all …]
/optee_os/core/drivers/crypto/caam/acipher/
H A Dcaam_ecc.c375 * Only required in case message length and key size is more than 40bytes
379 * will be 48bytes and Message size will also be 48bytes.
381 * but in this case, we don't need the padding to be done on the message.
383 * @msg_length: Message Length in bytes
393 * Check if padding is required on message to make it of same length
395 * Only required in case message length and key size is more than 40bytes
400 * @msg_length: Message Length in bytes
409 * Add padding of 00s in start of message
411 * @buf: Buffer in which padded message will be placed.
412 * @data: Original message
[all …]
/optee_os/core/drivers/crypto/crypto_api/include/
H A Ddrvcrypt_acipher.h51 struct drvcrypt_buf message; /* Message to sign or signed */ member
52 struct drvcrypt_buf signature; /* Signature of the message */
68 struct drvcrypt_buf message; /* Message to encrypt or decrypted */ member
100 /* RSA Sign a message and encode the signature */
124 struct drvcrypt_buf message; /* Message to sign or signed */ member
125 struct drvcrypt_buf signature; /* Signature of the message */
145 struct drvcrypt_buf plaintext; /* Clear text message */
146 struct drvcrypt_buf ciphertext; /* Encrypted message */
163 /* ECC Sign a message and returns the signature */
165 /* ECC Verify a message's signature */
[all …]
/optee_os/core/arch/arm/plat-k3/drivers/
H A Dti_sci.c24 * struct ti_sci_xfer - Structure representing a message flow
25 * @tx_message: Transmit message
26 * @rx_message: Receive message
34 * ti_sci_setup_xfer() - Setup message transfer
36 * @msg_type: Message type
37 * @msg_flags: Flag to set for the message
39 * @tx_message_size: transmit message size
41 * @rx_message_size: receive message size
42 * @xfer: Transfer message
45 * exposed to clients of this driver for allocating a message traffic event.
[all …]
H A Dti_sci.h21 * Return: 0 if all goes well, else appropriate error message
34 * Returns 0 for successful request, else returns corresponding error message.
121 * Return: 0 if all goes well, else appropriate error message
134 * Return: 0 if all goes well, else appropriate error message
146 * Return: 0 if all goes well, else appropriate error message
159 * Return: 0 if all goes well, else appropriate error message
171 * Return: 0 if all goes well, else appropriate error message
182 * Return: 0 if all goes well, else appropriate error message
193 * Return: 0 if all goes well, else appropriate error message
205 * Return: 0 if all goes well, else appropriate error message
[all …]
/optee_os/lib/libmbedtls/mbedtls/library/
H A Ddebug_internal.h16 * \brief Print a message to the debug output. This function is always used
21 * \param level error level of the debug message
22 * \param file file the message has occurred in
23 * \param line line number the message has occurred at
40 * \param level error level of the debug message
59 * \param level error level of the debug message
81 * \param level error level of the debug message
103 * \param level error level of the debug message
125 * \param level error level of the debug message
156 * \param level error level of the debug message
H A Dpsa_crypto_mac.h14 /** Calculate the MAC (message authentication code) of a message using Mbed TLS.
30 * \param[in] input Buffer containing the input message.
127 /** Add a message fragment to a multipart MAC operation using Mbed TLS.
141 * \param[in] input Buffer containing the message fragment to add to
157 /** Finish the calculation of the MAC of a message using Mbed TLS.
165 * This function calculates the MAC of the message formed by concatenating
200 /** Finish the calculation of the MAC of a message and compare it with
209 * function. This function calculates the MAC of the message formed by
225 * The expected MAC is identical to the actual MAC of the message.
227 * The MAC of the message was calculated successfully, but it
/optee_os/core/drivers/crypto/se050/core/
H A Drsa.c677 p->message.data, in encrypt_fallback()
678 p->message.length, in encrypt_fallback()
693 p->message.data, in encrypt_fallback()
694 p->message.length, in encrypt_fallback()
710 rsa_data->message.data, in do_encrypt()
711 rsa_data->message.length, in do_encrypt()
718 rsa_data->message.data, in do_encrypt()
719 rsa_data->message.length, in do_encrypt()
730 rsa_data->message.data, in do_encrypt()
731 rsa_data->message.length, in do_encrypt()
[all …]
/optee_os/.github/workflows/
H A Dnotify.yml34 grep message= output.txt >> $GITHUB_OUTPUT
36 if: steps.compute.outputs.message != ''
40 const message = "${{ steps.compute.outputs.message }}";
45 body: message
/optee_os/core/drivers/crypto/ele/include/
H A Dele.h30 * The CRC is the last word of the message
32 * msg: MU message to hash
37 * Initiate a communication with the EdgeLock Enclave. It sends a message
40 * @msg MU message
/optee_os/scripts/
H A Dnotify_maintainers.py6 # Build a message to notify maintainers/reviewers for a PR. Invoked by the
7 # notify.yml workflow which posts the content of the message output by this
21 # message=FYI @handle1 @handle2...
100 message = ""
134 message = "FYI " + " ".join(f"@{h}" for h in new_handles)
139 print(f"message={message}")

12345678910