| /optee_os/core/arch/riscv/include/ |
| H A D | sbi_mpxy_rpmi.h | 104 sbi_mpxy_rpmi_init_get_attribute(struct sbi_mpxy_rpmi_message *message, in sbi_mpxy_rpmi_init_get_attribute() argument 107 message->type = SBI_MPXY_RPMI_MSG_TYPE_GET_ATTRIBUTE; in sbi_mpxy_rpmi_init_get_attribute() 108 message->attribute.id = id; in sbi_mpxy_rpmi_init_get_attribute() 109 message->attribute.value = 0; in sbi_mpxy_rpmi_init_get_attribute() 110 message->error = 0; in sbi_mpxy_rpmi_init_get_attribute() 114 sbi_mpxy_rpmi_init_set_attribute(struct sbi_mpxy_rpmi_message *message, in sbi_mpxy_rpmi_init_set_attribute() argument 118 message->type = SBI_MPXY_RPMI_MSG_TYPE_SET_ATTRIBUTE; in sbi_mpxy_rpmi_init_set_attribute() 119 message->attribute.id = id; in sbi_mpxy_rpmi_init_set_attribute() 120 message->attribute.value = value; in sbi_mpxy_rpmi_init_set_attribute() 121 message->error = 0; in sbi_mpxy_rpmi_init_set_attribute() [all …]
|
| H A D | sbi_mpxy.h | 153 uint32_t message_id, void *message, 159 uint32_t message_id, void *message,
|
| /optee_os/core/arch/riscv/kernel/ |
| H A D | sbi_mpxy_rpmi.c | 179 struct sbi_mpxy_rpmi_message *message = data; in sbi_mpxy_rpmi_send_data() local 185 switch (message->type) { in sbi_mpxy_rpmi_send_data() 187 switch (message->attribute.id) { in sbi_mpxy_rpmi_send_data() 189 message->attribute.value = in sbi_mpxy_rpmi_send_data() 193 message->attribute.value = in sbi_mpxy_rpmi_send_data() 197 message->attribute.value = in sbi_mpxy_rpmi_send_data() 201 message->attribute.value = in sbi_mpxy_rpmi_send_data() 217 if ((!message->data.request && message->data.request_len) || in sbi_mpxy_rpmi_send_data() 218 (!message->data.response && in sbi_mpxy_rpmi_send_data() 219 message->data.max_response_len)) { in sbi_mpxy_rpmi_send_data() [all …]
|
| H A D | sbi_mpxy.c | 290 uint32_t message_id, void *message, in sbi_mpxy_send_message_with_response() argument 302 if (!message && message_len) in sbi_mpxy_send_message_with_response() 315 memcpy(mpxy->shmem, message, message_len); in sbi_mpxy_send_message_with_response() 354 uint32_t message_id, void *message, in sbi_mpxy_send_message_without_response() argument 362 if (!message && message_len) in sbi_mpxy_send_message_without_response() 375 memcpy(mpxy->shmem, message, message_len); in sbi_mpxy_send_message_without_response()
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | rsa.c | 48 rsa_data->message.data, in do_encrypt() 49 rsa_data->message.length, in do_encrypt() 58 rsa_data->message.data, in do_encrypt() 59 rsa_data->message.length, in do_encrypt() 64 rsa_data->message.data, in do_encrypt() 65 rsa_data->message.length, in do_encrypt() 82 versal_mbox_alloc(rsa_data->message.length, rsa_data->message.data, in do_encrypt() 141 rsa_data->message.data, in do_decrypt() 142 &rsa_data->message.length); in do_decrypt() 151 rsa_data->message.data, in do_decrypt() [all …]
|
| H A D | ecc.c | 343 sdata->message.data, in do_sign() 344 sdata->message.length, in do_sign() 353 sdata->message.data, in do_verify() 354 sdata->message.length, in do_verify()
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | hpre_rsa.c | 236 ret = hpre_bin_from_crypto_bin(msg->in, rsa_data->message.data, in hpre_rsa_encrypt_bn2bin() 238 rsa_data->message.length); in hpre_rsa_encrypt_bn2bin() 276 if (rsa_data->message.length > n_bytes) { in rsa_nopad_encrypt() 277 EMSG("Invalid msg length[%zu]", rsa_data->message.length); in rsa_nopad_encrypt() 322 size_t msg_len = rsa_data->message.length; in rsaes_pkcs_v1_5_encode() 343 memcpy(out + PKCS_V1_5_FIXED_LEN + ps_len, rsa_data->message.data, in rsaes_pkcs_v1_5_encode() 356 rsa_enc_info.message.data = malloc(n_bytes); in rsa_pkcs_encrypt() 357 if (!rsa_enc_info.message.data) { in rsa_pkcs_encrypt() 362 rsa_enc_info.message.length = n_bytes; in rsa_pkcs_encrypt() 363 ret = rsaes_pkcs_v1_5_encode(rsa_data, rsa_enc_info.message.data); in rsa_pkcs_encrypt() [all …]
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | rsa.c | 677 p->message.data, in encrypt_fallback() 678 p->message.length, in encrypt_fallback() 693 p->message.data, in encrypt_fallback() 694 p->message.length, in encrypt_fallback() 710 rsa_data->message.data, in do_encrypt() 711 rsa_data->message.length, in do_encrypt() 718 rsa_data->message.data, in do_encrypt() 719 rsa_data->message.length, in do_encrypt() 730 rsa_data->message.data, in do_encrypt() 731 rsa_data->message.length, in do_encrypt() [all …]
|
| H A D | ecc.c | 713 sdata->message.data, in do_sign() 714 sdata->message.length, in do_sign() 723 sdata->message.data, in do_verify() 724 sdata->message.length, in do_verify()
|
| /optee_os/core/drivers/crypto/crypto_api/acipher/ |
| H A D | rsassa.c | 109 memcpy(buf, ssa_data->message.data, ssa_data->digest_size); in emsa_pkcs1_v1_5_encode() 137 if (ps_size < ssa_data->message.length) in emsa_pkcs1_v1_5_encode_noasn1() 140 ps_size -= ssa_data->message.length; in emsa_pkcs1_v1_5_encode_noasn1() 165 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pkcs1_v1_5_encode_noasn1() 215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign() 216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign() 225 ssa_data->signature.length = rsa_data.message.length; in rsassa_pkcs1_v1_5_sign() 275 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify() 276 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_verify() 389 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_encode() [all …]
|
| H A D | rsa.c | 132 rsa_data.message.data = msg; in crypto_acipher_rsanopad_decrypt() 133 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt() 139 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt() 184 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsanopad_encrypt() 185 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt() 248 rsa_data.message.data = msg; in crypto_acipher_rsaes_decrypt() 249 rsa_data.message.length = *msg_len; in crypto_acipher_rsaes_decrypt() 260 *msg_len = rsa_data.message.length; in crypto_acipher_rsaes_decrypt() 342 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsaes_encrypt() 343 rsa_data.message.length = msg_len; in crypto_acipher_rsaes_encrypt() [all …]
|
| H A D | dsa.c | 162 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_sign() 163 sdata.message.length = msg_len; in crypto_acipher_dsa_sign() 216 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_verify() 217 sdata.message.length = msg_len; in crypto_acipher_dsa_verify()
|
| H A D | ecc.c | 204 sdata.message.data = (uint8_t *)msg; in ecc_sign() 205 sdata.message.length = msg_len; in ecc_sign() 267 sdata.message.data = (uint8_t *)msg; in ecc_verify() 268 sdata.message.length = msg_len; in ecc_verify()
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| H A D | caam_ecc.c | 474 ECC_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign() 476 if (padding_required(sdata->message.length, sdata->size_sec)) { in do_sign() 477 ret = add_padding(&caambuf_msg, sdata->message.data, in do_sign() 478 sdata->message.length, sdata->size_sec); in do_sign() 492 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign() 493 sdata->message.length); in do_sign() 546 if (msg_mes_rep(sdata->message.length, sdata->size_sec)) { in do_sign() 563 caam_desc_add_word(desc, sdata->message.length); in do_sign() 637 ECC_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_verify() 660 if (padding_required(sdata->message.length, sdata->size_sec)) { in do_verify() [all …]
|
| H A D | caam_rsa.c | 799 dec_data.message.data = EM.data; in do_oaep_decoding() 800 dec_data.message.length = EM.length; in do_oaep_decoding() 989 if (rsa_data->message.length < db_len) { in do_oaep_decoding() 990 rsa_data->message.length = db_len; in do_oaep_decoding() 995 rsa_data->message.length = db_len; in do_oaep_decoding() 996 memcpy(rsa_data->message.data, &DB.data[b01_idx + 1], in do_oaep_decoding() 997 rsa_data->message.length); in do_oaep_decoding() 999 RSA_DUMPBUF("Message decrypted", rsa_data->message.data, in do_oaep_decoding() 1000 rsa_data->message.length); in do_oaep_decoding() 1080 ps_size = rsa_data->key.n_size - rsa_data->message.length - in do_oaep_encoding() [all …]
|
| H A D | caam_dsa.c | 533 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign() 534 sdata->message.length); in do_sign() 543 DSA_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign() 596 caam_desc_add_word(desc, sdata->message.length); in do_sign() 686 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify() 687 sdata->message.length); in do_verify() 751 caam_desc_add_word(desc, sdata->message.length); in do_verify()
|
| /optee_os/core/drivers/crypto/crypto_api/include/ |
| H A D | drvcrypt_acipher.h | 51 struct drvcrypt_buf message; /* Message to sign or signed */ member 68 struct drvcrypt_buf message; /* Message to encrypt or decrypted */ member 124 struct drvcrypt_buf message; /* Message to sign or signed */ member
|
| /optee_os/scripts/ |
| H A D | notify_maintainers.py | 100 message = "" 134 message = "FYI " + " ".join(f"@{h}" for h in new_handles)
|
| H A D | checkpatch.sh | 43 --help Print this help message.
|
| /optee_os/core/tee/ |
| H A D | tee_fs_key_manager.c | 42 const void *message, size_t message_size) in do_hmac() argument 47 if (!out_key || !in_key || !message) in do_hmac() 58 res = crypto_mac_update(ctx, message, message_size); in do_hmac()
|
| /optee_os/core/include/drivers/ |
| H A D | regulator.h | 179 void regulator_print_state(const char *message); 207 static inline void regulator_print_state(const char *message __unused) in regulator_print_state()
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | ecc.c | 215 sdata->message.data, in stm32_sign() 216 sdata->message.length, in stm32_sign() 285 sdata->message.data, in stm32_verify() 286 sdata->message.length, in stm32_verify()
|
| /optee_os/lib/libutee/include/ |
| H A D | tee_internal_api.h | 379 const void *message, size_t messageLen, 382 const void *message, uint32_t messageLen, 386 const void *message, size_t messageLen, 389 const void *message, uint32_t messageLen,
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_operations.c | 1464 const void *message, size_t messageLen, in TEE_MACComputeFinal() argument 1470 if (operation == TEE_HANDLE_NULL || (!message && messageLen)) { in TEE_MACComputeFinal() 1492 res = _utee_hash_final(operation->state, message, messageLen, mac, &ml); in TEE_MACComputeFinal() 1510 const void *message, uint32_t messageLen, in __GP11_TEE_MACComputeFinal() argument 1518 res = TEE_MACComputeFinal(operation, message, messageLen, mac, &ml); in __GP11_TEE_MACComputeFinal() 1524 const void *message, size_t messageLen, in TEE_MACCompareFinal() argument 1546 res = TEE_MACComputeFinal(operation, message, messageLen, computed_mac, in TEE_MACCompareFinal() 1572 const void *message, uint32_t messageLen, in __GP11_TEE_MACCompareFinal() argument 1575 return TEE_MACCompareFinal(operation, message, messageLen, mac, macLen); in __GP11_TEE_MACCompareFinal()
|
| /optee_os/core/lib/zlib/ |
| H A D | inffast.c | 13 # pragma message("Assembler code may have bugs -- use at your own risk")
|