Home
last modified time | relevance | path

Searched refs:message (Results 1 – 25 of 34) sorted by relevance

12

/optee_os/core/arch/riscv/include/
H A Dsbi_mpxy_rpmi.h104 sbi_mpxy_rpmi_init_get_attribute(struct sbi_mpxy_rpmi_message *message, in sbi_mpxy_rpmi_init_get_attribute() argument
107 message->type = SBI_MPXY_RPMI_MSG_TYPE_GET_ATTRIBUTE; in sbi_mpxy_rpmi_init_get_attribute()
108 message->attribute.id = id; in sbi_mpxy_rpmi_init_get_attribute()
109 message->attribute.value = 0; in sbi_mpxy_rpmi_init_get_attribute()
110 message->error = 0; in sbi_mpxy_rpmi_init_get_attribute()
114 sbi_mpxy_rpmi_init_set_attribute(struct sbi_mpxy_rpmi_message *message, in sbi_mpxy_rpmi_init_set_attribute() argument
118 message->type = SBI_MPXY_RPMI_MSG_TYPE_SET_ATTRIBUTE; in sbi_mpxy_rpmi_init_set_attribute()
119 message->attribute.id = id; in sbi_mpxy_rpmi_init_set_attribute()
120 message->attribute.value = value; in sbi_mpxy_rpmi_init_set_attribute()
121 message->error = 0; in sbi_mpxy_rpmi_init_set_attribute()
[all …]
H A Dsbi_mpxy.h153 uint32_t message_id, void *message,
159 uint32_t message_id, void *message,
/optee_os/core/arch/riscv/kernel/
H A Dsbi_mpxy_rpmi.c179 struct sbi_mpxy_rpmi_message *message = data; in sbi_mpxy_rpmi_send_data() local
185 switch (message->type) { in sbi_mpxy_rpmi_send_data()
187 switch (message->attribute.id) { in sbi_mpxy_rpmi_send_data()
189 message->attribute.value = in sbi_mpxy_rpmi_send_data()
193 message->attribute.value = in sbi_mpxy_rpmi_send_data()
197 message->attribute.value = in sbi_mpxy_rpmi_send_data()
201 message->attribute.value = in sbi_mpxy_rpmi_send_data()
217 if ((!message->data.request && message->data.request_len) || in sbi_mpxy_rpmi_send_data()
218 (!message->data.response && in sbi_mpxy_rpmi_send_data()
219 message->data.max_response_len)) { in sbi_mpxy_rpmi_send_data()
[all …]
H A Dsbi_mpxy.c290 uint32_t message_id, void *message, in sbi_mpxy_send_message_with_response() argument
302 if (!message && message_len) in sbi_mpxy_send_message_with_response()
315 memcpy(mpxy->shmem, message, message_len); in sbi_mpxy_send_message_with_response()
354 uint32_t message_id, void *message, in sbi_mpxy_send_message_without_response() argument
362 if (!message && message_len) in sbi_mpxy_send_message_without_response()
375 memcpy(mpxy->shmem, message, message_len); in sbi_mpxy_send_message_without_response()
/optee_os/core/drivers/crypto/versal/
H A Drsa.c48 rsa_data->message.data, in do_encrypt()
49 rsa_data->message.length, in do_encrypt()
58 rsa_data->message.data, in do_encrypt()
59 rsa_data->message.length, in do_encrypt()
64 rsa_data->message.data, in do_encrypt()
65 rsa_data->message.length, in do_encrypt()
82 versal_mbox_alloc(rsa_data->message.length, rsa_data->message.data, in do_encrypt()
141 rsa_data->message.data, in do_decrypt()
142 &rsa_data->message.length); in do_decrypt()
151 rsa_data->message.data, in do_decrypt()
[all …]
H A Decc.c343 sdata->message.data, in do_sign()
344 sdata->message.length, in do_sign()
353 sdata->message.data, in do_verify()
354 sdata->message.length, in do_verify()
/optee_os/core/drivers/crypto/hisilicon/
H A Dhpre_rsa.c236 ret = hpre_bin_from_crypto_bin(msg->in, rsa_data->message.data, in hpre_rsa_encrypt_bn2bin()
238 rsa_data->message.length); in hpre_rsa_encrypt_bn2bin()
276 if (rsa_data->message.length > n_bytes) { in rsa_nopad_encrypt()
277 EMSG("Invalid msg length[%zu]", rsa_data->message.length); in rsa_nopad_encrypt()
322 size_t msg_len = rsa_data->message.length; in rsaes_pkcs_v1_5_encode()
343 memcpy(out + PKCS_V1_5_FIXED_LEN + ps_len, rsa_data->message.data, in rsaes_pkcs_v1_5_encode()
356 rsa_enc_info.message.data = malloc(n_bytes); in rsa_pkcs_encrypt()
357 if (!rsa_enc_info.message.data) { in rsa_pkcs_encrypt()
362 rsa_enc_info.message.length = n_bytes; in rsa_pkcs_encrypt()
363 ret = rsaes_pkcs_v1_5_encode(rsa_data, rsa_enc_info.message.data); in rsa_pkcs_encrypt()
[all …]
/optee_os/core/drivers/crypto/se050/core/
H A Drsa.c677 p->message.data, in encrypt_fallback()
678 p->message.length, in encrypt_fallback()
693 p->message.data, in encrypt_fallback()
694 p->message.length, in encrypt_fallback()
710 rsa_data->message.data, in do_encrypt()
711 rsa_data->message.length, in do_encrypt()
718 rsa_data->message.data, in do_encrypt()
719 rsa_data->message.length, in do_encrypt()
730 rsa_data->message.data, in do_encrypt()
731 rsa_data->message.length, in do_encrypt()
[all …]
H A Decc.c713 sdata->message.data, in do_sign()
714 sdata->message.length, in do_sign()
723 sdata->message.data, in do_verify()
724 sdata->message.length, in do_verify()
/optee_os/core/drivers/crypto/crypto_api/acipher/
H A Drsassa.c109 memcpy(buf, ssa_data->message.data, ssa_data->digest_size); in emsa_pkcs1_v1_5_encode()
137 if (ps_size < ssa_data->message.length) in emsa_pkcs1_v1_5_encode_noasn1()
140 ps_size -= ssa_data->message.length; in emsa_pkcs1_v1_5_encode_noasn1()
165 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pkcs1_v1_5_encode_noasn1()
215 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_sign()
216 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_sign()
225 ssa_data->signature.length = rsa_data.message.length; in rsassa_pkcs1_v1_5_sign()
275 rsa_data.message.data = ssa_data->signature.data; in rsassa_pkcs1_v1_5_verify()
276 rsa_data.message.length = ssa_data->signature.length; in rsassa_pkcs1_v1_5_verify()
389 memcpy(buf, ssa_data->message.data, ssa_data->message.length); in emsa_pss_encode()
[all …]
H A Drsa.c132 rsa_data.message.data = msg; in crypto_acipher_rsanopad_decrypt()
133 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt()
139 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt()
184 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsanopad_encrypt()
185 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt()
248 rsa_data.message.data = msg; in crypto_acipher_rsaes_decrypt()
249 rsa_data.message.length = *msg_len; in crypto_acipher_rsaes_decrypt()
260 *msg_len = rsa_data.message.length; in crypto_acipher_rsaes_decrypt()
342 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsaes_encrypt()
343 rsa_data.message.length = msg_len; in crypto_acipher_rsaes_encrypt()
[all …]
H A Ddsa.c162 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_sign()
163 sdata.message.length = msg_len; in crypto_acipher_dsa_sign()
216 sdata.message.data = (uint8_t *)msg; in crypto_acipher_dsa_verify()
217 sdata.message.length = msg_len; in crypto_acipher_dsa_verify()
H A Decc.c204 sdata.message.data = (uint8_t *)msg; in ecc_sign()
205 sdata.message.length = msg_len; in ecc_sign()
267 sdata.message.data = (uint8_t *)msg; in ecc_verify()
268 sdata.message.length = msg_len; in ecc_verify()
/optee_os/core/drivers/crypto/caam/acipher/
H A Dcaam_ecc.c474 ECC_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign()
476 if (padding_required(sdata->message.length, sdata->size_sec)) { in do_sign()
477 ret = add_padding(&caambuf_msg, sdata->message.data, in do_sign()
478 sdata->message.length, sdata->size_sec); in do_sign()
492 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign()
493 sdata->message.length); in do_sign()
546 if (msg_mes_rep(sdata->message.length, sdata->size_sec)) { in do_sign()
563 caam_desc_add_word(desc, sdata->message.length); in do_sign()
637 ECC_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_verify()
660 if (padding_required(sdata->message.length, sdata->size_sec)) { in do_verify()
[all …]
H A Dcaam_rsa.c799 dec_data.message.data = EM.data; in do_oaep_decoding()
800 dec_data.message.length = EM.length; in do_oaep_decoding()
989 if (rsa_data->message.length < db_len) { in do_oaep_decoding()
990 rsa_data->message.length = db_len; in do_oaep_decoding()
995 rsa_data->message.length = db_len; in do_oaep_decoding()
996 memcpy(rsa_data->message.data, &DB.data[b01_idx + 1], in do_oaep_decoding()
997 rsa_data->message.length); in do_oaep_decoding()
999 RSA_DUMPBUF("Message decrypted", rsa_data->message.data, in do_oaep_decoding()
1000 rsa_data->message.length); in do_oaep_decoding()
1080 ps_size = rsa_data->key.n_size - rsa_data->message.length - in do_oaep_encoding()
[all …]
H A Dcaam_dsa.c533 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_sign()
534 sdata->message.length); in do_sign()
543 DSA_DUMPBUF("Message", sdata->message.data, sdata->message.length); in do_sign()
596 caam_desc_add_word(desc, sdata->message.length); in do_sign()
686 ret = caam_dmaobj_input_sgtbuf(&msg, sdata->message.data, in do_verify()
687 sdata->message.length); in do_verify()
751 caam_desc_add_word(desc, sdata->message.length); in do_verify()
/optee_os/core/drivers/crypto/crypto_api/include/
H A Ddrvcrypt_acipher.h51 struct drvcrypt_buf message; /* Message to sign or signed */ member
68 struct drvcrypt_buf message; /* Message to encrypt or decrypted */ member
124 struct drvcrypt_buf message; /* Message to sign or signed */ member
/optee_os/scripts/
H A Dnotify_maintainers.py100 message = ""
134 message = "FYI " + " ".join(f"@{h}" for h in new_handles)
H A Dcheckpatch.sh43 --help Print this help message.
/optee_os/core/tee/
H A Dtee_fs_key_manager.c42 const void *message, size_t message_size) in do_hmac() argument
47 if (!out_key || !in_key || !message) in do_hmac()
58 res = crypto_mac_update(ctx, message, message_size); in do_hmac()
/optee_os/core/include/drivers/
H A Dregulator.h179 void regulator_print_state(const char *message);
207 static inline void regulator_print_state(const char *message __unused) in regulator_print_state()
/optee_os/core/drivers/crypto/stm32/
H A Decc.c215 sdata->message.data, in stm32_sign()
216 sdata->message.length, in stm32_sign()
285 sdata->message.data, in stm32_verify()
286 sdata->message.length, in stm32_verify()
/optee_os/lib/libutee/include/
H A Dtee_internal_api.h379 const void *message, size_t messageLen,
382 const void *message, uint32_t messageLen,
386 const void *message, size_t messageLen,
389 const void *message, uint32_t messageLen,
/optee_os/lib/libutee/
H A Dtee_api_operations.c1464 const void *message, size_t messageLen, in TEE_MACComputeFinal() argument
1470 if (operation == TEE_HANDLE_NULL || (!message && messageLen)) { in TEE_MACComputeFinal()
1492 res = _utee_hash_final(operation->state, message, messageLen, mac, &ml); in TEE_MACComputeFinal()
1510 const void *message, uint32_t messageLen, in __GP11_TEE_MACComputeFinal() argument
1518 res = TEE_MACComputeFinal(operation, message, messageLen, mac, &ml); in __GP11_TEE_MACComputeFinal()
1524 const void *message, size_t messageLen, in TEE_MACCompareFinal() argument
1546 res = TEE_MACComputeFinal(operation, message, messageLen, computed_mac, in TEE_MACCompareFinal()
1572 const void *message, uint32_t messageLen, in __GP11_TEE_MACCompareFinal() argument
1575 return TEE_MACCompareFinal(operation, message, messageLen, mac, macLen); in __GP11_TEE_MACCompareFinal()
/optee_os/core/lib/zlib/
H A Dinffast.c13 # pragma message("Assembler code may have bugs -- use at your own risk")

12