| /optee_os/core/arch/riscv/include/ |
| H A D | sbi_mpxy_rpmi.h | 22 /* RPMI message protocol specific MPXY attributes */ 31 /* RPMI message protocol specific MPXY message types */ 49 /* RPMI/MPXY message instance */ 101 /** RPMI/MPXY message helper routines */ 104 sbi_mpxy_rpmi_init_get_attribute(struct sbi_mpxy_rpmi_message *message, in sbi_mpxy_rpmi_init_get_attribute() argument 107 message->type = SBI_MPXY_RPMI_MSG_TYPE_GET_ATTRIBUTE; in sbi_mpxy_rpmi_init_get_attribute() 108 message->attribute.id = id; in sbi_mpxy_rpmi_init_get_attribute() 109 message->attribute.value = 0; in sbi_mpxy_rpmi_init_get_attribute() 110 message->error = 0; in sbi_mpxy_rpmi_init_get_attribute() 114 sbi_mpxy_rpmi_init_set_attribute(struct sbi_mpxy_rpmi_message *message, in sbi_mpxy_rpmi_init_set_attribute() argument [all …]
|
| H A D | rpmi.h | 37 * struct rpmi_message_header - Header of an RPMI message 40 * @flags: Message flags (e.g., request/response indicators) 41 * @datalen: Length of the message data in bytes 42 * @token: Message token used for matching responses 53 * struct rpmi_message - RPMI message including header and payload 54 * @header: RPMI message header 55 * @data: Payload of the message (variable length) 57 * This structure represents a full RPMI message. The @data buffer 67 * struct rpmi_notification_event - Notification message for events 89 /* Acknowledgment for normal request message */ [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | md.h | 4 * \brief This file contains the generic functions for message-digest 37 * \brief Supported message digests. 39 * \warning MD5 and SHA-1 are considered weak message digests and 41 * stronger message digests instead. 49 MBEDTLS_MD_MD5=0x03, /**< The MD5 message digest. */ 50 MBEDTLS_MD_RIPEMD160=0x04, /**< The RIPEMD-160 message digest. */ 51 MBEDTLS_MD_SHA1=0x05, /**< The SHA-1 message digest. */ 52 MBEDTLS_MD_SHA224=0x08, /**< The SHA-224 message digest. */ 53 MBEDTLS_MD_SHA256=0x09, /**< The SHA-256 message digest. */ 54 MBEDTLS_MD_SHA384=0x0a, /**< The SHA-384 message digest. */ [all …]
|
| H A D | md5.h | 4 * \brief MD5 message digest algorithm (hash function) 6 * \warning MD5 is considered a weak message digest and its use constitutes a 7 * security risk. We recommend considering stronger message 34 * \warning MD5 is considered a weak message digest and its use 36 * stronger message digests instead. 55 * \warning MD5 is considered a weak message digest and its use 57 * stronger message digests instead. 67 * \warning MD5 is considered a weak message digest and its use 69 * stronger message digests instead. 80 * \warning MD5 is considered a weak message digest and its use [all …]
|
| H A D | sha1.h | 9 * \warning SHA-1 is considered a weak message digest and its use constitutes 10 * a security risk. We recommend considering stronger message 40 * \warning SHA-1 is considered a weak message digest and its use 42 * stronger message digests instead. 59 * \warning SHA-1 is considered a weak message digest and its use 61 * stronger message digests instead. 72 * \warning SHA-1 is considered a weak message digest and its use 74 * stronger message digests instead. 87 * \warning SHA-1 is considered a weak message digest and its use 89 * stronger message digests instead. [all …]
|
| /optee_os/core/drivers/scmi-msg/ |
| H A D | common.h | 65 * struct scmi_msg - SCMI message context 68 * @protocol_id: SCMI protocol ID for the related message, set by caller agent 69 * @message_id: SCMI message ID for the related message, set by caller agent 70 * @in: Address of the incoming message payload copied in secure memory 71 * @in_size: Byte length of the incoming message payload, set by caller agent 72 * @out: Address of of the output message payload message in non-secure memory 74 * @out_size_out: Byte length of the output message payload 89 * the handler function for the incoming message ID. 94 * Process Read, process and write response for input SCMI message 96 * @msg: SCMI message context [all …]
|
| H A D | smt.c | 22 * @length: Byte size of message payload (variable) + ::message_header (32bit) 23 * payload: SCMI message payload data 35 /* Flag set in smt_header::status when SMT does not contain pending message */ 63 * Creates a SCMI message instance in secure memory and push it in the SCMI 64 * message drivers. Message structure contains SCMI protocol meta-data and 65 * references to input payload in secure memory and output message buffer 110 /* Fill message */ in scmi_entry_smt() 127 /* Update message length with the length of the response message */ in scmi_entry_smt()
|
| H A D | shm_msg.c | 21 * @payload: SCMI message payload data 39 * Creates a SCMI message instance in secure memory and push it in the SCMI 40 * message drivers. Message structure contains SCMI protocol meta-data and 41 * references to input payload in secure memory and output message buffer 74 /* Copy SCMI protocol data and message payload in secure memory */ in scmi_entry_msg() 86 /* Prepare output message buffer references */ in scmi_entry_msg()
|
| /optee_os/core/arch/riscv/kernel/ |
| H A D | sbi_mpxy_rpmi.c | 166 * @brief Sends a raw RPMI message over an MPXY channel. 168 * This function transmits a message to the associated platform microcontroller 172 * @param data Pointer to the message payload to send. It must be a 173 * properly initialized RPMI message structure. 179 struct sbi_mpxy_rpmi_message *message = data; in sbi_mpxy_rpmi_send_data() local 185 switch (message->type) { in sbi_mpxy_rpmi_send_data() 187 switch (message->attribute.id) { in sbi_mpxy_rpmi_send_data() 189 message->attribute.value = in sbi_mpxy_rpmi_send_data() 193 message->attribute.value = in sbi_mpxy_rpmi_send_data() 197 message->attribute.value = in sbi_mpxy_rpmi_send_data() [all …]
|
| H A D | sbi_mpxy.c | 18 * Holds MPXY-related per-hart data required for message exchange via 273 * sbi_mpxy_send_message_with_response - Send a message and receive response 276 * @message_id: ID of the message 277 * @message: Pointer to transmit buffer (can be NULL if message_len is 0) 284 * the message and receive a response. Copies the received response into 290 uint32_t message_id, void *message, in sbi_mpxy_send_message_with_response() argument 302 if (!message && message_len) in sbi_mpxy_send_message_with_response() 315 memcpy(mpxy->shmem, message, message_len); in sbi_mpxy_send_message_with_response() 341 * sbi_mpxy_send_message_without_response - Send a message via MPXY without 344 * @message_id: Message ID [all …]
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | rsa.c | 48 rsa_data->message.data, in do_encrypt() 49 rsa_data->message.length, in do_encrypt() 58 rsa_data->message.data, in do_encrypt() 59 rsa_data->message.length, in do_encrypt() 64 rsa_data->message.data, in do_encrypt() 65 rsa_data->message.length, in do_encrypt() 82 versal_mbox_alloc(rsa_data->message.length, rsa_data->message.data, in do_encrypt() 141 rsa_data->message.data, in do_decrypt() 142 &rsa_data->message.length); in do_decrypt() 151 rsa_data->message.data, in do_decrypt() [all …]
|
| /optee_os/lib/libutee/include/ |
| H A D | pta_scmi_client.h | 22 * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL - Process SCMI message in SMT buffer 26 * Shared memory used for SCMI message/response exhange is expected 30 * protocol message ID). 35 * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE - Process SCMI message in 39 * [in/out] memref[1]: Message/response buffer (SMT and SCMI payload) 41 * Shared memory used for SCMI message/response is a SMT buffer 43 * payload whatever message playload size. 45 * protocol message ID). 62 * PTA_SCMI_CMD_PROCESS_MSG_CHANNEL - Process SCMI message in a MSG 66 * [in] memref[1]: Input message shared buffer [all …]
|
| /optee_os/core/drivers/crypto/crypto_api/acipher/ |
| H A D | rsassa.c | 26 * PKCS#1 V1.5 - Encode the message in Distinguished Encoding Rules 31 * @EM [out] Encoded Message 57 * where T represent the message DigestInfo in DER: in emsa_pkcs1_v1_5_encode() 109 memcpy(buf, ssa_data->message.data, ssa_data->digest_size); in emsa_pkcs1_v1_5_encode() 111 CRYPTO_DUMPBUF("Encoded Message", EM->data, (size_t)EM->length); in emsa_pkcs1_v1_5_encode() 117 * PKCS#1 V1.5 - Encode the message in Distinguished Encoding Rules 122 * @EM [out] Encoded Message 133 * EM Size (modulus size) - 3 bytes - Message Length in emsa_pkcs1_v1_5_encode_noasn1() 137 if (ps_size < ssa_data->message.length) in emsa_pkcs1_v1_5_encode_noasn1() 140 ps_size -= ssa_data->message.length; in emsa_pkcs1_v1_5_encode_noasn1() [all …]
|
| H A D | rsa.c | 132 rsa_data.message.data = msg; in crypto_acipher_rsanopad_decrypt() 133 rsa_data.message.length = *msg_len; in crypto_acipher_rsanopad_decrypt() 139 *msg_len = rsa_data.message.length; in crypto_acipher_rsanopad_decrypt() 184 rsa_data.message.data = (uint8_t *)msg; in crypto_acipher_rsanopad_encrypt() 185 rsa_data.message.length = msg_len; in crypto_acipher_rsanopad_encrypt() 248 rsa_data.message.data = msg; in crypto_acipher_rsaes_decrypt() 249 rsa_data.message.length = *msg_len; in crypto_acipher_rsaes_decrypt() 259 /* Set the message size */ in crypto_acipher_rsaes_decrypt() 260 *msg_len = rsa_data.message.length; in crypto_acipher_rsaes_decrypt() 312 /* Message length <= (modulus_size - 11) */ in crypto_acipher_rsaes_encrypt() [all …]
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | hpre_rsa.c | 236 ret = hpre_bin_from_crypto_bin(msg->in, rsa_data->message.data, in hpre_rsa_encrypt_bn2bin() 238 rsa_data->message.length); in hpre_rsa_encrypt_bn2bin() 276 if (rsa_data->message.length > n_bytes) { in rsa_nopad_encrypt() 277 EMSG("Invalid msg length[%zu]", rsa_data->message.length); in rsa_nopad_encrypt() 322 size_t msg_len = rsa_data->message.length; in rsaes_pkcs_v1_5_encode() 343 memcpy(out + PKCS_V1_5_FIXED_LEN + ps_len, rsa_data->message.data, in rsaes_pkcs_v1_5_encode() 355 /* Alloc pkcs_v1.5 encode message data buf */ in rsa_pkcs_encrypt() 356 rsa_enc_info.message.data = malloc(n_bytes); in rsa_pkcs_encrypt() 357 if (!rsa_enc_info.message.data) { in rsa_pkcs_encrypt() 358 EMSG("Fail to alloc message data buf"); in rsa_pkcs_encrypt() [all …]
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| H A D | caam_ecc.c | 375 * Only required in case message length and key size is more than 40bytes 379 * will be 48bytes and Message size will also be 48bytes. 381 * but in this case, we don't need the padding to be done on the message. 383 * @msg_length: Message Length in bytes 393 * Check if padding is required on message to make it of same length 395 * Only required in case message length and key size is more than 40bytes 400 * @msg_length: Message Length in bytes 409 * Add padding of 00s in start of message 411 * @buf: Buffer in which padded message will be placed. 412 * @data: Original message [all …]
|
| /optee_os/core/drivers/crypto/crypto_api/include/ |
| H A D | drvcrypt_acipher.h | 51 struct drvcrypt_buf message; /* Message to sign or signed */ member 52 struct drvcrypt_buf signature; /* Signature of the message */ 68 struct drvcrypt_buf message; /* Message to encrypt or decrypted */ member 100 /* RSA Sign a message and encode the signature */ 124 struct drvcrypt_buf message; /* Message to sign or signed */ member 125 struct drvcrypt_buf signature; /* Signature of the message */ 145 struct drvcrypt_buf plaintext; /* Clear text message */ 146 struct drvcrypt_buf ciphertext; /* Encrypted message */ 163 /* ECC Sign a message and returns the signature */ 165 /* ECC Verify a message's signature */ [all …]
|
| /optee_os/core/arch/arm/plat-k3/drivers/ |
| H A D | ti_sci.c | 24 * struct ti_sci_xfer - Structure representing a message flow 25 * @tx_message: Transmit message 26 * @rx_message: Receive message 34 * ti_sci_setup_xfer() - Setup message transfer 36 * @msg_type: Message type 37 * @msg_flags: Flag to set for the message 39 * @tx_message_size: transmit message size 41 * @rx_message_size: receive message size 42 * @xfer: Transfer message 45 * exposed to clients of this driver for allocating a message traffic event. [all …]
|
| H A D | ti_sci.h | 21 * Return: 0 if all goes well, else appropriate error message 34 * Returns 0 for successful request, else returns corresponding error message. 121 * Return: 0 if all goes well, else appropriate error message 134 * Return: 0 if all goes well, else appropriate error message 146 * Return: 0 if all goes well, else appropriate error message 159 * Return: 0 if all goes well, else appropriate error message 171 * Return: 0 if all goes well, else appropriate error message 182 * Return: 0 if all goes well, else appropriate error message 193 * Return: 0 if all goes well, else appropriate error message 205 * Return: 0 if all goes well, else appropriate error message [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | debug_internal.h | 16 * \brief Print a message to the debug output. This function is always used 21 * \param level error level of the debug message 22 * \param file file the message has occurred in 23 * \param line line number the message has occurred at 40 * \param level error level of the debug message 59 * \param level error level of the debug message 81 * \param level error level of the debug message 103 * \param level error level of the debug message 125 * \param level error level of the debug message 156 * \param level error level of the debug message
|
| H A D | psa_crypto_mac.h | 14 /** Calculate the MAC (message authentication code) of a message using Mbed TLS. 30 * \param[in] input Buffer containing the input message. 127 /** Add a message fragment to a multipart MAC operation using Mbed TLS. 141 * \param[in] input Buffer containing the message fragment to add to 157 /** Finish the calculation of the MAC of a message using Mbed TLS. 165 * This function calculates the MAC of the message formed by concatenating 200 /** Finish the calculation of the MAC of a message and compare it with 209 * function. This function calculates the MAC of the message formed by 225 * The expected MAC is identical to the actual MAC of the message. 227 * The MAC of the message was calculated successfully, but it
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | rsa.c | 677 p->message.data, in encrypt_fallback() 678 p->message.length, in encrypt_fallback() 693 p->message.data, in encrypt_fallback() 694 p->message.length, in encrypt_fallback() 710 rsa_data->message.data, in do_encrypt() 711 rsa_data->message.length, in do_encrypt() 718 rsa_data->message.data, in do_encrypt() 719 rsa_data->message.length, in do_encrypt() 730 rsa_data->message.data, in do_encrypt() 731 rsa_data->message.length, in do_encrypt() [all …]
|
| /optee_os/.github/workflows/ |
| H A D | notify.yml | 34 grep message= output.txt >> $GITHUB_OUTPUT 36 if: steps.compute.outputs.message != '' 40 const message = "${{ steps.compute.outputs.message }}"; 45 body: message
|
| /optee_os/core/drivers/crypto/ele/include/ |
| H A D | ele.h | 30 * The CRC is the last word of the message 32 * msg: MU message to hash 37 * Initiate a communication with the EdgeLock Enclave. It sends a message 40 * @msg MU message
|
| /optee_os/scripts/ |
| H A D | notify_maintainers.py | 6 # Build a message to notify maintainers/reviewers for a PR. Invoked by the 7 # notify.yml workflow which posts the content of the message output by this 21 # message=FYI @handle1 @handle2... 100 message = "" 134 message = "FYI " + " ".join(f"@{h}" for h in new_handles) 139 print(f"message={message}")
|