| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | lmots.h | 146 size_t msg_size, 180 size_t msg_size, const unsigned char *sig, 279 void *p_rng, const unsigned char *msg, size_t msg_size,
|
| H A D | lmots.c | 465 size_t msg_size, in mbedtls_lmots_calculate_public_key_candidate() argument 476 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_calculate_public_key_candidate() 485 ret = create_digit_array_with_checksum(params, msg, msg_size, in mbedtls_lmots_calculate_public_key_candidate() 514 const unsigned char *msg, size_t msg_size, in mbedtls_lmots_verify() argument 520 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_verify() 541 msg, msg_size, sig, sig_size, in mbedtls_lmots_verify() 699 void *p_rng, const unsigned char *msg, size_t msg_size, in mbedtls_lmots_sign() argument 714 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_sign() 734 msg, msg_size, in mbedtls_lmots_sign()
|
| H A D | lms.c | 305 const unsigned char *msg, size_t msg_size, in mbedtls_lms_verify() argument 370 msg_size, in mbedtls_lms_verify() 707 unsigned int msg_size, unsigned char *sig, size_t sig_size, in mbedtls_lms_sign() argument 750 msg_size, in mbedtls_lms_sign()
|
| /optee_os/core/pta/imx/ |
| H A D | manufacturing_protection.c | 47 size_t msg_size = 0; in mp_signature() local 61 msg_size = params[0].memref.size; in mp_signature() 70 res = caam_mp_sign(msg, &msg_size, sig, &sig_size); in mp_signature()
|
| /optee_os/core/drivers/crypto/caam/mp/ |
| H A D | caam_mp.c | 181 TEE_Result caam_mp_sign(uint8_t *msg, size_t *msg_size, uint8_t *sig, in caam_mp_sign() argument 203 if (!msg || !msg_size || !sig || !sig_size) in caam_mp_sign() 211 if (*msg_size > MP_SIGN_MAX_MSG_SIZE) in caam_mp_sign() 215 aligned_msg = caam_alloc(*msg_size); in caam_mp_sign() 221 memcpy(aligned_msg, msg, *msg_size); in caam_mp_sign() 261 ret = caam_dmaobj_input_sgtbuf(&msg_input, aligned_msg, *msg_size); in caam_mp_sign()
|
| /optee_os/core/drivers/crypto/crypto_api/acipher/ |
| H A D | rsassa.c | 332 size_t msg_size = 0; in emsa_pss_encode() local 358 msg_size = 8 + ssa_data->digest_size + ssa_data->salt_len; in emsa_pss_encode() 361 db_size, msg_size); in emsa_pss_encode() 363 msg_db = malloc(MAX(db_size, msg_size)); in emsa_pss_encode() 411 ret = tee_hash_createdigest(ssa_data->hash_algo, msg_db, msg_size, in emsa_pss_encode() 523 size_t msg_size = 0; in emsa_pss_verify() local 549 msg_size = 8 + ssa_data->digest_size + ssa_data->salt_len; in emsa_pss_verify() 552 db_size, msg_size); in emsa_pss_verify() 554 msg_db = malloc(MAX(db_size, msg_size)); in emsa_pss_verify() 700 ret = tee_hash_createdigest(ssa_data->hash_algo, msg_db, msg_size, in emsa_pss_verify()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | lms.h | 321 const unsigned char *msg, size_t msg_size, 432 unsigned int msg_size, unsigned char *sig, size_t sig_size,
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | ecc.c | 146 const uint8_t *msg, size_t msg_size, in sign() argument 198 res = stm32_pka_ecdsa_sign(msg, msg_size, &sig_r, &sig_s, &d, &k, cid); in sign() 222 const uint8_t *msg, size_t msg_size, in verify() argument 269 res = stm32_pka_ecdsa_verif(msg, msg_size, &sig_r, &sig_s, &pk, cid); in verify()
|