| /optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
| H A D | rsa_sign_hash.c | 28 int padding, in rsa_sign_hash_ex() argument 42 if ((padding != LTC_PKCS_1_V1_5) && in rsa_sign_hash_ex() 43 (padding != LTC_PKCS_1_PSS) && in rsa_sign_hash_ex() 44 (padding != LTC_PKCS_1_V1_5_NA1)) { in rsa_sign_hash_ex() 48 if (padding == LTC_PKCS_1_PSS) { in rsa_sign_hash_ex() 55 if (padding != LTC_PKCS_1_V1_5_NA1) { in rsa_sign_hash_ex() 72 if (padding == LTC_PKCS_1_PSS) { in rsa_sign_hash_ex() 83 if (padding == LTC_PKCS_1_V1_5) { in rsa_sign_hash_ex() 123 if (padding == LTC_PKCS_1_V1_5) { in rsa_sign_hash_ex()
|
| H A D | rsa_decrypt_key.c | 31 int padding, in rsa_decrypt_key_ex() argument 48 if ((padding != LTC_PKCS_1_V1_5) && in rsa_decrypt_key_ex() 49 (padding != LTC_PKCS_1_OAEP)) { in rsa_decrypt_key_ex() 53 if (padding == LTC_PKCS_1_OAEP) { in rsa_decrypt_key_ex() 82 if (padding == LTC_PKCS_1_OAEP) { in rsa_decrypt_key_ex()
|
| H A D | rsa_encrypt_key.c | 32 int padding, in rsa_encrypt_key_ex() argument 44 if ((padding != LTC_PKCS_1_V1_5) && in rsa_encrypt_key_ex() 45 (padding != LTC_PKCS_1_OAEP)) { in rsa_encrypt_key_ex() 54 if (padding == LTC_PKCS_1_OAEP) { in rsa_encrypt_key_ex() 71 if (padding == LTC_PKCS_1_OAEP) { in rsa_encrypt_key_ex()
|
| H A D | rsa_verify_hash.c | 28 int padding, in rsa_verify_hash_ex() argument 49 if ((padding != LTC_PKCS_1_V1_5) && in rsa_verify_hash_ex() 50 (padding != LTC_PKCS_1_PSS) && in rsa_verify_hash_ex() 51 (padding != LTC_PKCS_1_V1_5_NA1)) { in rsa_verify_hash_ex() 55 if (padding != LTC_PKCS_1_V1_5_NA1) { in rsa_verify_hash_ex() 90 if (padding == LTC_PKCS_1_PSS) { in rsa_verify_hash_ex() 125 if (padding == LTC_PKCS_1_V1_5) { in rsa_verify_hash_ex()
|
| H A D | rsa_sign_saltlen_get.c | 19 int rsa_sign_saltlen_get_max_ex(int padding, int hash_idx, const rsa_key *key) in rsa_sign_saltlen_get_max_ex() argument 25 (padding == LTC_PKCS_1_PSS)) in rsa_sign_saltlen_get_max_ex()
|
| /optee_os/scripts/ |
| H A D | sign_helper_kms.py | 15 from cryptography.hazmat.primitives.asymmetric.padding import ( 45 def sign(self, data: bytes, padding: AsymmetricPadding, 54 if isinstance(padding, PSS): 56 elif isinstance(padding, PKCS1v15): 82 self, padding: AsymmetricPadding, algorithm: hashes.HashAlgorithm 86 def decrypt(self, ciphertext: bytes, padding: AsymmetricPadding) -> bytes:
|
| H A D | sign_encrypt.py | 731 from cryptography.hazmat.primitives.asymmetric import padding 734 pad = padding.PSS(mgf=padding.MGF1(self.chosen_hash), 737 pad = padding.PKCS1v15()
|
| /optee_os/core/lib/libtomcrypt/src/misc/padding/ |
| H A D | padding_pad.c | 16 enum padding_type padding; in s_padding_padded_length() local 22 padding = mode & LTC_PAD_MASK; in s_padding_padded_length() 25 switch (padding) { in s_padding_padded_length() 60 if ((pad == 0) && (padding != LTC_PAD_ZERO)) { in s_padding_padded_length()
|
| /optee_os/core/mm/ |
| H A D | boot_mem.c | 56 struct boot_mem_padding *padding; member 97 pad->next = desc->padding; in add_padding() 98 desc->padding = pad; in add_padding() 221 if (boot_mem_desc->padding) { in boot_mem_relocate() 222 boot_mem_desc->padding = add_offs(boot_mem_desc->padding, offs); in boot_mem_relocate() 223 pad = boot_mem_desc->padding; in boot_mem_relocate() 257 prev = &boot_mem_desc->padding; in boot_mem_foreach_padding() 258 for (pad = boot_mem_desc->padding; pad; pad = next) { in boot_mem_foreach_padding()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | pkcs5.c | 240 mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7; in mbedtls_pkcs5_pbes2_ext() local 248 padding = MBEDTLS_PADDING_NONE; in mbedtls_pkcs5_pbes2_ext() 251 if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) { in mbedtls_pkcs5_pbes2_ext()
|
| H A D | pkcs12.c | 211 mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7; in mbedtls_pkcs12_pbe_ext() local 219 padding = MBEDTLS_PADDING_NONE; in mbedtls_pkcs12_pbe_ext() 222 if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) { in mbedtls_pkcs12_pbe_ext()
|
| H A D | rsa.c | 959 ctx->padding = MBEDTLS_RSA_PKCS_V15; in mbedtls_rsa_init() 973 int mbedtls_rsa_set_padding(mbedtls_rsa_context *ctx, int padding, in mbedtls_rsa_set_padding() argument 976 switch (padding) { in mbedtls_rsa_set_padding() 991 if ((padding == MBEDTLS_RSA_PKCS_V21) && in mbedtls_rsa_set_padding() 1000 ctx->padding = padding; in mbedtls_rsa_set_padding() 1011 return ctx->padding; in mbedtls_rsa_get_padding_mode() 1896 switch (ctx->padding) { in mbedtls_rsa_pkcs1_encrypt() 1938 if (ctx->padding != MBEDTLS_RSA_PKCS_V21) { in mbedtls_rsa_rsaes_oaep_decrypt() 2062 if (ctx->padding != MBEDTLS_RSA_PKCS_V15) { in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 2097 switch (ctx->padding) { in mbedtls_rsa_pkcs1_decrypt() [all …]
|
| H A D | ssl_msg.c | 983 size_t padding = in mbedtls_ssl_encrypt_buf() local 990 padding) != 0) { in mbedtls_ssl_encrypt_buf() 1007 size_t padding = in mbedtls_ssl_encrypt_buf() local 1021 padding) != 0) { in mbedtls_ssl_encrypt_buf()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | rsa.h | 111 int MBEDTLS_PRIVATE(padding); /*!< Selects padding mode: 175 int mbedtls_rsa_set_padding(mbedtls_rsa_context *ctx, int padding,
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pk.h | 80 int padding, 87 int padding, 92 int padding, 99 int padding, 103 int rsa_sign_saltlen_get_max_ex(int padding, int hash_idx, const rsa_key *key);
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 60 * Fix a timing side channel in the implementation of PKCS#7 padding 598 * mbedtls_pem_read_buffer() now performs a check on the padding data of 601 mbedtls_pk_encrypt() on non-opaque RSA keys to honor the padding mode in 833 that the output after decryption may include CBC padding. Consider moving 837 * Improve padding calculations in CBC decryption, NIST key unwrapping and 840 time code, which could allow a padding oracle attack if the attacker 961 this call accidentally applied a default padding mode chosen at compile 1052 to read non-public fields for padding mode and hash id from 3197 either used both encrypt and decrypt key schedules, or which perform padding. 3393 decryption that could lead to a Bleichenbacher-style padding oracle [all …]
|