| /optee_os/core/lib/libtomcrypt/ |
| H A D | ed25519.c | 80 uint8_t *sig, size_t *sig_len) in crypto_acipher_ed25519_sign() argument 89 if (!key || !sig_len) in crypto_acipher_ed25519_sign() 92 if (*sig_len < UL(64)) { in crypto_acipher_ed25519_sign() 93 *sig_len = UL(64); in crypto_acipher_ed25519_sign() 97 siglen = *sig_len; in crypto_acipher_ed25519_sign() 108 *sig_len = siglen; in crypto_acipher_ed25519_sign() 114 uint8_t *sig, size_t *sig_len, in crypto_acipher_ed25519ctx_sign() argument 125 if (!key || !sig_len) in crypto_acipher_ed25519ctx_sign() 128 if (*sig_len < UL(64)) { in crypto_acipher_ed25519ctx_sign() 129 *sig_len = UL(64); in crypto_acipher_ed25519ctx_sign() [all …]
|
| H A D | dsa.c | 97 uint8_t *sig, size_t *sig_len) in crypto_acipher_dsa_sign() argument 131 if (*sig_len < 2 * mp_unsigned_bin_size(ltc_key.q)) { in crypto_acipher_dsa_sign() 132 *sig_len = 2 * mp_unsigned_bin_size(ltc_key.q); in crypto_acipher_dsa_sign() 147 *sig_len = 2 * mp_unsigned_bin_size(ltc_key.q); in crypto_acipher_dsa_sign() 148 memset(sig, 0, *sig_len); in crypto_acipher_dsa_sign() 149 mp_to_unsigned_bin(r, (uint8_t *)sig + *sig_len/2 - in crypto_acipher_dsa_sign() 151 mp_to_unsigned_bin(s, (uint8_t *)sig + *sig_len - in crypto_acipher_dsa_sign() 166 const uint8_t *sig, size_t sig_len) in crypto_acipher_dsa_verify() argument 192 mp_read_unsigned_bin(r, (uint8_t *)sig, sig_len/2); in crypto_acipher_dsa_verify() 193 mp_read_unsigned_bin(s, (uint8_t *)sig + sig_len/2, sig_len/2); in crypto_acipher_dsa_verify()
|
| H A D | sm2-dsa.c | 23 size_t *sig_len) in sm2_ltc_dsa_sign() argument 35 if (*sig_len < 2 * SM2_INT_SIZE_BYTES) { in sm2_ltc_dsa_sign() 36 *sig_len = 64; in sm2_ltc_dsa_sign() 125 *sig_len = 2 * SM2_INT_SIZE_BYTES; in sm2_ltc_dsa_sign() 126 memset(sig, 0, *sig_len); in sm2_ltc_dsa_sign() 141 const uint8_t *sig, size_t sig_len) in sm2_ltc_dsa_verify() argument 156 if (sig_len != 64) in sm2_ltc_dsa_verify()
|
| H A D | acipher_helpers.h | 57 size_t *sig_len); 61 const uint8_t *sig, size_t sig_len); 66 uint8_t *sig __unused, size_t *sig_len __unused) in sm2_ltc_dsa_sign() 74 const uint8_t *sig __unused, size_t sig_len __unused) in sm2_ltc_dsa_verify()
|
| H A D | ecc.c | 247 uint8_t *sig, size_t *sig_len) in _ltc_ecc_sign() argument 263 if (*sig_len < 2 * key_size_bytes) { in _ltc_ecc_sign() 264 *sig_len = 2 * key_size_bytes; in _ltc_ecc_sign() 269 ltc_sig_len = *sig_len; in _ltc_ecc_sign() 277 *sig_len = ltc_sig_len; in _ltc_ecc_sign() 286 const uint8_t *sig, size_t sig_len) in _ltc_ecc_verify() argument 302 if ((key_size_bytes * 2) != sig_len) { in _ltc_ecc_verify() 307 ltc_res = ecc_verify_hash_rfc7518(sig, sig_len, msg, msg_len, <c_stat, in _ltc_ecc_verify()
|
| H A D | rsa.c | 526 size_t *sig_len) 532 size_t *sig_len) in sw_crypto_acipher_rsassa_sign() argument 597 if (*sig_len < mod_size) { in sw_crypto_acipher_rsassa_sign() 598 *sig_len = mod_size; in sw_crypto_acipher_rsassa_sign() 609 *sig_len = ltc_sig_len; in sw_crypto_acipher_rsassa_sign() 625 size_t sig_len) 632 size_t sig_len) in sw_crypto_acipher_rsassa_verify() argument 664 if (sig_len < bigint_size) { in sw_crypto_acipher_rsassa_verify() 702 ltc_res = rsa_verify_hash_ex(sig, sig_len, msg, msg_len, ltc_rsa_algo, in sw_crypto_acipher_rsassa_verify()
|
| /optee_os/core/drivers/crypto/crypto_api/acipher/ |
| H A D | dsa.c | 123 uint8_t *sig, size_t *sig_len) in crypto_acipher_dsa_sign() argument 131 if (!key || !msg || !sig_len) { in crypto_acipher_dsa_sign() 145 if (*sig_len < 2 * n_bytes) { in crypto_acipher_dsa_sign() 147 *sig_len, 2 * n_bytes); in crypto_acipher_dsa_sign() 148 *sig_len = 2 * n_bytes; in crypto_acipher_dsa_sign() 165 sdata.signature.length = *sig_len; in crypto_acipher_dsa_sign() 170 *sig_len = sdata.signature.length; in crypto_acipher_dsa_sign() 183 const uint8_t *sig, size_t sig_len) in crypto_acipher_dsa_verify() argument 205 if (sig_len != 2 * n_bytes) { in crypto_acipher_dsa_verify() 207 sig_len, 2 * n_bytes); in crypto_acipher_dsa_verify() [all …]
|
| H A D | ecc.c | 163 size_t *sig_len) in ecc_sign() argument 171 if (!key || !msg || !sig_len) { in ecc_sign() 184 if (*sig_len < 2 * size_bytes) { in ecc_sign() 186 *sig_len, 2 * size_bytes); in ecc_sign() 187 *sig_len = 2 * size_bytes; in ecc_sign() 207 sdata.signature.length = *sig_len; in ecc_sign() 212 *sig_len = sdata.signature.length; in ecc_sign() 235 const uint8_t *sig, size_t sig_len) in ecc_verify() argument 256 if (sig_len != 2 * size_bytes) { in ecc_verify() 258 sig_len, 2 * size_bytes); in ecc_verify() [all …]
|
| H A D | rsa.c | 364 size_t *sig_len) in crypto_acipher_rsassa_sign() argument 370 if (!key || !msg || !sig_len) { in crypto_acipher_rsassa_sign() 400 if (rsa_ssa.key.n_size > *sig_len) { in crypto_acipher_rsassa_sign() 402 *sig_len, rsa_ssa.key.n_size); in crypto_acipher_rsassa_sign() 403 *sig_len = rsa_ssa.key.n_size; in crypto_acipher_rsassa_sign() 431 *sig_len = rsa_ssa.signature.length; in crypto_acipher_rsassa_sign() 446 size_t sig_len) in crypto_acipher_rsassa_verify() argument 483 if (rsa_ssa.key.n_size > sig_len) { in crypto_acipher_rsassa_verify() 497 rsa_ssa.signature.length = sig_len; in crypto_acipher_rsassa_verify()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | pk_wrap.c | 67 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() argument 92 if (sig_len < rsa_len) { in rsa_verify_wrap() 114 sig, sig_len); in rsa_verify_wrap() 132 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() argument 144 if (sig_len < rsa_len) { in rsa_verify_wrap() 159 if (sig_len > rsa_len) { in rsa_verify_wrap() 172 size_t *sig_len) in mbedtls_pk_psa_rsa_sign_ext() argument 188 *sig_len = mbedtls_rsa_get_len(rsa_ctx); in mbedtls_pk_psa_rsa_sign_ext() 189 if (sig_size < *sig_len) { in mbedtls_pk_psa_rsa_sign_ext() 211 sig, sig_size, sig_len); in mbedtls_pk_psa_rsa_sign_ext() [all …]
|
| H A D | pk_wrap.h | 38 const unsigned char *sig, size_t sig_len); 43 unsigned char *sig, size_t sig_size, size_t *sig_len, 51 const unsigned char *sig, size_t sig_len, 57 unsigned char *sig, size_t sig_size, size_t *sig_len, 133 size_t *sig_len);
|
| H A D | pk.c | 1041 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument 1065 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable() 1082 sig, sig_len); in mbedtls_pk_verify_restartable() 1090 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify() argument 1093 sig, sig_len, NULL); in mbedtls_pk_verify() 1102 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify_ext() argument 1122 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext() 1184 signature_length = sig_len > mbedtls_pk_get_len(ctx) ? in mbedtls_pk_verify_ext() 1185 mbedtls_pk_get_len(ctx) : sig_len; in mbedtls_pk_verify_ext() 1190 if (status == PSA_SUCCESS && sig_len > mbedtls_pk_get_len(ctx)) { in mbedtls_pk_verify_ext() [all …]
|
| H A D | x509write_csr.c | 147 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local 234 sig, sig_size, &sig_len, in x509write_csr_der_internal() 266 sig, sig_len, pk_alg)); in x509write_csr_der_internal()
|
| H A D | lmots.h | 280 unsigned char *sig, size_t sig_size, size_t *sig_len);
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | ecc.c | 148 const uint8_t *sig, size_t sig_len) in verify() argument 161 if (sig_len % 2) in verify() 170 return pub_ops->verify(algo, key, msg, msg_len, sig, sig_len); in verify() 193 versal_mbox_alloc(sig_len, NULL, &s); in verify() 195 memcpy_swp(s.buf, sig, sig_len / 2); in verify() 196 memcpy_swp((uint8_t *)s.buf + sig_len / 2, sig + sig_len / 2, in verify() 197 sig_len / 2); in verify() 228 uint8_t *sig, size_t *sig_len) in sign() argument 249 return pair_ops->sign(algo, key, msg, msg_len, sig, sig_len); in sign() 283 versal_mbox_alloc(*sig_len, NULL, &s); in sign() [all …]
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | sm2-dsa.c | 27 uint8_t *sig, size_t *sig_len) in sm2_mbedtls_dsa_sign() argument 39 if (*sig_len < 2 * SM2_INT_SIZE_BYTES) { in sm2_mbedtls_dsa_sign() 40 *sig_len = 64; in sm2_mbedtls_dsa_sign() 124 *sig_len = 2 * SM2_INT_SIZE_BYTES; in sm2_mbedtls_dsa_sign() 125 memset(sig, 0, *sig_len); in sm2_mbedtls_dsa_sign() 152 const uint8_t *sig, size_t sig_len) in sm2_mbedtls_dsa_verify() argument 165 if (sig_len != 64) in sm2_mbedtls_dsa_verify()
|
| H A D | ecc.c | 166 size_t *sig_len) in ecc_sign() argument 205 if (*sig_len < 2 * key_size_bytes) { in ecc_sign() 206 *sig_len = 2 * key_size_bytes; in ecc_sign() 220 *sig_len = 2 * key_size_bytes; in ecc_sign() 221 memset(sig, 0, *sig_len); in ecc_sign() 222 mbedtls_mpi_write_binary(&r, sig + *sig_len / 2 - in ecc_sign() 226 mbedtls_mpi_write_binary(&s, sig + *sig_len - in ecc_sign() 245 const uint8_t *sig, size_t sig_len) in ecc_verify() argument 288 if ((key_size_bytes * 2) != sig_len) { in ecc_verify() 293 mbedtls_mpi_read_binary(&r, sig, sig_len / 2); in ecc_verify() [all …]
|
| H A D | sm2-dsa.h | 15 uint8_t *sig, size_t *sig_len); 19 const uint8_t *sig, size_t sig_len);
|
| H A D | rsa.c | 655 uint8_t *sig, size_t *sig_len) 661 uint8_t *sig, size_t *sig_len) in sw_crypto_acipher_rsassa_sign() argument 724 if (*sig_len < mod_size) { in sw_crypto_acipher_rsassa_sign() 725 *sig_len = mod_size; in sw_crypto_acipher_rsassa_sign() 741 *sig_len, sig_len, mbd_rand, NULL); in sw_crypto_acipher_rsassa_sign() 758 size_t sig_len) 766 size_t sig_len) in sw_crypto_acipher_rsassa_verify() argument 815 if (sig_len < bigint_size) { in sw_crypto_acipher_rsassa_verify() 856 sig, sig_len); in sw_crypto_acipher_rsassa_verify()
|
| /optee_os/core/include/crypto/ |
| H A D | crypto.h | 237 uint8_t *sig, size_t *sig_len); 240 uint8_t *sig, size_t *sig_len, 245 const uint8_t *sig, size_t sig_len); 248 const uint8_t *sig, size_t sig_len, 277 size_t *sig_len); 282 size_t sig_len); 285 uint8_t *sig, size_t *sig_len); 288 const uint8_t *sig, size_t sig_len); 291 uint8_t *sig, size_t *sig_len); 294 const uint8_t *sig, size_t sig_len);
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | pk.h | 753 const unsigned char *sig, size_t sig_len); 778 const unsigned char *sig, size_t sig_len, 815 const unsigned char *sig, size_t sig_len); 851 unsigned char *sig, size_t sig_size, size_t *sig_len, 887 unsigned char *sig, size_t sig_size, size_t *sig_len, 923 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | ecc.c | 401 const uint8_t *sig, size_t sig_len) in verify_fallback() argument 407 return pub_ops->verify(algo, key, msg, msg_len, sig, sig_len); in verify_fallback() 412 uint8_t *sig, size_t *sig_len) in sign_fallback() argument 421 return pair_ops->sign(algo, key, msg, msg_len, sig, sig_len); in sign_fallback() 491 uint8_t *sig, size_t *sig_len) in sign() argument 508 return sign_fallback(algo, key, msg, msg_len, sig, sig_len); in sign() 547 if (sig_der_len > *sig_len) { in sign() 553 *sig_len = sig_der_len; in sign() 568 const uint8_t *sig, size_t sig_len) in verify() argument 575 size_t signature_len = sig_len + DER_SIGNATURE_SZ; in verify() [all …]
|
| /optee_os/core/pta/veraison_attestation/ |
| H A D | sign.c | 166 size_t *sig_len) in sign_ecdsa_sha256() argument 183 TEE_SHA256_HASH_SIZE, sig, sig_len); in sign_ecdsa_sha256() 189 TEE_SHA256_HASH_SIZE, sig, *sig_len); in sign_ecdsa_sha256()
|
| H A D | sign.h | 35 size_t *sig_len);
|
| /optee_os/core/crypto/ |
| H A D | crypto.c | 628 size_t *sig_len __unused) in crypto_acipher_rsassa_sign() 639 size_t sig_len __unused) in crypto_acipher_rsassa_verify() 670 size_t *sig_len __unused) in crypto_acipher_dsa_sign() 680 size_t sig_len __unused) in crypto_acipher_dsa_verify() 763 uint8_t *sig, size_t *sig_len) in crypto_acipher_ecc_sign() argument 770 return key->ops->sign(algo, key, msg, msg_len, sig, sig_len); in crypto_acipher_ecc_sign() 775 const uint8_t *sig, size_t sig_len) in crypto_acipher_ecc_verify() argument 782 return key->ops->verify(algo, key, msg, msg_len, sig, sig_len); in crypto_acipher_ecc_verify() 913 size_t *sig_len __unused) in crypto_acipher_ed25519_sign() 923 size_t sig_len __unused) in crypto_acipher_ed25519_verify() [all …]
|