Home
last modified time | relevance | path

Searched refs:stat (Results 1 – 21 of 21) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/pk/dsa/
H A Ddsa_verify_key.c23 int dsa_verify_key(const dsa_key *key, int *stat) in dsa_verify_key() argument
27 err = dsa_int_validate_primes(key, stat); in dsa_verify_key()
28 if (err != CRYPT_OK || *stat == 0) return err; in dsa_verify_key()
30 err = dsa_int_validate_pqg(key, stat); in dsa_verify_key()
31 if (err != CRYPT_OK || *stat == 0) return err; in dsa_verify_key()
33 return dsa_int_validate_xy(key, stat); in dsa_verify_key()
44 int dsa_int_validate_pqg(const dsa_key *key, int *stat) in dsa_int_validate_pqg() argument
50 LTC_ARGCHK(stat != NULL); in dsa_int_validate_pqg()
51 *stat = 0; in dsa_int_validate_pqg()
85 *stat = 1; in dsa_int_validate_pqg()
[all …]
H A Ddsa_verify_hash.c25 int *stat, const dsa_key *key) in dsa_verify_hash_raw() argument
32 LTC_ARGCHK(stat != NULL); in dsa_verify_hash_raw()
36 *stat = 0; in dsa_verify_hash_raw()
70 *stat = 1; in dsa_verify_hash_raw()
91 int *stat, const dsa_key *key) in dsa_verify_hash() argument
98 LTC_ARGCHK(stat != NULL); in dsa_verify_hash()
99 *stat = 0; /* must be set before the first return */ in dsa_verify_hash()
119 err = dsa_verify_hash_raw(r, s, hash, hashlen, stat, key); in dsa_verify_hash()
H A Ddsa_set.c24 int err, stat; in dsa_set_pqg() local
43 … if ((err = dsa_int_validate_pqg(key, &stat)) != CRYPT_OK) { goto LBL_ERR; } in dsa_set_pqg()
44 if (stat == 0) { in dsa_set_pqg()
69 int err, stat = 0; in dsa_set_key() local
89 …if ((err = dsa_int_validate_xy(key, &stat)) != CRYPT_OK) { goto LBL_ER… in dsa_set_key()
90 if (stat == 0) { in dsa_set_key()
H A Ddsa_set_pqg_dsaparam.c21 int err, stat; in dsa_set_pqg_dsaparam() local
42 if ((err = dsa_int_validate_pqg(key, &stat)) != CRYPT_OK) { in dsa_set_pqg_dsaparam()
45 if (stat == 0) { in dsa_set_pqg_dsaparam()
H A Ddsa_import.c21 int err, stat; in dsa_import() local
121 if ((err = dsa_int_validate_pqg(key, &stat)) != CRYPT_OK) { in dsa_import()
124 if (stat == 0) { in dsa_import()
129 if ((err = dsa_int_validate_xy(key, &stat)) != CRYPT_OK) { in dsa_import()
132 if (stat == 0) { in dsa_import()
/optee_os/core/lib/libtomcrypt/src/pk/ed25519/
H A Ded25519_verify.c15 int *stat, in s_ed25519_verify() argument
24 LTC_ARGCHK(stat != NULL); in s_ed25519_verify()
27 *stat = 0; in s_ed25519_verify()
41 err = tweetnacl_crypto_sign_open(stat, in s_ed25519_verify()
70 int *stat, in ed25519ctx_verify() argument
81 return s_ed25519_verify(msg, msglen, sig, siglen, ctx_prefix, ctx_prefix_size, stat, public_key); in ed25519ctx_verify()
99 int *stat, in ed25519ph_verify() argument
113 …519_verify(msg_hash, sizeof(msg_hash), sig, siglen, ctx_prefix, ctx_prefix_size, stat, public_key); in ed25519ph_verify()
128 int *stat, in ed25519_verify() argument
131 return s_ed25519_verify(msg, msglen, sig, siglen, NULL, 0, stat, public_key); in ed25519_verify()
/optee_os/core/lib/libtomcrypt/src/pk/rsa/
H A Drsa_verify_hash.c30 int *stat, const rsa_key *key) in rsa_verify_hash_ex() argument
40 LTC_ARGCHK(stat != NULL); in rsa_verify_hash_ex()
44 *stat = 0; in rsa_verify_hash_ex()
95 … err = pkcs_1_pss_decode(hash, hashlen, tmpbuf+1, x-1, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex()
98 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex()
100 if (*stat) { in rsa_verify_hash_ex()
171 *stat = 1; in rsa_verify_hash_ex()
180 *stat = 1; in rsa_verify_hash_ex()
186 if (!*stat) { in rsa_verify_hash_ex()
207 FTMN_CALLEE_DONE_CHECK(&ftmn, FTMN_INCR0, FTMN_STEP_COUNT(1, inc1), !*stat); in rsa_verify_hash_ex()
H A Drsa_decrypt_key.c32 int *stat, const rsa_key *key) in rsa_decrypt_key_ex() argument
42 LTC_ARGCHK(stat != NULL); in rsa_decrypt_key_ex()
45 *stat = 0; in rsa_decrypt_key_ex()
85 lparam_hash, out, outlen, stat); in rsa_decrypt_key_ex()
88 err = pkcs_1_v1_5_decode(tmp, x, LTC_PKCS_1_EME, modulus_bitlen, out, outlen, stat); in rsa_decrypt_key_ex()
/optee_os/core/lib/libtomcrypt/src/encauth/ocb/
H A Docb_done_decrypt.c26 const unsigned char *tag, unsigned long taglen, int *stat) in ocb_done_decrypt() argument
36 LTC_ARGCHK(stat != NULL); in ocb_done_decrypt()
39 *stat = 0; in ocb_done_decrypt()
53 *stat = 1; in ocb_done_decrypt()
H A Docb_decrypt_verify_memory.c32 int *stat) in ocb_decrypt_verify_memory() argument
42 LTC_ARGCHK(stat != NULL); in ocb_decrypt_verify_memory()
63 err = ocb_done_decrypt(ocb, ct, ctlen, pt, tag, taglen, stat); in ocb_decrypt_verify_memory()
/optee_os/core/lib/libtomcrypt/src/encauth/eax/
H A Deax_decrypt_verify_memory.c36 int *stat) in eax_decrypt_verify_memory() argument
43 LTC_ARGCHK(stat != NULL); in eax_decrypt_verify_memory()
50 *stat = 0; in eax_decrypt_verify_memory()
83 *stat = 1; in eax_decrypt_verify_memory()
/optee_os/core/lib/libtomcrypt/src/encauth/ocb3/
H A Docb3_decrypt_verify_memory.c36 int *stat) in ocb3_decrypt_verify_memory() argument
43 LTC_ARGCHK(stat != NULL); in ocb3_decrypt_verify_memory()
46 *stat = 0; in ocb3_decrypt_verify_memory()
85 *stat = 1; in ocb3_decrypt_verify_memory()
/optee_os/core/lib/libtomcrypt/
H A Ded25519.c158 int stat = 0; in crypto_acipher_ed25519_verify() local
169 if (ed25519_verify(msg, msg_len, sig, sig_len, &stat, in crypto_acipher_ed25519_verify()
173 if (stat != 1) in crypto_acipher_ed25519_verify()
185 int stat = 0; in crypto_acipher_ed25519ctx_verify() local
198 &stat, &public_key) != CRYPT_OK) in crypto_acipher_ed25519ctx_verify()
202 &stat, &public_key) != CRYPT_OK) in crypto_acipher_ed25519ctx_verify()
206 if (stat != 1) in crypto_acipher_ed25519ctx_verify()
H A Drsa.c637 int stat, ltc_hashindex, ltc_res, ltc_rsa_algo; in sw_crypto_acipher_rsassa_verify() local
703 ltc_hashindex, salt_len, &stat, &ltc_key); in sw_crypto_acipher_rsassa_verify()
704 res = convert_ltc_verify_status(ltc_res, stat); in sw_crypto_acipher_rsassa_verify()
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_pk.h62 #define rsa_decrypt_key(in, inlen, out, outlen, lparam, lparamlen, hash_idx, stat, key) \ argument
63 …rsa_decrypt_key_ex(in, inlen, out, outlen, lparam, lparamlen, hash_idx, -1, LTC_PKCS_1_OAEP, stat,…
68 #define rsa_verify_hash(sig, siglen, hash, hashlen, hash_idx, saltlen, stat, key) \ argument
69 rsa_verify_hash_ex(sig, siglen, hash, hashlen, LTC_PKCS_1_PSS, hash_idx, saltlen, stat, key)
88 int *stat, const rsa_key *key);
101 int *stat, const rsa_key *key);
317 ecc_signature_type sigformat, int *stat, const ecc_key *key);
373 int *stat,
378 int *stat,
383 int *stat,
[all …]
H A Dtomcrypt_mac.h286 int *stat);
320 const unsigned char *tag, unsigned long taglen, int *stat);
335 int *stat);
398 int *stat);
H A Dtomcrypt_private.h379 int dsa_int_validate_xy(const dsa_key *key, int *stat);
380 int dsa_int_validate_pqg(const dsa_key *key, int *stat);
381 int dsa_int_validate_primes(const dsa_key *key, int *stat);
393 int *stat,
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
H A Decc_verify_hash.c26 ecc_signature_type sigformat, int *stat, const ecc_key *key) in ecc_verify_hash_ex() argument
38 LTC_ARGCHK(stat != NULL); in ecc_verify_hash_ex()
42 *stat = 0; in ecc_verify_hash_ex()
191 *stat = 1; in ecc_verify_hash_ex()
/optee_os/core/lib/libtomcrypt/src/pk/ec25519/
H A Dtweetnacl.c452 int tweetnacl_crypto_sign_open(int *stat, u8 *m,u64 *mlen,const u8 *sm,u64 smlen,const u8 *ctx,u64 … in tweetnacl_crypto_sign_open() argument
458 *stat = 0; in tweetnacl_crypto_sign_open()
483 *stat = 1; in tweetnacl_crypto_sign_open()
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dx509_crt.c1596 struct stat sb; in mbedtls_x509_crt_parse_path()
1621 } else if (stat(entry_name, &sb) == -1) { in mbedtls_x509_crt_parse_path()
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog5736 * x509parse_crtpath() is now reentrant and uses more portable stat()