| /optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
| H A D | dsa_verify_key.c | 23 int dsa_verify_key(const dsa_key *key, int *stat) in dsa_verify_key() argument 27 err = dsa_int_validate_primes(key, stat); in dsa_verify_key() 28 if (err != CRYPT_OK || *stat == 0) return err; in dsa_verify_key() 30 err = dsa_int_validate_pqg(key, stat); in dsa_verify_key() 31 if (err != CRYPT_OK || *stat == 0) return err; in dsa_verify_key() 33 return dsa_int_validate_xy(key, stat); in dsa_verify_key() 44 int dsa_int_validate_pqg(const dsa_key *key, int *stat) in dsa_int_validate_pqg() argument 50 LTC_ARGCHK(stat != NULL); in dsa_int_validate_pqg() 51 *stat = 0; in dsa_int_validate_pqg() 85 *stat = 1; in dsa_int_validate_pqg() [all …]
|
| H A D | dsa_verify_hash.c | 25 int *stat, const dsa_key *key) in dsa_verify_hash_raw() argument 32 LTC_ARGCHK(stat != NULL); in dsa_verify_hash_raw() 36 *stat = 0; in dsa_verify_hash_raw() 70 *stat = 1; in dsa_verify_hash_raw() 91 int *stat, const dsa_key *key) in dsa_verify_hash() argument 98 LTC_ARGCHK(stat != NULL); in dsa_verify_hash() 99 *stat = 0; /* must be set before the first return */ in dsa_verify_hash() 119 err = dsa_verify_hash_raw(r, s, hash, hashlen, stat, key); in dsa_verify_hash()
|
| H A D | dsa_set.c | 24 int err, stat; in dsa_set_pqg() local 43 … if ((err = dsa_int_validate_pqg(key, &stat)) != CRYPT_OK) { goto LBL_ERR; } in dsa_set_pqg() 44 if (stat == 0) { in dsa_set_pqg() 69 int err, stat = 0; in dsa_set_key() local 89 …if ((err = dsa_int_validate_xy(key, &stat)) != CRYPT_OK) { goto LBL_ER… in dsa_set_key() 90 if (stat == 0) { in dsa_set_key()
|
| H A D | dsa_set_pqg_dsaparam.c | 21 int err, stat; in dsa_set_pqg_dsaparam() local 42 if ((err = dsa_int_validate_pqg(key, &stat)) != CRYPT_OK) { in dsa_set_pqg_dsaparam() 45 if (stat == 0) { in dsa_set_pqg_dsaparam()
|
| H A D | dsa_import.c | 21 int err, stat; in dsa_import() local 121 if ((err = dsa_int_validate_pqg(key, &stat)) != CRYPT_OK) { in dsa_import() 124 if (stat == 0) { in dsa_import() 129 if ((err = dsa_int_validate_xy(key, &stat)) != CRYPT_OK) { in dsa_import() 132 if (stat == 0) { in dsa_import()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ed25519/ |
| H A D | ed25519_verify.c | 15 int *stat, in s_ed25519_verify() argument 24 LTC_ARGCHK(stat != NULL); in s_ed25519_verify() 27 *stat = 0; in s_ed25519_verify() 41 err = tweetnacl_crypto_sign_open(stat, in s_ed25519_verify() 70 int *stat, in ed25519ctx_verify() argument 81 return s_ed25519_verify(msg, msglen, sig, siglen, ctx_prefix, ctx_prefix_size, stat, public_key); in ed25519ctx_verify() 99 int *stat, in ed25519ph_verify() argument 113 …519_verify(msg_hash, sizeof(msg_hash), sig, siglen, ctx_prefix, ctx_prefix_size, stat, public_key); in ed25519ph_verify() 128 int *stat, in ed25519_verify() argument 131 return s_ed25519_verify(msg, msglen, sig, siglen, NULL, 0, stat, public_key); in ed25519_verify()
|
| /optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
| H A D | rsa_verify_hash.c | 30 int *stat, const rsa_key *key) in rsa_verify_hash_ex() argument 40 LTC_ARGCHK(stat != NULL); in rsa_verify_hash_ex() 44 *stat = 0; in rsa_verify_hash_ex() 95 … err = pkcs_1_pss_decode(hash, hashlen, tmpbuf+1, x-1, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 98 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 100 if (*stat) { in rsa_verify_hash_ex() 171 *stat = 1; in rsa_verify_hash_ex() 180 *stat = 1; in rsa_verify_hash_ex() 186 if (!*stat) { in rsa_verify_hash_ex() 207 FTMN_CALLEE_DONE_CHECK(&ftmn, FTMN_INCR0, FTMN_STEP_COUNT(1, inc1), !*stat); in rsa_verify_hash_ex()
|
| H A D | rsa_decrypt_key.c | 32 int *stat, const rsa_key *key) in rsa_decrypt_key_ex() argument 42 LTC_ARGCHK(stat != NULL); in rsa_decrypt_key_ex() 45 *stat = 0; in rsa_decrypt_key_ex() 85 lparam_hash, out, outlen, stat); in rsa_decrypt_key_ex() 88 err = pkcs_1_v1_5_decode(tmp, x, LTC_PKCS_1_EME, modulus_bitlen, out, outlen, stat); in rsa_decrypt_key_ex()
|
| /optee_os/core/lib/libtomcrypt/src/encauth/ocb/ |
| H A D | ocb_done_decrypt.c | 26 const unsigned char *tag, unsigned long taglen, int *stat) in ocb_done_decrypt() argument 36 LTC_ARGCHK(stat != NULL); in ocb_done_decrypt() 39 *stat = 0; in ocb_done_decrypt() 53 *stat = 1; in ocb_done_decrypt()
|
| H A D | ocb_decrypt_verify_memory.c | 32 int *stat) in ocb_decrypt_verify_memory() argument 42 LTC_ARGCHK(stat != NULL); in ocb_decrypt_verify_memory() 63 err = ocb_done_decrypt(ocb, ct, ctlen, pt, tag, taglen, stat); in ocb_decrypt_verify_memory()
|
| /optee_os/core/lib/libtomcrypt/src/encauth/eax/ |
| H A D | eax_decrypt_verify_memory.c | 36 int *stat) in eax_decrypt_verify_memory() argument 43 LTC_ARGCHK(stat != NULL); in eax_decrypt_verify_memory() 50 *stat = 0; in eax_decrypt_verify_memory() 83 *stat = 1; in eax_decrypt_verify_memory()
|
| /optee_os/core/lib/libtomcrypt/src/encauth/ocb3/ |
| H A D | ocb3_decrypt_verify_memory.c | 36 int *stat) in ocb3_decrypt_verify_memory() argument 43 LTC_ARGCHK(stat != NULL); in ocb3_decrypt_verify_memory() 46 *stat = 0; in ocb3_decrypt_verify_memory() 85 *stat = 1; in ocb3_decrypt_verify_memory()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | ed25519.c | 158 int stat = 0; in crypto_acipher_ed25519_verify() local 169 if (ed25519_verify(msg, msg_len, sig, sig_len, &stat, in crypto_acipher_ed25519_verify() 173 if (stat != 1) in crypto_acipher_ed25519_verify() 185 int stat = 0; in crypto_acipher_ed25519ctx_verify() local 198 &stat, &public_key) != CRYPT_OK) in crypto_acipher_ed25519ctx_verify() 202 &stat, &public_key) != CRYPT_OK) in crypto_acipher_ed25519ctx_verify() 206 if (stat != 1) in crypto_acipher_ed25519ctx_verify()
|
| H A D | rsa.c | 637 int stat, ltc_hashindex, ltc_res, ltc_rsa_algo; in sw_crypto_acipher_rsassa_verify() local 703 ltc_hashindex, salt_len, &stat, <c_key); in sw_crypto_acipher_rsassa_verify() 704 res = convert_ltc_verify_status(ltc_res, stat); in sw_crypto_acipher_rsassa_verify()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pk.h | 62 #define rsa_decrypt_key(in, inlen, out, outlen, lparam, lparamlen, hash_idx, stat, key) \ argument 63 …rsa_decrypt_key_ex(in, inlen, out, outlen, lparam, lparamlen, hash_idx, -1, LTC_PKCS_1_OAEP, stat,… 68 #define rsa_verify_hash(sig, siglen, hash, hashlen, hash_idx, saltlen, stat, key) \ argument 69 rsa_verify_hash_ex(sig, siglen, hash, hashlen, LTC_PKCS_1_PSS, hash_idx, saltlen, stat, key) 88 int *stat, const rsa_key *key); 101 int *stat, const rsa_key *key); 317 ecc_signature_type sigformat, int *stat, const ecc_key *key); 373 int *stat, 378 int *stat, 383 int *stat, [all …]
|
| H A D | tomcrypt_mac.h | 286 int *stat); 320 const unsigned char *tag, unsigned long taglen, int *stat); 335 int *stat); 398 int *stat);
|
| H A D | tomcrypt_private.h | 379 int dsa_int_validate_xy(const dsa_key *key, int *stat); 380 int dsa_int_validate_pqg(const dsa_key *key, int *stat); 381 int dsa_int_validate_primes(const dsa_key *key, int *stat); 393 int *stat,
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_verify_hash.c | 26 ecc_signature_type sigformat, int *stat, const ecc_key *key) in ecc_verify_hash_ex() argument 38 LTC_ARGCHK(stat != NULL); in ecc_verify_hash_ex() 42 *stat = 0; in ecc_verify_hash_ex() 191 *stat = 1; in ecc_verify_hash_ex()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ec25519/ |
| H A D | tweetnacl.c | 452 int tweetnacl_crypto_sign_open(int *stat, u8 *m,u64 *mlen,const u8 *sm,u64 smlen,const u8 *ctx,u64 … in tweetnacl_crypto_sign_open() argument 458 *stat = 0; in tweetnacl_crypto_sign_open() 483 *stat = 1; in tweetnacl_crypto_sign_open()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | x509_crt.c | 1596 struct stat sb; in mbedtls_x509_crt_parse_path() 1621 } else if (stat(entry_name, &sb) == -1) { in mbedtls_x509_crt_parse_path()
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 5736 * x509parse_crtpath() is now reentrant and uses more portable stat()
|