Searched refs:byte (Results 1 – 16 of 16) sorted by relevance
81 uint8_t byte = 0; in _base64_dec() local92 byte = idx << 2; in _base64_dec()97 b[m] = byte | (idx >> 4); in _base64_dec()99 byte = (idx & 0xf) << 4; in _base64_dec()104 b[m] = byte | (idx >> 2); in _base64_dec()106 byte = (idx & 0x3) << 6; in _base64_dec()111 b[m] = byte | idx; in _base64_dec()
162 *ret_insn = (insn >> (state->byte * 8)) & 0xff; in unwind_exec_read_byte()165 if (state->byte == 0) { in unwind_exec_read_byte()166 state->byte = 3; in unwind_exec_read_byte()170 state->byte--; in unwind_exec_read_byte()335 state->byte = 2; in unwind_tab()338 state->byte = 1; in unwind_tab()
71 uint8_t byte[4]; in hw_get_random_bytes() member90 buffer[buffer_pos++] = random.byte[pos++]; in hw_get_random_bytes()
109 uint8_t byte[8]; in hw_get_random_bytes() member122 buffer[buffer_pos++] = fifo.byte[fifo_pos++]; in hw_get_random_bytes()
269 static TEE_Result i2c_write_byte(uint8_t bid, uint8_t byte) in i2c_write_byte() argument274 i2c_io_write8(bid, I2DR, byte); in i2c_write_byte()
103 uint8_t byte[16]; in hw_get_random_bytes() member117 buffer[buffer_pos++] = fifo.byte[fifo_pos++]; in hw_get_random_bytes()
88 #error long int is not a 32bit or 64bit byte
90 #error long int is not a 32bit or 64bit byte
93 #error long int is not a 32bit or 64bit byte
92 #error long int is not a 32bit or 64bit byte
96 #error long int is not a 32bit or 64bit byte
97 #error long int is not a 32bit or 64bit byte
856 uint8_t byte = 0; in pkcs2tee_param_ecdh() local877 rc = serialargs_get(&args, &byte, sizeof(uint8_t)); in pkcs2tee_param_ecdh()881 if (byte != 0x02 && byte != 0x03 && byte != 0x04) in pkcs2tee_param_ecdh()884 if (byte != 0x04) { in pkcs2tee_param_ecdh()
46 unsigned int byte; member
289 uint8_t __maybe_unused byte = 0; in dt_test_crypt_consumer_probe() local306 if (crypto_rng_read(&byte, sizeof(byte))) { in dt_test_crypt_consumer_probe()
726 attacker could for example impersonate a 4-bytes or 16-byte domain by756 * Fix a 1-byte buffer overread in mbedtls_x509_crl_parse_der().1144 1 byte too large for the output buffer.1299 were shifted by one byte, creating an invalid ASN.1 tag. Fixed by1304 * Fix 1-byte buffer overflow in mbedtls_mpi_write_string() when1956 function which leads to a potential one byte overread of the message2576 * Fix conditional statement that would cause a 1 byte overread in2589 * Fix potential byte overread when verifying malformed SERVER_HELLO in2603 * Added support for 3 and 4 byte lengths to mbedtls_asn1_write_len().3402 error if the output buffer was just 1 byte too small.[all …]
Completed in 19 milliseconds