/optee_os-3.20.0/lib/libutils/ext/ |
A D | strlcat.c | 55 size_t dlen; in strlcat() local 60 dlen = d - dst; in strlcat() 61 n = siz - dlen; in strlcat() 64 return dlen + strlen(s); in strlcat() 75 return dlen + (s - src); /* count does not include NUL */ in strlcat()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/der/bit/ |
A D | der_decode_bit_string.c | 24 unsigned long dlen, blen, x, y; in der_decode_bit_string() local 46 if ((err = der_decode_asn1_length(in + x, &y, &dlen)) != CRYPT_OK) { in der_decode_bit_string() 51 if ((dlen == 0) || (dlen > (inlen - x))) { in der_decode_bit_string() 56 blen = ((dlen - 1) << 3) - (in[x++] & 7); in der_decode_bit_string()
|
A D | der_decode_raw_bit_string.c | 27 unsigned long dlen, blen, x, y; in der_decode_raw_bit_string() local 49 if ((err = der_decode_asn1_length(in + x, &y, &dlen)) != CRYPT_OK) { in der_decode_raw_bit_string() 54 if ((dlen == 0) || (dlen > (inlen - x))) { in der_decode_raw_bit_string() 59 blen = ((dlen - 1) << 3) - (in[x++] & 7); in der_decode_raw_bit_string()
|
/optee_os-3.20.0/core/crypto/ |
A D | rng_fortuna.c | 65 uint8_t dlen; member 104 res = hash_update(ctx, data, dlen); in key_from_data() 176 size_t dlen) in push_ring_buffer() argument 204 size_t dlen; in pop_ring_buffer() local 213 dlen = MIN(ring_buffer.elem[ring_buffer.end].dlen, RING_BUF_DATA_SIZE); in pop_ring_buffer() 214 assert(ring_buffer.elem[ring_buffer.end].dlen == dlen); in pop_ring_buffer() 219 return dlen; in pop_ring_buffer() 255 size_t dlen; in drain_ring_buffer() local 258 if (!dlen) in drain_ring_buffer() 299 const void *data, size_t dlen) in crypto_rng_add_event() argument [all …]
|
A D | rng_hw.c | 12 TEE_Result crypto_rng_init(const void *data __unused, size_t dlen __unused) in crypto_rng_init() 21 size_t dlen __unused) in crypto_rng_add_event()
|
/optee_os-3.20.0/lib/libutee/ |
A D | base64.c | 16 bool _base64_enc(const void *data, size_t dlen, char *buf, size_t *blen) in _base64_enc() argument 22 n = _base64_enc_len(dlen); in _base64_enc() 28 for (n = 0; n < dlen; n += 3) { in _base64_enc() 34 if ((n + 1) < dlen) in _base64_enc() 38 if ((n + 2) < dlen) in _base64_enc() 43 if ((n + 1) < dlen) in _base64_enc() 47 if ((n + 2) < dlen) in _base64_enc()
|
A D | tee_api_operations.c | 881 size_t slen, void *dst, uint64_t *dlen), in tee_buffer_update() argument 889 size_t dlen = *dest_len; in tee_buffer_update() local 930 tmp_dlen = dlen; in tee_buffer_update() 935 dlen -= tmp_dlen; in tee_buffer_update() 956 tmp_dlen = dlen; in tee_buffer_update() 963 dlen -= tmp_dlen; in tee_buffer_update()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pbes/ |
A D | pbes.c | 19 unsigned long klen, keylen, dlen; in pbes_decrypt() local 57 dlen = arg->enc_data->size; in pbes_decrypt() 58 if ((err = padding_depad(dec_data, &dlen, LTC_PAD_PKCS7)) != CRYPT_OK) goto LBL_ERROR; in pbes_decrypt() 59 diff = (long)arg->enc_data->size - (long)dlen; in pbes_decrypt() 64 *dec_size = dlen; in pbes_decrypt()
|
/optee_os-3.20.0/core/tee/ |
A D | tee_ta_enc_manager.c | 43 size_t dlen = len; in tee_ta_decrypt_update() local 46 dst, &dlen); in tee_ta_decrypt_update() 57 size_t dlen = len; in tee_ta_decrypt_final() local 59 res = crypto_authenc_dec_final(enc_ctx, src, len, dst, &dlen, in tee_ta_decrypt_final()
|
A D | tee_svc_cryp.c | 3036 size_t dlen = 0; in tee_svc_cipher_update_helper() local 3056 dlen = 0; in tee_svc_cipher_update_helper() 3782 size_t dlen = 0; in syscall_authenc_update_payload() local 3843 size_t dlen = 0; in syscall_authenc_enc_final() local 3871 dlen = 0; in syscall_authenc_enc_final() 3932 size_t dlen = 0; in syscall_authenc_dec_final() local 3959 dlen = 0; in syscall_authenc_dec_final() 4029 size_t dlen = 0; in syscall_asymm_operate() local 4105 &dlen); in syscall_asymm_operate() 4109 &dlen); in syscall_asymm_operate() [all …]
|
A D | fs_htree.c | 109 size_t idx, size_t vers, void *data, size_t dlen) in rpc_read() argument 124 if (bytes != dlen) in rpc_read() 127 memcpy(data, p, dlen); in rpc_read() 148 size_t vers, const void *data, size_t dlen) in rpc_write() argument 158 memcpy(p, data, dlen); in rpc_write()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | base64.h | 61 int mbedtls_base64_encode( unsigned char *dst, size_t dlen, size_t *olen, 81 int mbedtls_base64_decode( unsigned char *dst, size_t dlen, size_t *olen,
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | base64.c | 44 int mbedtls_base64_encode( unsigned char *dst, size_t dlen, size_t *olen, in mbedtls_base64_encode() argument 67 if( ( dlen < n + 1 ) || ( NULL == dst ) ) in mbedtls_base64_encode() 114 int mbedtls_base64_decode( unsigned char *dst, size_t dlen, size_t *olen, in mbedtls_base64_decode() argument 182 if( dst == NULL || dlen < n ) in mbedtls_base64_decode()
|
A D | ssl_tls13_keys.c | 97 unsigned char *dst, size_t *dlen ) in ssl_tls1_3_hkdf_encode_label() argument 130 *dlen = total_hkdf_lbl_len; in ssl_tls1_3_hkdf_encode_label()
|
A D | ssl_tls.c | 345 unsigned char *dstbuf, size_t dlen ) in ssl3_prf() argument 366 for( i = 0; i < dlen / 16; i++ ) in ssl3_prf() 407 unsigned char *dstbuf, size_t dlen ) in tls1_prf() argument 462 for( i = 0; i < dlen; i += 16 ) in tls1_prf() 484 k = ( i + 16 > dlen ) ? dlen % 16 : 16; in tls1_prf() 516 for( i = 0; i < dlen; i += 20 ) in tls1_prf() 538 k = ( i + 20 > dlen ) ? dlen % 20 : 20; in tls1_prf() 653 dlen ); in tls_prf_generic() 738 for( i = 0; i < dlen; i += md_len ) in tls_prf_generic() 760 k = ( i + md_len > dlen ) ? dlen % md_len : md_len; in tls_prf_generic() [all …]
|
A D | rsa.c | 1092 static int mgf_mask( unsigned char *dst, size_t dlen, unsigned char *src, in mgf_mask() argument 1110 while( dlen > 0 ) in mgf_mask() 1113 if( dlen < hlen ) in mgf_mask() 1114 use_len = dlen; in mgf_mask() 1130 dlen -= use_len; in mgf_mask()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_set.c | 22 const unsigned char *d, unsigned long dlen, in rsa_set_key() argument 36 if (d && dlen) { in rsa_set_key() 37 …if ((err = mp_read_unsigned_bin(key->d , (unsigned char *)d , dlen)) != CRYPT_OK) { goto LBL_ERR; } in rsa_set_key()
|
/optee_os-3.20.0/core/drivers/crypto/versal/include/ |
A D | ipi.h | 89 size_t dlen; member
|
/optee_os-3.20.0/core/pta/tests/ |
A D | aes_perf.c | 119 size_t dlen = len; in update_ae() local 121 return crypto_authenc_update_payload(ctx, mode, src, len, dst, &dlen); in update_ae()
|
/optee_os-3.20.0/core/drivers/crypto/versal/ |
A D | ecc.c | 199 arg.dlen = 1; in verify() 426 arg.data[arg.dlen++] = XSECURE_ECDSA_KAT_NIST_P384; in ecc_init() 433 arg.dlen = 0; in ecc_init() 435 arg.data[arg.dlen++] = XSECURE_ECDSA_KAT_NIST_P521; in ecc_init()
|
A D | authenc.c | 206 arg.data[arg.dlen++] = engine.init.key_len; in replay_init() 207 arg.data[arg.dlen++] = engine.key_src; in replay_init() 234 arg.data[arg.dlen++] = p->mem.len % 16 ? p->mem.alloc_len : p->mem.len; in replay_aad() 348 arg.data[arg.dlen++] = key_len; in do_init() 349 arg.data[arg.dlen++] = engine.key_src; in do_init() 432 arg.data[arg.dlen++] = p.len % 16 ? p.alloc_len : p.len; in do_update_aad()
|
A D | ipi.c | 84 for (i = 1; i < arg->dlen + 1; i++) in versal_crypto_request()
|
/optee_os-3.20.0/core/drivers/ |
A D | versal_sha3_384.c | 22 struct versal_cmd_args arg = { .dlen = 1, }; in input_plaintext()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | blowfish.c | 342 static ulong32 s_blowfish_stream2word(const unsigned char *d, int dlen, int *cur) in s_blowfish_stream2word() argument 350 if (y == dlen) { in s_blowfish_stream2word()
|
/optee_os-3.20.0/core/include/crypto/ |
A D | crypto.h | 358 TEE_Result crypto_rng_init(const void *data, size_t dlen); 374 const void *data, size_t dlen);
|