Searched refs:flag (Results 1 – 13 of 13) sorted by relevance
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ec25519/ |
A D | ec25519_crypto_ctx.c | 12 int ec25519_crypto_ctx(unsigned char *out, unsigned long *outlen, unsigned char flag, const unsigne… in ec25519_crypto_ctx() argument 25 XMEMCPY(buf, &flag, 1); in ec25519_crypto_ctx()
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | sm2-kep.c | 103 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument 176 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S() 359 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in sm2_kep_derive() local 365 res = sm2_kep_compute_S(S1, sizeof(S1), flag, U, in sm2_kep_derive() 382 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in sm2_kep_derive() local 389 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, U, in sm2_kep_derive()
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | sm2-kep.c | 133 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument 228 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S() 452 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in crypto_acipher_sm2_kep_derive() local 458 res = sm2_kep_compute_S(S1, sizeof(S1), flag, &U, in crypto_acipher_sm2_kep_derive() 475 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in crypto_acipher_sm2_kep_derive() local 482 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, in crypto_acipher_sm2_kep_derive()
|
/optee_os-3.20.0/lib/libutils/isoc/ |
A D | sprintf.c | 23 int __sprintf_chk(char *str, int flag __unused, size_t slen, in __sprintf_chk()
|
/optee_os-3.20.0/lib/libutils/isoc/include/ |
A D | stdio.h | 23 int __sprintf_chk(char *str, int flag, size_t slen, const char *fmt, ...)
|
/optee_os-3.20.0/core/drivers/ |
A D | zynqmp_pm.c | 72 uint32_t flag; member 139 efuse_op->flag = op; in efuse_op()
|
A D | versal_trng.c | 402 uint32_t flag, const uint8_t *pstr) in trng_df_algorithm() argument 424 if (flag == DF_SEED) in trng_df_algorithm()
|
/optee_os-3.20.0/ta/pkcs11/src/ |
A D | processing_ec.c | 792 uint32_t flag = 0; in pkcs2tee_proc_params_eddsa() local 799 rc = serialargs_get_u32(&args, &flag); in pkcs2tee_proc_params_eddsa() 821 ctx->flag = flag; in pkcs2tee_proc_params_eddsa()
|
A D | processing.h | 75 uint32_t flag; member
|
A D | processing_asymm.c | 536 if (eddsa_ctx->flag) { in step_asymm_operation()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_private.h | 388 unsigned char flag,
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 401 When that flag is on, standard GNU C printf format specifiers 413 * Implicitly add PSA_KEY_USAGE_SIGN_MESSAGE key usage policy flag when 414 PSA_KEY_USAGE_SIGN_HASH flag is set and PSA_KEY_USAGE_VERIFY_MESSAGE flag 415 when PSA_KEY_USAGE_VERIFY_HASH flag is set. This usage flag extension 424 in bits rather than bytes, with an additional flag to indicate if the 449 through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK. 2148 configuration flag MBEDTLS_GCM_ALT. 2162 the new configuration flag MBEDTLS_ECJPAKE_ALT. 2951 * Change SSL_DISABLE_RENEGOTIATION config.h flag to SSL_RENEGOTIATION 3276 * Add SSL_CIPHERSUITES config.h flag to allow specifying a list of [all …]
|
/optee_os-3.20.0/ |
A D | CHANGELOG.md | 533 attempts to create an existing persistent object without the overwrite flag 906 * The linux driver will set the 'privileged' flag (TEE_GEN_CAP_PRIVILEGED) on
|
Completed in 24 milliseconds