Home
last modified time | relevance | path

Searched refs:flag (Results 1 – 13 of 13) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ec25519/
A Dec25519_crypto_ctx.c12 int ec25519_crypto_ctx(unsigned char *out, unsigned long *outlen, unsigned char flag, const unsigne… in ec25519_crypto_ctx() argument
25 XMEMCPY(buf, &flag, 1); in ec25519_crypto_ctx()
/optee_os-3.20.0/core/lib/libtomcrypt/
A Dsm2-kep.c103 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument
176 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S()
359 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in sm2_kep_derive() local
365 res = sm2_kep_compute_S(S1, sizeof(S1), flag, U, in sm2_kep_derive()
382 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in sm2_kep_derive() local
389 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, U, in sm2_kep_derive()
/optee_os-3.20.0/lib/libmbedtls/core/
A Dsm2-kep.c133 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument
228 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S()
452 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in crypto_acipher_sm2_kep_derive() local
458 res = sm2_kep_compute_S(S1, sizeof(S1), flag, &U, in crypto_acipher_sm2_kep_derive()
475 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in crypto_acipher_sm2_kep_derive() local
482 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, in crypto_acipher_sm2_kep_derive()
/optee_os-3.20.0/lib/libutils/isoc/
A Dsprintf.c23 int __sprintf_chk(char *str, int flag __unused, size_t slen, in __sprintf_chk()
/optee_os-3.20.0/lib/libutils/isoc/include/
A Dstdio.h23 int __sprintf_chk(char *str, int flag, size_t slen, const char *fmt, ...)
/optee_os-3.20.0/core/drivers/
A Dzynqmp_pm.c72 uint32_t flag; member
139 efuse_op->flag = op; in efuse_op()
A Dversal_trng.c402 uint32_t flag, const uint8_t *pstr) in trng_df_algorithm() argument
424 if (flag == DF_SEED) in trng_df_algorithm()
/optee_os-3.20.0/ta/pkcs11/src/
A Dprocessing_ec.c792 uint32_t flag = 0; in pkcs2tee_proc_params_eddsa() local
799 rc = serialargs_get_u32(&args, &flag); in pkcs2tee_proc_params_eddsa()
821 ctx->flag = flag; in pkcs2tee_proc_params_eddsa()
A Dprocessing.h75 uint32_t flag; member
A Dprocessing_asymm.c536 if (eddsa_ctx->flag) { in step_asymm_operation()
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_private.h388 unsigned char flag,
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog401 When that flag is on, standard GNU C printf format specifiers
413 * Implicitly add PSA_KEY_USAGE_SIGN_MESSAGE key usage policy flag when
414 PSA_KEY_USAGE_SIGN_HASH flag is set and PSA_KEY_USAGE_VERIFY_MESSAGE flag
415 when PSA_KEY_USAGE_VERIFY_HASH flag is set. This usage flag extension
424 in bits rather than bytes, with an additional flag to indicate if the
449 through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK.
2148 configuration flag MBEDTLS_GCM_ALT.
2162 the new configuration flag MBEDTLS_ECJPAKE_ALT.
2951 * Change SSL_DISABLE_RENEGOTIATION config.h flag to SSL_RENEGOTIATION
3276 * Add SSL_CIPHERSUITES config.h flag to allow specifying a list of
[all …]
/optee_os-3.20.0/
A DCHANGELOG.md533 attempts to create an existing persistent object without the overwrite flag
906 * The linux driver will set the 'privileged' flag (TEE_GEN_CAP_PRIVILEGED) on

Completed in 24 milliseconds