/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/oid/ |
A D | pk_oid_str.c | 6 int pk_oid_str_to_num(const char *OID, unsigned long *oid, unsigned long *oidlen) in pk_oid_str_to_num() argument 11 LTC_ARGCHK(oidlen != NULL); in pk_oid_str_to_num() 13 limit = *oidlen; in pk_oid_str_to_num() 14 *oidlen = 0; /* make sure that we return zero oidlen on error */ in pk_oid_str_to_num() 38 *oidlen = j; in pk_oid_str_to_num() 41 *oidlen = j + 1; in pk_oid_str_to_num() 45 int pk_oid_num_to_str(const unsigned long *oid, unsigned long oidlen, char *OID, unsigned long *out… in pk_oid_num_to_str() argument 52 LTC_ARGCHK(oidlen < INT_MAX); in pk_oid_num_to_str() 55 for (i = oidlen - 1, k = 0; i >= 0; i--) { in pk_oid_num_to_str()
|
/optee_os-3.20.0/core/tee/ |
A D | fs_dirfile.c | 25 uint32_t oidlen; member 41 return !dent->oidlen && !dent->oid[0]; in is_free() 226 if (dent.oidlen != oidlen) in tee_fs_dirfile_find() 289 const void *oid, size_t oidlen) in tee_fs_dirfile_rename() argument 294 if (oidlen > sizeof(dent.oid)) in tee_fs_dirfile_rename() 298 if (oidlen) in tee_fs_dirfile_rename() 299 memcpy(dent.oid, oid, oidlen); in tee_fs_dirfile_rename() 303 dent.oidlen = oidlen; in tee_fs_dirfile_rename() 368 size_t *oidlen) in tee_fs_dirfile_get_next() argument 386 if (*oidlen < dent.oidlen) in tee_fs_dirfile_get_next() [all …]
|
A D | tee_ree_fs.c | 944 d->d.oidlen = sizeof(d->d.oid); in ree_fs_opendir_rpc() 946 &d->d.oidlen); in ree_fs_opendir_rpc() 981 d->d.oidlen = sizeof(d->d.oid); in ree_fs_readdir_rpc() 983 &d->d.oidlen); in ree_fs_readdir_rpc()
|
A D | tee_svc_storage.c | 649 res = tee_pobj_get(&sess->ctx->uuid, d->oid, d->oidlen, 0, in syscall_storage_next_enum()
|
A D | tee_rpmb_fs.c | 2851 next->entry.oidlen = tee_hs2b((uint8_t *) in rpmb_fs_dir_populate() 2856 if (next->entry.oidlen) { in rpmb_fs_dir_populate()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/asn1/x509/ |
A D | x509_encode_subject_public_key_info.c | 41 unsigned long oid[16], oidlen; in x509_encode_subject_public_key_info() local 50 oidlen = sizeof(oid)/sizeof(oid[0]); in x509_encode_subject_public_key_info() 51 if ((err = pk_oid_str_to_num(OID, oid, &oidlen)) != CRYPT_OK) { in x509_encode_subject_public_key_info() 55 LTC_SET_ASN1(alg_id, 0, LTC_ASN1_OBJECT_IDENTIFIER, oid, oidlen); in x509_encode_subject_public_key_info()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ec25519/ |
A D | ec25519_export.c | 26 unsigned long oid[16], oidlen; in ec25519_export() local 45 oidlen = sizeof(oid)/sizeof(oid[0]); in ec25519_export() 46 if ((err = pk_oid_str_to_num(OID, oid, &oidlen)) != CRYPT_OK) { in ec25519_export() 50 LTC_SET_ASN1(alg_id, 0, LTC_ASN1_OBJECT_IDENTIFIER, oid, oidlen); in ec25519_export()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_export_openssl.c | 25 unsigned long oid[16], oidlen; in ecc_export_openssl() local 43 … if (key->dp.oidlen == 0) { err = CRYPT_INVALID_ARG; goto error; } in ecc_export_openssl() 44 LTC_SET_ASN1(&ecparams, 0, LTC_ASN1_OBJECT_IDENTIFIER, key->dp.oid, key->dp.oidlen); in ecc_export_openssl() 93 oidlen = sizeof(oid)/sizeof(oid[0]); in ecc_export_openssl() 94 if ((err = pk_oid_str_to_num(OID, oid, &oidlen)) != CRYPT_OK) { in ecc_export_openssl() 99 LTC_SET_ASN1(seq_fieldid, 0, LTC_ASN1_OBJECT_IDENTIFIER, oid, oidlen); in ecc_export_openssl()
|
A D | ecc_set_curve_internal.c | 20 key->dp.oidlen = 0; in s_ecc_oid_lookup() 34 key->dp.oidlen = 16; /* size of key->dp.oid */ in s_ecc_oid_lookup() 35 pk_oid_str_to_num(curve->OID, key->dp.oid, &key->dp.oidlen); in s_ecc_oid_lookup() 64 if (srckey->dp.oidlen > 0) { in ecc_copy_curve() 65 key->dp.oidlen = srckey->dp.oidlen; in ecc_copy_curve() 66 for (i = 0; i < key->dp.oidlen; i++) key->dp.oid[i] = srckey->dp.oid[i]; in ecc_copy_curve()
|
A D | ecc_ssh_ecdsa_encode_name.c | 23 unsigned long oidlen = sizeof(oidstr); in ecc_ssh_ecdsa_encode_name() local 31 if ((err = ecc_get_oid_str(oidstr, &oidlen, key)) != CRYPT_OK) goto error; in ecc_ssh_ecdsa_encode_name()
|
A D | ecc_get_oid_str.c | 19 return pk_oid_num_to_str(key->dp.oid, key->dp.oidlen, out, outlen); in ecc_get_oid_str()
|
A D | ecc_set_curve.c | 34 key->dp.oidlen = 16; in ecc_set_curve() 35 if ((err = pk_oid_str_to_num(cu->OID, key->dp.oid, &key->dp.oidlen)) != CRYPT_OK) { goto error; } in ecc_set_curve()
|
A D | ecc_sign_hash.c | 138 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_sign_hash_ex()
|
A D | ecc_verify_hash.c | 83 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_verify_hash_ex()
|
A D | ecc_recover_key.c | 89 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_recover_key()
|
/optee_os-3.20.0/core/include/tee/ |
A D | fs_dirfile.h | 96 size_t oidlen, struct tee_fs_dirfile_fileh *dfh); 121 const void *oid, size_t oidlen); 152 size_t *oidlen);
|
A D | tee_fs.h | 21 size_t oidlen; member
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_private.h | 262 int pk_oid_str_to_num(const char *OID, unsigned long *oid, unsigned long *oidlen); 263 int pk_oid_num_to_str(const unsigned long *oid, unsigned long oidlen, char *OID, unsigned long *out…
|
A D | tomcrypt_pk.h | 224 unsigned long oidlen; member
|