/optee_test-3.20.0/host/openssl/include/openssl/ |
A D | rand.h | 82 void (*seed) (const void *buf, int num); 83 int (*bytes) (unsigned char *buf, int num); 85 void (*add) (const void *buf, int num, double entropy); 86 int (*pseudorand) (unsigned char *buf, int num); 101 int RAND_bytes(unsigned char *buf, int num); 102 int RAND_pseudo_bytes(unsigned char *buf, int num); 103 void RAND_seed(const void *buf, int num); 104 void RAND_add(const void *buf, int num, double entropy); 109 int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes);
|
A D | ui_compat.h | 80 int _ossl_old_des_read_pw_string(char *buf, int length, const char *prompt, 82 int _ossl_old_des_read_pw(char *buf, char *buff, int size, const char *prompt,
|
A D | bio.h | 582 # define BIO_set_buffer_read_data(b,buf,num) BIO_ctrl(b,BIO_C_SET_BUFF_READ_DATA,num,buf) argument 664 int BIO_gets(BIO *bp, char *buf, int size); 666 int BIO_puts(BIO *bp, const char *buf); 683 int BIO_nread0(BIO *bio, char **buf); 684 int BIO_nread(BIO *bio, char **buf, int num); 685 int BIO_nwrite0(BIO *bio, char **buf); 686 int BIO_nwrite(BIO *bio, char **buf, int num); 692 BIO *BIO_new_mem_buf(const void *buf, int len); 766 void *buf), 798 int BIO_snprintf(char *buf, size_t n, const char *format, ...) [all …]
|
A D | des.h | 207 int DES_enc_read(int fd, void *buf, int len, DES_key_schedule *sched, 209 int DES_enc_write(int fd, const void *buf, int len, DES_key_schedule *sched, 211 char *DES_fcrypt(const char *buf, const char *salt, char *ret); 212 char *DES_crypt(const char *buf, const char *salt);
|
A D | safestack.h | 201 # define SKM_ASN1_seq_pack(type, st, i2d_func, buf, len) \ argument 2264 # define ASN1_seq_pack_ASN1_OBJECT(st, i2d_func, buf, len) \ argument 2272 # define ASN1_seq_pack_ASN1_TYPE(st, i2d_func, buf, len) \ argument 2288 # define ASN1_seq_pack_DIST_POINT(st, i2d_func, buf, len) \ argument 2304 # define ASN1_seq_pack_EVP_MD(st, i2d_func, buf, len) \ argument 2344 # define ASN1_seq_pack_PKCS7(st, i2d_func, buf, len) \ argument 2368 # define ASN1_seq_pack_POLICYINFO(st, i2d_func, buf, len) \ argument 2384 # define ASN1_seq_pack_SXNETID(st, i2d_func, buf, len) \ argument 2392 # define ASN1_seq_pack_X509(st, i2d_func, buf, len) \ argument 2400 # define ASN1_seq_pack_X509_ALGOR(st, i2d_func, buf, len) \ argument [all …]
|
A D | ui.h | 375 int UI_UTIL_read_pw_string(char *buf, int length, const char *prompt, 377 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt,
|
A D | rsa.h | 392 int (*cb) (char *buf, int len, const char *prompt, 395 int (*cb) (char *buf, int len, const char *prompt, 399 int (*cb) (char *buf, int len, const char *prompt, 402 int (*cb) (char *buf, int len, const char *prompt,
|
A D | ssl.h | 445 int (*ssl_read) (SSL *s, void *buf, int len); 446 int (*ssl_peek) (SSL *s, void *buf, int len); 447 int (*ssl_write) (SSL *s, const void *buf, int len); 1768 size_t SSL_get_finished(const SSL *s, void *buf, size_t count); 1769 size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count); 2152 char *SSL_get_shared_ciphers(const SSL *s, char *buf, int len); 2334 int SSL_read(SSL *ssl, void *buf, int num); 2335 int SSL_peek(SSL *ssl, void *buf, int num); 2336 int SSL_write(SSL *ssl, const void *buf, int num); 2421 char *SSL_CIPHER_description(const SSL_CIPHER *, char *buf, int size); [all …]
|
A D | pem.h | 389 typedef int pem_password_cb (char *buf, int size, int rwflag, void *userdata); 392 typedef int pem_password_cb (char *buf, int size, int rwflag); 445 int PEM_def_callback(char *buf, int num, int w, void *key); 446 void PEM_proc_type(char *buf, int type); 447 void PEM_dek_info(char *buf, const char *type, int len, char *str);
|
A D | asn1.h | 914 int a2i_ASN1_INTEGER(BIO *bp, ASN1_INTEGER *bs, char *buf, int size); 916 int a2i_ASN1_ENUMERATED(BIO *bp, ASN1_ENUMERATED *bs, char *buf, int size); 918 int a2i_ASN1_STRING(BIO *bp, ASN1_STRING *bs, char *buf, int size); 921 int i2t_ASN1_OBJECT(char *buf, int buf_len, ASN1_OBJECT *a); 923 int a2d_ASN1_OBJECT(unsigned char *out, int olen, const char *buf, int num); 1041 unsigned char *buf, int off); 1061 STACK_OF(OPENSSL_BLOCK) *ASN1_seq_unpack(const unsigned char *buf, int len, 1065 unsigned char **buf, int *len);
|
/optee_test-3.20.0/host/xtest/ |
A D | regression_2000.c | 28 uint64_t buf[2]; member 230 r = read(fd, buf, sizeof(buf)); in test_200x_tcp_read_cb() 301 blen = sizeof(buf); in xtest_tee_test_2001() 310 blen = sizeof(buf); in xtest_tee_test_2001() 347 blen = sizeof(buf); in xtest_tee_test_2001() 362 blen = sizeof(buf); in xtest_tee_test_2001() 378 blen = sizeof(buf); in xtest_tee_test_2001() 563 void *buf = NULL; in xtest_tee_test_2003() local 634 free(buf); in xtest_tee_test_2003() 653 r = recvfrom(fd, buf, sizeof(buf), 0, sa, &slen); in test_200x_udp_accept_cb() [all …]
|
A D | install_ta.c | 31 void *buf = NULL; in read_ta() local 49 buf = malloc(s); in read_ta() 50 if (!buf) in read_ta() 53 if (fread(buf, 1, s, f) != s) in read_ta() 57 return buf; in read_ta() 60 static void install_ta(TEEC_Session *sess, void *buf, size_t blen) in install_ta() argument 68 op.params[0].tmpref.buffer = buf; in install_ta()
|
A D | xtest_helpers.c | 104 const void *buf, size_t len) in xtest_add_attr() argument 128 uint8_t **buf, size_t *blen) in pack_attrs() argument 135 *buf = NULL; in pack_attrs() 156 *buf = b; in pack_attrs() 201 uint8_t *buf = NULL; in ta_crypt_cmd_populate_transient_object() local 211 op.params[1].tmpref.buffer = buf; in ta_crypt_cmd_populate_transient_object() 226 free(buf); in ta_crypt_cmd_populate_transient_object() 289 uint8_t *buf = NULL; in ta_crypt_cmd_derive_key() local 303 op.params[1].tmpref.buffer = buf; in ta_crypt_cmd_derive_key() 317 free(buf); in ta_crypt_cmd_derive_key() [all …]
|
A D | rand_stream.c | 46 static void get_random(struct rand_stream *rs, uint8_t *buf, size_t blen) in get_random() argument 48 uint8_t *b = buf; in get_random() 85 void rand_stream_read(struct rand_stream *rs, void *buf, size_t num_bytes) in rand_stream_read() argument 90 memcpy(buf, peek, peek_bytes); in rand_stream_read() 94 get_random(rs, (uint8_t *)buf + peek_bytes, in rand_stream_read()
|
A D | xtest_helpers.h | 84 void *buf, 99 uint32_t attr_id, const void *buf, size_t len); 104 uint8_t **buf, size_t *blen);
|
A D | regression_8100.c | 147 BIO *buf = BIO_new(BIO_s_mem()); in get_cert() local 150 if (!ADBG_EXPECT_NOT_NULL(c, buf)) in get_cert() 153 b = BIO_write(buf, crt_str, slen); in get_cert() 157 if (!PEM_read_bio_X509(buf, crt, 0, NULL)) in get_cert() 164 BIO_free(buf); in get_cert()
|
A D | rand_stream.h | 18 void rand_stream_read(struct rand_stream *rs, void *buf, size_t num_bytes);
|
A D | regression_1000.c | 300 buf[n] = n + 1; in xtest_tee_test_1002() 302 exp_sum += buf[n]; in xtest_tee_test_1002() 568 uint8_t buf[32] = { }; in xtest_tee_test_1006() local 627 char buf[PATH_MAX] = { }; in open_ta_file() local 629 snprintf(buf, sizeof(buf), in open_ta_file() 637 return fopen(buf, mode); in open_ta_file() 649 uint8_t *buf = NULL; in load_corrupt_ta() local 665 buf = malloc(sz); in load_corrupt_ta() 676 buf[MIN(offs, sz)] ^= mask; in load_corrupt_ta() 687 free(buf); in load_corrupt_ta() [all …]
|
/optee_test-3.20.0/ta/tpm_log_test/ |
A D | ta_entry.c | 40 unsigned char buf[LOG_SIZE] = { 0 }; in test_with_right_parameters() local 51 params[0].memref.buffer = (void *)buf; in test_with_right_parameters() 59 memcpy(&field, &buf[0], sizeof(uint32_t)); in test_with_right_parameters() 72 memcpy(&field, &buf[4], sizeof(uint32_t)); in test_with_right_parameters() 90 digestptr = &buf[8]; in test_with_right_parameters() 109 unsigned char buf[LOG_SIZE] = { 0 }; in test_short_buffer() local 118 params[0].memref.buffer = (void *)buf; in test_short_buffer() 127 if (buf[i] != 0) { in test_short_buffer()
|
/optee_test-3.20.0/ta/crypt/ |
A D | mbedtls_taf.c | 163 unsigned char *buf = NULL; in parse_issuer_cert() local 165 buf = TEE_Malloc(mid_crt_size + 1, TEE_MALLOC_FILL_ZERO); in parse_issuer_cert() 166 if (!buf) in parse_issuer_cert() 169 memcpy(buf, mid_crt, mid_crt_size); in parse_issuer_cert() 170 ret = mbedtls_x509_crt_parse(crt, buf, mid_crt_size + 1); in parse_issuer_cert() 171 TEE_Free(buf); in parse_issuer_cert() 183 unsigned char *buf = NULL; in parse_issuer_key() local 185 buf = TEE_Malloc(mid_key_size + 1, TEE_MALLOC_FILL_ZERO); in parse_issuer_key() 186 if (!buf) in parse_issuer_key() 189 memcpy(buf, mid_key, mid_key_size); in parse_issuer_key() [all …]
|
A D | cryp_taf.c | 406 static TEE_Result unpack_attrs(const uint8_t *buf, size_t blen, in unpack_attrs() argument 418 if (((uintptr_t)buf & 0x3) != 0 || blen < num_attrs_size) in unpack_attrs() 420 num_attrs = *(uint32_t *) (void *)buf; in unpack_attrs() 423 ap = (const struct attr_packed *)(const void *)(buf + num_attrs_size); in unpack_attrs() 448 p += (uintptr_t)buf; in unpack_attrs() 651 void *buf = NULL; in ta_entry_random_number_generate() local 657 buf = TEE_Malloc(params[0].memref.size, 0); in ta_entry_random_number_generate() 658 if (!buf) in ta_entry_random_number_generate() 661 TEE_GenerateRandom(buf, params[0].memref.size); in ta_entry_random_number_generate() 662 TEE_MemMove(params[0].memref.buffer, buf, params[0].memref.size); in ta_entry_random_number_generate() [all …]
|
/optee_test-3.20.0/host/xtest/gp/include/ |
A D | xml_client_api.h | 193 #define TEEC_defineMemoryContent_tmpMemory(buf, val, size_val) \ argument 194 memcpy(buf, &(val), size_val) 259 static void init_mem(uint8_t *buf, size_t buf_size, size_t begin_size, in init_mem() argument 263 memset(buf, begin_value, begin_size); in init_mem() 264 memset(buf + begin_size, middle_value, middle_size); in init_mem() 265 memset(buf + begin_size + middle_size, end_value, in init_mem() 304 void *buf, size_t sz) in TEEC_prepare_OperationEachParameter_tmpref() argument 308 .buffer = buf, .size = sz, in TEEC_prepare_OperationEachParameter_tmpref() 336 buf, exp_buf, exp_blen) \ argument 342 ADBG_EXPECT_COMPARE_POINTER((c), (buf), ==, \ [all …]
|
A D | xml_common_api.h | 104 uint8_t buf[1024]; member 230 sizeof(saved_attr[n].buf))) in GetObjectBufferAttribute_helper() 255 memcpy(saved_attr[n].buf, shm.buffer, in GetObjectBufferAttribute_helper() 256 sizeof(saved_attr[n].buf)); in GetObjectBufferAttribute_helper()
|
A D | xml_crypto_api.h | 2682 void *buf = NULL; in calculate_digest() local 2688 buf = calloc(1, sz); in calculate_digest() 2689 if (!buf) in calculate_digest() 2694 digest->buffer = buf; in calculate_digest() 2697 free(buf); in calculate_digest() 3162 void *buf = NULL; in rsa_sign_digest() local 3172 buf = calloc(1, sz); in rsa_sign_digest() 3196 } else if (!RSA_private_encrypt(sz, buf, buf, key, in rsa_sign_digest() 3207 free(buf); in rsa_sign_digest() 3221 void *buf; in rsa_verify_pss_digest() local [all …]
|
/optee_test-3.20.0/ta/storage_benchmark/ |
A D | benchmark.c | 25 static void fill_buffer(uint8_t *buf, size_t size) in fill_buffer() argument 29 if (!buf) in fill_buffer() 33 buf[i] = SCRAMBLE(i); in fill_buffer() 36 static TEE_Result verify_buffer(uint8_t *buf, size_t size) in verify_buffer() argument 40 if (!buf) in verify_buffer() 46 if (expect_data != buf[i]) { in verify_buffer()
|