/optee_test-3.20.0/host/xtest/ |
A D | regression_8000.c | 321 hkdf_##id##_ikm, sizeof(hkdf_##id##_ikm), \ in xtest_test_derivation_hkdf() 322 (oeb && !sizeof(hkdf_##id##_salt)) ? NULL : hkdf_##id##_salt, sizeof(hkdf_##id##_salt), \ in xtest_test_derivation_hkdf() 323 (oeb && !sizeof(hkdf_##id##_info)) ? NULL : hkdf_##id##_info, sizeof(hkdf_##id##_info), \ in xtest_test_derivation_hkdf() 324 hkdf_##id##_okm, sizeof(hkdf_##id##_okm), \ in xtest_test_derivation_hkdf() 458 concat_kdf_##id##_z, sizeof(concat_kdf_##id##_z), \ in xtest_test_derivation_concat_kdf() 461 sizeof(concat_kdf_##id##_other_info), \ in xtest_test_derivation_concat_kdf() 462 concat_kdf_##id##_derived_key, sizeof(concat_kdf_##id##_derived_key), \ in xtest_test_derivation_concat_kdf() 577 pbkdf2_##id##_password, sizeof(pbkdf2_##id##_password), \ in xtest_test_derivation_pbkdf2() 578 (oeb && !sizeof(pbkdf2_##id##_salt)) ? NULL : pbkdf2_##id##_salt, sizeof(pbkdf2_##id##_salt), \ in xtest_test_derivation_pbkdf2() 579 pbkdf2_##id##_iteration_count, \ in xtest_test_derivation_pbkdf2() [all …]
|
A D | regression_6000.c | 32 uint32_t id = storage_info[i].id; \ 37 test_name##_single(c, id); \ 86 op.params[0].tmpref.buffer = id; in fs_open() 428 uint32_t id; member 502 if (id == storage_info[i].id) in is_storage_available() 531 return id; in real_id_for() 1210 uint8_t id[200] = { }; in xtest_tee_test_6009_single() local 1256 fs_next_enum(&sess, e, info, sizeof(info), id, sizeof(id)))) in xtest_tee_test_6009_single() 1261 fs_next_enum(&sess, e, NULL, 0, id, sizeof(id)))) in xtest_tee_test_6009_single() 1266 fs_next_enum(&sess, e, info, sizeof(info), id, sizeof(id)))) in xtest_tee_test_6009_single() [all …]
|
A D | pkcs11_1000.c | 3421 { CKA_ID, (CK_BYTE_PTR)id, strlen(id) }, in xtest_pkcs11_test_1014() 3515 !ADBG_EXPECT_BUFFER(c, id, strlen(id), g_id, in xtest_pkcs11_test_1014() 5364 { CKA_ID, id, sizeof(id) }, in test_ec_operations() 6349 { CKA_ID, id, sizeof(id) }, in test_rsa_pkcs_operations() 6750 { CKA_ID, id, sizeof(id) }, in test_rsa_pss_operations() 7113 { CKA_ID, id, sizeof(id) }, in test_rsa_oaep_operations() 7469 { CKA_ID, id, sizeof(id) }, in xtest_pkcs11_test_1024() 7483 { CKA_ID, id, sizeof(id) }, in xtest_pkcs11_test_1024() 7500 { CKA_ID, id, sizeof(id) }, in xtest_pkcs11_test_1024() 7517 { CKA_ID, id, sizeof(id) }, in xtest_pkcs11_test_1024() [all …]
|
A D | ffa_spmc_1000.c | 105 return sid.id; in get_endpoint_id()
|
/optee_test-3.20.0/host/openssl/include/openssl/ |
A D | srp.h | 86 char *id; member 113 char *id; member 156 SRP_gN *SRP_get_default_gN(const char *id);
|
A D | engine.h | 393 ENGINE *ENGINE_by_id(const char *id); 553 int ENGINE_set_id(ENGINE *e, const char *id); 824 typedef int (*dynamic_bind_engine) (ENGINE *e, const char *id, 828 int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns); \ 830 int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns) { \ 844 if(!fn(e,id)) return 0; \
|
A D | crypto.h | 453 void CRYPTO_THREADID_set_numeric(CRYPTO_THREADID *id, unsigned long val); 454 void CRYPTO_THREADID_set_pointer(CRYPTO_THREADID *id, void *ptr); 457 void CRYPTO_THREADID_current(CRYPTO_THREADID *id); 460 unsigned long CRYPTO_THREADID_hash(const CRYPTO_THREADID *id);
|
A D | cms.h | 191 unsigned char *id, size_t idlen); 213 unsigned char *id, size_t idlen, 229 const unsigned char *id, size_t idlen); 333 CMS_ReceiptRequest *CMS_ReceiptRequest_create0(unsigned char *id, int idlen,
|
A D | pkcs12.h | 226 int saltlen, int id, int iter, int n, 229 int saltlen, int id, int iter, int n,
|
A D | ocsp.h | 395 OCSP_CERTID *OCSP_CERTID_dup(OCSP_CERTID *id); 445 int OCSP_resp_find(OCSP_BASICRESP *bs, OCSP_CERTID *id, int last); 450 int OCSP_resp_find_status(OCSP_BASICRESP *bs, OCSP_CERTID *id, int *status,
|
A D | x509v3.h | 698 int X509_check_purpose(X509 *x, int id, int ca); 706 int X509_PURPOSE_get_by_id(int id); 707 int X509_PURPOSE_add(int id, int trust, int flags, 770 ASN1_INTEGER *id; member
|
A D | x509_vfy.h | 176 X509_VERIFY_PARAM_ID *id; /* opaque ID data */ member 614 const X509_VERIFY_PARAM *X509_VERIFY_PARAM_get0(int id);
|
A D | x509.h | 842 int X509_keyid_set1(X509 *x, unsigned char *id, int len); 1221 int X509_check_trust(X509 *x, int id, int flags); 1224 int X509_TRUST_get_by_id(int id); 1225 int X509_TRUST_add(int id, int flags, int (*ck) (X509_TRUST *, X509 *, int),
|
A D | ssl.h | 385 unsigned long id; member 421 unsigned long id; /* id, 4 bytes, first is version */ member 905 typedef int (*GEN_SESSION_CB) (const SSL *ssl, unsigned char *id, 913 int id; member 2247 int SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id, 2542 int SSL_COMP_add_compression_method(int id, COMP_METHOD *cm);
|
A D | evp.h | 1077 EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_new(int id, int flags, 1205 EVP_PKEY_METHOD *EVP_PKEY_meth_new(int id, int flags); 1213 EVP_PKEY_CTX *EVP_PKEY_CTX_new_id(int id, ENGINE *e);
|
/optee_test-3.20.0/host/xtest/include/uapi/linux/ |
A D | arm_ffa_user.h | 23 __u16 id; member
|
/optee_test-3.20.0/host/xtest/gp/include/ |
A D | xml_crypto_api.h | 52 #define add_attribute(vector, id) set_flag((vector), 1ul << (id)) argument 1038 int id; in collapse_crypto_buffers() local 1043 for (id = 0; id < 4; id++) in collapse_crypto_buffers() 1044 out_buffer->size += in_buffer[id].size; in collapse_crypto_buffers() 1049 for (id = 0; id < 4; id++) { in collapse_crypto_buffers() 1050 if (in_buffer[id].buffer) { in collapse_crypto_buffers() 1051 memcpy(tmp, in_buffer[id].buffer, in_buffer[id].size); in collapse_crypto_buffers() 1052 tmp += in_buffer[id].size; in collapse_crypto_buffers() 1261 static TEEC_Result add_attr(uint32_t id, const void *v, uint32_t sz, in add_attr() argument 1270 if (id == TEE_ATTR_NONE) in add_attr() [all …]
|
/optee_test-3.20.0/ta/crypt/ |
A D | cryp_taf.c | 401 uint32_t id; member 434 a[n].attributeID = ap[n].id; in unpack_attrs() 435 if (ap[n].id & TEE_ATTR_FLAG_VALUE) { in unpack_attrs()
|