/optee_os-3.20.0/core/arch/arm/plat-stm32mp1/nsec-service/ |
A D | bsec_svc.c | 16 TEE_Result result = TEE_ERROR_GENERIC; in bsec_main() local 31 result = stm32_bsec_read_otp(out_value, otp_id); in bsec_main() 43 result = stm32_bsec_read_otp(&tmp, otp_id); in bsec_main() 44 if (!result) in bsec_main() 45 result = stm32_bsec_shadow_register(otp_id); in bsec_main() 46 if (!result) in bsec_main() 48 if (!result) in bsec_main() 49 result = stm32_bsec_write_otp(tmp, otp_id); in bsec_main() 57 result = TEE_ERROR_BAD_PARAMETERS; in bsec_main() 61 if (!result) in bsec_main() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/pkcs1/ |
A D | pkcs_1_v1_5_decode.c | 33 int result; in pkcs_1_v1_5_decode() local 46 result = CRYPT_OK; in pkcs_1_v1_5_decode() 51 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 64 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 74 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 84 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 88 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 91 if (result == CRYPT_OK) { in pkcs_1_v1_5_decode() 99 return result; in pkcs_1_v1_5_decode()
|
A D | pkcs_1_v1_5_encode.c | 36 int result; in pkcs_1_v1_5_encode() local 45 if ((result = prng_is_valid(prng_idx)) != CRYPT_OK) { in pkcs_1_v1_5_encode() 46 return result; in pkcs_1_v1_5_encode() 59 result = CRYPT_BUFFER_OVERFLOW; in pkcs_1_v1_5_encode() 70 result = CRYPT_ERROR_READPRNG; in pkcs_1_v1_5_encode() 78 result = CRYPT_ERROR_READPRNG; in pkcs_1_v1_5_encode() 94 result = CRYPT_OK; in pkcs_1_v1_5_encode() 96 return result; in pkcs_1_v1_5_encode()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_shared_secret.c | 25 ecc_point *result; in ecc_shared_secret() local 40 result = ltc_ecc_new_point(); in ecc_shared_secret() 41 if (result == NULL) { in ecc_shared_secret() 48 …if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, a, prime, 1)) != CRYPT_OK… in ecc_shared_secret() 57 …if ((err = mp_to_unsigned_bin(result->x, out + (x - mp_unsigned_bin_size(result->x)))) != CRYPT_… in ecc_shared_secret() 62 ltc_ecc_del_point(result); in ecc_shared_secret()
|
/optee_os-3.20.0/core/drivers/ |
A D | stm32_bsec.c | 259 if (result) in stm32_bsec_shadow_register() 271 if (result) in stm32_bsec_shadow_register() 291 return result; in stm32_bsec_shadow_register() 313 if (result) { in stm32_bsec_shadow_read_otp() 319 if (result) in stm32_bsec_shadow_read_otp() 322 return result; in stm32_bsec_shadow_read_otp() 334 if (result) in stm32_bsec_write_otp() 362 if (result) in stm32_bsec_program_otp() 377 if (result) in stm32_bsec_program_otp() 400 return result; in stm32_bsec_program_otp() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/math/ |
A D | modulus.c | 19 !data->b.length || !data->result.data || !data->result.length || in drvcrypt_xor_mod_n() 23 if (data->result.length < data->n.length) in drvcrypt_xor_mod_n() 39 data->result.data[idx] = in drvcrypt_xor_mod_n() 45 memcpy(&data->result.data[idx], in drvcrypt_xor_mod_n() 49 memcpy(&data->result.data[idx], in drvcrypt_xor_mod_n() 53 memset(&data->result.data[idx], 0, in drvcrypt_xor_mod_n()
|
/optee_os-3.20.0/core/drivers/crypto/caam/acipher/ |
A D | caam_math.c | 49 ret = caam_dmaobj_output_sgtbuf(&res, data->result.data, in do_xor_mod_n() 50 data->result.length, in do_xor_mod_n() 51 data->result.length); in do_xor_mod_n() 94 RSA_DUMPBUF("Output", data->result.data, data->result.length); in do_xor_mod_n()
|
A D | caam_rsa.c | 848 mod_op.result.data = seed.data; in do_oaep_decoding() 849 mod_op.result.length = seed.length; in do_oaep_decoding() 882 mod_op.result.data = DB.data; in do_oaep_decoding() 883 mod_op.result.length = DB.length; in do_oaep_decoding() 1089 mod_op.result.data = maskedDB.data; in do_oaep_encoding() 1090 mod_op.result.length = maskedDB.length; in do_oaep_encoding() 1124 mod_op.result.data = maskedSeed.data; in do_oaep_encoding() 1125 mod_op.result.length = maskedSeed.length; in do_oaep_encoding()
|
/optee_os-3.20.0/core/arch/arm/plat-k3/drivers/ |
A D | sa2ul.c | 52 TEE_Result result = TEE_SUCCESS; in sa2ul_init() local 140 result = sa2ul_rng_init(); in sa2ul_init() 141 if (result != TEE_SUCCESS) in sa2ul_init() 142 return result; in sa2ul_init()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | platform_util.h | 221 #define MBEDTLS_IGNORE_RETURN(result) ( (void) !( result ) ) argument
|
/optee_os-3.20.0/core/drivers/imx/dcp/ |
A D | dcp_utils.c | 41 void dcp_left_shift_buffer(uint8_t *input, uint8_t *result, size_t buffer_size) in dcp_left_shift_buffer() argument 49 result[buffer_size - 1 - i] = in dcp_left_shift_buffer()
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_math.h | 20 struct drvcrypt_buf result; /* Result of operation */ member
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/twofish/ |
A D | twofish.c | 139 ulong32 result, B[2], P[2]; in gf_mult() local 143 result = P[0] = B[0] = 0; in gf_mult() 146 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 147 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 148 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 149 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 150 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 151 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 152 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 153 result ^= B[a&1]; in gf_mult() [all …]
|
/optee_os-3.20.0/core/drivers/imx/dcp/include/ |
A D | dcp_utils.h | 40 void dcp_left_shift_buffer(uint8_t *result, uint8_t *input, size_t buffer_size);
|
/optee_os-3.20.0/core/drivers/crypto/se050/adaptors/utils/ |
A D | info.c | 156 SE05x_Result_t result = kSE05x_Result_NA; in applet_get_id() local 165 &result); in applet_get_id()
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/acipher/ |
A D | rsassa.c | 468 mod_op.result.data = dbMask.data; in emsa_pss_encode() 469 mod_op.result.length = dbMask.length; in emsa_pss_encode() 614 mod_op.result.data = msg_db; in emsa_pss_verify() 615 mod_op.result.length = db_size; in emsa_pss_verify()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | cipher.c | 507 int result; in mbedtls_cipher_update_ad() local 514 result = mbedtls_chachapoly_starts( (mbedtls_chachapoly_context*) ctx->cipher_ctx, in mbedtls_cipher_update_ad() 517 if ( result != 0 ) in mbedtls_cipher_update_ad() 518 return( result ); in mbedtls_cipher_update_ad()
|
A D | rsa.c | 2026 unsigned char result[MBEDTLS_MD_MAX_SIZE]; in mbedtls_rsa_rsassa_pss_verify_ext() local 2142 ret = mbedtls_md_finish( &md_ctx, result ); in mbedtls_rsa_rsassa_pss_verify_ext() 2146 if( FTMN_CALLEE_DONE_MEMCMP( memcmp, hash_start, result, hlen ) != 0 ) in mbedtls_rsa_rsassa_pss_verify_ext()
|
/optee_os-3.20.0/core/drivers/clk/ |
A D | clk-stm32mp13.c | 1133 int *result) in clk_stm32_is_pll_config_on_the_fly() argument 1150 *result = -1; in clk_stm32_is_pll_config_on_the_fly() 1156 *result = -1; in clk_stm32_is_pll_config_on_the_fly() 1160 *result = 1; in clk_stm32_is_pll_config_on_the_fly() 1169 *result = 1; in clk_stm32_is_pll_config_on_the_fly() 1171 *result = 0; in clk_stm32_is_pll_config_on_the_fly()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 24 is selected. This may result in an application crash or potentially an 42 ECDHE was indeed one that was offered. As a result, the client would 312 where these are already defined, this can result in a compilation 409 may result in mbedtls_mpi_write_binary() or mbedtls_mpi_write_string() 669 could go undetected, resulting in an incorrect result. 1515 of the decryption and not its result could nonetheless decrypt RSA 1700 This improves compliance to RFC 4492, and as a result, solves 2376 Could result in DoS (application crash) or information leak 2404 reflect bad EC curves within verification result. 3801 * Fixed memory leak in RSA as a result of introduction of blinding [all …]
|
A D | CONTRIBUTING.md | 69 …uous Integration (CI) tests are triggered and run. You should follow the result of the CI tests, a…
|
A D | LICENSE | 160 result of this License or out of the use or inability to use the
|
A D | README.md | 41 …edx509 and libmbedcrypto, and libmbedx509 depends on libmbedcrypto. As a result, some linkers will…
|