Searched refs:bad (Results 1 – 15 of 15) sorted by relevance
| /optee_os/core/kernel/ |
| A D | dt.c | 134 goto bad; in _fdt_read_paddr() 142 goto bad; in _fdt_read_paddr() 151 goto bad; in _fdt_read_paddr() 154 bad: in _fdt_read_paddr()
|
| /optee_os/out/arm/export-ta_arm64/mk/ |
| A D | gcc.mk | 33 nostdinc := --bad-nostdinc-variable 34 libgcc := --bad-libgcc-variable
|
| A D | clang.mk | 48 nostdinc := --bad-nostdinc-variable 49 libgcc := --bad-libgcc-variable
|
| /optee_os/mk/ |
| A D | gcc.mk | 33 nostdinc := --bad-nostdinc-variable 34 libgcc := --bad-libgcc-variable
|
| A D | clang.mk | 48 nostdinc := --bad-nostdinc-variable 49 libgcc := --bad-libgcc-variable
|
| /optee_os/out/arm/export-ta_arm32/mk/ |
| A D | gcc.mk | 33 nostdinc := --bad-nostdinc-variable 34 libgcc := --bad-libgcc-variable
|
| A D | clang.mk | 48 nostdinc := --bad-nostdinc-variable 49 libgcc := --bad-libgcc-variable
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| A D | cipher.c | 802 unsigned char padding_len, bad = 0; in get_pkcs_padding() local 811 bad |= padding_len > input_len; in get_pkcs_padding() 812 bad |= padding_len == 0; in get_pkcs_padding() 818 bad |= ( input[i] ^ padding_len ) * ( i >= pad_idx ); in get_pkcs_padding() 843 unsigned char done = 0, prev_done, bad; in get_one_and_zeros_padding() local 848 bad = 0x80; in get_one_and_zeros_padding() 855 bad ^= input[i - 1] * ( done != prev_done ); in get_one_and_zeros_padding() 882 unsigned char padding_len, bad = 0; in get_zeros_and_len_padding() local 891 bad |= padding_len > input_len; in get_zeros_and_len_padding() 892 bad |= padding_len == 0; in get_zeros_and_len_padding() [all …]
|
| A D | rsa.c | 1365 unsigned char *p, bad, pad_done; in mbedtls_rsa_rsaes_oaep_decrypt() local 1447 bad = 0; in mbedtls_rsa_rsaes_oaep_decrypt() 1455 bad |= lhash[i] ^ *p++; in mbedtls_rsa_rsaes_oaep_decrypt() 1468 bad |= *p++ ^ 0x01; in mbedtls_rsa_rsaes_oaep_decrypt() 1476 if( bad != 0 ) in mbedtls_rsa_rsaes_oaep_decrypt() 1618 unsigned bad = 0; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() local 1650 bad |= buf[0]; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 1684 bad |= if_int( pad_done, 0, 1 ); in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 1696 plaintext_size = if_int( bad, in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 1720 bad = all_or_nothing_int( bad | output_too_large ); in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() [all …]
|
| /optee_os/core/mm/ |
| A D | mobj.c | 541 goto bad; in mobj_seccpy_shm_alloc() 547 goto bad; in mobj_seccpy_shm_alloc() 552 bad: in mobj_seccpy_shm_alloc()
|
| /optee_os/lib/libutils/isoc/ |
| A D | bget.doc | 288 validated for bad pointers, overwritten data, etc. If compiled with
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| A D | ChangeLog | 171 bad cryptographic practice. Fix #1906. 293 * Fix a resource leak in a bad-arguments case of mbedtls_rsa_gen_key() 2189 reflect bad EC curves within verification result. 2511 * Fix failures in MPI on Sparc(64) due to use of bad assembly code. 2910 performance impact was bad for some users (this was introduced in 1.3.10). 3025 * Fix potential bad read in parsing ServerHello (found by Adrien 3492 * Fix potential bad read in parsing ServerHello (found by Adrien 3676 * Removed timing differences due to bad padding from 3840 * Removed timing differences due to bad padding from
|
| /optee_os/out/arm/ta/avb/ |
| A D | 023f8f1a-292a-432b-8fc4-de8471358067.dmp | 16616 6e6c: 1bad subs r5, r5, r6
|
| /optee_os/out/arm/ta/trusted_keys/ |
| A D | f04a0fe7-1f5d-4b9b-abf7-619b85b4ce8c.dmp | 22017 92f4: 1bad subs r5, r5, r6
|
| /optee_os/out/arm/ta/pkcs11/ |
| A D | fd02c9da-306c-48c7-a49c-bbd827ae86ee.dmp | 43911 12740: 1bad subs r5, r5, r6
|
Completed in 140 milliseconds