/optee_os/core/lib/libtomcrypt/src/prngs/ |
A D | rng_make_prng.c | 35 unsigned long bytes; in rng_make_prng() local 46 bytes = prng_descriptor[wprng]->export_size; in rng_make_prng() 50 bytes = (unsigned long)((bits+7)/8) * 2; in rng_make_prng() 57 buf = XMALLOC(bytes); in rng_make_prng() 62 if (rng_get_bytes(buf, bytes, callback) != bytes) { in rng_make_prng() 68 if ((err = prng_descriptor[wprng]->pimport(buf, bytes, prng)) != CRYPT_OK) { in rng_make_prng() 72 if ((err = prng_descriptor[wprng]->add_entropy(buf, bytes, prng)) != CRYPT_OK) { in rng_make_prng() 82 zeromem(buf, bytes); in rng_make_prng()
|
/optee_os/core/lib/libtomcrypt/src/math/ |
A D | rand_bn.c | 19 int res, bytes; in rand_bn_bits() local 28 bytes = (bits+7) >> 3; in rand_bn_bits() 32 if ((buf = XCALLOC(1, bytes)) == NULL) return CRYPT_MEM; in rand_bn_bits() 35 if (prng_descriptor[wprng]->read(buf, bytes, prng) != (unsigned long)bytes) { in rand_bn_bits() 42 if ((res = mp_read_unsigned_bin(N, buf, bytes)) != CRYPT_OK) goto cleanup; in rand_bn_bits() 48 zeromem(buf, bytes); in rand_bn_bits()
|
/optee_os/core/arch/arm/kernel/ |
A D | tee_time_arm_cntpct.c | 53 int bytes = 0, n; in REGISTER_TIME_SOURCE() local 59 bytes = 2; in REGISTER_TIME_SOURCE() 68 bytes = 1; in REGISTER_TIME_SOURCE() 71 if (bytes) { in REGISTER_TIME_SOURCE() 72 FMSG("0x%02X", (int)acc & ((1 << (bytes * 8)) - 1)); in REGISTER_TIME_SOURCE() 73 crypto_rng_add_event(sid, pnum, (uint8_t *)&acc, bytes); in REGISTER_TIME_SOURCE()
|
/optee_os/scripts/ |
A D | gen_stmm_hex.py | 31 bytes = inf.read() 32 uncompressed_size = len(bytes) 33 bytes = zlib.compress(bytes) 34 size = len(bytes) 42 outf.write('0x{:02x},'.format(bytes[i]))
|
A D | bin_to_c.py | 41 bytes = indata.read() 43 bytes += b'\0' 44 size = len(bytes) 60 if args.text and i != size - 1 and bytes[i] == b'\0': 63 f.write('0x' + '{:02x}'.format(bytes[i]) + ',')
|
A D | sign_helper_kms.py | 45 def sign(self, data: bytes, padding: AsymmetricPadding, argument 48 ) -> bytes: 86 def decrypt(self, ciphertext: bytes, padding: AsymmetricPadding) -> bytes: argument 97 ) -> bytes:
|
A D | ts_bin_to_c.py | 101 bytes = _ts.read() 102 uncompressed_size = len(bytes) 104 bytes = zlib.compress(bytes) 105 size = len(bytes) 117 f.write(hex(bytes[i]) + ',')
|
A D | sign_encrypt.py | 226 shdr_uuid = args.uuid.bytes 231 cipher = AESGCM(bytes.fromhex(args.enc_key))
|
/optee_os/core/drivers/crypto/se050/glue/ |
A D | i2c.c | 14 static TEE_Result (*transfer)(struct rpc_i2c_request *req, size_t *bytes); 17 size_t *bytes) in native_i2c_transfer() argument 29 *bytes = req->buffer_len; in native_i2c_transfer() 44 size_t bytes = 0; in i2c_transfer() local 48 if ((*transfer)(&request, &bytes) == TEE_SUCCESS) in i2c_transfer() 49 return bytes; in i2c_transfer()
|
/optee_os/core/drivers/crypto/se050/core/ |
A D | ecc.c | 101 size_t *bytes, size_t *bits) in ecc_get_key_size() argument 110 *bytes = 24; in ecc_get_key_size() 117 *bytes = 28; in ecc_get_key_size() 124 *bytes = 32; in ecc_get_key_size() 131 *bytes = 48; in ecc_get_key_size() 138 *bytes = 66; in ecc_get_key_size() 544 size_t bytes = 0; in gen_keypair() local 572 bytes = sizeof(kf); in gen_keypair() 574 &bytes); in gen_keypair() 581 crypto_bignum_bin2bn(kf + 1, bytes / 2, key->x); in gen_keypair() [all …]
|
/optee_os/core/drivers/ |
A D | zynqmp_pm.c | 80 .bytes = ZYNQMP_EFUSE_##__x##_LENGTH, \ 85 uint32_t bytes; member 116 efuse.size = efuse_tbl[id].bytes / sizeof(uint32_t); in efuse_op()
|
/optee_os/core/tee/ |
A D | tee_svc_storage.c | 88 size_t bytes; in tee_svc_storage_read_head() local 101 bytes = sizeof(struct tee_svc_storage_head); in tee_svc_storage_read_head() 102 res = fops->read(o->fh, 0, &head, &bytes); in tee_svc_storage_read_head() 118 if (bytes != sizeof(struct tee_svc_storage_head)) { in tee_svc_storage_read_head() 137 bytes = head.attr_size; in tee_svc_storage_read_head() 139 attr, &bytes); in tee_svc_storage_read_head() 142 if (res != TEE_SUCCESS || bytes != head.attr_size) in tee_svc_storage_read_head() 683 size_t bytes = 0; in syscall_storage_obj_read() local 711 bytes = len; in syscall_storage_obj_read() 725 o->info.dataPosition += bytes; in syscall_storage_obj_read() [all …]
|
A D | tee_rpmb_fs.c | 340 *bytes = (uint8_t) (u32 >> 24); in u32_to_bytes() 341 *(bytes + 1) = (uint8_t) (u32 >> 16); in u32_to_bytes() 342 *(bytes + 2) = (uint8_t) (u32 >> 8); in u32_to_bytes() 343 *(bytes + 3) = (uint8_t) u32; in u32_to_bytes() 348 *u32 = (uint32_t) ((*(bytes) << 24) + in bytes_to_u32() 349 (*(bytes + 1) << 16) + in bytes_to_u32() 350 (*(bytes + 2) << 8) + (*(bytes + 3))); in bytes_to_u32() 355 *bytes = (uint8_t) (u16 >> 8); in u16_to_bytes() 356 *(bytes + 1) = (uint8_t) u16; in u16_to_bytes() 361 *u16 = (uint16_t) ((*bytes << 8) + *(bytes + 1)); in bytes_to_u16() [all …]
|
A D | fs_htree.c | 113 size_t bytes; in rpc_read() local 120 res = ht->stor->rpc_read_final(&op, &bytes); in rpc_read() 124 if (bytes != dlen) in rpc_read()
|
/optee_os/core/include/tee/ |
A D | tadb.h | 38 size_t pos, uint8_t **data, size_t bytes); 40 size_t *bytes);
|
A D | fs_htree.h | 93 size_t *bytes);
|
/optee_os/core/include/kernel/ |
A D | rpc_io_i2c.h | 36 TEE_Result rpc_io_i2c_transfer(struct rpc_i2c_request *p, size_t *bytes);
|
/optee_os/core/pta/tests/ |
A D | fs_htree.c | 119 size_t *bytes) in test_read_final() argument 126 *bytes = sz; in test_read_final() 128 *bytes = a->data_len - offs; in test_read_final() 130 *bytes = 0; in test_read_final() 132 memcpy(a->block, a->data + offs, *bytes); in test_read_final()
|
/optee_os/out/arm/export-ta_arm32/host_include/ |
A D | fs_htree.h | 93 size_t *bytes);
|
/optee_os/out/arm/export-ta_arm64/host_include/ |
A D | fs_htree.h | 93 size_t *bytes);
|
/optee_os/out/arm/core/ |
A D | kern.ld | 7 ASSERT(!((0x0e100000 + (0x0e100000 - 0x0e100000)) & 127), "text start should align to 128bytes")
|
/optee_os/out/arm/export-ta_arm64/scripts/ |
A D | sign_encrypt.py | 226 shdr_uuid = args.uuid.bytes 231 cipher = AESGCM(bytes.fromhex(args.enc_key))
|
/optee_os/out/arm/export-ta_arm32/scripts/ |
A D | sign_encrypt.py | 226 shdr_uuid = args.uuid.bytes 231 cipher = AESGCM(bytes.fromhex(args.enc_key))
|
/optee_os/lib/libutils/isoc/ |
A D | bget.doc | 142 function is called with an argument indicating how many bytes of 170 Create a buffer pool of <len> bytes, using the storage starting at 176 Allocate a buffer of <size> bytes. The address of the buffer is 182 Allocate a buffer of <size> bytes and clear it to all zeroes. The 209 specifying the number of bytes (total buffer size, including header
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 210 size may have been rounded up to a whole number of bytes. 376 of up to 15 bytes, with consequences ranging up to arbitrary code 828 bytes (size of the entropy accumulator). 880 most 2 bytes. 1919 name larger than 16 bytes had been configured on the server. 2533 mbedtls_pk_parse_key(file)() when the password is > 129 bytes. 2539 require reading a string of close to or larger than 2^62 bytes. 3092 to 32 bytes with CBC-based ciphersuites and TLS >= 1.1 4288 than 64 bytes, thanks to Stephane Desneux and gary ng 4349 size of 16384 bytes to be rejected [all …]
|