Searched refs:flag (Results 1 – 9 of 9) sorted by relevance
/optee_os/core/lib/libtomcrypt/ |
A D | sm2-kep.c | 103 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument 176 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S() 359 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in sm2_kep_derive() local 365 res = sm2_kep_compute_S(S1, sizeof(S1), flag, U, in sm2_kep_derive() 382 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in sm2_kep_derive() local 389 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, U, in sm2_kep_derive()
|
/optee_os/lib/libmbedtls/core/ |
A D | sm2-kep.c | 133 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument 228 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S() 452 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in crypto_acipher_sm2_kep_derive() local 458 res = sm2_kep_compute_S(S1, sizeof(S1), flag, &U, in crypto_acipher_sm2_kep_derive() 475 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in crypto_acipher_sm2_kep_derive() local 482 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, in crypto_acipher_sm2_kep_derive()
|
/optee_os/core/drivers/ |
A D | zynqmp_pm.c | 71 uint32_t flag; member 120 efuse.flag = op; in efuse_op()
|
/optee_os/lib/libutils/isoc/ |
A D | sprintf.c | 23 int __sprintf_chk(char *str, int flag __unused, size_t slen, in __sprintf_chk()
|
/optee_os/lib/libutils/isoc/include/ |
A D | stdio.h | 23 int __sprintf_chk(char *str, int flag, size_t slen, const char *fmt, ...)
|
/optee_os/out/arm/export-ta_arm32/include/ |
A D | stdio.h | 23 int __sprintf_chk(char *str, int flag, size_t slen, const char *fmt, ...)
|
/optee_os/out/arm/export-ta_arm64/include/ |
A D | stdio.h | 23 int __sprintf_chk(char *str, int flag, size_t slen, const char *fmt, ...)
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 186 When that flag is on, standard GNU C printf format specifiers 198 * Implicitly add PSA_KEY_USAGE_SIGN_MESSAGE key usage policy flag when 199 PSA_KEY_USAGE_SIGN_HASH flag is set and PSA_KEY_USAGE_VERIFY_MESSAGE flag 200 when PSA_KEY_USAGE_VERIFY_HASH flag is set. This usage flag extension 209 in bits rather than bytes, with an additional flag to indicate if the 234 through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK. 1933 configuration flag MBEDTLS_GCM_ALT. 1947 the new configuration flag MBEDTLS_ECJPAKE_ALT. 2736 * Change SSL_DISABLE_RENEGOTIATION config.h flag to SSL_RENEGOTIATION 3061 * Add SSL_CIPHERSUITES config.h flag to allow specifying a list of [all …]
|
/optee_os/ |
A D | CHANGELOG.md | 412 attempts to create an existing persistent object without the overwrite flag 785 * The linux driver will set the 'privileged' flag (TEE_GEN_CAP_PRIVILEGED) on
|
Completed in 21 milliseconds