/optee_os/core/crypto/ |
A D | aes-cts.c | 37 TEE_OperationMode mode; member 57 c->mode = mode; in cts_init() 106 mode, last_block, data, len, dst); in cbc_cts_update() 116 if (mode == TEE_MODE_ENCRYPT) { in cbc_cts_update() 125 mode, 0, data, in cbc_cts_update() 135 mode, 0, tmp_block, block_size, in cbc_cts_update() 142 mode, 0, in cbc_cts_update() 160 TEE_ALG_AES_CBC_NOPAD, mode, in cbc_cts_update() 169 mode, 0, tmp_block, block_size, in cbc_cts_update() 176 mode, 0, data + in cbc_cts_update() [all …]
|
/optee_os/core/pta/tests/ |
A D | aes_perf.c | 98 res = crypto_cipher_init(*ctx, mode, aes_key, key_len, key2, in init_ctx() 102 res = crypto_authenc_init(*ctx, mode, aes_key, key_len, aes_iv, in init_ctx() 116 static TEE_Result update_ae(void *ctx, TEE_OperationMode mode, in update_ae() argument 127 return crypto_cipher_update(ctx, mode, false, src, len, dst); in update_cipher() 134 TEE_Result (*update_func)(void *ctx, TEE_OperationMode mode, in do_update() 148 res = update_func(ctx, mode, in + m * unit_size, in do_update() 154 res = update_func(ctx, mode, in + m * unit_size, in do_update() 169 TEE_OperationMode mode = 0; in core_aes_perf_tests() local 200 mode = TEE_MODE_DECRYPT; in core_aes_perf_tests() 202 mode = TEE_MODE_ENCRYPT; in core_aes_perf_tests() [all …]
|
/optee_os/core/lib/zlib/ |
A D | inflate.c | 115 state->mode < HEAD || state->mode > SYNC) 131 state->mode = HEAD; 651 if (state->mode == TYPE) state->mode = TYPEDO; /* skip check */ 657 switch (state->mode) { 733 state->mode = OS; 1050 state->mode = LEN; 1207 state->mode = LEN; 1284 (state->mode == LEN_ || state->mode == COPY_ ? 256 : 0); 1354 state->mode = MEM; 1428 state->mode = SYNC; [all …]
|
A D | zutil.h | 109 # define F_OPEN(name, mode) \ argument 110 fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512") 141 # define fdopen(fd,mode) NULL /* No fdopen() */ argument 168 # define fdopen(fd,mode) NULL /* No fdopen() */ argument 173 # define fdopen(fd,mode) NULL /* No fdopen() */ argument 203 # define F_OPEN(name, mode) fopen((name), (mode)) argument
|
/optee_os/out/arm/export-ta_arm32/include/mbedtls/ |
A D | rsa.h | 618 int mode, size_t ilen, 704 int mode, 757 int mode, size_t *olen, 861 int mode, 921 int mode, 969 int mode, 1088 int mode, 1141 int mode, 1187 int mode, 1243 int mode, [all …]
|
A D | pkcs11.h | 138 int mode, size_t *olen, 163 int mode, 176 int mode, size_t *olen, in mbedtls_ssl_pkcs11_decrypt() argument 180 return mbedtls_pkcs11_decrypt( (mbedtls_pkcs11_context *) ctx, mode, olen, input, output, in mbedtls_ssl_pkcs11_decrypt() 212 int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, in mbedtls_ssl_pkcs11_sign() argument 217 return mbedtls_pkcs11_sign( (mbedtls_pkcs11_context *) ctx, mode, md_alg, in mbedtls_ssl_pkcs11_sign()
|
A D | aes.h | 259 int mode, 306 int mode, 350 int mode, 398 int mode, 442 int mode,
|
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | rsa.h | 618 int mode, size_t ilen, 704 int mode, 757 int mode, size_t *olen, 861 int mode, 921 int mode, 969 int mode, 1088 int mode, 1141 int mode, 1187 int mode, 1243 int mode, [all …]
|
A D | pkcs11.h | 138 int mode, size_t *olen, 163 int mode, 176 int mode, size_t *olen, in mbedtls_ssl_pkcs11_decrypt() argument 180 return mbedtls_pkcs11_decrypt( (mbedtls_pkcs11_context *) ctx, mode, olen, input, output, in mbedtls_ssl_pkcs11_decrypt() 212 int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, in mbedtls_ssl_pkcs11_sign() argument 217 return mbedtls_pkcs11_sign( (mbedtls_pkcs11_context *) ctx, mode, md_alg, in mbedtls_ssl_pkcs11_sign()
|
/optee_os/out/arm/export-ta_arm64/include/mbedtls/ |
A D | rsa.h | 618 int mode, size_t ilen, 704 int mode, 757 int mode, size_t *olen, 861 int mode, 921 int mode, 969 int mode, 1088 int mode, 1141 int mode, 1187 int mode, 1243 int mode, [all …]
|
A D | pkcs11.h | 138 int mode, size_t *olen, 163 int mode, 176 int mode, size_t *olen, in mbedtls_ssl_pkcs11_decrypt() argument 180 return mbedtls_pkcs11_decrypt( (mbedtls_pkcs11_context *) ctx, mode, olen, input, output, in mbedtls_ssl_pkcs11_decrypt() 212 int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, in mbedtls_ssl_pkcs11_sign() argument 217 return mbedtls_pkcs11_sign( (mbedtls_pkcs11_context *) ctx, mode, md_alg, in mbedtls_ssl_pkcs11_sign()
|
A D | aes.h | 259 int mode, 306 int mode, 350 int mode, 398 int mode, 442 int mode,
|
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/ |
A D | rsa.h | 618 int mode, size_t ilen, 704 int mode, 757 int mode, size_t *olen, 861 int mode, 921 int mode, 969 int mode, 1088 int mode, 1141 int mode, 1187 int mode, 1243 int mode, [all …]
|
A D | pkcs11.h | 138 int mode, size_t *olen, 163 int mode, 176 int mode, size_t *olen, in mbedtls_ssl_pkcs11_decrypt() argument 180 return mbedtls_pkcs11_decrypt( (mbedtls_pkcs11_context *) ctx, mode, olen, input, output, in mbedtls_ssl_pkcs11_decrypt() 212 int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, in mbedtls_ssl_pkcs11_sign() argument 217 return mbedtls_pkcs11_sign( (mbedtls_pkcs11_context *) ctx, mode, md_alg, in mbedtls_ssl_pkcs11_sign()
|
A D | aes.h | 259 int mode, 306 int mode, 350 int mode, 398 int mode, 442 int mode,
|
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/ |
A D | rsa.h | 618 int mode, size_t ilen, 704 int mode, 757 int mode, size_t *olen, 861 int mode, 921 int mode, 969 int mode, 1088 int mode, 1141 int mode, 1187 int mode, 1243 int mode, [all …]
|
A D | pkcs11.h | 138 int mode, size_t *olen, 163 int mode, 176 int mode, size_t *olen, in mbedtls_ssl_pkcs11_decrypt() argument 180 return mbedtls_pkcs11_decrypt( (mbedtls_pkcs11_context *) ctx, mode, olen, input, output, in mbedtls_ssl_pkcs11_decrypt() 212 int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, in mbedtls_ssl_pkcs11_sign() argument 217 return mbedtls_pkcs11_sign( (mbedtls_pkcs11_context *) ctx, mode, md_alg, in mbedtls_ssl_pkcs11_sign()
|
A D | aes.h | 259 int mode, 306 int mode, 350 int mode, 398 int mode, 442 int mode,
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | cipher.c | 151 const mbedtls_cipher_mode_t mode ) in mbedtls_cipher_info_from_values() argument 158 def->info->mode == mode ) in mbedtls_cipher_info_from_values() 397 MBEDTLS_MODE_CTR == ctx->cipher_info->mode ) in mbedtls_cipher_setkey() 506 if( MBEDTLS_MODE_GCM == ctx->cipher_info->mode ) in mbedtls_cipher_update_ad() 517 mbedtls_chachapoly_mode_t mode; in mbedtls_cipher_update_ad() local 519 mode = ( ctx->operation == MBEDTLS_ENCRYPT ) in mbedtls_cipher_update_ad() 568 if( ctx->cipher_info->mode == MBEDTLS_MODE_ECB ) in mbedtls_cipher_update() 1072 if( mode != MBEDTLS_PADDING_NONE ) in mbedtls_cipher_set_padding_mode() 1079 switch( mode ) in mbedtls_cipher_set_padding_mode() 1586 mbedtls_nist_kw_mode_t mode = ( MBEDTLS_MODE_KW == ctx->cipher_info->mode ) ? in mbedtls_cipher_auth_encrypt_ext() local [all …]
|
A D | rsa.c | 1159 int mode, in mbedtls_rsa_rsaes_oaep_encrypt() argument 1274 if( mode == MBEDTLS_RSA_PUBLIC ) in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() 1356 int mode, in mbedtls_rsa_rsaes_oaep_decrypt() argument 1641 ret = ( mode == MBEDTLS_RSA_PUBLIC ) in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 1652 if( mode == MBEDTLS_RSA_PRIVATE ) in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 1807 int mode, in rsa_rsassa_pss_sign() argument 1965 int mode, in mbedtls_rsa_rsassa_pss_sign() argument 2149 if( mode == MBEDTLS_RSA_PUBLIC ) in mbedtls_rsa_rsassa_pkcs1_v15_sign() 2197 int mode, in mbedtls_rsa_pkcs1_sign() argument 2387 int mode, in mbedtls_rsa_rsassa_pss_verify() argument [all …]
|
A D | blowfish.c | 234 int mode, in mbedtls_blowfish_crypt_ecb() argument 240 BLOWFISH_VALIDATE_RET( mode == MBEDTLS_BLOWFISH_ENCRYPT || in mbedtls_blowfish_crypt_ecb() 241 mode == MBEDTLS_BLOWFISH_DECRYPT ); in mbedtls_blowfish_crypt_ecb() 248 if( mode == MBEDTLS_BLOWFISH_DECRYPT ) in mbedtls_blowfish_crypt_ecb() 268 int mode, in mbedtls_blowfish_crypt_cbc() argument 277 BLOWFISH_VALIDATE_RET( mode == MBEDTLS_BLOWFISH_ENCRYPT || in mbedtls_blowfish_crypt_cbc() 278 mode == MBEDTLS_BLOWFISH_DECRYPT ); in mbedtls_blowfish_crypt_cbc() 286 if( mode == MBEDTLS_BLOWFISH_DECRYPT ) in mbedtls_blowfish_crypt_cbc() 328 int mode, in mbedtls_blowfish_crypt_cfb64() argument 339 BLOWFISH_VALIDATE_RET( mode == MBEDTLS_BLOWFISH_ENCRYPT || in mbedtls_blowfish_crypt_cfb64() [all …]
|
/optee_os/core/drivers/ |
A D | stm32_gpio.c | 104 cfg->mode << (pin << 1)); in set_gpio_cfg() 233 uint32_t mode = 0; in get_pinctrl_from_fdt() local 246 switch (mode) { in get_pinctrl_from_fdt() 248 mode = GPIO_MODE_INPUT; in get_pinctrl_from_fdt() 266 alternate = mode - 1U; in get_pinctrl_from_fdt() 267 mode = GPIO_MODE_ALTERNATE; in get_pinctrl_from_fdt() 270 mode = GPIO_MODE_ANALOG; in get_pinctrl_from_fdt() 273 mode = GPIO_MODE_OUTPUT; in get_pinctrl_from_fdt() 288 ref->active_cfg.mode = mode; in get_pinctrl_from_fdt() 386 return mode == GPIO_MODE_INPUT; in valid_gpio_config() [all …]
|
/optee_os/core/arch/arm/plat-imx/drivers/ |
A D | imx_snvs.c | 11 enum snvs_ssm_mode mode = SNVS_SSM_MODE_INIT; in plat_rpmb_key_is_ready() local 15 mode = snvs_get_ssm_mode(); in plat_rpmb_key_is_ready() 17 ssm_secure = (mode == SNVS_SSM_MODE_TRUSTED || in plat_rpmb_key_is_ready() 18 mode == SNVS_SSM_MODE_SECURE); in plat_rpmb_key_is_ready()
|
/optee_os/core/lib/libtomcrypt/src/misc/padding/ |
A D | padding_pad.c | 21 static int _padding_padded_length(unsigned long *length, unsigned long mode) in _padding_padded_length() argument 28 block_length = mode & 0xff; in _padding_padded_length() 29 padding = mode & LTC_PAD_MASK; in _padding_padded_length() 86 …ng_pad(unsigned char *data, unsigned long length, unsigned long* padded_length, unsigned long mode) in padding_pad() argument 96 if ((err = _padding_padded_length(&l, mode)) != CRYPT_OK) { in padding_pad() 100 type = mode & LTC_PAD_MASK; in padding_pad()
|
/optee_os/core/lib/libtomcrypt/src/misc/base64/ |
A D | base64_decode.c | 87 const unsigned char *map, int mode) in _base64_decode_internal() argument 99 if ((in[x] == 0) && (x == (inlen - 1)) && (mode != strict)) { in _base64_decode_internal() 108 if (mode == strict) { in _base64_decode_internal() 114 if (mode == insane) { in _base64_decode_internal() 119 if ((g > 0) && (mode != insane)) { in _base64_decode_internal() 137 if (((y + g) != 4) && (mode == strict) && (map != map_base64url)) return CRYPT_INVALID_PACKET; in _base64_decode_internal()
|