Home
last modified time | relevance | path

Searched refs:optional (Results 1 – 14 of 14) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/custom_type/
A Dder_decode_custom_type.c168 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
179 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
190 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
202 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
214 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
226 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
237 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
247 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
259 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
271 if (!ordered || list[i].optional) { continue; } in der_decode_custom_type_ex()
[all …]
A Dder_length_custom_type.c68 if (!list[i].used && list[i].optional) continue; in der_length_custom_type()
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
A Decc_import_x509.c61 seq_ecparams[5].optional = 1; in _ecc_import_x509_with_curve()
69 seq_curve[2].optional = 1; in _ecc_import_x509_with_curve()
A Decc_import_openssl.c79 seq_ecparams[5].optional = 1; in _ecc_import_private_with_curve()
87 seq_curve[2].optional = 1; in _ecc_import_private_with_curve()
/optee_os/core/drivers/crypto/crypto_api/acipher/
A Drsa.c406 if (rsa->optional.ssa_sign) in crypto_acipher_rsassa_sign()
407 ret = rsa->optional.ssa_sign(&rsa_ssa); in crypto_acipher_rsassa_sign()
482 if (rsa->optional.ssa_verify) in crypto_acipher_rsassa_verify()
483 ret = rsa->optional.ssa_verify(&rsa_ssa); in crypto_acipher_rsassa_verify()
/optee_os/mk/
A Daosp_optee.mk109 LOCAL_MODULE_TAGS := optional
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/sequence/
A Dder_length_sequence.c55 if (!list[i].used && list[i].optional) continue; in der_length_sequence_ex()
/optee_os/core/drivers/crypto/crypto_api/include/
A Ddrvcrypt_acipher.h101 } optional; member
/optee_os/core/drivers/crypto/se050/core/
A Drsa.c755 .optional.ssa_sign = do_ssa_sign,
756 .optional.ssa_verify = do_ssa_verify,
/optee_os/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_pk.h534 int optional; member
551 LTC_MACRO_list[LTC_MACRO_temp].optional = 0; \
/optee_os/ta/pkcs11/src/
A Dpkcs11_attributes.c603 uint32_t const *optional = NULL; in create_certificate_attributes() local
640 optional = pkcs11_x509_certificate_optional; in create_certificate_attributes()
656 rc = set_optional_attributes(out, temp, optional, optional_count); in create_certificate_attributes()
/optee_os/lib/libutils/isoc/
A Dbget.doc123 expansion increment. All of these functions are optional (although it
166 optional settings below):
/optee_os/core/drivers/crypto/caam/acipher/
A Dcaam_rsa.c1554 .optional.ssa_sign = NULL,
1555 .optional.ssa_verify = NULL,
/optee_os/lib/libmbedtls/mbedtls/
A DChangeLog1241 that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
1684 where an optional signature algorithms list is expected when the signature
1726 unable to parse keys which had only the optional parameters field of the
2083 * Fix authentication bypass in SSL/TLS: when authmode is set to optional,
2111 * With authmode set to optional, the TLS handshake is now aborted if the
2788 * Support for RSA_ALT contexts in the PK layer is now optional. Since is is
3223 "triple handshake" attack when authentication mode is 'optional' (the
3319 * Added optional optimization for NIST MODP curves (POLARSSL_ECP_NIST_OPTIM)
3528 "triple handshake" attack when authentication mode is optional (the

Completed in 32 milliseconds