/optee_os/core/arch/arm/plat-stm32mp1/nsec-service/ |
A D | bsec_svc.c | 16 TEE_Result result = TEE_ERROR_GENERIC; in bsec_main() local 31 result = stm32_bsec_read_otp(out_value, otp_id); in bsec_main() 43 result = stm32_bsec_read_otp(&tmp, otp_id); in bsec_main() 44 if (!result) in bsec_main() 45 result = stm32_bsec_shadow_register(otp_id); in bsec_main() 46 if (!result) in bsec_main() 48 if (!result) in bsec_main() 49 result = stm32_bsec_write_otp(tmp, otp_id); in bsec_main() 57 result = TEE_ERROR_BAD_PARAMETERS; in bsec_main() 61 if (!result) in bsec_main() [all …]
|
/optee_os/core/drivers/ |
A D | stm32_bsec.c | 235 if (result) in stm32_bsec_shadow_register() 244 if (result) in stm32_bsec_shadow_register() 264 return result; in stm32_bsec_shadow_register() 283 if (result) { in stm32_bsec_shadow_read_otp() 289 if (result) in stm32_bsec_shadow_read_otp() 292 return result; in stm32_bsec_shadow_read_otp() 304 if (result) in stm32_bsec_write_otp() 329 if (result) in stm32_bsec_program_otp() 341 if (result) in stm32_bsec_program_otp() 364 return result; in stm32_bsec_program_otp() [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/pkcs1/ |
A D | pkcs_1_v1_5_decode.c | 40 int result; in pkcs_1_v1_5_decode() local 53 result = CRYPT_OK; in pkcs_1_v1_5_decode() 58 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 71 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 81 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 91 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 95 result = CRYPT_INVALID_PACKET; in pkcs_1_v1_5_decode() 98 if (result == CRYPT_OK) { in pkcs_1_v1_5_decode() 106 return result; in pkcs_1_v1_5_decode()
|
A D | pkcs_1_v1_5_encode.c | 43 int result; in pkcs_1_v1_5_encode() local 52 if ((result = prng_is_valid(prng_idx)) != CRYPT_OK) { in pkcs_1_v1_5_encode() 53 return result; in pkcs_1_v1_5_encode() 66 result = CRYPT_BUFFER_OVERFLOW; in pkcs_1_v1_5_encode() 77 result = CRYPT_ERROR_READPRNG; in pkcs_1_v1_5_encode() 85 result = CRYPT_ERROR_READPRNG; in pkcs_1_v1_5_encode() 101 result = CRYPT_OK; in pkcs_1_v1_5_encode() 103 return result; in pkcs_1_v1_5_encode()
|
/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_shared_secret.c | 32 ecc_point *result; in ecc_shared_secret() local 47 result = ltc_ecc_new_point(); in ecc_shared_secret() 48 if (result == NULL) { in ecc_shared_secret() 55 …if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, a, prime, 1)) != CRYPT_OK… in ecc_shared_secret() 64 …if ((err = mp_to_unsigned_bin(result->x, out + (x - mp_unsigned_bin_size(result->x)))) != CRYPT_… in ecc_shared_secret() 69 ltc_ecc_del_point(result); in ecc_shared_secret()
|
/optee_os/core/drivers/crypto/crypto_api/math/ |
A D | modulus.c | 20 !data->b.length || !data->result.data || !data->result.length || in drvcrypt_xor_mod_n() 24 if (data->result.length < data->n.length) in drvcrypt_xor_mod_n() 40 data->result.data[idx] = in drvcrypt_xor_mod_n() 46 memcpy(&data->result.data[idx], in drvcrypt_xor_mod_n() 50 memcpy(&data->result.data[idx], in drvcrypt_xor_mod_n() 54 memset(&data->result.data[idx], 0, in drvcrypt_xor_mod_n()
|
/optee_os/core/drivers/crypto/caam/acipher/ |
A D | caam_math.c | 49 ret = caam_dmaobj_output_sgtbuf(&res, data->result.data, in do_xor_mod_n() 50 data->result.length, in do_xor_mod_n() 51 data->result.length); in do_xor_mod_n() 94 RSA_DUMPBUF("Output", data->result.data, data->result.length); in do_xor_mod_n()
|
A D | caam_rsa.c | 848 mod_op.result.data = seed.data; in do_oaep_decoding() 849 mod_op.result.length = seed.length; in do_oaep_decoding() 882 mod_op.result.data = DB.data; in do_oaep_decoding() 883 mod_op.result.length = DB.length; in do_oaep_decoding() 1089 mod_op.result.data = maskedDB.data; in do_oaep_encoding() 1090 mod_op.result.length = maskedDB.length; in do_oaep_encoding() 1124 mod_op.result.data = maskedSeed.data; in do_oaep_encoding() 1125 mod_op.result.length = maskedSeed.length; in do_oaep_encoding()
|
/optee_os/core/lib/libtomcrypt/src/ciphers/twofish/ |
A D | twofish.c | 146 ulong32 result, B[2], P[2]; in gf_mult() local 150 result = P[0] = B[0] = 0; in gf_mult() 153 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 154 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 155 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 156 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 157 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 158 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 159 result ^= B[a&1]; a >>= 1; B[1] = P[B[1]>>7] ^ (B[1] << 1); in gf_mult() 160 result ^= B[a&1]; in gf_mult() [all …]
|
/optee_os/core/drivers/imx/dcp/ |
A D | dcp_utils.c | 75 void dcp_left_shift_buffer(uint8_t *input, uint8_t *result, size_t buffer_size) in dcp_left_shift_buffer() argument 83 result[buffer_size - 1 - i] = in dcp_left_shift_buffer()
|
/optee_os/core/arch/arm/plat-stm32mp1/ |
A D | main.c | 219 TEE_Result result = TEE_ERROR_GENERIC; in stm32mp_is_closed_device() local 222 result = stm32_bsec_shadow_read_otp(&otp, DATA0_OTP); in stm32mp_is_closed_device() 223 if (!result && !(otp & BIT(DATA0_OTP_SECURED_POS))) in stm32mp_is_closed_device()
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | base64.c | 151 unsigned char result = 0; in mbedtls_base64_table_lookup() local 155 mbedtls_base64_cond_assign_uchar( &result, &table[i], mbedtls_base64_eq( i, table_index ) ); in mbedtls_base64_table_lookup() 158 return result; in mbedtls_base64_table_lookup()
|
A D | cipher.c | 516 int result; in mbedtls_cipher_update_ad() local 523 result = mbedtls_chachapoly_starts( (mbedtls_chachapoly_context*) ctx->cipher_ctx, in mbedtls_cipher_update_ad() 526 if ( result != 0 ) in mbedtls_cipher_update_ad() 527 return( result ); in mbedtls_cipher_update_ad()
|
A D | rsa.c | 2249 unsigned char result[MBEDTLS_MD_MAX_SIZE]; in mbedtls_rsa_rsassa_pss_verify_ext() local 2365 ret = mbedtls_md_finish( &md_ctx, result ); in mbedtls_rsa_rsassa_pss_verify_ext() 2369 if( memcmp( hash_start, result, hlen ) != 0 ) in mbedtls_rsa_rsassa_pss_verify_ext()
|
/optee_os/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_math.h | 20 struct drvcrypt_buf result; /* Result of operation */ member
|
/optee_os/core/drivers/imx/dcp/include/ |
A D | dcp_utils.h | 40 void dcp_left_shift_buffer(uint8_t *result, uint8_t *input, size_t buffer_size);
|
/optee_os/core/drivers/crypto/se050/adaptors/utils/ |
A D | info.c | 156 SE05x_Result_t result = kSE05x_Result_NA; in applet_get_id() local 165 &result); in applet_get_id()
|
/optee_os/core/drivers/crypto/crypto_api/acipher/ |
A D | rsassa.c | 466 mod_op.result.data = dbMask.data; in emsa_pss_encode() 467 mod_op.result.length = dbMask.length; in emsa_pss_encode() 612 mod_op.result.data = msg_db; in emsa_pss_verify() 613 mod_op.result.length = db_size; in emsa_pss_verify()
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 97 where these are already defined, this can result in a compilation 194 may result in mbedtls_mpi_write_binary() or mbedtls_mpi_write_string() 452 (an error condition) and the second operand was aliased to the result. 454 could go undetected, resulting in an incorrect result. 1300 of the decryption and not its result could nonetheless decrypt RSA 1485 This improves compliance to RFC 4492, and as a result, solves 2161 Could result in DoS (application crash) or information leak 2189 reflect bad EC curves within verification result. 2621 result trying to unlock an unlocked mutex on invalid input (found by 3586 * Fixed memory leak in RSA as a result of introduction of blinding [all …]
|
A D | CONTRIBUTING.md | 74 …uous Integration (CI) tests are triggered and run. You should follow the result of the CI tests, a…
|
A D | LICENSE | 160 result of this License or out of the use or inability to use the
|
A D | README.md | 41 …edx509 and libmbedcrypto, and libmbedx509 depends on libmbedcrypto. As a result, some linkers will…
|