/optee_test/host/openssl/include/openssl/ |
A D | pem.h | 158 char *name; member 366 # define DECLARE_PEM_write(name, type) \ argument 368 DECLARE_PEM_write_fp(name, type) 375 # define DECLARE_PEM_read(name, type) \ argument 377 DECLARE_PEM_read_fp(name, type) 378 # define DECLARE_PEM_rw(name, type) \ argument 379 DECLARE_PEM_read(name, type) \ 380 DECLARE_PEM_write(name, type) 382 DECLARE_PEM_read(name, type) \ 384 # define DECLARE_PEM_rw_cb(name, type) \ argument [all …]
|
A D | lhash.h | 107 return name##_hash(a); } 108 # define LHASH_HASH_FN(name) name##_LHASH_HASH argument 117 return name##_cmp(a,b); } 118 # define LHASH_COMP_FN(name) name##_LHASH_COMP argument 122 void name##_LHASH_DOALL(void *); 126 name##_doall(a); } 127 # define LHASH_DOALL_FN(name) name##_LHASH_DOALL argument 136 name##_doall_arg(a, b); } 137 # define LHASH_DOALL_ARG_FN(name) name##_LHASH_DOALL_ARG argument 207 # define LHM_lh_new(type, name) \ argument [all …]
|
A D | e_os2.h | 294 # define OPENSSL_IMPLEMENT_GLOBAL(type,name,value) \ argument 295 type *_shadow_##name(void) \ 296 { static type _hide_##name=value; return &_hide_##name; } 297 # define OPENSSL_DECLARE_GLOBAL(type,name) type *_shadow_##name(void) argument 298 # define OPENSSL_GLOBAL_REF(name) (*(_shadow_##name())) argument 300 # define OPENSSL_IMPLEMENT_GLOBAL(type,name,value) OPENSSL_GLOBAL type _shadow_##name=value; 301 # define OPENSSL_DECLARE_GLOBAL(type,name) OPENSSL_EXPORT type _shadow_##name 302 # define OPENSSL_GLOBAL_REF(name) _shadow_##name
|
A D | conf.h | 76 char *name; member 88 const char *name; member 97 int (*load) (CONF *conf, const char *name, long *eline); 132 const char *name); 134 const char *name); 170 char *NCONF_get_string(const CONF *conf, const char *group, const char *name); 171 int NCONF_get_number_e(const CONF *conf, const char *group, const char *name, 178 long NCONF_get_number(CONF *conf, char *group, char *name); 192 int CONF_module_add(const char *name, conf_init_func *ifunc,
|
A D | x509_vfy.h | 141 const char *name; member 148 int (*get_by_subject) (X509_LOOKUP *ctx, int type, X509_NAME *name, 168 char *name; member 309 # define X509_LOOKUP_load_file(x,name,type) \ argument 312 # define X509_LOOKUP_add_dir(x,name,type) \ argument 460 X509_NAME *name); 520 int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, int type, X509_NAME *name, 570 int X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name); 596 const char *name, size_t namelen); 598 const char *name, size_t namelen); [all …]
|
A D | asn1t.h | 292 #name, ASN1_ITEM_ref(type) } 393 # define ASN1_ADB(name) \ argument 400 static const ASN1_ADB name##_adb = {\ 402 offsetof(name, field),\ 404 name##_adbtbl,\ 419 offsetof(name, field),\ 421 name##_adbtbl,\ 434 # define ASN1_ADB_TEMPLATE(name) \ argument 435 static const ASN1_TEMPLATE name##_tt 907 # define IMPLEMENT_ASN1_FUNCTIONS_const(name) \ argument [all …]
|
A D | asn1.h | 310 DECLARE_ASN1_ENCODE_FUNCTIONS(type, name, name) 324 DECLARE_ASN1_ITEM(name) 326 # define DECLARE_ASN1_NDEF_FUNCTION(name) \ argument 327 int i2d_##name##_NDEF(name *a, unsigned char **out); 330 DECLARE_ASN1_ALLOC_FUNCTIONS(name) \ 331 DECLARE_ASN1_ENCODE_FUNCTIONS_const(name, name) 334 type *name##_new(void); \ 335 void name##_free(type *a); 414 # define DECLARE_ASN1_ITEM(name) \ argument 435 # define DECLARE_ASN1_ITEM(name) \ argument [all …]
|
A D | bio.h | 314 const char *name; member 475 # define BIO_set_conn_hostname(b,name) BIO_ctrl(b,BIO_C_SET_CONNECT,0,(char *)name) argument 487 # define BIO_set_accept_port(b,name) BIO_ctrl(b,BIO_C_SET_ACCEPT,0,(char *)name) argument 540 int BIO_read_filename(BIO *b, const char *name); 542 # define BIO_read_filename(b,name) BIO_ctrl(b,BIO_C_SET_FILENAME, \ argument 543 BIO_CLOSE|BIO_FP_READ,(char *)name) 546 BIO_CLOSE|BIO_FP_WRITE,name) 548 BIO_CLOSE|BIO_FP_APPEND,name) 549 # define BIO_rw_filename(b,name) BIO_ctrl(b,BIO_C_SET_FILENAME, \ argument 550 BIO_CLOSE|BIO_FP_READ|BIO_FP_WRITE,name) [all …]
|
A D | conf_api.h | 79 const char *name); 81 const char *name);
|
A D | x509.h | 276 char *name; member 310 char *name; member 819 int X509_NAME_set(X509_NAME **xn, X509_NAME *name); 841 int X509_alias_set1(X509 *x, unsigned char *name, int len); 904 int X509_set_issuer_name(X509 *x, X509_NAME *name); 906 int X509_set_subject_name(X509 *x, X509_NAME *name); 944 int X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name); 996 int X509_NAME_print(BIO *bp, X509_NAME *name, int obase); 1010 int X509_NAME_entry_count(X509_NAME *name); 1024 int X509_NAME_add_entry(X509_NAME *name, X509_NAME_ENTRY *ne, [all …]
|
A D | x509v3.h | 231 } name; member 382 ",name:", val->name, ",value:", val->value); 463 char *name; member 629 char *name, char *value); 637 int X509V3_add_value_bool_nf(char *name, int asn1_bool, 645 char *X509V3_get_string(X509V3_CTX *ctx, char *name, char *section); 652 int X509V3_add_value(const char *name, const char *value, 656 int X509V3_add_value_bool(const char *name, int asn1_bool, 658 int X509V3_add_value_int(const char *name, ASN1_INTEGER *aint, 685 int name_cmp(const char *name, const char *cmp); [all …]
|
A D | pkcs12.h | 202 int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, 204 int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, 206 int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, 209 const unsigned char *name, int namelen); 257 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
|
/optee_test/ta/os_test/include/ |
A D | tb_macros.h | 45 #define DEF_BIGINT(name, size) \ argument 46 TEE_BigInt *name; \ 47 size_t name##_size; \ 48 name##_size = TEE_BigIntSizeInU32(size); \ 49 name = (TEE_BigInt *)TEE_Malloc(name##_size * sizeof(TEE_BigInt), 0); \ 50 TEE_BigIntInit(name, name##_size) 55 #define DEL_BIGINT(name) TEE_Free(name) argument
|
/optee_test/host/xtest/gp/patches/ |
A D | 0009-TEE_Internal_API.xml.patch | 36 <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED"> 44 <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED"> 52 <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED"> 60 <req name="CHECK_MEMORY_ACCESS_RIGHTS_OK"> 67 <scenario name="Invoke_GetCancellationFlag_RequestedCancel (a7-71-11)" destructive="no"> 68 <req name="GET_CANCELLATION_FLAG"> 75 … <scenario name="Invoke_GetInstanceData_noPreviousSetInstance_null (a7-7d-9b)" destructive="no"> 76 <req name="GET_INSTANCE_DATA_SUCCESS"> 83 … <scenario name="Invoke_GetPropertyAsBinaryBlock_withoutEnum_success (a7-26-c1)" destructive="no"> 84 <req name="CLOSE_SESSION_ENTRY_POINT_SUCCESS"> [all …]
|
A D | 0010-TEE_DataStorage_API.xml.patch | 29 … <scenario name="Invoke_SeekWriteRead_Offset_0_SEEK_END_Offset_Low (9d-a6-93)" destructive="no"> 30 <req name="READ_OBJECT_DATA_SUCCESS"> 38 <req name="READ_OBJECT_DATA_SUCCESS"> 46 <req name="READ_OBJECT_DATA_SUCCESS"> 54 <req name="READ_OBJECT_DATA_SUCCESS"> 62 <req name="READ_OBJECT_DATA_SUCCESS"> 70 <req name="READ_OBJECT_DATA_SUCCESS"> 78 <req name="READ_OBJECT_DATA_SUCCESS"> 86 <req name="READ_OBJECT_DATA_SUCCESS"> 93 <scenario name="Invoke_WriteObjectData_overflow (9d-01-ce)" destructive="no"> [all …]
|
A D | 0011-TEE_Crypto_API.xml.patch | 26 …<scenario name="Invoke_Crypto_MACInit_init_vector_not_required_length (50-ea-af)" destructive="no"> 27 <req name="MAC_INIT_PANIC"> 34 <scenario name="Invoke_Crypto_MACInit_invalid_operation_class (50-27-d0)" destructive="no"> 35 <req name="MAC_INIT_PANIC">
|
A D | 0006-TTA_TCF-fix-CmdTEEGetPropertyA-_withoutEnum.patch | 6 Property name must not reside in non-secure shared memory when passed as 36 SLogError("CmdTEEGetPropertyAsString_withoutEnum: property name Input parameter is NULL"); 63 SLogError("CmdTEEGetPropertyAsBool_withoutEnum: property name Input parameter is NULL"); 90 SLogError("CmdTEEGetPropertyAsInt_withoutEnum: property name Input parameter is NULL"); 117 SLogError("CmdTEEGetPropertyAsBinaryBlock_withoutEnum: property name Input parameter is NULL"); 144 SLogError("CmdTEEGetPropertyAsUUID_withoutEnum: property name Input parameter is NULL"); 171 SLogError("CmdTEEGetPropertyAsIdentity_withoutEnum: property name Input parameter is NULL");
|
A D | 0013-Disable-Invoke_GetTAPersistentTimeNotSet_and_SetTAPe.patch | 25 …<scenario name="Invoke_GetTAPersistentTimeNotSet_and_SetTAPersistentTime_success (ce-7b-17)" destr… 26 <req name="GET_TA_PERSISTENT_TIME_ERROR_TIME_NOT_SET"> 33 …<scenario name="Invoke_SetTAPersistentTime_and_GetTAPersistentTime_overflow (ce-1b-d0)" destructiv… 34 <req name="GET_TA_PERSISTENT_TIME_ERROR_OVERFLOW">
|
A D | 0008-TEE.xml.patch | 25 <scenario name="Request_Cancellation (d3-87-46)" destructive="no"> 26 <req name="REQUEST_CANCELLATION_PROCESSING"> 34 <initial-state name="TestSuite_OtherCommandThanInvoke"> 35 <scenario name="Allocate_In (29-ff-45)" destructive="no">
|
/optee_test/host/xtest/ |
A D | CMakeLists.txt | 28 --name regression_8100_${prefix} 69 macro(__GEN_GP_FILE outfile xmldir name basedir) 72 COMMAND xalan -in ${basedir}/${name}.xml 73 -xsl gp/${name}.xsl -out ${outfile} 74 DEPENDS ${basedir}/${name}.xml gp/${name}.xsl 77 macro(GEN_GP_FILE outfile xmldir name) 78 __GEN_GP_FILE(${outfile} ${xmldir} ${name}
|
/optee_test/scripts/ |
A D | file_to_c.py | 30 f.write("const uint8_t " + args.name + "[] = {\n") 41 f.write("const size_t " + args.name + "_size = sizeof(" + 42 args.name + ") - 1;\n")
|
A D | rsp_to_gcm_test.py | 95 name = s[0] 96 if name == 'Count':
|
/optee_test/ta/crypt/ |
A D | mbedtls_taf.c | 208 char name[256] = { 0 }; in ta_entry_mbedtls_sign_cert() local 249 ret = mbedtls_x509_dn_gets(name, sizeof(name), &csr.subject); in ta_entry_mbedtls_sign_cert() 255 ret = mbedtls_x509write_crt_set_subject_name(&crt, name); in ta_entry_mbedtls_sign_cert() 264 ret = mbedtls_x509_dn_gets(name, sizeof(name), &issuer_crt.subject); in ta_entry_mbedtls_sign_cert() 270 ret = mbedtls_x509write_crt_set_issuer_name(&crt, name); in ta_entry_mbedtls_sign_cert()
|
/optee_test/ |
A D | Makefile | 78 $(q)find $(out-dir) -name \*.ta -exec cp -a {} ${DESTDIR}/lib/optee_armtz \; 90 ${q}find $(PWD) -name "*.[ch]" -o -name "*.cpp" | grep -v /package/ > cscope.files
|
/optee_test/ta/sha_perf/ |
A D | ta_sha_perf.c | 15 #define CHECK(res, name, action) do { \ argument 17 DMSG(name ": 0x%08x", (res)); \
|