| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | version_features.c | 19 "HAVE_ASM", //no-check-names 22 "NO_UDBL_DIVISION", //no-check-names 25 "NO_64BIT_MULTIPLICATION", //no-check-names 28 "HAVE_SSE2", //no-check-names 31 "HAVE_TIME", //no-check-names 34 "HAVE_TIME_DATE", //no-check-names 37 "PLATFORM_MEMORY", //no-check-names 40 "PLATFORM_NO_STD_FUNCTIONS", //no-check-names 43 "PLATFORM_SETBUF_ALT", //no-check-names 46 "PLATFORM_EXIT_ALT", //no-check-names [all …]
|
| H A D | rsa_alt_helpers.h | 33 * They take a set of core or CRT related RSA parameters and check their 99 * \note This function does not check whether P and Q are primes. 124 * \note This function does not check whether P, Q are 134 * \brief Check validity of core RSA parameters 145 * \param f_rng PRNG to be used for primality check, or NULL 161 * (-,P,-,-,-) and a PRNG amounts to a primality check for P. 170 * \brief Check validity of RSA CRT parameters 179 * \param DP MPI to check for D modulo P-1 180 * \param DQ MPI to check for D modulo P-1 181 * \param QP MPI to check for the modular inverse of Q modulo P. [all …]
|
| H A D | rsa_alt_helpers.c | 119 /* Check if gcd(K,N) = 1 */ in mbedtls_rsa_deduce_primes() 126 * and check whether they have nontrivial GCD with N. */ in mbedtls_rsa_deduce_primes() 161 * Check if that's the case and abort if not, to avoid very long, in mbedtls_rsa_deduce_primes() 257 * Check that core RSA parameters are sane. 272 * Step 1: If PRNG provided, check that P and Q are prime in mbedtls_rsa_validate_params() 298 * Step 2: Check that 1 < N = P * Q in mbedtls_rsa_validate_params() 311 * Step 3: Check and 1 < D, E < N if present. in mbedtls_rsa_validate_params() 325 * Step 4: Check that D, E are inverse modulo P-1 and Q-1 in mbedtls_rsa_validate_params() 361 /* Wrap MPI error codes by RSA check failure error code */ in mbedtls_rsa_validate_params() 370 * Check that RSA CRT parameters are in accordance with core parameters. [all …]
|
| /optee_os/lib/libutils/ext/ |
| H A D | fault_mitigation.c | 23 unsigned long __weak ___ftmn_return_res(struct ftmn_check *check, in ___ftmn_return_res() argument 26 if (check->steps != steps) in ___ftmn_return_res() 28 if ((check->res ^ FTMN_DEFAULT_HASH) != res) in ___ftmn_return_res() 33 void __weak ___ftmn_expect_state(struct ftmn_check *check, enum ftmn_incr incr, in ___ftmn_expect_state() argument 36 if ((check->res ^ FTMN_DEFAULT_HASH) != res) in ___ftmn_expect_state() 38 if (check->steps != steps) in ___ftmn_expect_state() 40 check->steps += incr; in ___ftmn_expect_state() 82 struct ftmn_check *check, in ___ftmn_callee_done_check() argument 86 if ((check->res ^ FTMN_DEFAULT_HASH) != res) in ___ftmn_callee_done_check() 88 if (check->steps != steps) in ___ftmn_callee_done_check() [all …]
|
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_attributes.h | 14 /* The key check value (KCV) attribute for objects is 3 bytes */ 42 * Utils to check compliance of attributes at various processing steps. 50 * - check/set token/session state 52 * - check new secret attributes complies requested mechanism. 53 * - check new secret attributes complies token/session state. 62 * - check/set token/session state 64 * - check new secret attributes complies requested mechanism (raw-import). 65 * - check new secret attributes complies token/session state. 73 * - check/set token/session state 74 * - check secret's parent attributes complies requested processing. [all …]
|
| /optee_os/core/include/drivers/ |
| H A D | firewall_device.h | 75 * firewall_check_access() - Check if the access is authorized for a consumer 79 * @fw: Firewall query containing the configuration to check against its 85 * firewall_acquire_access() - Check if OP-TEE can access the consumer and 88 * @fw: Firewall query containing the configuration to check against its 94 * firewall_check_memory_access() - Check if a consumer can access the memory 98 * @fw: Firewall query containing the configuration to check against its 100 * @paddr: Physical base address of the memory range to check 101 * @size: Size of the memory range to check 102 * @read: If true, check rights for a read access 103 * @write: If true, check rights for a write access [all …]
|
| H A D | stm32_rif.h | 60 * stm32_rif_scid_ok() - Check if a given static CID configuration authorizes 78 * stm32_rif_semaphore_enabled_and_ok() - Check if semaphore mode is enabled and 83 * @cid_to_check: CID to check 96 * stm32_rifsc_check_tdcid() - Check if the execution context is TDCID or not
|
| /optee_os/scripts/ |
| H A D | checkpatch.sh | 6 # locate checkpatch.pl: first take the one from the path, then check 40 --working Check the working area [Default]. 41 --cached Check the staging area. 42 --diff <commit1> <commit2> Check the diff between commit1 and commit2. 46 checkpatch.sh commit1 commit2 commit3 Check commit1, commit2, and commit3. 48 checkpatch.sh HEAD~5 Check the commit 5 revisions before 51 checkpatch.sh commit1..^commit2 Check each commit from commit1 to 55 checkpatch.sh HEAD~5..HEAD~1 Check each commit from HEAD~5 to 59 checkpatch.sh commit1...tags/tag1 Check each commit that exists 64 checkpatch.sh HEAD~10-5 Check 5 commits moving forward in [all …]
|
| /optee_os/core/lib/qcbor/src/ |
| H A D | UsefulBuf.c | 54 11/08/2019 llundblade Re check pointer math and update comments 169 /* This check is off by default. in UsefulOutBuf_Init() 171 * The following check fails on ThreadX in UsefulOutBuf_Init() 173 * Sanity check on the pointer and size to be sure we are not in UsefulOutBuf_Init() 180 if(Storage.ptr && (uintptr_t)Storage.ptr > ptrM) /* Check #0 */ in UsefulOutBuf_Init() 231 /* 0. Sanity check the UsefulOutBuf structure in UsefulOutBuf_InsertUsefulBuf() 246 if(pMe->data_len > pMe->UB.len) { /* Check #1 */ in UsefulOutBuf_InsertUsefulBuf() 256 * Check #1 makes sure subtraction in RoomLeft will not wrap around in UsefulOutBuf_InsertUsefulBuf() 258 if(! UsefulOutBuf_WillItFit(pMe, NewData.len)) { /* Check #2 */ in UsefulOutBuf_InsertUsefulBuf() 264 /* 2. Check the Insertion Position in UsefulOutBuf_InsertUsefulBuf() [all …]
|
| /optee_os/core/lib/zlib/ |
| H A D | inflate.h | 31 DICTID, /* i: waiting for dictionary check value */ 34 TYPEDO, /* i: same, but skip check to exit inflate on new block */ 48 CHECK, /* i: waiting for 32-bit check value */ enumerator 50 DONE, /* finished check, done -- remain here until reset */ 69 TYPE -> TYPEDO -> STORED or TABLE or LEN_ or CHECK 78 CHECK -> LENGTH -> DONE 88 bit 2 true to validate check value */ 93 unsigned long check; /* protected copy of check value */ member
|
| H A D | inflate.c | 35 * - Remove distance extra == 0 check in inflate_fast()--only helps for lengths 52 * - Simplified bad distance check in inflate_fast() 79 * - Check next_in and next_out for Z_NULL on entry to inflate() 450 /* check function to use adler32() for zlib or crc32() for gzip */ 452 # define UPDATE_CHECK(check, buf, len) \ argument 453 (state->flags ? crc32(check, buf, len) : adler32(check, buf, len)) 455 # define UPDATE_CHECK(check, buf, len) adler32(check, buf, len) argument 458 /* check macros for header crc */ 460 # define CRC2(check, word) \ argument 464 check = crc32(check, hbuf, 2); \ [all …]
|
| /optee_os/lib/libutils/ext/include/ |
| H A D | fault_mitigation.h | 34 * 3 FAULT.VALUE.CHECK 35 * 5 FAULT.DECISION.CHECK 43 * 8. FAULT.NESTED.CHECK 93 * @check: local checked state 105 struct ftmn_check check; member 222 unsigned long ___ftmn_return_res(struct ftmn_check *check, unsigned long steps, 224 void ___ftmn_expect_state(struct ftmn_check *check, enum ftmn_incr incr, 237 struct ftmn_check *check, enum ftmn_incr incr, 243 void ___ftmn_set_check_res(struct ftmn_check *check, enum ftmn_incr incr, 245 void ___ftmn_set_check_res_not_zero(struct ftmn_check *check, [all …]
|
| H A D | speculation_barrier.h | 80 /* The value we have loaded, or failval if the condition check \ 89 /* The value to return if the condition check fails. */ \ 104 /* The value we have loaded, or failval if the condition check \ 114 /* The value to return if the condition check fails. */ \ 199 /* The value we have loaded, or failval if the condition check \ 208 /* The value to return if the condition check fails. */ \ 227 /* The value we have loaded, or failval if the condition check \ 237 /* The value to return if the condition check fails. */ \ 273 /* The value we have loaded, or failval if the condition check \ 282 /* The value to return if the condition check fails. */ \ [all …]
|
| /optee_os/core/drivers/crypto/caam/hal/common/registers/ |
| H A D | rng_regs.h | 43 /* Statistical Check Miscellaneous */ 60 /* Statistical Check Monobit Limit */ 67 /* Statistical Check Run Length 1 Limit */ 74 /* Statistical Check Run Length 2 Limit */ 81 /* Statistical Check Run Length 3 Limit */ 88 /* Statistical Check Run Length 4 Limit */ 95 /* Statistical Check Run Length 5 Limit */ 102 /* Statistical Check Run Length 6+ Limit */
|
| /optee_os/.github/workflows/ |
| H A D | ci.yml | 17 fetch-depth: 0 # full history so checkpatch can check commit IDs in commit messages 40 # * on the global diff if the PR contains more than one commit (useful to check if fixup 411 make -j$(nproc) check CFG_LOCKDEP=y CFG_LOCKDEP_RECORD_STACK=n CFG_IN_TREE_EARLY_TAS=pkcs11/fd02c9da-306c-48c7-a49c-bbd827ae86ee CFG_PKCS11_TA=y CFG_CORE_UNSAFE_MODEXP=y XTEST_ARGS="-x pkcs11_1007" 414 make -j$(nproc) check CFG_CORE_SANITIZE_KADDRESS=y CFG_CORE_ASLR=n CFG_ATTESTATION_PTA=n XTEST_ARGS="n_1001 n_1003 n_1004" 417 make -j$(nproc) check CFG_CORE_SANITIZE_KADDRESS=y CFG_CORE_ASLR=n CFG_ATTESTATION_PTA=n CFG_DYN_CONFIG=n XTEST_ARGS="n_1001 n_1003 n_1004" 445 - name: Run 'make check' tasks in container 511 make -j$(nproc) CFG_CORE_BTI=y CFG_TA_BTI=y SEL0_SPS=y MEMTAG=y PAUTH=y RUST_ENABLE=n XTEST_ARGS="-x n_1031" check 514 make -j$(nproc) check CFG_CRYPTO_WITH_CE82=y 518 make -j$(nproc) check 522 make -j$(nproc) check CFG_ULIBS_SHARE [all...] |
| /optee_os/mk/ |
| H A D | checkconf.mk | 1 # Generate/check/update a .h file to reflect the values of Makefile 4 # Example usage (by default, check-conf-h will consider all CFG_* 8 # $(call check-conf-h) 13 # $(call check-conf-h,CFG_CRYPTO_ CRYPTO_) 14 define check-conf-h 30 define check-conf-cmake 43 define check-conf-mk 158 # Check if a configuration variable has an acceptable value 160 # $(call cfg-check-value,FOO,foo bar) 162 cfg-check-value = \
|
| H A D | compile.mk | 60 CHECK ?= sparse 88 check-cmd-$2 = $(CHECK) $$(comp-cppflags-$2) $$< 89 echo-check-$2 := $(cmd-echo-silent) 90 echo-check-cmd-$2 = $(cmd-echo) $$(subst \",\\\",$$(check-cmd-$2)) 136 echo-check-$2 ?= true 137 echo-check-cmd-$2 ?= true 138 check-cmd-$2 ?= true 145 # Check if any prerequisites are newer than the target and 146 # check if command line has changed 152 $$(echo-check-$2) ' CHECK $$<' ;\ [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | platform_util.h | 43 /* Implementation of the check-return facility. 48 * depending on how important it is to check the return value. 65 * Omitting the check is very likely to indicate a bug in the application 75 * return-check-critical. 83 * applications. Omitting the check will result in a compile-time warning if 105 * indicates that it is rarely useful to check its return value. 109 * has been analyzed for return-check usefulness, whereas the lack of 111 * return-check usefulness is unknown. 136 #if !defined(MBEDTLS_TEST_DEFINES_ZEROIZE) //no-check-names 182 * in for future use. Check the documentation of
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_legacy.h | 22 #if defined(PSA_WANT_KEY_TYPE_ECC_KEY_PAIR) //no-check-names 40 #if defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR) //no-check-names 55 #if defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_KEY_PAIR) //no-check-names 73 #if defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_KEY_PAIR) //no-check-names
|
| /optee_os/lib/libutee/include/ |
| H A D | pta_invoke_tests.h | 28 * Secure data path: check that PTA can copy data from non-secure shared memory 37 * Secure data path: check that PTA can read data from SDP secure memory and 38 * write it back. Data are processed so that client check the expected 46 * Secure data path: check that PTA can copy data from SDP secure memory to
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | ccm.c | 80 /* Check the key length */ in crypto_aes_ccm_init() 84 /* check the nonce */ in crypto_aes_ccm_init() 88 /* Check that payload_len and aad_len will fit into ints */ in crypto_aes_ccm_init() 92 /* check the tag len */ in crypto_aes_ccm_init() 167 /* Check the tag length */ in crypto_aes_ccm_enc_final()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_import_pkcs8.c | 20 static int s_der_flexi_sequence_cmp(const ltc_asn1_list *flexi, der_flexi_check *check) in s_der_flexi_sequence_cmp() argument 27 while(check->t != LTC_ASN1_EOL) { in s_der_flexi_sequence_cmp() 28 if (!LTC_ASN1_IS_TYPE(cur, check->t)) { in s_der_flexi_sequence_cmp() 31 if (check->pp != NULL) *check->pp = (ltc_asn1_list*)cur; in s_der_flexi_sequence_cmp() 33 check++; in s_der_flexi_sequence_cmp()
|
| /optee_os/core/arch/arm/plat-k3/drivers/ |
| H A D | sec_proxy.c | 71 FMSG("Check for thread corruption"); in k3_sec_proxy_verify_thread() 74 /* Check for any errors already available */ in k3_sec_proxy_verify_thread() 88 FMSG("Check for thread direction"); in k3_sec_proxy_verify_thread() 100 FMSG("Check for thread queue"); in k3_sec_proxy_verify_thread() 101 /* Check the message queue before sending/receiving data */ in k3_sec_proxy_verify_thread() 138 /* Check the message size. */ in k3_sec_proxy_send()
|
| /optee_os/core/drivers/ |
| H A D | rockchip_otp.c | 57 /* Check for invalid parameters or exceeding hardware burst limit */ in rockchip_otp_read_secure() 117 /* Check for invalid parameters or exceeding hardware limits */ in rockchip_otp_write_secure() 138 /* Check if bits in value conflict with old_val */ in rockchip_otp_write_secure() 174 /* Check for VERIFY_FAIL, ERROR or timeout */ in rockchip_otp_write_secure()
|
| /optee_os/core/lib/libtomcrypt/src/pk/pkcs1/ |
| H A D | pkcs_1_pss_decode.c | 50 /* check sizes */ in pkcs_1_pss_decode() 92 /* check the MSB */ in pkcs_1_pss_decode() 113 /* check for zeroes and 0x01 */ in pkcs_1_pss_decode() 121 /* check for the 0x01 */ in pkcs_1_pss_decode()
|