| /optee_os/core/lib/libtomcrypt/src/misc/crypt/ |
| H A D | crypt.c | 15 #if defined(INCLUDE_BUILD_DATE) 19 #if defined(ENDIAN_NEUTRAL) 22 #if defined(ENDIAN_LITTLE) 27 #if defined(ENDIAN_32BITWORD) 35 #if defined(LTC_CLEAN_STACK) 41 #if defined(LTC_BLOWFISH) 44 #if defined(LTC_RC2) 47 #if defined(LTC_RC5) 50 #if defined(LTC_RC6) 53 #if defined(LTC_SAFERP) [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | version_features.c | 10 #if defined(MBEDTLS_VERSION_C) 17 #if defined(MBEDTLS_VERSION_FEATURES) 18 #if defined(MBEDTLS_HAVE_ASM) 21 #if defined(MBEDTLS_NO_UDBL_DIVISION) 24 #if defined(MBEDTLS_NO_64BIT_MULTIPLICATION) 27 #if defined(MBEDTLS_HAVE_SSE2) 30 #if defined(MBEDTLS_HAVE_TIME) 33 #if defined(MBEDTLS_HAVE_TIME_DATE) 36 #if defined(MBEDTLS_PLATFORM_MEMORY) 39 #if defined(MBEDTLS_PLATFORM_NO_STD_FUNCTIONS) [all …]
|
| H A D | md.c | 30 #if defined(MBEDTLS_MD_LIGHT) 44 #if defined(MBEDTLS_PSA_CRYPTO_CLIENT) 50 #if defined(MBEDTLS_MD_SOME_PSA) 58 #if defined(MBEDTLS_FS_IO) 63 #if defined(MBEDTLS_PSA_CRYPTO_C) && MBEDTLS_MD_MAX_SIZE < PSA_HASH_MAX_SIZE 67 #if defined(MBEDTLS_MD_C) 73 #if defined(MBEDTLS_MD_CAN_MD5) 79 #if defined(MBEDTLS_MD_CAN_RIPEMD160) 85 #if defined(MBEDTLS_MD_CAN_SHA1) 91 #if defined(MBEDTLS_MD_CAN_SHA224) [all …]
|
| H A D | cipher_wrap.c | 16 #if defined(MBEDTLS_CIPHER_C) 21 #if defined(MBEDTLS_CHACHAPOLY_C) 25 #if defined(MBEDTLS_AES_C) 29 #if defined(MBEDTLS_CAMELLIA_C) 33 #if defined(MBEDTLS_ARIA_C) 37 #if defined(MBEDTLS_DES_C) 41 #if defined(MBEDTLS_CHACHA20_C) 45 #if defined(MBEDTLS_GCM_C) 49 #if defined(MBEDTLS_CCM_C) 53 #if defined(MBEDTLS_NIST_KW_C) [all …]
|
| H A D | psa_crypto_hash.c | 11 #if defined(MBEDTLS_PSA_CRYPTO_C) 20 #if defined(MBEDTLS_PSA_BUILTIN_HASH) 30 #if defined(MBEDTLS_PSA_BUILTIN_ALG_MD5) in mbedtls_psa_hash_abort() 35 #if defined(MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160) in mbedtls_psa_hash_abort() 40 #if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_1) in mbedtls_psa_hash_abort() 45 #if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_224) in mbedtls_psa_hash_abort() 50 #if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256) in mbedtls_psa_hash_abort() 55 #if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_384) in mbedtls_psa_hash_abort() 60 #if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_512) in mbedtls_psa_hash_abort() 65 #if defined(MBEDTLS_PSA_BUILTIN_ALG_SHA3_224) in mbedtls_psa_hash_abort() [all …]
|
| H A D | ssl_ciphersuites.c | 12 #if defined(MBEDTLS_SSL_TLS_C) 19 #if defined(MBEDTLS_USE_PSA_CRYPTO) 39 #if defined(MBEDTLS_SSL_CIPHERSUITES) 42 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) 282 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) 283 #if defined(MBEDTLS_SSL_HAVE_AES) 284 #if defined(MBEDTLS_SSL_HAVE_GCM) 285 #if defined(MBEDTLS_MD_CAN_SHA384) 292 #if defined(MBEDTLS_MD_CAN_SHA256) 300 #if defined(MBEDTLS_SSL_HAVE_CCM) && defined(MBEDTLS_MD_CAN_SHA256) [all …]
|
| H A D | ssl_tls.c | 14 #if defined(MBEDTLS_SSL_TLS_C) 32 #if defined(MBEDTLS_USE_PSA_CRYPTO) 39 #if defined(MBEDTLS_X509_CRT_PARSE_C) 43 #if defined(MBEDTLS_USE_PSA_CRYPTO) 55 #if defined(MBEDTLS_TEST_HOOKS) 79 #if defined(MBEDTLS_SSL_PROTO_DTLS) 81 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) 88 if (len > MBEDTLS_SSL_CID_IN_LEN_MAX) { in mbedtls_ssl_conf_cid() 92 if (ignore_other_cid != MBEDTLS_SSL_UNEXPECTED_CID_FAIL && in mbedtls_ssl_conf_cid() 107 if (ssl->conf->transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM) { in mbedtls_ssl_set_cid() [all …]
|
| H A D | pk.c | 10 #if defined(MBEDTLS_PK_C) 19 #if defined(MBEDTLS_RSA_C) 23 #if defined(MBEDTLS_PK_HAVE_ECC_KEYS) 26 #if defined(MBEDTLS_ECDSA_C) 30 #if defined(MBEDTLS_PSA_CRYPTO_CLIENT) 45 #if defined(MBEDTLS_USE_PSA_CRYPTO) in mbedtls_pk_init() 48 #if defined(MBEDTLS_PK_USE_PSA_EC_DATA) in mbedtls_pk_init() 61 if (ctx == NULL) { in mbedtls_pk_free() 65 if ((ctx->pk_info != NULL) && (ctx->pk_info->ctx_free_func != NULL)) { in mbedtls_pk_free() 69 #if defined(MBEDTLS_PK_USE_PSA_EC_DATA) in mbedtls_pk_free() [all …]
|
| H A D | cipher.c | 14 #if defined(MBEDTLS_CIPHER_C) 27 #if defined(MBEDTLS_CHACHAPOLY_C) 31 #if defined(MBEDTLS_GCM_C) 35 #if defined(MBEDTLS_CCM_C) 39 #if defined(MBEDTLS_CHACHA20_C) 43 #if defined(MBEDTLS_CMAC_C) 47 #if defined(MBEDTLS_USE_PSA_CRYPTO) && !defined(MBEDTLS_DEPRECATED_REMOVED) 51 #if defined(MBEDTLS_NIST_KW_C) 70 if (!supported_init) { in mbedtls_cipher_list() 92 if (def->type == cipher_type) { in mbedtls_cipher_info_from_type() [all …]
|
| H A D | psa_crypto_cipher.c | 11 #if defined(MBEDTLS_PSA_CRYPTO_C) 22 /* mbedtls_cipher_values_from_psa() below only checks if the proper build symbols 24 * (i.e. if the specified key works with the specified algorithm). This helper 35 #if !defined(PSA_WANT_KEY_TYPE_AES) in mbedtls_cipher_validate_values() 38 #if !defined(PSA_WANT_KEY_TYPE_ARIA) in mbedtls_cipher_validate_values() 41 #if !defined(PSA_WANT_KEY_TYPE_CAMELLIA) in mbedtls_cipher_validate_values() 44 #if !defined(PSA_WANT_KEY_TYPE_CHACHA20) in mbedtls_cipher_validate_values() 47 #if !defined(PSA_WANT_KEY_TYPE_DES) in mbedtls_cipher_validate_values() 50 #if !defined(PSA_WANT_ALG_CCM) in mbedtls_cipher_validate_values() 53 #if !defined(PSA_WANT_ALG_GCM) in mbedtls_cipher_validate_values() [all …]
|
| H A D | entropy.c | 10 #if defined(MBEDTLS_ENTROPY_C) 19 #if defined(MBEDTLS_FS_IO) 32 #if defined(MBEDTLS_THREADING_C) in mbedtls_entropy_init() 42 #if !defined(MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES) in mbedtls_entropy_init() 43 #if !defined(MBEDTLS_NO_PLATFORM_ENTROPY) in mbedtls_entropy_init() 48 #if defined(MBEDTLS_ENTROPY_HARDWARE_ALT) in mbedtls_entropy_init() 53 #if defined(MBEDTLS_ENTROPY_NV_SEED) in mbedtls_entropy_init() 64 if (ctx == NULL) { in mbedtls_entropy_free() 68 /* If the context was already free, don't call free() again. in mbedtls_entropy_free() 70 if (ctx->accumulator_started == -1) { in mbedtls_entropy_free() [all …]
|
| H A D | pem.c | 10 #if defined(MBEDTLS_PEM_PARSE_C) || defined(MBEDTLS_PEM_WRITE_C) 25 #if defined(MBEDTLS_USE_PSA_CRYPTO) 29 #if defined(MBEDTLS_MD_CAN_MD5) && \ 37 #if defined(MBEDTLS_PEM_PARSE_C) 43 #if defined(PEM_RFC1421) 55 if (*s >= '0' && *s <= '9') { in pem_get_iv() 58 if (*s >= 'A' && *s <= 'F') { in pem_get_iv() 61 if (*s >= 'a' && *s <= 'f') { in pem_get_iv() 89 if ((ret = mbedtls_md_setup(&md5_ctx, md5_info, 0)) != 0) { in pem_pbkdf1() 96 if ((ret = mbedtls_md_starts(&md5_ctx)) != 0) { in pem_pbkdf1() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | config_adjust_legacy_from_psa.h | 9 * configuration. Generally speaking, we activate a legacy mechanism if 21 #if !defined(MBEDTLS_CONFIG_FILES_READ) 24 "If you're trying to fix a complaint from check_config.h, just remove " \ 32 #if defined(MBEDTLS_PSA_P256M_DRIVER_ENABLED) 47 * A triplet/pair is accelerated if all of is components are accelerated; 51 * 1. Check if acceleration is complete for curves, key types, algs. 60 #if (defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256) && \ 77 #if (defined(PSA_WANT_ECC_MONTGOMERY_255) && !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)) || \ 83 #if (defined(PSA_WANT_ALG_ECDH) && !defined(MBEDTLS_PSA_ACCEL_ALG_ECDH)) || \ 92 #if (defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY) && \ [all …]
|
| H A D | check_config.h | 23 #if !defined(MBEDTLS_CONFIG_IS_FINALIZED) 34 #if CHAR_BIT != 8 40 #if defined(__MINGW32__) || (defined(_MSC_VER) && _MSC_VER <= 1900) 41 #if !defined(MBEDTLS_PLATFORM_C) 48 #if defined(TARGET_LIKE_MBED) && defined(MBEDTLS_NET_C) 52 #if defined(MBEDTLS_DEPRECATED_WARNING) && \ 57 #if defined(MBEDTLS_HAVE_TIME_DATE) && !defined(MBEDTLS_HAVE_TIME) 61 /* Limitations on ECC key types acceleration: if we have any of `PUBLIC_KEY`, 65 #if defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY) || \ 69 #if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ECC_PUBLIC_KEY) || \ [all …]
|
| H A D | config_adjust_legacy_crypto.h | 11 * in some circumstances. One case is if MBEDTLS_xxx_B is an internal option 14 * Another case is if A didn't depend on B in earlier versions, and we 27 #if !defined(MBEDTLS_CONFIG_FILES_READ) 30 "If you're trying to fix a complaint from check_config.h, just remove " \ 40 #if defined(__MINGW32__) || (defined(_MSC_VER) && _MSC_VER <= 1900) 41 #if !defined(MBEDTLS_PLATFORM_SNPRINTF_ALT) && \ 45 #if !defined(MBEDTLS_PLATFORM_VSNPRINTF_ALT) && \ 51 /* If MBEDTLS_PSA_CRYPTO_C is defined, make sure MBEDTLS_PSA_CRYPTO_CLIENT 54 #if defined(MBEDTLS_PSA_CRYPTO_C) 60 #if defined(MBEDTLS_PSA_CRYPTO_C) && \ [all …]
|
| H A D | config_adjust_psa_from_legacy.h | 23 #if !defined(MBEDTLS_CONFIG_FILES_READ) 26 "If you're trying to fix a complaint from check_config.h, just remove " \ 32 * Ensure PSA_WANT_* defines are setup properly if MBEDTLS_PSA_CRYPTO_CONFIG 36 #if defined(MBEDTLS_CCM_C) 39 #if defined(MBEDTLS_CIPHER_C) 45 #if defined(MBEDTLS_CMAC_C) 50 #if defined(MBEDTLS_ECDH_C) 55 #if defined(MBEDTLS_ECDSA_C) 60 // Only add in DETERMINISTIC support if ECDSA is also enabled 61 #if defined(MBEDTLS_ECDSA_DETERMINISTIC) [all …]
|
| H A D | config_adjust_psa_superset_legacy.h | 8 * mechanisms in the PSA API if they are enabled in the legacy API. The general 9 * idea is that if legacy module M uses mechanism A internally, and A has 22 #if !defined(MBEDTLS_CONFIG_FILES_READ) 25 "If you're trying to fix a complaint from check_config.h, just remove " \ 36 #if defined(MBEDTLS_MD5_C) 40 #if defined(MBEDTLS_RIPEMD160_C) 44 #if defined(MBEDTLS_SHA1_C) 48 #if defined(MBEDTLS_SHA224_C) 52 #if defined(MBEDTLS_SHA256_C) 56 #if defined(MBEDTLS_SHA384_C) [all …]
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_operations.c | 30 bool buffer_two_blocks; /* True if two blocks need to be buffered */ 50 if (!operation) in TEE_AllocateOperation() 53 if (algorithm == TEE_ALG_AES_XTS || algorithm == TEE_ALG_SM2_KEP || in TEE_AllocateOperation() 60 if (maxKeySize < 512) in TEE_AllocateOperation() 62 if (maxKeySize > 1024) in TEE_AllocateOperation() 64 if (maxKeySize % 64 != 0) in TEE_AllocateOperation() 69 if (maxKeySize != 2048) in TEE_AllocateOperation() 74 if (maxKeySize != 2048 && maxKeySize != 3072) in TEE_AllocateOperation() 81 if (maxKeySize != 192) in TEE_AllocateOperation() 88 if (maxKeySize != 224) in TEE_AllocateOperation() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ltc_ecc_projective_add_point.c | 11 #if defined(LTC_MECC) && (!defined(LTC_MECC_ACCEL) || defined(LTM_DESC)) 34 if ((err = mp_init_multi(&t1, &t2, &x, &y, &z, LTC_NULL)) != CRYPT_OK) { in ltc_ecc_projective_add_point() 38 if ((err = ltc_ecc_is_point_at_infinity(P, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_projective_add_point() 39 if (inf) { in ltc_ecc_projective_add_point() 45 if ((err = ltc_ecc_is_point_at_infinity(Q, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_projective_add_point() 46 if (inf) { in ltc_ecc_projective_add_point() 52 if ((mp_cmp(P->x, Q->x) == LTC_MP_EQ) && (mp_cmp(P->z, Q->z) == LTC_MP_EQ)) { in ltc_ecc_projective_add_point() 53 if (mp_cmp(P->y, Q->y) == LTC_MP_EQ) { in ltc_ecc_projective_add_point() 58 if ((err = mp_sub(modulus, Q->y, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_add_point() 59 if (mp_cmp(P->y, t1) == LTC_MP_EQ) { in ltc_ecc_projective_add_point() [all …]
|
| H A D | ltc_ecc_projective_dbl_point.c | 29 #if defined(LTC_MECC) && (!defined(LTC_MECC_ACCEL) || defined(LTM_DESC)) 50 if ((err = mp_init_multi(&t1, &t2, LTC_NULL)) != CRYPT_OK) { in ltc_ecc_projective_dbl_point() 54 if (P != R) { in ltc_ecc_projective_dbl_point() 55 if ((err = ltc_ecc_copy_point(P, R)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 58 if ((err = ltc_ecc_is_point_at_infinity(P, modulus, &inf)) != CRYPT_OK) return err; in ltc_ecc_projective_dbl_point() 59 if (inf) { in ltc_ecc_projective_dbl_point() 60 /* if P is point at infinity >> Result = point at infinity */ in ltc_ecc_projective_dbl_point() 66 if ((err = mp_sqr(R->z, t1)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 67 if ((err = mp_montgomery_reduce(t1, modulus, mp)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() 69 if ((err = mp_mul(R->z, R->y, R->z)) != CRYPT_OK) { goto done; } in ltc_ecc_projective_dbl_point() [all …]
|
| /optee_os/ta/pkcs11/src/ |
| H A D | processing_rsa.c | 31 if (rc) in pkcs2tee_proc_params_rsa_pss() 35 if (rc) in pkcs2tee_proc_params_rsa_pss() 39 if (rc) in pkcs2tee_proc_params_rsa_pss() 42 if (serialargs_remaining_bytes(&args)) in pkcs2tee_proc_params_rsa_pss() 47 if (!proc->extra_ctx) in pkcs2tee_proc_params_rsa_pss() 96 * length in bytes of the RSA modulus, except if the length in in pkcs2tee_validate_rsa_pss() 101 if ((modulus_size % 8) == 1) in pkcs2tee_validate_rsa_pss() 106 if (rsa_pss_ctx->salt_len > (k - 2 - hash_size)) in pkcs2tee_validate_rsa_pss() 129 if (rc) in pkcs2tee_algo_rsa_pss() 133 if (rc) in pkcs2tee_algo_rsa_pss() [all …]
|
| H A D | processing.c | 24 if (session_is_active(session)) in get_ready_session() 95 if (session->processing && in get_active_session() 104 if (!session->processing) in release_active_processing() 115 if (session->processing->tee_op_handle != TEE_HANDLE_NULL) { in release_active_processing() 120 if (session->processing->tee_op_handle2 != TEE_HANDLE_NULL) { in release_active_processing() 146 if (get_attribute_ptr(attrs, PKCS11_CKA_VALUE, NULL, &a_size)) in get_object_key_bit_size() 151 if (get_attribute_ptr(attrs, PKCS11_CKA_MODULUS, NULL, &a_size)) in get_object_key_bit_size() 156 if (get_attribute_ptr(attrs, PKCS11_CKA_EC_PARAMS, in get_object_key_bit_size() 162 if (get_attribute_ptr(attrs, PKCS11_CKA_EC_POINT, NULL, in get_object_key_bit_size() 181 if (!*head) in generate_random_key_value() [all …]
|
| /optee_os/core/kernel/ |
| H A D | ldelf_syscalls.c | 35 if (res) { in unmap_or_panic() 54 if (flags & ~LDELF_MAP_FLAG_SHAREABLE) in ldelf_syscall_map_zi() 58 if (res) in ldelf_syscall_map_zi() 61 if (flags & LDELF_MAP_FLAG_SHAREABLE) in ldelf_syscall_map_zi() 65 if (!f) in ldelf_syscall_map_zi() 69 if (!mobj) in ldelf_syscall_map_zi() 74 if (!res) { in ldelf_syscall_map_zi() 76 if (res) in ldelf_syscall_map_zi() 95 * API function it's worth having an extra guard here. If nothing else, in ldelf_syscall_unmap() 98 if (ADD_OVERFLOW(va, sz, &end_va)) in ldelf_syscall_unmap() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/custom_type/ |
| H A D | der_decode_custom_type.c | 57 if (inlen < 2) { in der_decode_custom_type_ex() 62 if (root == NULL) { in der_decode_custom_type_ex() 66 if (in[x] != 0x30 && in[x] != 0x31) { in der_decode_custom_type_ex() 71 if (root->type != LTC_ASN1_CUSTOM_TYPE) { in der_decode_custom_type_ex() 76 if (root->pc == LTC_ASN1_PC_PRIMITIVE) { in der_decode_custom_type_ex() 78 if (in_new == NULL) { in der_decode_custom_type_ex() 86 if ((err = der_decode_asn1_identifier(in, &y, &ident)) != CRYPT_OK) { in der_decode_custom_type_ex() 89 if ((ident.type != root->type) || in der_decode_custom_type_ex() 102 if (root != NULL && root->pc == LTC_ASN1_PC_PRIMITIVE) { in der_decode_custom_type_ex() 103 if (((unsigned long)root->used >= der_asn1_type_to_identifier_map_sz) || in der_decode_custom_type_ex() [all …]
|
| /optee_os/core/lib/libfdt/ |
| H A D | fdt_ro.c | 20 if (!p || olen < len) in fdt_nodename_eq_() 24 if (memcmp(p, s, len) != 0) in fdt_nodename_eq_() 27 if (p[len] == '\0') in fdt_nodename_eq_() 29 else if (!memchr(s, '@', len) && (p[len] == '@')) in fdt_nodename_eq_() 44 if (totalsize < 0) in fdt_get_string() 48 if (absoffset >= totalsize) in fdt_get_string() 52 if (fdt_magic(fdt) == FDT_MAGIC) { in fdt_get_string() 53 if (stroffset < 0) in fdt_get_string() 55 if (fdt_version(fdt) >= 17) { in fdt_get_string() 56 if (stroffset >= fdt_size_dt_strings(fdt)) in fdt_get_string() [all …]
|