Home
last modified time | relevance | path

Searched full:in (Results 1 – 25 of 1807) sorted by relevance

12345678910>>...73

/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_ecp.h17 * \param[in] type The type of key contained in \p data.
18 * \param[in] curve_bits The nominal bit-size of the curve.
20 * passed in \p data.
21 * This can be 0, in which case the bit-size
25 * be in the foreseeable future).
26 * \param[in] data The buffer from which to load the representation.
27 * \param[in] data_length The size in bytes of \p data.
48 /** Import an ECP key in binary format.
52 * entry point as defined in the PSA driver interface specification for
55 * \param[in] attributes The attributes for the key to import.
[all …]
H A Dpsa_crypto_core.h38 /* This field is accessed in a lot of places. Putting it first
43 * The current state of the key slot, as described in
56 * slots that are in a suitable state for the function.
69 * In most cases, the slice index can be deduced from the key identifer.
70 * We keep it in a separate field for robustness (it reduces the chance
71 * that a coding mistake in the key store will result in accessing the
74 * filled in.
81 /* The index of the next slot in the free list for this
94 * consists of all the slots in order.
101 * Number of functions registered as reading the material in the key slot.
[all …]
H A Dpsa_crypto_rsa.h17 * \param[in] type The type of key contained in \p data.
18 * \param[in] data The buffer from which to load the representation.
19 * \param[in] data_length The size in bytes of \p data.
30 /** Import an RSA key in binary format.
34 * entry point as defined in the PSA driver interface specification for
37 * \param[in] attributes The attributes for the key to import.
38 * \param[in] data The buffer containing the key data in import
40 * \param[in] data_length Size of the \p data buffer in bytes.
41 * \param[out] key_buffer The buffer containing the key data in output
43 * \param[in] key_buffer_size Size of the \p key_buffer buffer in bytes. This
[all …]
H A Dpsa_crypto_cipher.h19 * \param[in] alg PSA cipher algorithm identifier
20 * \param[in] key_type PSA key type
21 * \param[in,out] key_bits Size of the key in bits. The value provided in input
43 * \param key_bits Size of the key in bits
59 * cipher_encrypt_setup entry point as defined in the PSA driver
62 * \param[in,out] operation The operation object to set up. It has been
64 * #psa_cipher_operation_t and not yet in use.
65 * \param[in] attributes The attributes of the key to use for the
67 * \param[in] key_buffer The buffer containing the key context.
68 * \param[in] key_buffer_size Size of the \p key_buffer buffer in bytes.
[all …]
H A Dpsa_crypto_ffdh.h16 * \param[in] attributes The attributes of the key to use for the
18 * \param[in] peer_key The buffer containing the key context
20 * \param[in] peer_key_length Size of the \p peer_key buffer in
22 * \param[in] key_buffer The buffer containing the private key
24 * \param[in] key_buffer_size Size of the \p key_buffer buffer in
28 * \param[in] shared_secret_size Size of the \p shared_secret buffer in
50 /** Export a public key or the public part of a DH key pair in binary format.
52 * \param[in] attributes The attributes for the key to export.
53 * \param[in] key_buffer Material or context of the key to export.
54 * \param[in] key_buffer_size Size of the \p key_buffer buffer in bytes.
[all …]
H A Dpsa_crypto_aead.h19 * entry point as defined in the PSA driver interface specification for
22 * \param[in] attributes The attributes of the key to use for the
24 * \param[in] key_buffer The buffer containing the key context.
25 * \param key_buffer_size Size of the \p key_buffer buffer in bytes.
27 * \param[in] nonce Nonce or IV to use.
28 * \param nonce_length Size of the nonce buffer in bytes. This must
33 * \param[in] additional_data Additional data that will be authenticated
35 * \param additional_data_length Size of additional_data in bytes.
36 * \param[in] plaintext Data that will be authenticated and encrypted.
37 * \param plaintext_length Size of plaintext in bytes.
[all …]
H A Decp_invasive.h6 * The interfaces in this file are intended for testing purposes only.
7 * They SHOULD NOT be made available in library integrations except when
50 * specified in [Curve25519] p. 5 and in [Curve448]. The resulting value
61 * masked as specified in [Curve25519] and in [RFC7748] §5.
82 * \param[in,out] Np The address of the MPI to be converted.
87 * \param[in] Nn The length of \p Np in limbs.
98 * \param[in,out] X The address of the MPI to be converted.
102 * in range `0 <= X < 2 * N` (where N is the modulus).
105 * \param[in] X_limbs The length of \p X in limbs.
120 * \param[in,out] X The address of the MPI to be converted.
[all …]
H A Dbignum_core.h11 * These can be thought of integers written in base 2^#biL with a fixed
12 * number of digits. Digits in this base are called *limbs*.
16 * The functions in this module obey the following conventions unless
36 * - **Bignum sizes**: bignum sizes are always expressed in limbs.
44 * - **Aliasing**: in general, output bignums may be aliased to one or more
50 * in undefined behavior.
57 * all modular inputs to be in the range [0, \p N - 1] and guarantee outputs
58 * in the range [0, \p N - 1]. If an input is out of range, outputs are
77 #define ciL (sizeof(mbedtls_mpi_uint)) /** chars in limb */
78 #define biL (ciL << 3) /** bits in limb */
[all …]
H A Dpsa_crypto_mac.h18 * defined in the PSA driver interface specification for transparent
21 * \param[in] attributes The attributes of the key to use for the
23 * \param[in] key_buffer The buffer containing the key to use for
25 * in export representation as defined by
27 * \param key_buffer_size Size of the \p key_buffer buffer in bytes.
30 * \param[in] input Buffer containing the input message.
31 * \param input_length Size of the \p input buffer in bytes.
33 * \param mac_size Size of the \p mac buffer in bytes.
61 * defined in the PSA driver interface specification for transparent
64 * \param[in,out] operation The operation object to set up. It must have
[all …]
/optee_os/core/include/
H A Doptee_rpc_cmd.h22 * Since the size of the TA isn't known in advance the size of the TA is
25 * [in] value[0].a-b UUID
33 * [in] memref[0] Frames to device
58 * does a notification wait request instead of spinning in secure world.
66 * [in] value[0].a OPTEE_RPC_NOTIFICATION_WAIT
67 * [in] value[0].b notification value
68 * [in] value[0].c timeout in millisecond or 0 if no timeout
71 * [in] value[0].a OPTEE_RPC_NOTIFICATION_SEND
72 * [in] value[0].b notification value
73 * [in] value[0].c shall be 0, reserved for future evolution
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/psa/
H A Dcrypto_se_driver.h8 * space in which the PSA Crypto implementation runs, typically secure
13 * to be called in a standardized way by a PSA Cryptography API
50 * in mind the restrictions on when the persistent data is saved
60 * The size of this buffer is in the \c persistent_data_size field of
85 * psa_drv_se_key_management_t::p_destroy in case an error occurs.
91 /** The size of \c persistent_data in bytes.
101 * afterwards. The driver may store whatever it wants in this field.
108 * \param[in,out] drv_context The driver context structure.
109 * \param[in,out] persistent_data A pointer to the persistent data
113 * for all keys whose lifetime is in this
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/sequence/
H A Dder_sequence_free.c14 @param in The list to free
16 void der_sequence_free(ltc_asn1_list *in) in der_sequence_free() argument
20 if (!in) return; in der_sequence_free()
23 while (in->prev != NULL || in->parent != NULL) { in der_sequence_free()
24 if (in->parent != NULL) { in der_sequence_free()
25 in = in->parent; in der_sequence_free()
27 in = in->prev; in der_sequence_free()
32 while (in != NULL) { in der_sequence_free()
34 if (in->child) { in der_sequence_free()
36 in->child->parent = NULL; in der_sequence_free()
[all …]
/optee_os/lib/libutee/include/
H A Dpta_system.h25 /* Same value as max in huk_subkey_derive */
36 * [in] memref[0]: entropy input data
46 * [in] params[0].memref.buffer Buffer for extra data
47 * [in] params[0].memref.size Size of extra data (max 1024 bytes)
63 * [in] value[0].a: Number of bytes
64 * [in] value[0].b: Flags, 0 or PTA_SYSTEM_MAP_FLAG_SHAREABLE
67 * [in] value[2].a: Extra pad before memory range
68 * [in] value[2].b: Extra pad after memory range
75 * [in] value[0].a: Number of bytes
76 * [in] value[0].b: Must be 0
[all …]
H A Dremoteproc_pta.h54 * [in] params[0].value.a: Unique 32bit remote processor identifier
63 * Optional service to implement only in case of proprietary format.
65 * [in] params[0].value.a: Unique 32bit remote processor identifier
66 * [in] params[1].memref: Loadable firmware image
77 * [in] params[0].value.a: Unique 32bit remote processor identifier
78 * [in] params[1].memref: Section data to load
79 * [in] params[2].value.a: 32bit LSB load device segment address
80 * [in] params[2].value.b: 32bit MSB load device segment address
81 * [in] params[3].memref: Expected hash (SHA256) of the payload
91 * [in] params[0].value.a: Unique 32bit remote processor identifier
[all …]
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog8 function psa_can_do_cipher() in addition to psa_can_do_hash(). This
9 changed was made in Mbed TLS 3.6.0 but was not announced then.
14 conditions in constant time.
17 * Fix a timing side channel in CBC-PKCS7 decryption that could
21 * Fix a local timing side-channel in modular inversion and GCD that was
22 exploitable in RSA key generation and other RSA operations (see the full
27 probably in other similar settings as well. Found and reported
43 documented, and inconsistent as all other inputs resulted in a non-negative
51 session, according to the TLS-Exporter specification in RFC 8446 and 5705.
52 This requires MBEDTLS_SSL_KEYING_MATERIAL_EXPORT to be defined in
[all …]
/optee_os/core/lib/qcbor/inc/qcbor/
H A Dqcbor_decode.h8 * Redistribution and use in source and binary forms, with or without
13 * * Redistributions in binary form must reproduce the above
15 * disclaimer in the documentation and/or other materials provided
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
30 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
31 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
60 * general description of this encoder-decoder in section @ref
84 * representation in @ref QCBORItem.
92 * array members are taken in order. Maps can be decoded this way too,
104 * and any or all of the functions in qcbor_spiffy_decode.h. Don't use
[all …]
H A DUsefulBuf.h8 * Redistribution and use in source and binary forms, with or without
13 * * Redistributions in binary form must reproduce the above
15 * disclaimer in the documentation and/or other materials provided
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
30 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
31 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
43 Notice that changes are listed in reverse chronological order.
65 02/02/18 llundbla Full support for integers in and out; fix pointer
67 in/out are now in network byte order.
117 * implemented efficiently. In some cases, this will be a dedicated
[all …]
/optee_os/core/arch/arm/include/sm/
H A Dwatchdog_smc.h11 * We're following ARM SMC Calling Convention as specified in
18 * a0 [in] SMC Function ID, CFG_WDT_SM_HANDLER_ID
20 * a1 [in] Watchdog command (one of SMCWD_*)
22 * a2 [in/out] Depends on watchdog command (input a1)
23 * a3-6 [in/out] Not used
24 * a7 [in/out] Hypervisor Client ID register
37 * [in] a1 Set to SMCWD_INIT
38 * [out] a1 The minimal timeout value in seconds supported
39 * a2 The maximum timeout value in seconds supported
45 * [in] a1 Set to SMCWD_SET_TIMEOUT
[all …]
/optee_os/core/arch/arm/crypto/
H A Dsm4_armv8a_neon.c35 void crypto_accel_sm4_ecb_enc(void *out, const void *in, const void *key, in crypto_accel_sm4_ecb_enc() argument
40 assert(out && in && key && !(len % 16)); in crypto_accel_sm4_ecb_enc()
43 neon_sm4_ecb_encrypt(out, in, key, len); in crypto_accel_sm4_ecb_enc()
47 void crypto_accel_sm4_cbc_enc(void *out, const void *in, const void *key, in crypto_accel_sm4_cbc_enc() argument
52 assert(out && in && key && !(len % 16)); in crypto_accel_sm4_cbc_enc()
55 neon_sm4_cbc_encrypt(out, in, key, len, iv); in crypto_accel_sm4_cbc_enc()
59 void crypto_accel_sm4_cbc_dec(void *out, const void *in, const void *key, in crypto_accel_sm4_cbc_dec() argument
64 assert(out && in && key && !(len % 16)); in crypto_accel_sm4_cbc_dec()
67 neon_sm4_cbc_decrypt(out, in, key, len, iv); in crypto_accel_sm4_cbc_dec()
71 void crypto_accel_sm4_ctr_enc(void *out, const void *in, const void *key, in crypto_accel_sm4_ctr_enc() argument
[all …]
H A Dsm4_armv8a_ce.c35 void crypto_accel_sm4_ecb_enc(void *out, const void *in, const void *key, in crypto_accel_sm4_ecb_enc() argument
40 assert(out && in && key && !(len % 16)); in crypto_accel_sm4_ecb_enc()
43 ce_sm4_ecb_encrypt(out, in, key, len); in crypto_accel_sm4_ecb_enc()
47 void crypto_accel_sm4_cbc_enc(void *out, const void *in, const void *key, in crypto_accel_sm4_cbc_enc() argument
52 assert(out && in && key && !(len % 16)); in crypto_accel_sm4_cbc_enc()
55 ce_sm4_cbc_encrypt(out, in, key, len, iv); in crypto_accel_sm4_cbc_enc()
59 void crypto_accel_sm4_cbc_dec(void *out, const void *in, const void *key, in crypto_accel_sm4_cbc_dec() argument
64 assert(out && in && key && !(len % 16)); in crypto_accel_sm4_cbc_dec()
67 ce_sm4_cbc_decrypt(out, in, key, len, iv); in crypto_accel_sm4_cbc_dec()
71 void crypto_accel_sm4_ctr_enc(void *out, const void *in, const void *key, in crypto_accel_sm4_ctr_enc() argument
[all …]
/optee_os/core/lib/libtomcrypt/src/misc/base64/
H A Dbase64_encode.c33 static int s_base64_encode_internal(const unsigned char *in, unsigned long inlen, in s_base64_encode_internal() argument
56 LTC_ARGCHK(in != NULL); in s_base64_encode_internal()
59 if ((void*)in == out) { in s_base64_encode_internal()
66 *p++ = codes[(in[0] >> 2) & 0x3F]; in s_base64_encode_internal()
67 *p++ = codes[(((in[0] & 3) << 4) + (in[1] >> 4)) & 0x3F]; in s_base64_encode_internal()
68 *p++ = codes[(((in[1] & 0xf) << 2) + (in[2] >> 6)) & 0x3F]; in s_base64_encode_internal()
69 *p++ = codes[in[2] & 0x3F]; in s_base64_encode_internal()
70 in += 3; in s_base64_encode_internal()
78 unsigned a = in[0]; in s_base64_encode_internal()
79 unsigned b = (i+1 < inlen) ? in[1] : 0; in s_base64_encode_internal()
[all …]
/optee_os/core/lib/libtomcrypt/src/misc/pkcs12/
H A Dpkcs12_utf8_to_utf16.c8 int pkcs12_utf8_to_utf16(const unsigned char *in, unsigned long inlen, in pkcs12_utf8_to_utf16() argument
11 const unsigned char* in_end = in + inlen; in pkcs12_utf8_to_utf16()
18 LTC_ARGCHK(in != NULL); in pkcs12_utf8_to_utf16()
22 while (in < in_end) { in pkcs12_utf8_to_utf16()
25 if (*in >= 192) extra++; /* 1 */ in pkcs12_utf8_to_utf16()
26 if (*in >= 224) extra++; /* 2 */ in pkcs12_utf8_to_utf16()
27 if (*in >= 240) extra++; /* 3 */ in pkcs12_utf8_to_utf16()
28 if (*in >= 248) extra++; /* 4 */ in pkcs12_utf8_to_utf16()
29 if (*in >= 252) extra++; /* 5 */ in pkcs12_utf8_to_utf16()
30 if (in + extra >= in_end) goto ERROR; in pkcs12_utf8_to_utf16()
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dasn1write.h42 * \brief Write a length field in ASN.1 format.
44 * \note This function works backwards in data buffer.
56 * \brief Write an ASN.1 tag in ASN.1 format.
58 * \note This function works backwards in data buffer.
75 * \note This function works backwards in data buffer.
91 * in ASN.1 format.
93 * \note This function works backwards in data buffer.
109 * in ASN.1 format.
111 * \note This function works backwards in data buffer.
123 * in ASN.1 format.
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/ed25519/
H A Ded25519_verify.c57 @param msg [in] The data to be verified
58 @param msglen [in] The size of the data to be verified
59 @param sig [in] The signature to be verified
60 @param siglen [in] The size of the signature to be verified
61 @param ctx [in] The context
62 @param ctxlen [in] The size of the context
64 @param public_key [in] The public Ed25519 key in the pair
86 @param msg [in] The data to be verified
87 @param msglen [in] The size of the data to be verified
88 @param sig [in] The signature to be verified
[all …]
/optee_os/core/lib/libtomcrypt/src/misc/base32/
H A Dbase32_encode.c10 @param in The input buffer to encode
13 @param outlen [in/out] The max size and resulting size of the encoded data
17 int base32_encode(const unsigned char *in, unsigned long inlen, in base32_encode() argument
30 LTC_ARGCHK(in != NULL); in base32_encode()
53 *out++ = codes[(in[0] >> 3) & 0x1F]; in base32_encode()
54 *out++ = codes[(((in[0] & 0x7) << 2) + (in[1] >> 6)) & 0x1F]; in base32_encode()
55 *out++ = codes[(in[1] >> 1) & 0x1F]; in base32_encode()
56 *out++ = codes[(((in[1] & 0x1) << 4) + (in[2] >> 4)) & 0x1F]; in base32_encode()
57 *out++ = codes[(((in[2] & 0xF) << 1) + (in[3] >> 7)) & 0x1F]; in base32_encode()
58 *out++ = codes[(in[3] >> 2) & 0x1F]; in base32_encode()
[all …]

12345678910>>...73