| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | asn1write.h | 50 * \return The number of bytes written to \p p on success. 51 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure. 64 * \return The number of bytes written to \p p on success. 65 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure. 82 * \return The number of bytes written to \p p on success. 83 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure. 100 * \return The number of bytes written to \p p on success. 101 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure. 116 * \return The number of bytes written to \p p on success. 117 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure. [all …]
|
| H A D | asn1.h | 206 * \param p On entry, \c *p points to the first byte of the length, 208 * On successful completion, \c *p points to the first byte 210 * On error, the value of \c *p is undefined. 212 * \param len On successful completion, \c *len contains the length 229 * \param p On entry, \c *p points to the start of the ASN.1 element. 230 * On successful completion, \c *p points to the first byte 232 * On error, the value of \c *p is undefined. 234 * \param len On successful completion, \c *len contains the length 255 * \param p On entry, \c *p points to the start of the ASN.1 element. 256 * On successful completion, \c *p points to the first byte [all …]
|
| H A D | ecp.h | 222 * reduction. It must return 0 on success and non-zero on failure. 298 * Trade code size for speed on fixed-point multiplication. 448 * curves. Specifically, parsing compressed points on 471 * restart context be the same on successive calls for the 485 * mbedtls_ecdh_enable_restart() was previously called on 511 * lower value. That minimum depends on the curve size, and 575 * \return The associated curve information on success. 576 * \return NULL on failure. 586 * \return The associated curve information on success. 587 * \return NULL on failure. [all …]
|
| H A D | aria.h | 94 * \return \c 0 on success. 95 * \return A negative error code on failure. 114 * \return \c 0 on success. 115 * \return A negative error code on failure. 126 * It performs encryption or decryption (depending on whether 127 * the key was set for encryption on decryption) on the input 139 * \return \c 0 on success. 140 * \return A negative error code on failure. 149 * on full blocks. 152 * parameter (encrypt/decrypt), on the input data buffer defined in [all …]
|
| H A D | chachapoly.h | 9 * authenticate data. It is based on ChaCha20 and Poly1305 by Daniel 123 * \return \c 0 on success. 124 * \return A negative error code on failure. 142 * warning on \c mbedtls_chachapoly_init(). 151 * \return \c 0 on success. 152 * \return A negative error code on failure. 181 * warning on \c mbedtls_chachapoly_init(). 190 * \return \c 0 on success. 203 * into an on-going ChaCha20-Poly1305 206 * The direction (encryption or decryption) depends on the [all …]
|
| H A D | md.h | 68 * part of the code based on PSA. 166 * If you have called mbedtls_md_setup() on \p ctx, you must 191 * \return \c 0 on success. 192 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification 194 * \return #MBEDTLS_ERR_MD_ALLOC_FAILED on memory-allocation failure. 203 * \note You must call mbedtls_md_setup() on \c dst before calling 215 * \return \c 0 on success. 216 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification failure. 271 * \return \c 0 on success. 272 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification [all …]
|
| H A D | sha512.h | 93 * \return \c 0 on success. 94 * \return A negative error code on failure. 108 * \return \c 0 on success. 109 * \return A negative error code on failure. 125 * \return \c 0 on success. 126 * \return A negative error code on failure. 140 * \return \c 0 on success. 141 * \return A negative error code on failure. 172 * \return \c 0 on success. 173 * \return A negative error code on failure. [all …]
|
| H A D | sha256.h | 92 * \return \c 0 on success. 93 * \return A negative error code on failure. 107 * \return \c 0 on success. 108 * \return A negative error code on failure. 124 * \return \c 0 on success. 125 * \return A negative error code on failure. 139 * \return \c 0 on success. 140 * \return A negative error code on failure. 164 * \return \c 0 on success. 165 * \return A negative error code on failure. [all …]
|
| H A D | ecdh.h | 35 * (56 bytes on a 32-bit platform). In future versions of the library, it 100 * \warning Performing multiple operations concurrently on the same 149 * `mbedtls_ecp_group_load` on the extracted `group_id`. 167 * \brief This function generates an ECDH keypair on an elliptic 187 * \return \c 0 on success. 189 * \c MBEDTLS_MPI_XXX error code on failure. 222 * \return \c 0 on success. 224 * \c MBEDTLS_MPI_XXX error code on failure. 252 * \return \c 0 on success. 286 * \return \c 0 on success. [all …]
|
| H A D | aes.h | 38 /* padlock.c and aesni.c rely on these values! */ 151 * \return \c 0 on success. 152 * \return #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure. 171 * \return \c 0 on success. 172 * \return #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure. 193 * \return \c 0 on success. 194 * \return #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure. 214 * \return \c 0 on success. 215 * \return #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure. 228 * (encrypt or decrypt), on the input data buffer defined in [all …]
|
| H A D | nist_kw.h | 49 * Don't make any assumptions on this context! 79 * \return \c 0 on success. 83 * \return cipher-specific error code on failure of the underlying cipher. 113 * \param[out] out_len The number of bytes written to the output buffer. \c 0 on failure. 116 * \return \c 0 on success. 118 * \return cipher-specific error code on failure of the underlying cipher. 137 * \param[out] out_len The number of bytes written to the output buffer. \c 0 on failure. 139 * depending on how much padding was added to the data. 142 * \return \c 0 on success. 145 * \return cipher-specific error code on failure of the underlying cipher. [all …]
|
| H A D | sha1.h | 107 * \return \c 0 on success. 108 * \return A negative error code on failure. 127 * \return \c 0 on success. 128 * \return A negative error code on failure. 147 * \return \c 0 on success. 148 * \return A negative error code on failure. 164 * \return \c 0 on success. 165 * \return A negative error code on failure. 190 * \return \c 0 on success. 191 * \return A negative error code on failure. [all …]
|
| /optee_os/ta/pkcs11/src/ |
| H A D | serializer.h | 42 * Returns PKCS11_CKR_OK on success or PKCS11_CKR_ARGUMENTS_BAD on failure. 51 * Returns PKCS11_CKR_OK on success or PKCS11_CKR_ARGUMENTS_BAD on failure. 65 * Returns PKCS11_CKR_OK on success or PKCS11_CKR_ARGUMENTS_BAD on failure. 75 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on 87 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on 99 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on 120 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on 135 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on
|
| H A D | attributes.h | 19 * on the object. These attributes are often accessed and it is 70 * Return PKCS11_CKR_OK on success or a PKCS11 return code. 83 * Return PKCS11_CKR_OK on success or a PKCS11 return code. 92 * Return PKCS11_CKR_OK on success or a PKCS11 return code. 130 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return 155 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return 169 * Return PKCS11_CKR_OK on success or a PKCS11 return code. 176 * attribute list (serialized attributes) based on the value of attributes in 183 * Return PKCS11_CKR_OK on success 198 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return [all …]
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_math.h | 42 @return CRYPT_OK on success 47 @param size_bits The size of the number we compute on 49 @return CRYPT_OK on success 56 @return CRYPT_OK on success 62 @return CRYPT_OK on success 71 @return CRYPT_OK on success 78 @return CRYPT_OK on success 87 @return CRYPT_OK on success 144 @return CRYPT_OK on success 154 @return CRYPT_OK on success [all …]
|
| /optee_os/core/include/kernel/ |
| H A D | user_access.h | 64 * freed, all bounce buffer allocations are reset on each syscall entry. 66 * Return NULL on failure or a valid pointer on success. 75 * The bounce buffer is only freed if it is last on the stack of allocated 87 * it is last on the stack of allocated bounce buffers. 117 * @p: Holds duplicated bounce buffer on success, or unchanged on failure. 120 * Return TEE_SUCCESS on success. 121 * Return TEE_ERROR_OUT_OF_MEMORY or TEE_ERROR_ACCESS_DENIED on error. 132 * @p: Holds duplicated kernel buffer on success, or unchanged on failure. 135 * Return TEE_SUCCESS on success. 136 * Return TEE_ERROR_OUT_OF_MEMORY or TEE_ERROR_ACCESS_DENIED on error. [all …]
|
| H A D | dt.h | 96 * Return 0 on success and a negative FDT error value on error 116 * MEM_AREA_IO_NSEC, depending on the device status. 126 * Returns 0 on success or -1 in case of error. 137 * Returns true on success or false if no propname. 147 * Returns 0 on success or -1 on failure 157 * Returns 0 on success or -1 on failure 184 * Returns 0 on success and a negative FDT error value in case of failure 190 * Return -1 on failure, DT_STATUS_DISABLED if the node is disabled, 207 * cells of the property can be read. Returns 0 on success, or a negative 215 * Returns 0 on success, or a negative FDT error value otherwise. [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_tls13_keys.h | 106 * \returns \c 0 on success. 107 * \return A negative error code on failure. 145 * \returns \c 0 on success. 146 * \returns A negative error code on failure. 179 * itself, depending on \p ctx_hashed. 193 * \returns \c 0 on success. 194 * \returns A negative error code on failure. 244 * \returns \c 0 on success. 245 * \returns A negative error code on failure. 290 * \returns \c 0 on success. [all …]
|
| H A D | lmots.h | 90 * \return \c 0 on success. 91 * \return A non-zero error code on failure. 112 * \return \c 0 on success. 113 * \return A non-zero error code on failure. 141 * \return \c 0 on success. 142 * \return A non-zero error code on failure. 175 * \return \c 0 on successful verification. 176 * \return A non-zero error code on failure. 222 * \return \c 0 on success. 223 * \return A non-zero error code on failure. [all …]
|
| /optee_os/core/include/mm/ |
| H A D | fobj.h | 60 * Returns a valid pointer on success or NULL on failure. 71 * Returns a valid pointer on success or NULL on failure. 85 * Returns a valid pointer on success or NULL on failure. 104 * Returns a valid pointer on success or NULL on failure. 117 * Returns TEE_SUCCESS on success or TEE_ERROR_* on failure. 134 * Returns TEE_SUCCESS on success or TEE_ERROR_* on failure. 162 * Returns a valid pointer on success or NULL on failure. 171 * Returns a valid pointer on success or NULL on failure.
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | SECURITY.md | 24 We classify attacks based on the capabilities of the attacker. 46 In this section, we consider an attacker who can run software on the same 58 protecting against timing attacks widely varies depending on the granularity of 77 The attacker code running on the platform has access to some sensor capable of 78 picking up information on the physical state of the hardware while Mbed TLS is 79 running. This could for example be an analogue-to-digital converter on the 88 Software running on the same hardware can affect the physical state of the 98 about the hardware Mbed TLS is running on and/or can alter the physical state 124 These timing attacks can be physical, local or depending on network latency 129 - Turn on hardware acceleration for AES. This is supported only on selected [all …]
|
| H A D | LICENSE | 49 form, that is based on (or derived from) the Work and for which the 60 or by an individual or Legal Entity authorized to submit on behalf of 64 communication on electronic mailing lists, source code control systems, 65 and issue tracking systems that are managed by, or on behalf of, the 71 on behalf of whom a Contribution has been received by Licensor and 153 Contributor provides its Contributions) on an "AS IS" BASIS, 178 on Your own behalf and on Your sole responsibility, not on behalf 193 file or class name and description of purpose be included on the 206 distributed under the License is distributed on an "AS IS" BASIS, 259 software. If the software is modified by someone else and passed on, we [all …]
|
| H A D | README.md | 11 Mbed TLS should build out of the box on most systems. Some platform specific options are available … 15 We provide some non-standard configurations focused on specific use cases in the `configs/` directo… 22 Documentation for the PSA Cryptography API is available [on GitHub](https://arm-software.github.io/… 43 … and libmbedtls. Note that libmbedtls depends on libmbedx509 and libmbedcrypto, and libmbedx509 de… 63 …generated by scripts and whose content depends only on the Mbed TLS source, not on the platform or… 72 …Depending on your Python installation, you may need to invoke `python` instead of `python3`. To in… 80 * On non-Windows systems, when not cross-compiling, CMake will generate the required files automati… 82 * On Unix/POSIX systems, run `tests/scripts/check-generated-files.sh -u` to generate all the config… 83 * On Windows, run `scripts\make_generated_files.bat` to generate all the configuration-independent … 109 …can override `CFLAGS` and `LDFLAGS` by setting them in your environment or on the make command lin… [all …]
|
| H A D | ChangeLog | 20 * On x86/amd64 platforms, with some compilers, when the library is 33 mbedtls_asn1_free_named_data_list() on its head argument, while the 35 on the documented behaviour to still hold pointers to memory blocks after 76 * On entry to PSA driver entry points that set up a multipart operation 87 keys with a different LMS or LM-OTS types on some platforms. Specifically, 88 this could happen on platforms where enum types are smaller than 32 bits 91 * Fix a race condition on x86/amd64 platforms in AESNI support detection 95 * Fix mbedtls_base64_decode() on inputs that did not have the correct 98 rejected. Furthermore, before, on inputs with too few equal signs, the 109 to point to NULL on entry. This makes it likely that existing risky uses of [all …]
|
| /optee_os/core/arch/arm/dts/ |
| H A D | at91-sama5d27_wlsom1.dtsi | 75 regulator-always-on; 78 regulator-on-in-suspend; 94 regulator-always-on; 97 regulator-on-in-suspend; 104 regulator-on-in-suspend; 117 regulator-always-on; 120 regulator-on-in-suspend; 136 regulator-always-on; 139 regulator-on-in-suspend; 146 regulator-on-in-suspend; [all …]
|