Home
last modified time | relevance | path

Searched full:on (Results 1 – 25 of 1285) sorted by relevance

12345678910>>...52

/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dasn1write.h50 * \return The number of bytes written to \p p on success.
51 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure.
64 * \return The number of bytes written to \p p on success.
65 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure.
82 * \return The number of bytes written to \p p on success.
83 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure.
100 * \return The number of bytes written to \p p on success.
101 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure.
116 * \return The number of bytes written to \p p on success.
117 * \return A negative \c MBEDTLS_ERR_ASN1_XXX error code on failure.
[all …]
H A Dasn1.h206 * \param p On entry, \c *p points to the first byte of the length,
208 * On successful completion, \c *p points to the first byte
210 * On error, the value of \c *p is undefined.
212 * \param len On successful completion, \c *len contains the length
229 * \param p On entry, \c *p points to the start of the ASN.1 element.
230 * On successful completion, \c *p points to the first byte
232 * On error, the value of \c *p is undefined.
234 * \param len On successful completion, \c *len contains the length
255 * \param p On entry, \c *p points to the start of the ASN.1 element.
256 * On successful completion, \c *p points to the first byte
[all …]
H A Decp.h222 * reduction. It must return 0 on success and non-zero on failure.
298 * Trade code size for speed on fixed-point multiplication.
448 * curves. Specifically, parsing compressed points on
471 * restart context be the same on successive calls for the
485 * mbedtls_ecdh_enable_restart() was previously called on
511 * lower value. That minimum depends on the curve size, and
575 * \return The associated curve information on success.
576 * \return NULL on failure.
586 * \return The associated curve information on success.
587 * \return NULL on failure.
[all …]
H A Daria.h94 * \return \c 0 on success.
95 * \return A negative error code on failure.
114 * \return \c 0 on success.
115 * \return A negative error code on failure.
126 * It performs encryption or decryption (depending on whether
127 * the key was set for encryption on decryption) on the input
139 * \return \c 0 on success.
140 * \return A negative error code on failure.
149 * on full blocks.
152 * parameter (encrypt/decrypt), on the input data buffer defined in
[all …]
H A Dchachapoly.h9 * authenticate data. It is based on ChaCha20 and Poly1305 by Daniel
123 * \return \c 0 on success.
124 * \return A negative error code on failure.
142 * warning on \c mbedtls_chachapoly_init().
151 * \return \c 0 on success.
152 * \return A negative error code on failure.
181 * warning on \c mbedtls_chachapoly_init().
190 * \return \c 0 on success.
203 * into an on-going ChaCha20-Poly1305
206 * The direction (encryption or decryption) depends on the
[all …]
H A Dmd.h68 * part of the code based on PSA.
166 * If you have called mbedtls_md_setup() on \p ctx, you must
191 * \return \c 0 on success.
192 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
194 * \return #MBEDTLS_ERR_MD_ALLOC_FAILED on memory-allocation failure.
203 * \note You must call mbedtls_md_setup() on \c dst before calling
215 * \return \c 0 on success.
216 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification failure.
271 * \return \c 0 on success.
272 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
[all …]
H A Dsha512.h93 * \return \c 0 on success.
94 * \return A negative error code on failure.
108 * \return \c 0 on success.
109 * \return A negative error code on failure.
125 * \return \c 0 on success.
126 * \return A negative error code on failure.
140 * \return \c 0 on success.
141 * \return A negative error code on failure.
172 * \return \c 0 on success.
173 * \return A negative error code on failure.
[all …]
H A Dsha256.h92 * \return \c 0 on success.
93 * \return A negative error code on failure.
107 * \return \c 0 on success.
108 * \return A negative error code on failure.
124 * \return \c 0 on success.
125 * \return A negative error code on failure.
139 * \return \c 0 on success.
140 * \return A negative error code on failure.
164 * \return \c 0 on success.
165 * \return A negative error code on failure.
[all …]
H A Decdh.h35 * (56 bytes on a 32-bit platform). In future versions of the library, it
100 * \warning Performing multiple operations concurrently on the same
149 * `mbedtls_ecp_group_load` on the extracted `group_id`.
167 * \brief This function generates an ECDH keypair on an elliptic
187 * \return \c 0 on success.
189 * \c MBEDTLS_MPI_XXX error code on failure.
222 * \return \c 0 on success.
224 * \c MBEDTLS_MPI_XXX error code on failure.
252 * \return \c 0 on success.
286 * \return \c 0 on success.
[all …]
H A Daes.h38 /* padlock.c and aesni.c rely on these values! */
151 * \return \c 0 on success.
152 * \return #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure.
171 * \return \c 0 on success.
172 * \return #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure.
193 * \return \c 0 on success.
194 * \return #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure.
214 * \return \c 0 on success.
215 * \return #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure.
228 * (encrypt or decrypt), on the input data buffer defined in
[all …]
H A Dnist_kw.h49 * Don't make any assumptions on this context!
79 * \return \c 0 on success.
83 * \return cipher-specific error code on failure of the underlying cipher.
113 * \param[out] out_len The number of bytes written to the output buffer. \c 0 on failure.
116 * \return \c 0 on success.
118 * \return cipher-specific error code on failure of the underlying cipher.
137 * \param[out] out_len The number of bytes written to the output buffer. \c 0 on failure.
139 * depending on how much padding was added to the data.
142 * \return \c 0 on success.
145 * \return cipher-specific error code on failure of the underlying cipher.
[all …]
H A Dsha1.h107 * \return \c 0 on success.
108 * \return A negative error code on failure.
127 * \return \c 0 on success.
128 * \return A negative error code on failure.
147 * \return \c 0 on success.
148 * \return A negative error code on failure.
164 * \return \c 0 on success.
165 * \return A negative error code on failure.
190 * \return \c 0 on success.
191 * \return A negative error code on failure.
[all …]
/optee_os/ta/pkcs11/src/
H A Dserializer.h42 * Returns PKCS11_CKR_OK on success or PKCS11_CKR_ARGUMENTS_BAD on failure.
51 * Returns PKCS11_CKR_OK on success or PKCS11_CKR_ARGUMENTS_BAD on failure.
65 * Returns PKCS11_CKR_OK on success or PKCS11_CKR_ARGUMENTS_BAD on failure.
75 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on
87 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on
99 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on
120 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on
135 * Returns PKCS11_CKR_OK on success or an error code from enum pkcs11_rc on
H A Dattributes.h19 * on the object. These attributes are often accessed and it is
70 * Return PKCS11_CKR_OK on success or a PKCS11 return code.
83 * Return PKCS11_CKR_OK on success or a PKCS11 return code.
92 * Return PKCS11_CKR_OK on success or a PKCS11 return code.
130 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return
155 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return
169 * Return PKCS11_CKR_OK on success or a PKCS11 return code.
176 * attribute list (serialized attributes) based on the value of attributes in
183 * Return PKCS11_CKR_OK on success
198 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return
[all …]
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_math.h42 @return CRYPT_OK on success
47 @param size_bits The size of the number we compute on
49 @return CRYPT_OK on success
56 @return CRYPT_OK on success
62 @return CRYPT_OK on success
71 @return CRYPT_OK on success
78 @return CRYPT_OK on success
87 @return CRYPT_OK on success
144 @return CRYPT_OK on success
154 @return CRYPT_OK on success
[all …]
/optee_os/core/include/kernel/
H A Duser_access.h64 * freed, all bounce buffer allocations are reset on each syscall entry.
66 * Return NULL on failure or a valid pointer on success.
75 * The bounce buffer is only freed if it is last on the stack of allocated
87 * it is last on the stack of allocated bounce buffers.
117 * @p: Holds duplicated bounce buffer on success, or unchanged on failure.
120 * Return TEE_SUCCESS on success.
121 * Return TEE_ERROR_OUT_OF_MEMORY or TEE_ERROR_ACCESS_DENIED on error.
132 * @p: Holds duplicated kernel buffer on success, or unchanged on failure.
135 * Return TEE_SUCCESS on success.
136 * Return TEE_ERROR_OUT_OF_MEMORY or TEE_ERROR_ACCESS_DENIED on error.
[all …]
H A Ddt.h96 * Return 0 on success and a negative FDT error value on error
116 * MEM_AREA_IO_NSEC, depending on the device status.
126 * Returns 0 on success or -1 in case of error.
137 * Returns true on success or false if no propname.
147 * Returns 0 on success or -1 on failure
157 * Returns 0 on success or -1 on failure
184 * Returns 0 on success and a negative FDT error value in case of failure
190 * Return -1 on failure, DT_STATUS_DISABLED if the node is disabled,
207 * cells of the property can be read. Returns 0 on success, or a negative
215 * Returns 0 on success, or a negative FDT error value otherwise.
[all …]
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dssl_tls13_keys.h106 * \returns \c 0 on success.
107 * \return A negative error code on failure.
145 * \returns \c 0 on success.
146 * \returns A negative error code on failure.
179 * itself, depending on \p ctx_hashed.
193 * \returns \c 0 on success.
194 * \returns A negative error code on failure.
244 * \returns \c 0 on success.
245 * \returns A negative error code on failure.
290 * \returns \c 0 on success.
[all …]
H A Dlmots.h90 * \return \c 0 on success.
91 * \return A non-zero error code on failure.
112 * \return \c 0 on success.
113 * \return A non-zero error code on failure.
141 * \return \c 0 on success.
142 * \return A non-zero error code on failure.
175 * \return \c 0 on successful verification.
176 * \return A non-zero error code on failure.
222 * \return \c 0 on success.
223 * \return A non-zero error code on failure.
[all …]
/optee_os/core/include/mm/
H A Dfobj.h60 * Returns a valid pointer on success or NULL on failure.
71 * Returns a valid pointer on success or NULL on failure.
85 * Returns a valid pointer on success or NULL on failure.
104 * Returns a valid pointer on success or NULL on failure.
117 * Returns TEE_SUCCESS on success or TEE_ERROR_* on failure.
134 * Returns TEE_SUCCESS on success or TEE_ERROR_* on failure.
162 * Returns a valid pointer on success or NULL on failure.
171 * Returns a valid pointer on success or NULL on failure.
/optee_os/lib/libmbedtls/mbedtls/
H A DSECURITY.md24 We classify attacks based on the capabilities of the attacker.
46 In this section, we consider an attacker who can run software on the same
58 protecting against timing attacks widely varies depending on the granularity of
77 The attacker code running on the platform has access to some sensor capable of
78 picking up information on the physical state of the hardware while Mbed TLS is
79 running. This could for example be an analogue-to-digital converter on the
88 Software running on the same hardware can affect the physical state of the
98 about the hardware Mbed TLS is running on and/or can alter the physical state
124 These timing attacks can be physical, local or depending on network latency
129 - Turn on hardware acceleration for AES. This is supported only on selected
[all …]
H A DLICENSE49 form, that is based on (or derived from) the Work and for which the
60 or by an individual or Legal Entity authorized to submit on behalf of
64 communication on electronic mailing lists, source code control systems,
65 and issue tracking systems that are managed by, or on behalf of, the
71 on behalf of whom a Contribution has been received by Licensor and
153 Contributor provides its Contributions) on an "AS IS" BASIS,
178 on Your own behalf and on Your sole responsibility, not on behalf
193 file or class name and description of purpose be included on the
206 distributed under the License is distributed on an "AS IS" BASIS,
259 software. If the software is modified by someone else and passed on, we
[all …]
H A DREADME.md11 Mbed TLS should build out of the box on most systems. Some platform specific options are available …
15 We provide some non-standard configurations focused on specific use cases in the `configs/` directo…
22 Documentation for the PSA Cryptography API is available [on GitHub](https://arm-software.github.io/…
43 … and libmbedtls. Note that libmbedtls depends on libmbedx509 and libmbedcrypto, and libmbedx509 de…
63 …generated by scripts and whose content depends only on the Mbed TLS source, not on the platform or…
72 …Depending on your Python installation, you may need to invoke `python` instead of `python3`. To in…
80 * On non-Windows systems, when not cross-compiling, CMake will generate the required files automati…
82 * On Unix/POSIX systems, run `tests/scripts/check-generated-files.sh -u` to generate all the config…
83 * On Windows, run `scripts\make_generated_files.bat` to generate all the configuration-independent …
109 …can override `CFLAGS` and `LDFLAGS` by setting them in your environment or on the make command lin…
[all …]
H A DChangeLog20 * On x86/amd64 platforms, with some compilers, when the library is
33 mbedtls_asn1_free_named_data_list() on its head argument, while the
35 on the documented behaviour to still hold pointers to memory blocks after
76 * On entry to PSA driver entry points that set up a multipart operation
87 keys with a different LMS or LM-OTS types on some platforms. Specifically,
88 this could happen on platforms where enum types are smaller than 32 bits
91 * Fix a race condition on x86/amd64 platforms in AESNI support detection
95 * Fix mbedtls_base64_decode() on inputs that did not have the correct
98 rejected. Furthermore, before, on inputs with too few equal signs, the
109 to point to NULL on entry. This makes it likely that existing risky uses of
[all …]
/optee_os/core/arch/arm/dts/
H A Dat91-sama5d27_wlsom1.dtsi75 regulator-always-on;
78 regulator-on-in-suspend;
94 regulator-always-on;
97 regulator-on-in-suspend;
104 regulator-on-in-suspend;
117 regulator-always-on;
120 regulator-on-in-suspend;
136 regulator-always-on;
139 regulator-on-in-suspend;
146 regulator-on-in-suspend;
[all …]

12345678910>>...52