| /optee_os/lib/libutils/ext/ |
| H A D | fault_mitigation.c | 24 unsigned long steps, unsigned long res) in ___ftmn_return_res() argument 26 if (check->steps != steps) in ___ftmn_return_res() 34 unsigned long steps, unsigned long res) in ___ftmn_expect_state() argument 38 if (check->steps != steps) in ___ftmn_expect_state() 40 check->steps += incr; in ___ftmn_expect_state() 83 enum ftmn_incr incr, unsigned long steps, in ___ftmn_callee_done_check() argument 88 if (check->steps != steps) in ___ftmn_callee_done_check() 91 check->steps += incr; in ___ftmn_callee_done_check() 116 check->steps += incr; in ___ftmn_copy_linked_call_res() 122 check->steps += incr; in ___ftmn_set_check_res() [all …]
|
| /optee_os/lib/libutils/ext/include/ |
| H A D | fault_mitigation.h | 59 * @steps: accumulated checkpoints 71 unsigned long steps; member 222 unsigned long ___ftmn_return_res(struct ftmn_check *check, unsigned long steps, 225 unsigned long steps, unsigned long res); 238 unsigned long steps, unsigned long res); 358 unsigned long steps, in __ftmn_callee_done_check() argument 363 &ftmn->check, incr, steps, res); in __ftmn_callee_done_check() 643 ftmn->check.steps += incr; in ftmn_checkpoint() 652 * @steps: Expected accumulated steps 656 * increasing the accumulated steps first checks the accumulated steps and [all …]
|
| /optee_os/.github/workflows/ |
| H A D | notify.yml | 19 steps: 36 if: steps.compute.outputs.message != '' 40 const message = "${{ steps.compute.outputs.message }}";
|
| H A D | ci.yml | 13 steps: 339 steps: 380 steps: 418 steps: 474 steps: 562 steps: 620 steps: 653 steps:
|
| H A D | stales.yml | 13 steps:
|
| /optee_os/core/lib/libtomcrypt/src/misc/bcrypt/ |
| H A D | bcrypt.c | 82 unsigned long left, itts, x, y, hashed_pass_len, step_size, steps, dest, used_rounds; in bcrypt_pbkdf_openbsd() local 121 steps = (*outlen + step_size - 1) / step_size; in bcrypt_pbkdf_openbsd() 166 /* now emit upto `steps` bytes of buf[2] to output */ in bcrypt_pbkdf_openbsd() 167 steps = MIN(steps, left); in bcrypt_pbkdf_openbsd() 168 for (y = 0; y < steps; ++y) { in bcrypt_pbkdf_openbsd()
|
| /optee_os/core/lib/libtomcrypt/src/hashes/ |
| H A D | sha3_test.c | 43 /* SHA3-224 in two steps. [FIPS 202] */ in sha3_224_test() 52 /* SHA3-224 byte-by-byte: 200 steps. [FIPS 202] */ in sha3_224_test() 107 /* SHA3-256 in two steps. [FIPS 202] */ in sha3_256_test() 116 /* SHA3-256 byte-by-byte: 200 steps. [FIPS 202] */ in sha3_256_test() 190 /* SHA3-384 in two steps. [FIPS 202] */ in sha3_384_test() 199 /* SHA3-384 byte-by-byte: 200 steps. [FIPS 202] */ in sha3_384_test() 245 /* SHA3-512 in two steps. [FIPS 202] */ in sha3_512_test() 254 /* SHA3-512 byte-by-byte: 200 steps. [FIPS 202] */ in sha3_512_test() 329 /* SHAKE256 in two steps. [FIPS 202] */ in sha3_shake_test() 338 /* SHAKE256 byte-by-byte: 200 steps. [FIPS 202] */ in sha3_shake_test() [all …]
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | des2_key.h | 15 * the same key for both of the encryption (E) steps. in get_des2_key()
|
| H A D | sm2-dsa.c | 55 * Steps A1 and A2 are the generation of the hash value e from user in sm2_ltc_dsa_sign() 188 * Steps B3: M'bar = (ZA || M') and B4: e' = Hv(M'bar) are not done here in sm2_ltc_dsa_verify()
|
| H A D | sm2-kep.c | 208 * Variable names and documented steps reflect the initator side (user A in sm2_kep_derive() 249 * Steps A1-A3 are supposedly done already (generate ephemeral key, send in sm2_kep_derive()
|
| /optee_os/core/include/drivers/ |
| H A D | imx_sc_api.h | 17 * Enables a CAAM Job Ring for the secure world with the following steps:
|
| H A D | scmi-msg.h | 240 * Get clock possible rate as range with regular steps in Hertz 360 * Get voltage domain possible levels as range with regular steps in microvolt
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | BUGS.md | 7 If you think you've found a bug in Mbed TLS, please follow these steps:
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | sm2-dsa.c | 60 * Steps A1 and A2 are the generation of the hash value e from user in sm2_mbedtls_dsa_sign() 208 * Steps B3: M'bar = (ZA || M') and B4: e' = Hv(M'bar) are not done here in sm2_mbedtls_dsa_verify()
|
| H A D | sm2-kep.c | 281 * Variable names and documented steps reflect the initator side (user A in crypto_acipher_sm2_kep_derive() 333 * Steps A1-A3 are supposedly done already (generate ephemeral key, send in crypto_acipher_sm2_kep_derive()
|
| H A D | sm2-pke.c | 399 * Steps A6, A7, A8: in sm2_mbedtls_pke_encrypt()
|
| /optee_os/core/arch/arm/plat-sam/ |
| H A D | scmi_server.c | 1146 unsigned long *steps) in plat_scmi_clock_rates_by_step() argument 1157 steps[0] = p->output_range.min; in plat_scmi_clock_rates_by_step() 1158 steps[1] = p->output_range.max; in plat_scmi_clock_rates_by_step() 1159 steps[2] = 1; in plat_scmi_clock_rates_by_step()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_pake.c | 298 * The Mbed TLS JPAKE API outputs the whole X1+X2 and X2S steps data in mbedtls_psa_pake_output_internal() 303 * In order to achieve API compatibility, the whole X1+X2 or X2S steps in mbedtls_psa_pake_output_internal() 417 * The Mbed TLS JPAKE API takes the whole X1+X2 or X4S steps data in mbedtls_psa_pake_input_internal()
|
| /optee_os/lib/libutils/isoc/arch/arm/ |
| H A D | arm32_aeabi_ldivmod.c | 28 i = i << 1; /* count the max division steps */ in division_lqr()
|
| H A D | arm32_aeabi_divmod.c | 69 i = i << 1; /* count the max division steps */ in division_qr()
|
| /optee_os/core/drivers/crypto/caam/hal/common/ |
| H A D | hal_jr.c | 35 * Reset is done in 2 steps: in caam_hal_jr_reset()
|
| /optee_os/core/pta/veraison_attestation/ |
| H A D | sign.c | 27 * (and similar steps for obtaining the x, y, d values).
|
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_attributes.h | 42 * Utils to check compliance of attributes at various processing steps.
|
| /optee_os/core/drivers/scmi-msg/ |
| H A D | clock.c | 40 unsigned long *steps __unused) in plat_scmi_clock_rates_by_step()
|
| H A D | voltage_domain.c | 41 long *steps __unused) in plat_scmi_voltd_levels_by_step()
|