Searched refs:bad (Results 1 – 7 of 7) sorted by relevance
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | cipher.c | 900 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in mbedtls_get_pkcs_padding() local 901 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in mbedtls_get_pkcs_padding() 909 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_and(in_padding, different)); in mbedtls_get_pkcs_padding() 913 *data_len = mbedtls_ct_if(bad, 0, input_len - padding_len); in mbedtls_get_pkcs_padding() 915 *invalid_padding = mbedtls_ct_size_if_else_0(bad, SIZE_MAX); in mbedtls_get_pkcs_padding() 944 mbedtls_ct_condition_t bad = MBEDTLS_CT_TRUE; in get_one_and_zeros_padding() local 955 bad = mbedtls_ct_bool_if(hit_first_nonzero, mbedtls_ct_uint_ne(input[i], 0x80), bad); in get_one_and_zeros_padding() 960 *invalid_padding = mbedtls_ct_size_if_else_0(bad, SIZE_MAX); in get_one_and_zeros_padding() 986 mbedtls_ct_condition_t bad; in get_zeros_and_len_padding() local 996 bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_zeros_and_len_padding() [all …]
|
| H A D | rsa.c | 465 mbedtls_ct_condition_t bad; in mbedtls_ct_rsaes_pkcs1_v15_unpadding() local 475 bad = mbedtls_ct_bool(input[0]); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 480 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(input[1], MBEDTLS_RSA_CRYPT)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 492 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_not(pad_done)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 495 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_gt(8, pad_count)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 505 bad, (unsigned) plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 519 bad, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 530 mbedtls_ct_zeroize_if(mbedtls_ct_bool_or(bad, output_too_large), input + 11, ilen - 11); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 1902 mbedtls_ct_condition_t bad, in_padding; in mbedtls_rsa_rsaes_oaep_decrypt() local 1966 bad = mbedtls_ct_bool(*p++); /* First byte must be 0 */ in mbedtls_rsa_rsaes_oaep_decrypt() [all …]
|
| /optee_os/mk/ |
| H A D | gcc.mk | 33 nostdinc := --bad-nostdinc-variable 34 libgcc := --bad-libgcc-variable
|
| H A D | clang.mk | 50 nostdinc := --bad-nostdinc-variable 51 libgcc := --bad-libgcc-variable
|
| /optee_os/core/kernel/ |
| H A D | dt.c | 179 goto bad; in fdt_read_paddr() 187 goto bad; in fdt_read_paddr() 196 bad: in fdt_read_paddr()
|
| /optee_os/lib/libutils/isoc/ |
| H A D | bget.doc | 288 validated for bad pointers, overwritten data, etc. If compiled with
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 233 bad state after an operation has been aborted. 1613 to catch bad uses of time.h. 2309 bad cryptographic practice. Fix #1906. 2440 * Fix a resource leak in a bad-arguments case of mbedtls_rsa_gen_key() 4336 reflect bad EC curves within verification result. 4658 * Fix failures in MPI on Sparc(64) due to use of bad assembly code. 5057 performance impact was bad for some users (this was introduced in 1.3.10). 5172 * Fix potential bad read in parsing ServerHello (found by Adrien 5639 * Fix potential bad read in parsing ServerHello (found by Adrien 5823 * Removed timing differences due to bad padding from [all …]
|