Home
last modified time | relevance | path

Searched refs:bad (Results 1 – 7 of 7) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/library/
H A Dcipher.c900 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in mbedtls_get_pkcs_padding() local
901 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in mbedtls_get_pkcs_padding()
909 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_and(in_padding, different)); in mbedtls_get_pkcs_padding()
913 *data_len = mbedtls_ct_if(bad, 0, input_len - padding_len); in mbedtls_get_pkcs_padding()
915 *invalid_padding = mbedtls_ct_size_if_else_0(bad, SIZE_MAX); in mbedtls_get_pkcs_padding()
944 mbedtls_ct_condition_t bad = MBEDTLS_CT_TRUE; in get_one_and_zeros_padding() local
955 bad = mbedtls_ct_bool_if(hit_first_nonzero, mbedtls_ct_uint_ne(input[i], 0x80), bad); in get_one_and_zeros_padding()
960 *invalid_padding = mbedtls_ct_size_if_else_0(bad, SIZE_MAX); in get_one_and_zeros_padding()
986 mbedtls_ct_condition_t bad; in get_zeros_and_len_padding() local
996 bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_zeros_and_len_padding()
[all …]
H A Drsa.c465 mbedtls_ct_condition_t bad; in mbedtls_ct_rsaes_pkcs1_v15_unpadding() local
475 bad = mbedtls_ct_bool(input[0]); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
480 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(input[1], MBEDTLS_RSA_CRYPT)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
492 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_not(pad_done)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
495 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_gt(8, pad_count)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
505 bad, (unsigned) plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
519 bad, in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
530 mbedtls_ct_zeroize_if(mbedtls_ct_bool_or(bad, output_too_large), input + 11, ilen - 11); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
1902 mbedtls_ct_condition_t bad, in_padding; in mbedtls_rsa_rsaes_oaep_decrypt() local
1966 bad = mbedtls_ct_bool(*p++); /* First byte must be 0 */ in mbedtls_rsa_rsaes_oaep_decrypt()
[all …]
/optee_os/mk/
H A Dgcc.mk33 nostdinc := --bad-nostdinc-variable
34 libgcc := --bad-libgcc-variable
H A Dclang.mk50 nostdinc := --bad-nostdinc-variable
51 libgcc := --bad-libgcc-variable
/optee_os/core/kernel/
H A Ddt.c179 goto bad; in fdt_read_paddr()
187 goto bad; in fdt_read_paddr()
196 bad: in fdt_read_paddr()
/optee_os/lib/libutils/isoc/
H A Dbget.doc288 validated for bad pointers, overwritten data, etc. If compiled with
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog233 bad state after an operation has been aborted.
1613 to catch bad uses of time.h.
2309 bad cryptographic practice. Fix #1906.
2440 * Fix a resource leak in a bad-arguments case of mbedtls_rsa_gen_key()
4336 reflect bad EC curves within verification result.
4658 * Fix failures in MPI on Sparc(64) due to use of bad assembly code.
5057 performance impact was bad for some users (this was introduced in 1.3.10).
5172 * Fix potential bad read in parsing ServerHello (found by Adrien
5639 * Fix potential bad read in parsing ServerHello (found by Adrien
5823 * Removed timing differences due to bad padding from
[all …]