Searched refs:buffer_size (Results 1 – 9 of 9) sorted by relevance
| /optee_os/core/drivers/imx/dcp/ |
| H A D | dcp_utils.c | 41 void dcp_left_shift_buffer(uint8_t *input, uint8_t *result, size_t buffer_size) in dcp_left_shift_buffer() argument 47 for (i = 0; i < buffer_size; i++) { in dcp_left_shift_buffer() 49 result[buffer_size - 1 - i] = in dcp_left_shift_buffer() 50 input[buffer_size - 1 - i] << 1 | overflow; in dcp_left_shift_buffer() 52 overflow = input[buffer_size - 1 - i] >> 7; in dcp_left_shift_buffer()
|
| /optee_os/core/drivers/imx/dcp/include/ |
| H A D | dcp_utils.h | 40 void dcp_left_shift_buffer(uint8_t *result, uint8_t *input, size_t buffer_size);
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | pkwrite.c | 363 size_t buffer_size; in pk_write_opaque_pubkey() local 370 buffer_size = (size_t) (*p - start); in pk_write_opaque_pubkey() 371 if (psa_export_public_key(pk->priv_id, start, buffer_size, in pk_write_opaque_pubkey()
|
| H A D | psa_crypto.c | 8596 uint8_t *buffer, size_t buffer_size, size_t *buffer_length) in psa_crypto_driver_pake_get_password() argument 8602 if (buffer_size < inputs->password_len) { in psa_crypto_driver_pake_get_password()
|
| H A D | ssl_tls.c | 7312 size_t buffer_size, in ssl_calc_verify_tls_psa() argument 7328 status = psa_hash_finish(&cloned_op, hash, buffer_size, hlen); in ssl_calc_verify_tls_psa()
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_operations.c | 337 size_t buffer_size = block_size; in TEE_AllocateOperation() local 340 buffer_size *= 2; in TEE_AllocateOperation() 342 op->buffer = TEE_Malloc(buffer_size, in TEE_AllocateOperation() 1084 size_t buffer_size; in tee_buffer_update() local 1094 buffer_size = op->block_size * 2; in tee_buffer_update() 1097 buffer_size = op->block_size; in tee_buffer_update() 1106 l = MIN(slen, buffer_size - op->buffer_offs); in tee_buffer_update() 1117 ((op->buffer_offs + slen) >= (buffer_size + buffer_left))) { in tee_buffer_update() 1118 l = ROUNDUP2(op->buffer_offs + slen - buffer_size, in tee_buffer_update() 1139 memcpy(op->buffer, op->buffer + l, buffer_size - l); in tee_buffer_update() [all …]
|
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_attributes.c | 2508 uint32_t buffer_size = 0; in set_private_key_data_rsa() local 2561 buffer_size = size; in set_private_key_data_rsa() 2562 buffer = TEE_Malloc(buffer_size, TEE_USER_MEM_HINT_NO_FILL_ZERO); in set_private_key_data_rsa() 2579 if (buffer_size < size) { in set_private_key_data_rsa() 2595 if (buffer_size < size) { in set_private_key_data_rsa() 2611 if (buffer_size < size) { in set_private_key_data_rsa() 2627 if (buffer_size < size) { in set_private_key_data_rsa()
|
| H A D | pkcs11_token.c | 1626 size_t buffer_size = 0; in entry_ck_generate_random() local 1648 buffer_size = MIN(out->memref.size, RNG_CHUNK_SIZE); in entry_ck_generate_random() 1649 buffer = TEE_Malloc(buffer_size, TEE_MALLOC_FILL_ZERO); in entry_ck_generate_random() 1657 size_t count = MIN(left, buffer_size); in entry_ck_generate_random()
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_extra.h | 1330 uint8_t *buffer, size_t buffer_size, size_t *buffer_length);
|