Home
last modified time | relevance | path

Searched refs:dlen (Results 1 – 25 of 27) sorted by relevance

12

/optee_os/core/crypto/
H A Drng_fortuna.c65 uint8_t dlen; member
86 static TEE_Result hash_update(void *ctx, const void *data, size_t dlen) in hash_update() argument
88 return crypto_hash_update(ctx, data, dlen); in hash_update()
96 static TEE_Result key_from_data(void *ctx, const void *data, size_t dlen, in key_from_data() argument
104 res = hash_update(ctx, data, dlen); in key_from_data()
130 TEE_Result crypto_rng_init(const void *data, size_t dlen) in crypto_rng_init() argument
157 res = key_from_data(state.reseed_ctx, data, dlen, key); in crypto_rng_init()
176 size_t dlen) in push_ring_buffer() argument
178 uint8_t dl = MIN(RING_BUF_DATA_SIZE, dlen); in push_ring_buffer()
191 ring_buffer.elem[next_begin].dlen = dl; in push_ring_buffer()
[all …]
H A Drng_hw.c12 TEE_Result crypto_rng_init(const void *data __unused, size_t dlen __unused) in crypto_rng_init()
21 size_t dlen __unused) in crypto_rng_add_event()
/optee_os/lib/libutils/ext/
H A Dstrlcat.c55 size_t dlen; in strlcat() local
60 dlen = d - dst; in strlcat()
61 n = siz - dlen; in strlcat()
64 return dlen + strlen(s); in strlcat()
75 return dlen + (s - src); /* count does not include NUL */ in strlcat()
H A Dbase64.c16 bool base64_enc(const void *data, size_t dlen, char *buf, size_t *blen) in base64_enc() argument
22 n = base64_enc_len(dlen); in base64_enc()
28 for (n = 0; n < dlen; n += 3) { in base64_enc()
34 if ((n + 1) < dlen) in base64_enc()
38 if ((n + 2) < dlen) in base64_enc()
43 if ((n + 1) < dlen) in base64_enc()
47 if ((n + 2) < dlen) in base64_enc()
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/bit/
H A Dder_decode_bit_string.c24 unsigned long dlen, blen, x, y; in der_decode_bit_string() local
46 if ((err = der_decode_asn1_length(in + x, &y, &dlen)) != CRYPT_OK) { in der_decode_bit_string()
51 if ((dlen == 0) || (dlen > (inlen - x))) { in der_decode_bit_string()
56 blen = ((dlen - 1) << 3) - (in[x++] & 7); in der_decode_bit_string()
H A Dder_decode_raw_bit_string.c27 unsigned long dlen, blen, x, y; in der_decode_raw_bit_string() local
49 if ((err = der_decode_asn1_length(in + x, &y, &dlen)) != CRYPT_OK) { in der_decode_raw_bit_string()
54 if ((dlen == 0) || (dlen > (inlen - x))) { in der_decode_raw_bit_string()
59 blen = ((dlen - 1) << 3) - (in[x++] & 7); in der_decode_raw_bit_string()
/optee_os/core/lib/libtomcrypt/src/misc/pbes/
H A Dpbes.c19 unsigned long klen, keylen, dlen; in pbes_decrypt() local
57 dlen = arg->enc_data->size; in pbes_decrypt()
58 if ((err = padding_depad(dec_data, &dlen, LTC_PAD_PKCS7)) != CRYPT_OK) goto LBL_ERROR; in pbes_decrypt()
59 diff = (long)arg->enc_data->size - (long)dlen; in pbes_decrypt()
64 *dec_size = dlen; in pbes_decrypt()
/optee_os/core/tee/
H A Dtee_ta_enc_manager.c43 size_t dlen = len; in tee_ta_decrypt_update() local
46 dst, &dlen); in tee_ta_decrypt_update()
57 size_t dlen = len; in tee_ta_decrypt_final() local
59 res = crypto_authenc_dec_final(enc_ctx, src, len, dst, &dlen, in tee_ta_decrypt_final()
H A Dtee_svc_cryp.c3256 size_t dlen = 0; in tee_svc_cipher_update_helper() local
3276 dlen = 0; in tee_svc_cipher_update_helper()
3283 res = get_user_u64_as_size_t(&dlen, dst_len); in tee_svc_cipher_update_helper()
3287 res = vm_check_access_rights(uctx, flags, (uaddr_t)dst, dlen); in tee_svc_cipher_update_helper()
3292 if (dlen < src_len) { in tee_svc_cipher_update_helper()
4166 size_t dlen = 0; in syscall_authenc_update_payload() local
4188 res = get_user_u64_as_size_t(&dlen, dst_len); in syscall_authenc_update_payload()
4196 (uaddr_t)dst_data, dlen); in syscall_authenc_update_payload()
4200 if (dlen < src_len) { in syscall_authenc_update_payload()
4207 src_len, dst_data, &dlen); in syscall_authenc_update_payload()
[all …]
H A Dfs_htree.c110 size_t idx, size_t vers, void *data, size_t dlen) in rpc_read() argument
125 if (bytes != dlen) in rpc_read()
128 memcpy(data, p, dlen); in rpc_read()
149 size_t vers, const void *data, size_t dlen) in rpc_write() argument
159 memcpy(p, data, dlen); in rpc_write()
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dbase64.h45 int mbedtls_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
65 int mbedtls_base64_decode(unsigned char *dst, size_t dlen, size_t *olen,
/optee_os/core/lib/libtomcrypt/src/pk/rsa/
H A Drsa_set.c22 const unsigned char *d, unsigned long dlen, in rsa_set_key() argument
36 if (d && dlen) { in rsa_set_key()
37 …if ((err = mp_read_unsigned_bin(key->d , (unsigned char *)d , dlen)) != CRYPT_OK) { goto LBL_ERR; } in rsa_set_key()
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dbase64.c62 int mbedtls_base64_encode(unsigned char *dst, size_t dlen, size_t *olen, in mbedtls_base64_encode() argument
83 if ((dlen < n + 1) || (NULL == dst)) { in mbedtls_base64_encode()
129 int mbedtls_base64_decode(unsigned char *dst, size_t dlen, size_t *olen, in mbedtls_base64_decode() argument
220 if ((*olen != 0 && dst == NULL) || dlen < *olen) { in mbedtls_base64_decode()
H A Dssl_tls.c409 unsigned char *dstbuf, size_t dlen);
438 unsigned char *dstbuf, size_t dlen);
449 unsigned char *dstbuf, size_t dlen);
475 unsigned char *dstbuf, size_t dlen) in mbedtls_ssl_tls_prf() argument
496 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf()
6774 unsigned char *dstbuf, size_t dlen) in tls_prf_generic() argument
6814 dlen); in tls_prf_generic()
6821 status = psa_key_derivation_output_bytes(&derivation, dstbuf, dlen); in tls_prf_generic()
6854 unsigned char *dstbuf, size_t dlen) in tls_prf_generic() argument
6905 for (i = 0; i < dlen; i += md_len) { in tls_prf_generic()
[all …]
H A Drsa.c1620 static int mgf_mask(unsigned char *dst, size_t dlen, unsigned char *src, in mgf_mask() argument
1651 while (dlen > 0) { in mgf_mask()
1653 if (dlen < hlen) { in mgf_mask()
1654 use_len = dlen; in mgf_mask()
1676 dlen -= use_len; in mgf_mask()
/optee_os/core/pta/tests/
H A Daes_perf.c118 size_t dlen = len; in update_ae() local
120 return crypto_authenc_update_payload(ctx, mode, src, len, dst, &dlen); in update_ae()
/optee_os/core/drivers/crypto/versal/
H A Decc.c183 arg.dlen = 1; in verify()
437 arg.data[arg.dlen++] = XSECURE_ECDSA_KAT_NIST_P384; in ecc_init()
444 arg.dlen = 0; in ecc_init()
446 arg.data[arg.dlen++] = XSECURE_ECDSA_KAT_NIST_P521; in ecc_init()
H A Dauthenc.c206 arg.data[arg.dlen++] = engine.init.key_len; in replay_init()
207 arg.data[arg.dlen++] = engine.key_src; in replay_init()
234 arg.data[arg.dlen++] = p->mem.len % 16 ? p->mem.alloc_len : p->mem.len; in replay_aad()
348 arg.data[arg.dlen++] = key_len; in do_init()
349 arg.data[arg.dlen++] = engine.key_src; in do_init()
432 arg.data[arg.dlen++] = p.len % 16 ? p.alloc_len : p.len; in do_update_aad()
H A Dipi.c84 for (i = 1; i < arg->dlen + 1; i++) in versal_crypto_request()
/optee_os/core/drivers/crypto/versal/include/
H A Dipi.h89 size_t dlen; member
/optee_os/core/drivers/
H A Dversal_sha3_384.c22 struct versal_cmd_args arg = { .dlen = 1, }; in input_plaintext()
/optee_os/core/lib/libtomcrypt/src/ciphers/
H A Dblowfish.c342 static ulong32 s_blowfish_stream2word(const unsigned char *d, int dlen, int *cur) in s_blowfish_stream2word() argument
350 if (y == dlen) { in s_blowfish_stream2word()
/optee_os/lib/libutee/
H A Dtee_api_operations.c1081 size_t slen, void *dst, uint64_t *dlen), in tee_buffer_update() argument
1089 size_t dlen = *dest_len; in tee_buffer_update() local
1136 tmp_dlen = dlen; in tee_buffer_update()
1141 dlen -= tmp_dlen; in tee_buffer_update()
1162 tmp_dlen = dlen; in tee_buffer_update()
1169 dlen -= tmp_dlen; in tee_buffer_update()
1689 size_t *dlen) in ae_update_helper() argument
1696 *dlen = 0; in ae_update_helper()
1712 dl = *dlen; in ae_update_helper()
1714 *dlen = req_dlen; in ae_update_helper()
[all …]
/optee_os/core/include/crypto/
H A Dcrypto.h376 TEE_Result crypto_rng_init(const void *data, size_t dlen);
392 const void *data, size_t dlen);
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_pk.h115 const unsigned char *d, unsigned long dlen,

12