| /optee_os/core/crypto/ |
| H A D | rng_fortuna.c | 65 uint8_t dlen; member 86 static TEE_Result hash_update(void *ctx, const void *data, size_t dlen) in hash_update() argument 88 return crypto_hash_update(ctx, data, dlen); in hash_update() 96 static TEE_Result key_from_data(void *ctx, const void *data, size_t dlen, in key_from_data() argument 104 res = hash_update(ctx, data, dlen); in key_from_data() 130 TEE_Result crypto_rng_init(const void *data, size_t dlen) in crypto_rng_init() argument 157 res = key_from_data(state.reseed_ctx, data, dlen, key); in crypto_rng_init() 176 size_t dlen) in push_ring_buffer() argument 178 uint8_t dl = MIN(RING_BUF_DATA_SIZE, dlen); in push_ring_buffer() 191 ring_buffer.elem[next_begin].dlen = dl; in push_ring_buffer() [all …]
|
| H A D | rng_hw.c | 12 TEE_Result crypto_rng_init(const void *data __unused, size_t dlen __unused) in crypto_rng_init() 21 size_t dlen __unused) in crypto_rng_add_event()
|
| /optee_os/lib/libutils/ext/ |
| H A D | strlcat.c | 55 size_t dlen; in strlcat() local 60 dlen = d - dst; in strlcat() 61 n = siz - dlen; in strlcat() 64 return dlen + strlen(s); in strlcat() 75 return dlen + (s - src); /* count does not include NUL */ in strlcat()
|
| H A D | base64.c | 16 bool base64_enc(const void *data, size_t dlen, char *buf, size_t *blen) in base64_enc() argument 22 n = base64_enc_len(dlen); in base64_enc() 28 for (n = 0; n < dlen; n += 3) { in base64_enc() 34 if ((n + 1) < dlen) in base64_enc() 38 if ((n + 2) < dlen) in base64_enc() 43 if ((n + 1) < dlen) in base64_enc() 47 if ((n + 2) < dlen) in base64_enc()
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/bit/ |
| H A D | der_decode_bit_string.c | 24 unsigned long dlen, blen, x, y; in der_decode_bit_string() local 46 if ((err = der_decode_asn1_length(in + x, &y, &dlen)) != CRYPT_OK) { in der_decode_bit_string() 51 if ((dlen == 0) || (dlen > (inlen - x))) { in der_decode_bit_string() 56 blen = ((dlen - 1) << 3) - (in[x++] & 7); in der_decode_bit_string()
|
| H A D | der_decode_raw_bit_string.c | 27 unsigned long dlen, blen, x, y; in der_decode_raw_bit_string() local 49 if ((err = der_decode_asn1_length(in + x, &y, &dlen)) != CRYPT_OK) { in der_decode_raw_bit_string() 54 if ((dlen == 0) || (dlen > (inlen - x))) { in der_decode_raw_bit_string() 59 blen = ((dlen - 1) << 3) - (in[x++] & 7); in der_decode_raw_bit_string()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes.c | 19 unsigned long klen, keylen, dlen; in pbes_decrypt() local 57 dlen = arg->enc_data->size; in pbes_decrypt() 58 if ((err = padding_depad(dec_data, &dlen, LTC_PAD_PKCS7)) != CRYPT_OK) goto LBL_ERROR; in pbes_decrypt() 59 diff = (long)arg->enc_data->size - (long)dlen; in pbes_decrypt() 64 *dec_size = dlen; in pbes_decrypt()
|
| /optee_os/core/tee/ |
| H A D | tee_ta_enc_manager.c | 43 size_t dlen = len; in tee_ta_decrypt_update() local 46 dst, &dlen); in tee_ta_decrypt_update() 57 size_t dlen = len; in tee_ta_decrypt_final() local 59 res = crypto_authenc_dec_final(enc_ctx, src, len, dst, &dlen, in tee_ta_decrypt_final()
|
| H A D | tee_svc_cryp.c | 3256 size_t dlen = 0; in tee_svc_cipher_update_helper() local 3276 dlen = 0; in tee_svc_cipher_update_helper() 3283 res = get_user_u64_as_size_t(&dlen, dst_len); in tee_svc_cipher_update_helper() 3287 res = vm_check_access_rights(uctx, flags, (uaddr_t)dst, dlen); in tee_svc_cipher_update_helper() 3292 if (dlen < src_len) { in tee_svc_cipher_update_helper() 4166 size_t dlen = 0; in syscall_authenc_update_payload() local 4188 res = get_user_u64_as_size_t(&dlen, dst_len); in syscall_authenc_update_payload() 4196 (uaddr_t)dst_data, dlen); in syscall_authenc_update_payload() 4200 if (dlen < src_len) { in syscall_authenc_update_payload() 4207 src_len, dst_data, &dlen); in syscall_authenc_update_payload() [all …]
|
| H A D | fs_htree.c | 110 size_t idx, size_t vers, void *data, size_t dlen) in rpc_read() argument 125 if (bytes != dlen) in rpc_read() 128 memcpy(data, p, dlen); in rpc_read() 149 size_t vers, const void *data, size_t dlen) in rpc_write() argument 159 memcpy(p, data, dlen); in rpc_write()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | base64.h | 45 int mbedtls_base64_encode(unsigned char *dst, size_t dlen, size_t *olen, 65 int mbedtls_base64_decode(unsigned char *dst, size_t dlen, size_t *olen,
|
| /optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
| H A D | rsa_set.c | 22 const unsigned char *d, unsigned long dlen, in rsa_set_key() argument 36 if (d && dlen) { in rsa_set_key() 37 …if ((err = mp_read_unsigned_bin(key->d , (unsigned char *)d , dlen)) != CRYPT_OK) { goto LBL_ERR; } in rsa_set_key()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | base64.c | 62 int mbedtls_base64_encode(unsigned char *dst, size_t dlen, size_t *olen, in mbedtls_base64_encode() argument 83 if ((dlen < n + 1) || (NULL == dst)) { in mbedtls_base64_encode() 129 int mbedtls_base64_decode(unsigned char *dst, size_t dlen, size_t *olen, in mbedtls_base64_decode() argument 220 if ((*olen != 0 && dst == NULL) || dlen < *olen) { in mbedtls_base64_decode()
|
| H A D | ssl_tls.c | 409 unsigned char *dstbuf, size_t dlen); 438 unsigned char *dstbuf, size_t dlen); 449 unsigned char *dstbuf, size_t dlen); 475 unsigned char *dstbuf, size_t dlen) in mbedtls_ssl_tls_prf() argument 496 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf() 6774 unsigned char *dstbuf, size_t dlen) in tls_prf_generic() argument 6814 dlen); in tls_prf_generic() 6821 status = psa_key_derivation_output_bytes(&derivation, dstbuf, dlen); in tls_prf_generic() 6854 unsigned char *dstbuf, size_t dlen) in tls_prf_generic() argument 6905 for (i = 0; i < dlen; i += md_len) { in tls_prf_generic() [all …]
|
| H A D | rsa.c | 1620 static int mgf_mask(unsigned char *dst, size_t dlen, unsigned char *src, in mgf_mask() argument 1651 while (dlen > 0) { in mgf_mask() 1653 if (dlen < hlen) { in mgf_mask() 1654 use_len = dlen; in mgf_mask() 1676 dlen -= use_len; in mgf_mask()
|
| /optee_os/core/pta/tests/ |
| H A D | aes_perf.c | 118 size_t dlen = len; in update_ae() local 120 return crypto_authenc_update_payload(ctx, mode, src, len, dst, &dlen); in update_ae()
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | ecc.c | 183 arg.dlen = 1; in verify() 437 arg.data[arg.dlen++] = XSECURE_ECDSA_KAT_NIST_P384; in ecc_init() 444 arg.dlen = 0; in ecc_init() 446 arg.data[arg.dlen++] = XSECURE_ECDSA_KAT_NIST_P521; in ecc_init()
|
| H A D | authenc.c | 206 arg.data[arg.dlen++] = engine.init.key_len; in replay_init() 207 arg.data[arg.dlen++] = engine.key_src; in replay_init() 234 arg.data[arg.dlen++] = p->mem.len % 16 ? p->mem.alloc_len : p->mem.len; in replay_aad() 348 arg.data[arg.dlen++] = key_len; in do_init() 349 arg.data[arg.dlen++] = engine.key_src; in do_init() 432 arg.data[arg.dlen++] = p.len % 16 ? p.alloc_len : p.len; in do_update_aad()
|
| H A D | ipi.c | 84 for (i = 1; i < arg->dlen + 1; i++) in versal_crypto_request()
|
| /optee_os/core/drivers/crypto/versal/include/ |
| H A D | ipi.h | 89 size_t dlen; member
|
| /optee_os/core/drivers/ |
| H A D | versal_sha3_384.c | 22 struct versal_cmd_args arg = { .dlen = 1, }; in input_plaintext()
|
| /optee_os/core/lib/libtomcrypt/src/ciphers/ |
| H A D | blowfish.c | 342 static ulong32 s_blowfish_stream2word(const unsigned char *d, int dlen, int *cur) in s_blowfish_stream2word() argument 350 if (y == dlen) { in s_blowfish_stream2word()
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_operations.c | 1081 size_t slen, void *dst, uint64_t *dlen), in tee_buffer_update() argument 1089 size_t dlen = *dest_len; in tee_buffer_update() local 1136 tmp_dlen = dlen; in tee_buffer_update() 1141 dlen -= tmp_dlen; in tee_buffer_update() 1162 tmp_dlen = dlen; in tee_buffer_update() 1169 dlen -= tmp_dlen; in tee_buffer_update() 1689 size_t *dlen) in ae_update_helper() argument 1696 *dlen = 0; in ae_update_helper() 1712 dl = *dlen; in ae_update_helper() 1714 *dlen = req_dlen; in ae_update_helper() [all …]
|
| /optee_os/core/include/crypto/ |
| H A D | crypto.h | 376 TEE_Result crypto_rng_init(const void *data, size_t dlen); 392 const void *data, size_t dlen);
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pk.h | 115 const unsigned char *d, unsigned long dlen,
|