| /optee_os/core/lib/libtomcrypt/src/pk/asn1/oid/ |
| H A D | pk_oid_str.c | 6 int pk_oid_str_to_num(const char *OID, unsigned long *oid, unsigned long *oidlen) in pk_oid_str_to_num() argument 11 LTC_ARGCHK(oidlen != NULL); in pk_oid_str_to_num() 13 limit = *oidlen; in pk_oid_str_to_num() 14 *oidlen = 0; /* make sure that we return zero oidlen on error */ in pk_oid_str_to_num() 38 *oidlen = j; in pk_oid_str_to_num() 41 *oidlen = j + 1; in pk_oid_str_to_num() 45 int pk_oid_num_to_str(const unsigned long *oid, unsigned long oidlen, char *OID, unsigned long *out… in pk_oid_num_to_str() argument 52 LTC_ARGCHK(oidlen < INT_MAX); in pk_oid_num_to_str() 55 for (i = oidlen - 1, k = 0; i >= 0; i--) { in pk_oid_num_to_str()
|
| /optee_os/core/tee/ |
| H A D | fs_dirfile.c | 25 uint32_t oidlen; member 39 assert(dent->oidlen || !dent->oid[0] || dent->oid[0] == OID_EMPTY_NAME); in is_free() 41 return !dent->oidlen && !dent->oid[0]; in is_free() 213 size_t oidlen, struct tee_fs_dirfile_fileh *dfh) in tee_fs_dirfile_find() argument 226 if (dent.oidlen != oidlen) in tee_fs_dirfile_find() 232 !memcmp(&dent.oid, oid, oidlen)) in tee_fs_dirfile_find() 289 const void *oid, size_t oidlen) in tee_fs_dirfile_rename() argument 294 if (oidlen > sizeof(dent.oid)) in tee_fs_dirfile_rename() 298 if (oidlen) in tee_fs_dirfile_rename() 299 memcpy(dent.oid, oid, oidlen); in tee_fs_dirfile_rename() [all …]
|
| H A D | tee_ree_fs.c | 1043 d->d.oidlen = sizeof(d->d.oid); in ree_fs_opendir_rpc() 1045 &d->d.oidlen); in ree_fs_opendir_rpc() 1085 d->d.oidlen = sizeof(d->d.oid); in ree_fs_readdir_rpc() 1087 &d->d.oidlen); in ree_fs_readdir_rpc()
|
| H A D | tee_svc_storage.c | 668 res = tee_pobj_get(&sess->ctx->uuid, d->oid, d->oidlen, 0, in syscall_storage_next_enum()
|
| H A D | tee_rpmb_fs.c | 2916 next->entry.oidlen = tee_hs2b((uint8_t *) in rpmb_fs_dir_populate() 2921 if (next->entry.oidlen) { in rpmb_fs_dir_populate()
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/x509/ |
| H A D | x509_encode_subject_public_key_info.c | 41 unsigned long oid[16], oidlen; in x509_encode_subject_public_key_info() local 50 oidlen = sizeof(oid)/sizeof(oid[0]); in x509_encode_subject_public_key_info() 51 if ((err = pk_oid_str_to_num(OID, oid, &oidlen)) != CRYPT_OK) { in x509_encode_subject_public_key_info() 55 LTC_SET_ASN1(alg_id, 0, LTC_ASN1_OBJECT_IDENTIFIER, oid, oidlen); in x509_encode_subject_public_key_info()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ec25519/ |
| H A D | ec25519_export.c | 26 unsigned long oid[16], oidlen; in ec25519_export() local 45 oidlen = sizeof(oid)/sizeof(oid[0]); in ec25519_export() 46 if ((err = pk_oid_str_to_num(OID, oid, &oidlen)) != CRYPT_OK) { in ec25519_export() 50 LTC_SET_ASN1(alg_id, 0, LTC_ASN1_OBJECT_IDENTIFIER, oid, oidlen); in ec25519_export()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_export_openssl.c | 25 unsigned long oid[16], oidlen; in ecc_export_openssl() local 43 … if (key->dp.oidlen == 0) { err = CRYPT_INVALID_ARG; goto error; } in ecc_export_openssl() 44 LTC_SET_ASN1(&ecparams, 0, LTC_ASN1_OBJECT_IDENTIFIER, key->dp.oid, key->dp.oidlen); in ecc_export_openssl() 93 oidlen = sizeof(oid)/sizeof(oid[0]); in ecc_export_openssl() 94 if ((err = pk_oid_str_to_num(OID, oid, &oidlen)) != CRYPT_OK) { in ecc_export_openssl() 99 LTC_SET_ASN1(seq_fieldid, 0, LTC_ASN1_OBJECT_IDENTIFIER, oid, oidlen); in ecc_export_openssl()
|
| H A D | ecc_set_curve_internal.c | 20 key->dp.oidlen = 0; in s_ecc_oid_lookup() 34 key->dp.oidlen = 16; /* size of key->dp.oid */ in s_ecc_oid_lookup() 35 pk_oid_str_to_num(curve->OID, key->dp.oid, &key->dp.oidlen); in s_ecc_oid_lookup() 64 if (srckey->dp.oidlen > 0) { in ecc_copy_curve() 65 key->dp.oidlen = srckey->dp.oidlen; in ecc_copy_curve() 66 for (i = 0; i < key->dp.oidlen; i++) key->dp.oid[i] = srckey->dp.oid[i]; in ecc_copy_curve()
|
| H A D | ecc_ssh_ecdsa_encode_name.c | 23 unsigned long oidlen = sizeof(oidstr); in ecc_ssh_ecdsa_encode_name() local 31 if ((err = ecc_get_oid_str(oidstr, &oidlen, key)) != CRYPT_OK) goto error; in ecc_ssh_ecdsa_encode_name()
|
| H A D | ecc_get_oid_str.c | 19 return pk_oid_num_to_str(key->dp.oid, key->dp.oidlen, out, outlen); in ecc_get_oid_str()
|
| H A D | ecc_set_curve.c | 34 key->dp.oidlen = 16; in ecc_set_curve() 35 if ((err = pk_oid_str_to_num(cu->OID, key->dp.oid, &key->dp.oidlen)) != CRYPT_OK) { goto error; } in ecc_set_curve()
|
| H A D | ecc_sign_hash.c | 138 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_sign_hash_ex()
|
| H A D | ecc_verify_hash.c | 83 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_verify_hash_ex()
|
| H A D | ecc_recover_key.c | 89 if (pk_oid_cmp_with_ulong("1.3.132.0.10", key->dp.oid, key->dp.oidlen) != CRYPT_OK) { in ecc_recover_key()
|
| /optee_os/core/include/tee/ |
| H A D | fs_dirfile.h | 100 size_t oidlen, struct tee_fs_dirfile_fileh *dfh); 125 const void *oid, size_t oidlen); 156 size_t *oidlen);
|
| H A D | tee_fs.h | 23 size_t oidlen; member
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_private.h | 287 int pk_oid_str_to_num(const char *OID, unsigned long *oid, unsigned long *oidlen); 288 int pk_oid_num_to_str(const unsigned long *oid, unsigned long oidlen, char *OID, unsigned long *out…
|
| H A D | tomcrypt_pk.h | 226 unsigned long oidlen; member
|