| /optee_os/core/lib/libtomcrypt/src/misc/ |
| H A D | error_to_string.c | 17 "Invalid key size.", 18 "Invalid number of rounds for block cipher.", 22 "Invalid input packet.", 24 "Invalid number of bits for a PRNG.", 27 "Invalid cipher specified.", 28 "Invalid hash specified.", 29 "Invalid PRNG specified.", 33 "Invalid PK key or key type specified for function.", 36 "Invalid argument provided.", 39 "Invalid PK type.", [all …]
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt.h | 40 CRYPT_INVALID_KEYSIZE, /* Invalid key size given */ 41 CRYPT_INVALID_ROUNDS, /* Invalid number of rounds */ 45 CRYPT_INVALID_PACKET, /* Invalid input packet given */ 47 CRYPT_INVALID_PRNGSIZE, /* Invalid number of bits for a PRNG */ 50 CRYPT_INVALID_CIPHER, /* Invalid cipher specified */ 51 CRYPT_INVALID_HASH, /* Invalid hash specified */ 52 CRYPT_INVALID_PRNG, /* Invalid PRNG specified */ 59 CRYPT_INVALID_ARG, /* Generic invalid argument */ 62 CRYPT_PK_INVALID_TYPE, /* Invalid type of PK key */ 70 CRYPT_PK_INVALID_SIZE, /* Invalid size input for PK parameters */ [all …]
|
| /optee_os/core/drivers/ |
| H A D | zynqmp_csu_aes.c | 73 EMSG("Invalid length"); in aes_transfer_enc() 87 EMSG("DMA transfer failed, invalid destination buffer"); in aes_transfer_enc() 97 EMSG("DMA transfer failed, invalid IV buffer"); in aes_transfer_enc() 111 EMSG("DMA transfer failed, invalid source buffer"); in aes_transfer_enc() 151 EMSG("DMA transfer failed, invalid destination buffer"); in aes_transfer_dec() 161 EMSG("DMA transfer failed, invalid IV buffer"); in aes_transfer_dec() 174 EMSG("DMA transfer failed, invalid source buffer"); in aes_transfer_dec() 187 EMSG("DMA transfer failed, invalid tag buffer"); in aes_transfer_dec() 292 EMSG("Invalid source size"); in zynqmp_csu_aes_decrypt_data() 297 EMSG("Invalid IV size"); in zynqmp_csu_aes_decrypt_data() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | error.c | 195 return( "CIPHER - Input data contains invalid padding and is rejected" ); in mbedtls_high_level_strerr() 201 return( "CIPHER - The context is invalid. For example, because it was freed" ); in mbedtls_high_level_strerr() 241 return( "ECP - Invalid private or public key" ); in mbedtls_high_level_strerr() 292 return( "PK - Invalid key tag or value" ); in mbedtls_high_level_strerr() 300 return( "PK - The pubkey tag or value is invalid (only RSA and EC are supported)" ); in mbedtls_high_level_strerr() 302 return( "PK - The algorithm tag or value is invalid" ); in mbedtls_high_level_strerr() 337 return( "PKCS7 - The format is invalid, e.g. different type expected" ); in mbedtls_high_level_strerr() 341 return( "PKCS7 - The PKCS #7 version element is invalid or cannot be parsed" ); in mbedtls_high_level_strerr() 343 return( "PKCS7 - The PKCS #7 content info is invalid or cannot be parsed" ); in mbedtls_high_level_strerr() 345 return( "PKCS7 - The algorithm tag or value is invalid or cannot be parsed" ); in mbedtls_high_level_strerr() [all …]
|
| H A D | psa_crypto_its.h | 63 …* is invalid, for example is `NULL` or references me… 87 …* is invalid. For example is `NULL` or references memory… 88 …* In addition, this can also happen if an invalid offset… 108 …* is invalid, for example is `NULL` or references memory…
|
| /optee_os/core/pta/bcm/ |
| H A D | wdt.c | 44 EMSG("Invalid Param types"); in pta_wd_config() 68 EMSG("Invalid Param types"); in pta_wd_start() 86 EMSG("Invalid Param types"); in pta_wd_ping() 104 EMSG("Invalid Param types"); in pta_wd_stop() 123 EMSG("Invalid Param types"); in pta_wd_set_timeout()
|
| H A D | elog.c | 73 EMSG("Invalid Param types"); in pta_elog_load_nitro_fw() 79 EMSG("Invalid access"); in pta_elog_load_nitro_fw() 93 EMSG("Invalid access"); in pta_elog_load_nitro_fw() 150 EMSG("Invalid Param types"); in pta_elog_nitro_crash_dump() 161 EMSG("Invalid access"); in pta_elog_nitro_crash_dump() 197 EMSG("Invalid Param types"); in pta_elog_dump()
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | sec_authenc.c | 300 EMSG("Invalid aad len"); in is_hw_supported() 306 EMSG("Invalid tag len"); in is_hw_supported() 312 EMSG("Invalid nonce len"); in is_hw_supported() 317 EMSG("Invalid aad len"); in is_hw_supported() 324 EMSG("Invalid tag len"); in is_hw_supported() 332 EMSG("Invalid src len"); in is_hw_supported() 356 EMSG("Invalid AES key size"); in sec_aead_set_key() 529 EMSG("Invalid input parameters"); in sec_authenc_update_aad() 546 EMSG("Invalid aad length"); in sec_authenc_update_aad() 566 EMSG("Invalid input/output data"); in update_params_check() [all …]
|
| H A D | sec_cipher.c | 41 EMSG("Invalid DES key size"); in sec_cipher_des_get_c_key_len() 56 EMSG("Invalid 3DES key size"); in sec_cipher_3des_get_c_key_len() 82 EMSG("Invalid AES key size"); in sec_cipher_aes_get_c_key_len() 95 EMSG("Invalid AES-XTS key size"); in sec_cipher_aes_get_c_key_len() 116 EMSG("Invalid SM4 key size"); in sec_cipher_sm4_get_c_key_len() 123 EMSG("Invalid SM4-XTS key size"); in sec_cipher_sm4_get_c_key_len() 160 EMSG("Invalid cipher type %#"PRIx8, c_ctx->alg); in sec_cipher_set_key() 472 EMSG("Invalid cipher type %#"PRIx32, alg); in crypto_set_alg() 498 EMSG("Invalid cipher mode type %#"PRIx32, mode); in crypto_set_mode() 601 EMSG("Invalid xts src len"); in sec_cipher_cryptlen_check() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | pkcs7.h | 50 #define MBEDTLS_ERR_PKCS7_INVALID_FORMAT -0x5300 /**< The format is invalid, e.g… 52 …ID_VERSION -0x5400 /**< The PKCS #7 version element is invalid or cannot be pars… 53 …VALID_CONTENT_INFO -0x5480 /**< The PKCS #7 content info is invalid or cannot be pars… 54 …LID_ALG -0x5500 /**< The algorithm tag or value is invalid or cannot be pars… 55 …D_CERT -0x5580 /**< The certificate tag or value is invalid or cannot be pars… 58 #define MBEDTLS_ERR_PKCS7_BAD_INPUT_DATA -0x5700 /**< Input invalid. */ 61 …CERT_DATE_INVALID -0x5880 /**< The PKCS #7 date issued/expired dates are invalid */
|
| H A D | x509.h | 48 /** The CRT/CRL/CSR format is invalid, e.g. different type expected. */ 50 /** The CRT/CRL/CSR version element is invalid. */ 52 /** The serial tag or value is invalid. */ 54 /** The algorithm tag or value is invalid. */ 56 /** The name tag or value is invalid. */ 58 /** The date tag or value is invalid. */ 60 /** The signature tag or value invalid. */ 62 /** The extension tag or value is invalid. */ 74 /** Input invalid. */
|
| /optee_os/lib/libutils/isoc/arch/arm/softfloat/source/ |
| H A D | extF80M_to_i32_r_minMag.c | 84 if ( sig>>32 || (shiftCount <= -31) ) goto invalid; in extF80M_to_i32_r_minMag() 86 if ( shiftedSig>>32 ) goto invalid; in extF80M_to_i32_r_minMag() 91 if ( shiftedSig>>32 ) goto invalid; in extF80M_to_i32_r_minMag() 98 if ( 0x80000000 < absZ ) goto invalid; in extF80M_to_i32_r_minMag() 102 if ( 0x80000000 <= absZ ) goto invalid; in extF80M_to_i32_r_minMag() 110 invalid: in extF80M_to_i32_r_minMag()
|
| H A D | extF80M_to_ui32_r_minMag.c | 82 if ( sign || sig>>32 || (shiftCount <= -31) ) goto invalid; in extF80M_to_ui32_r_minMag() 84 if ( shiftedSig>>32 ) goto invalid; in extF80M_to_ui32_r_minMag() 89 if ( shiftedSig>>32 ) goto invalid; in extF80M_to_ui32_r_minMag() 91 if ( sign && z ) goto invalid; in extF80M_to_ui32_r_minMag() 99 invalid: in extF80M_to_ui32_r_minMag()
|
| H A D | f128M_to_ui64_r_minMag.c | 67 if ( shiftCount < 0 ) goto invalid; in f128M_to_ui64_r_minMag() 77 if ( signF128UI96( uiA96 ) && z ) goto invalid; in f128M_to_ui64_r_minMag() 83 if ( signF128UI96( uiA96 ) ) goto invalid; in f128M_to_ui64_r_minMag() 91 invalid: in f128M_to_ui64_r_minMag()
|
| H A D | extF80M_to_i64_r_minMag.c | 83 if ( shiftCount <= -63 ) goto invalid; in extF80M_to_i64_r_minMag() 86 if ( absZ>>shiftCount != sig ) goto invalid; in extF80M_to_i64_r_minMag() 95 if ( UINT64_C( 0x8000000000000000 ) < absZ ) goto invalid; in extF80M_to_i64_r_minMag() 99 if ( UINT64_C( 0x8000000000000000 ) <= absZ ) goto invalid; in extF80M_to_i64_r_minMag() 107 invalid: in extF80M_to_i64_r_minMag()
|
| H A D | f128M_to_i64_r_minMag.c | 70 if ( shiftCount < 0 ) goto invalid; in f128M_to_i64_r_minMag() 81 goto invalid; in f128M_to_i64_r_minMag() 96 if ( uiZ || ! sign ) goto invalid; in f128M_to_i64_r_minMag() 103 invalid: in f128M_to_i64_r_minMag()
|
| H A D | s_roundPackToUI64.c | 65 if ( ! sig ) goto invalid; in softfloat_roundPackToUI64() 71 if ( sign && sig ) goto invalid; in softfloat_roundPackToUI64() 76 invalid: in softfloat_roundPackToUI64()
|
| H A D | s_roundPackMToUI64.c | 67 if ( ! sig ) goto invalid; in softfloat_roundPackMToUI64() 70 if ( sign && sig ) goto invalid; in softfloat_roundPackMToUI64() 75 invalid: in softfloat_roundPackMToUI64()
|
| H A D | s_roundPackToUI32.c | 63 if ( sig & UINT64_C( 0xFFFFFF8000000000 ) ) goto invalid; in softfloat_roundPackToUI32() 66 if ( sign && z ) goto invalid; in softfloat_roundPackToUI32() 71 invalid: in softfloat_roundPackToUI32()
|
| H A D | s_roundPackToI32.c | 65 if ( sig & UINT64_C( 0xFFFFFF8000000000 ) ) goto invalid; in softfloat_roundPackToI32() 70 if ( z && ((z < 0) ^ sign) ) goto invalid; in softfloat_roundPackToI32() 75 invalid: in softfloat_roundPackToI32()
|
| H A D | f64_to_ui64_r_minMag.c | 64 if ( signF64UI( uiA ) ) goto invalid; in f64_to_ui64_r_minMag() 66 if ( shiftCount < -11 ) goto invalid; in f64_to_ui64_r_minMag() 76 invalid: in f64_to_ui64_r_minMag()
|
| H A D | s_roundPackToI64.c | 67 if ( ! sig ) goto invalid; in softfloat_roundPackToI64() 75 if ( z && ((z < 0) ^ sign) ) goto invalid; in softfloat_roundPackToI64() 80 invalid: in softfloat_roundPackToI64()
|
| /optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
| H A D | dsa_verify_hash.c | 19 @param stat [out] The result of the signature verification, 1==valid, 0==invalid 21 @return CRYPT_OK if successful (even if the signature is invalid) 35 /* default to invalid signature */ in dsa_verify_hash_raw() 85 @param stat [out] The result of the signature verification, 1==valid, 0==invalid 87 @return CRYPT_OK if successful (even if the signature is invalid)
|
| /optee_os/core/kernel/ |
| H A D | tee_misc.c | 74 /* invalid config return false */ in is_valid_conf_and_notnull_size() 87 /* invalid config or "null size" return false */ in core_is_buffer_inside() 100 /* invalid config or "null size" return false */ in core_is_buffer_outside() 113 /* invalid config or "null size" return false */ in core_is_buffer_intersect()
|
| /optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
| H A D | rsa_decrypt_key.c | 23 @param stat [out] Result of the decryption, 1==valid, 0==invalid 25 @return CRYPT_OK if succcessul (even if invalid) 44 /* default to invalid */ in rsa_decrypt_key_ex()
|