Home
last modified time | relevance | path

Searched full:invalid (Results 1 – 25 of 305) sorted by relevance

12345678910>>...13

/optee_os/core/lib/libtomcrypt/src/misc/
H A Derror_to_string.c17 "Invalid key size.",
18 "Invalid number of rounds for block cipher.",
22 "Invalid input packet.",
24 "Invalid number of bits for a PRNG.",
27 "Invalid cipher specified.",
28 "Invalid hash specified.",
29 "Invalid PRNG specified.",
33 "Invalid PK key or key type specified for function.",
36 "Invalid argument provided.",
39 "Invalid PK type.",
[all …]
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt.h40 CRYPT_INVALID_KEYSIZE, /* Invalid key size given */
41 CRYPT_INVALID_ROUNDS, /* Invalid number of rounds */
45 CRYPT_INVALID_PACKET, /* Invalid input packet given */
47 CRYPT_INVALID_PRNGSIZE, /* Invalid number of bits for a PRNG */
50 CRYPT_INVALID_CIPHER, /* Invalid cipher specified */
51 CRYPT_INVALID_HASH, /* Invalid hash specified */
52 CRYPT_INVALID_PRNG, /* Invalid PRNG specified */
59 CRYPT_INVALID_ARG, /* Generic invalid argument */
62 CRYPT_PK_INVALID_TYPE, /* Invalid type of PK key */
70 CRYPT_PK_INVALID_SIZE, /* Invalid size input for PK parameters */
[all …]
/optee_os/core/drivers/
H A Dzynqmp_csu_aes.c73 EMSG("Invalid length"); in aes_transfer_enc()
87 EMSG("DMA transfer failed, invalid destination buffer"); in aes_transfer_enc()
97 EMSG("DMA transfer failed, invalid IV buffer"); in aes_transfer_enc()
111 EMSG("DMA transfer failed, invalid source buffer"); in aes_transfer_enc()
151 EMSG("DMA transfer failed, invalid destination buffer"); in aes_transfer_dec()
161 EMSG("DMA transfer failed, invalid IV buffer"); in aes_transfer_dec()
174 EMSG("DMA transfer failed, invalid source buffer"); in aes_transfer_dec()
187 EMSG("DMA transfer failed, invalid tag buffer"); in aes_transfer_dec()
292 EMSG("Invalid source size"); in zynqmp_csu_aes_decrypt_data()
297 EMSG("Invalid IV size"); in zynqmp_csu_aes_decrypt_data()
[all …]
/optee_os/lib/libmbedtls/mbedtls/library/
H A Derror.c195 return( "CIPHER - Input data contains invalid padding and is rejected" ); in mbedtls_high_level_strerr()
201 return( "CIPHER - The context is invalid. For example, because it was freed" ); in mbedtls_high_level_strerr()
241 return( "ECP - Invalid private or public key" ); in mbedtls_high_level_strerr()
292 return( "PK - Invalid key tag or value" ); in mbedtls_high_level_strerr()
300 return( "PK - The pubkey tag or value is invalid (only RSA and EC are supported)" ); in mbedtls_high_level_strerr()
302 return( "PK - The algorithm tag or value is invalid" ); in mbedtls_high_level_strerr()
337 return( "PKCS7 - The format is invalid, e.g. different type expected" ); in mbedtls_high_level_strerr()
341 return( "PKCS7 - The PKCS #7 version element is invalid or cannot be parsed" ); in mbedtls_high_level_strerr()
343 return( "PKCS7 - The PKCS #7 content info is invalid or cannot be parsed" ); in mbedtls_high_level_strerr()
345 return( "PKCS7 - The algorithm tag or value is invalid or cannot be parsed" ); in mbedtls_high_level_strerr()
[all …]
H A Dpsa_crypto_its.h63 …* is invalid, for example is `NULL` or references me…
87 …* is invalid. For example is `NULL` or references memory…
88 …* In addition, this can also happen if an invalid offset…
108 …* is invalid, for example is `NULL` or references memory…
/optee_os/core/pta/bcm/
H A Dwdt.c44 EMSG("Invalid Param types"); in pta_wd_config()
68 EMSG("Invalid Param types"); in pta_wd_start()
86 EMSG("Invalid Param types"); in pta_wd_ping()
104 EMSG("Invalid Param types"); in pta_wd_stop()
123 EMSG("Invalid Param types"); in pta_wd_set_timeout()
H A Delog.c73 EMSG("Invalid Param types"); in pta_elog_load_nitro_fw()
79 EMSG("Invalid access"); in pta_elog_load_nitro_fw()
93 EMSG("Invalid access"); in pta_elog_load_nitro_fw()
150 EMSG("Invalid Param types"); in pta_elog_nitro_crash_dump()
161 EMSG("Invalid access"); in pta_elog_nitro_crash_dump()
197 EMSG("Invalid Param types"); in pta_elog_dump()
/optee_os/core/drivers/crypto/hisilicon/
H A Dsec_authenc.c300 EMSG("Invalid aad len"); in is_hw_supported()
306 EMSG("Invalid tag len"); in is_hw_supported()
312 EMSG("Invalid nonce len"); in is_hw_supported()
317 EMSG("Invalid aad len"); in is_hw_supported()
324 EMSG("Invalid tag len"); in is_hw_supported()
332 EMSG("Invalid src len"); in is_hw_supported()
356 EMSG("Invalid AES key size"); in sec_aead_set_key()
529 EMSG("Invalid input parameters"); in sec_authenc_update_aad()
546 EMSG("Invalid aad length"); in sec_authenc_update_aad()
566 EMSG("Invalid input/output data"); in update_params_check()
[all …]
H A Dsec_cipher.c41 EMSG("Invalid DES key size"); in sec_cipher_des_get_c_key_len()
56 EMSG("Invalid 3DES key size"); in sec_cipher_3des_get_c_key_len()
82 EMSG("Invalid AES key size"); in sec_cipher_aes_get_c_key_len()
95 EMSG("Invalid AES-XTS key size"); in sec_cipher_aes_get_c_key_len()
116 EMSG("Invalid SM4 key size"); in sec_cipher_sm4_get_c_key_len()
123 EMSG("Invalid SM4-XTS key size"); in sec_cipher_sm4_get_c_key_len()
160 EMSG("Invalid cipher type %#"PRIx8, c_ctx->alg); in sec_cipher_set_key()
472 EMSG("Invalid cipher type %#"PRIx32, alg); in crypto_set_alg()
498 EMSG("Invalid cipher mode type %#"PRIx32, mode); in crypto_set_mode()
601 EMSG("Invalid xts src len"); in sec_cipher_cryptlen_check()
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dpkcs7.h50 #define MBEDTLS_ERR_PKCS7_INVALID_FORMAT -0x5300 /**< The format is invalid, e.g…
52 …ID_VERSION -0x5400 /**< The PKCS #7 version element is invalid or cannot be pars…
53 …VALID_CONTENT_INFO -0x5480 /**< The PKCS #7 content info is invalid or cannot be pars…
54 …LID_ALG -0x5500 /**< The algorithm tag or value is invalid or cannot be pars…
55 …D_CERT -0x5580 /**< The certificate tag or value is invalid or cannot be pars…
58 #define MBEDTLS_ERR_PKCS7_BAD_INPUT_DATA -0x5700 /**< Input invalid. */
61 …CERT_DATE_INVALID -0x5880 /**< The PKCS #7 date issued/expired dates are invalid */
H A Dx509.h48 /** The CRT/CRL/CSR format is invalid, e.g. different type expected. */
50 /** The CRT/CRL/CSR version element is invalid. */
52 /** The serial tag or value is invalid. */
54 /** The algorithm tag or value is invalid. */
56 /** The name tag or value is invalid. */
58 /** The date tag or value is invalid. */
60 /** The signature tag or value invalid. */
62 /** The extension tag or value is invalid. */
74 /** Input invalid. */
/optee_os/lib/libutils/isoc/arch/arm/softfloat/source/
H A DextF80M_to_i32_r_minMag.c84 if ( sig>>32 || (shiftCount <= -31) ) goto invalid; in extF80M_to_i32_r_minMag()
86 if ( shiftedSig>>32 ) goto invalid; in extF80M_to_i32_r_minMag()
91 if ( shiftedSig>>32 ) goto invalid; in extF80M_to_i32_r_minMag()
98 if ( 0x80000000 < absZ ) goto invalid; in extF80M_to_i32_r_minMag()
102 if ( 0x80000000 <= absZ ) goto invalid; in extF80M_to_i32_r_minMag()
110 invalid: in extF80M_to_i32_r_minMag()
H A DextF80M_to_ui32_r_minMag.c82 if ( sign || sig>>32 || (shiftCount <= -31) ) goto invalid; in extF80M_to_ui32_r_minMag()
84 if ( shiftedSig>>32 ) goto invalid; in extF80M_to_ui32_r_minMag()
89 if ( shiftedSig>>32 ) goto invalid; in extF80M_to_ui32_r_minMag()
91 if ( sign && z ) goto invalid; in extF80M_to_ui32_r_minMag()
99 invalid: in extF80M_to_ui32_r_minMag()
H A Df128M_to_ui64_r_minMag.c67 if ( shiftCount < 0 ) goto invalid; in f128M_to_ui64_r_minMag()
77 if ( signF128UI96( uiA96 ) && z ) goto invalid; in f128M_to_ui64_r_minMag()
83 if ( signF128UI96( uiA96 ) ) goto invalid; in f128M_to_ui64_r_minMag()
91 invalid: in f128M_to_ui64_r_minMag()
H A DextF80M_to_i64_r_minMag.c83 if ( shiftCount <= -63 ) goto invalid; in extF80M_to_i64_r_minMag()
86 if ( absZ>>shiftCount != sig ) goto invalid; in extF80M_to_i64_r_minMag()
95 if ( UINT64_C( 0x8000000000000000 ) < absZ ) goto invalid; in extF80M_to_i64_r_minMag()
99 if ( UINT64_C( 0x8000000000000000 ) <= absZ ) goto invalid; in extF80M_to_i64_r_minMag()
107 invalid: in extF80M_to_i64_r_minMag()
H A Df128M_to_i64_r_minMag.c70 if ( shiftCount < 0 ) goto invalid; in f128M_to_i64_r_minMag()
81 goto invalid; in f128M_to_i64_r_minMag()
96 if ( uiZ || ! sign ) goto invalid; in f128M_to_i64_r_minMag()
103 invalid: in f128M_to_i64_r_minMag()
H A Ds_roundPackToUI64.c65 if ( ! sig ) goto invalid; in softfloat_roundPackToUI64()
71 if ( sign && sig ) goto invalid; in softfloat_roundPackToUI64()
76 invalid: in softfloat_roundPackToUI64()
H A Ds_roundPackMToUI64.c67 if ( ! sig ) goto invalid; in softfloat_roundPackMToUI64()
70 if ( sign && sig ) goto invalid; in softfloat_roundPackMToUI64()
75 invalid: in softfloat_roundPackMToUI64()
H A Ds_roundPackToUI32.c63 if ( sig & UINT64_C( 0xFFFFFF8000000000 ) ) goto invalid; in softfloat_roundPackToUI32()
66 if ( sign && z ) goto invalid; in softfloat_roundPackToUI32()
71 invalid: in softfloat_roundPackToUI32()
H A Ds_roundPackToI32.c65 if ( sig & UINT64_C( 0xFFFFFF8000000000 ) ) goto invalid; in softfloat_roundPackToI32()
70 if ( z && ((z < 0) ^ sign) ) goto invalid; in softfloat_roundPackToI32()
75 invalid: in softfloat_roundPackToI32()
H A Df64_to_ui64_r_minMag.c64 if ( signF64UI( uiA ) ) goto invalid; in f64_to_ui64_r_minMag()
66 if ( shiftCount < -11 ) goto invalid; in f64_to_ui64_r_minMag()
76 invalid: in f64_to_ui64_r_minMag()
H A Ds_roundPackToI64.c67 if ( ! sig ) goto invalid; in softfloat_roundPackToI64()
75 if ( z && ((z < 0) ^ sign) ) goto invalid; in softfloat_roundPackToI64()
80 invalid: in softfloat_roundPackToI64()
/optee_os/core/lib/libtomcrypt/src/pk/dsa/
H A Ddsa_verify_hash.c19 @param stat [out] The result of the signature verification, 1==valid, 0==invalid
21 @return CRYPT_OK if successful (even if the signature is invalid)
35 /* default to invalid signature */ in dsa_verify_hash_raw()
85 @param stat [out] The result of the signature verification, 1==valid, 0==invalid
87 @return CRYPT_OK if successful (even if the signature is invalid)
/optee_os/core/kernel/
H A Dtee_misc.c74 /* invalid config return false */ in is_valid_conf_and_notnull_size()
87 /* invalid config or "null size" return false */ in core_is_buffer_inside()
100 /* invalid config or "null size" return false */ in core_is_buffer_outside()
113 /* invalid config or "null size" return false */ in core_is_buffer_intersect()
/optee_os/core/lib/libtomcrypt/src/pk/rsa/
H A Drsa_decrypt_key.c23 @param stat [out] Result of the decryption, 1==valid, 0==invalid
25 @return CRYPT_OK if succcessul (even if invalid)
44 /* default to invalid */ in rsa_decrypt_key_ex()

12345678910>>...13