Searched refs:bad (Results 1 – 7 of 7) sorted by relevance
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | cipher.c | 899 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in mbedtls_get_pkcs_padding() local 900 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in mbedtls_get_pkcs_padding() 908 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_and(in_padding, different)); in mbedtls_get_pkcs_padding() 912 *data_len = mbedtls_ct_if(bad, 0, input_len - padding_len); in mbedtls_get_pkcs_padding() 914 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in mbedtls_get_pkcs_padding() 942 mbedtls_ct_condition_t bad = MBEDTLS_CT_TRUE; in get_one_and_zeros_padding() local 953 bad = mbedtls_ct_bool_if(hit_first_nonzero, mbedtls_ct_uint_ne(input[i], 0x80), bad); in get_one_and_zeros_padding() 958 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_one_and_zeros_padding() 983 mbedtls_ct_condition_t bad; in get_zeros_and_len_padding() local 993 bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_zeros_and_len_padding() [all …]
|
| H A D | rsa.c | 465 mbedtls_ct_condition_t bad; in mbedtls_ct_rsaes_pkcs1_v15_unpadding() local 475 bad = mbedtls_ct_bool(input[0]); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 480 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(input[1], MBEDTLS_RSA_CRYPT)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 492 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_not(pad_done)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 495 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_gt(8, pad_count)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 505 bad, (unsigned) plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 519 bad, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 530 mbedtls_ct_zeroize_if(mbedtls_ct_bool_or(bad, output_too_large), input + 11, ilen - 11); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 1930 mbedtls_ct_condition_t bad, in_padding; in mbedtls_rsa_rsaes_oaep_decrypt() local 1994 bad = mbedtls_ct_bool(*p++); /* First byte must be 0 */ in mbedtls_rsa_rsaes_oaep_decrypt() [all …]
|
| /optee_os/mk/ |
| H A D | gcc.mk | 33 nostdinc := --bad-nostdinc-variable 34 libgcc := --bad-libgcc-variable
|
| H A D | clang.mk | 50 nostdinc := --bad-nostdinc-variable 51 libgcc := --bad-libgcc-variable
|
| /optee_os/core/kernel/ |
| H A D | dt.c | 155 goto bad; in fdt_read_paddr() 163 goto bad; in fdt_read_paddr() 172 bad: in fdt_read_paddr()
|
| /optee_os/lib/libutils/isoc/ |
| H A D | bget.doc | 288 validated for bad pointers, overwritten data, etc. If compiled with
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 190 bad state after an operation has been aborted. 1570 to catch bad uses of time.h. 2266 bad cryptographic practice. Fix #1906. 2397 * Fix a resource leak in a bad-arguments case of mbedtls_rsa_gen_key() 4293 reflect bad EC curves within verification result. 4615 * Fix failures in MPI on Sparc(64) due to use of bad assembly code. 5014 performance impact was bad for some users (this was introduced in 1.3.10). 5129 * Fix potential bad read in parsing ServerHello (found by Adrien 5596 * Fix potential bad read in parsing ServerHello (found by Adrien 5780 * Removed timing differences due to bad padding from [all …]
|