| /optee_os/core/drivers/ |
| H A D | versal_puf.c | 97 TEE_Result versal_puf_register(struct versal_puf_data *buf, in versal_puf_register() argument 104 .buf = &req, in versal_puf_register() 115 versal_mbox_alloc(sizeof(buf->puf_id), buf->puf_id, &puf_id_addr); in versal_puf_register() 116 versal_mbox_alloc(sizeof(buf->chash), &buf->chash, &hash_addr); in versal_puf_register() 117 versal_mbox_alloc(sizeof(buf->aux), &buf->aux, &aux_addr); in versal_puf_register() 118 versal_mbox_alloc(sizeof(buf->efuse_syn_data), buf->efuse_syn_data, in versal_puf_register() 120 versal_mbox_alloc(sizeof(buf->syndrome_data), buf->syndrome_data, in versal_puf_register() 130 req.efuse_syn_data_addr = virt_to_phys(efuse_syn_data_addr.buf); in versal_puf_register() 131 req.syndrome_data_addr = virt_to_phys(syndrome_data_addr.buf); in versal_puf_register() 132 req.puf_id_addr = virt_to_phys(puf_id_addr.buf); in versal_puf_register() [all …]
|
| H A D | versal_nvm.c | 92 void *buf; member 128 if (!ibufs[0].buf) in prepare_cmd() 131 reg_pair_from_64(virt_to_phys(ibufs[0].buf), &b, &a); in prepare_cmd() 138 cmd->ibuf[i].mem.buf = ibufs[i].buf; in prepare_cmd() 165 req->ibuf[0].buf = alloc_cache_aligned(req->ibuf[0].len); in versal_alloc_read_buffer() 166 if (!req->ibuf[0].buf) in versal_alloc_read_buffer() 175 free(req->ibuf[0].buf); in versal_free_read_buffer() 181 return req->ibuf[0].buf; in versal_get_read_buffer() 254 TEE_Result versal_efuse_read_user_data(uint32_t *buf, size_t len, in versal_efuse_read_user_data() argument 273 req.ibuf[0].buf = &cfg; in versal_efuse_read_user_data() [all …]
|
| /optee_os/lib/libutils/ext/ |
| H A D | trace.c | 58 static int print_thread_id(char *buf, size_t bs) in print_thread_id() argument 70 return snprintk(buf, bs, "%0*d ", num_thread_digits, thread_id); in print_thread_id() 72 return snprintk(buf, bs, "%*s ", num_thread_digits, ""); in print_thread_id() 76 static int print_core_id(char *buf, size_t bs) in print_core_id() argument 91 return snprintk(buf, bs, "%0*u ", num_digits, core_id); in print_core_id() 93 return snprintk(buf, bs, "%s ", qm); in print_core_id() 96 static int print_guest_id(char *buf, size_t bs) in print_guest_id() argument 99 return snprintk(buf, bs, "%d ", trace_ext_get_guest_id()); in print_guest_id() 106 static int print_core_id(char *buf __unused, size_t bs __unused) in print_core_id() 111 static int print_guest_id(char *buf __unused, size_t bs __unused) in print_guest_id() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | x509write_crt.c | 171 unsigned char buf[9]; in mbedtls_x509write_crt_set_basic_constraints() local 172 unsigned char *c = buf + sizeof(buf); in mbedtls_x509write_crt_set_basic_constraints() 175 memset(buf, 0, sizeof(buf)); in mbedtls_x509write_crt_set_basic_constraints() 183 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_int(&c, buf, in mbedtls_x509write_crt_set_basic_constraints() 186 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_bool(&c, buf, 1)); in mbedtls_x509write_crt_set_basic_constraints() 189 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(&c, buf, len)); in mbedtls_x509write_crt_set_basic_constraints() 190 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(&c, buf, in mbedtls_x509write_crt_set_basic_constraints() 197 is_ca, buf + sizeof(buf) - len, len); in mbedtls_x509write_crt_set_basic_constraints() 206 unsigned char buf[MBEDTLS_MPI_MAX_SIZE * 2 + 20]; /* tag, length + 2xMPI */ in mbedtls_x509write_crt_set_key_identifier() local 207 unsigned char *c = buf + sizeof(buf); in mbedtls_x509write_crt_set_key_identifier() [all …]
|
| H A D | x509write_csr.c | 90 unsigned char buf[4] = { 0 }; in mbedtls_x509write_csr_set_key_usage() local 94 c = buf + 4; in mbedtls_x509write_csr_set_key_usage() 96 ret = mbedtls_asn1_write_named_bitstring(&c, buf, &key_usage, 8); in mbedtls_x509write_csr_set_key_usage() 114 unsigned char buf[4] = { 0 }; in mbedtls_x509write_csr_set_ns_cert_type() local 118 c = buf + 4; in mbedtls_x509write_csr_set_ns_cert_type() 120 ret = mbedtls_asn1_write_named_bitstring(&c, buf, &ns_cert_type, 8); in mbedtls_x509write_csr_set_ns_cert_type() 136 unsigned char *buf, in x509write_csr_der_internal() argument 156 c = buf + size; in x509write_csr_der_internal() 158 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_x509_write_extensions(&c, buf, in x509write_csr_der_internal() 162 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(&c, buf, len)); in x509write_csr_der_internal() [all …]
|
| H A D | pkwrite.c | 62 static int pk_write_rsa_der(unsigned char **p, unsigned char *buf, in pk_write_rsa_der() argument 74 if (tmp_len > (size_t) (*p - buf)) { in pk_write_rsa_der() 85 return mbedtls_rsa_write_key(mbedtls_pk_rsa(*pk), buf, p); in pk_write_rsa_der() 98 uint8_t buf[PK_MAX_EC_PUBLIC_KEY_SIZE]; in pk_write_ec_pubkey() local 101 if (psa_export_public_key(pk->priv_id, buf, sizeof(buf), &len) != PSA_SUCCESS) { in pk_write_ec_pubkey() 106 memcpy(buf, pk->pub_raw, len); in pk_write_ec_pubkey() 114 memcpy(*p, buf, len); in pk_write_ec_pubkey() 123 unsigned char buf[PK_MAX_EC_PUBLIC_KEY_SIZE]; in pk_write_ec_pubkey() local 129 if (psa_export_public_key(pk->priv_id, buf, sizeof(buf), &len) != PSA_SUCCESS) { in pk_write_ec_pubkey() 137 memcpy(*p, buf, len); in pk_write_ec_pubkey() [all …]
|
| H A D | entropy.c | 203 unsigned char buf[MBEDTLS_ENTROPY_MAX_GATHER]; in entropy_gather_internal() local 220 buf, MBEDTLS_ENTROPY_MAX_GATHER, &olen)) != 0) { in entropy_gather_internal() 229 buf, olen)) != 0) { in entropy_gather_internal() 241 mbedtls_platform_zeroize(buf, sizeof(buf)); in entropy_gather_internal() 275 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE]; in mbedtls_entropy_func() local 324 memset(buf, 0, MBEDTLS_ENTROPY_BLOCK_SIZE); in mbedtls_entropy_func() 331 if ((ret = mbedtls_md_finish(&ctx->accumulator, buf)) != 0) { in mbedtls_entropy_func() 349 if ((ret = mbedtls_md_update(&ctx->accumulator, buf, in mbedtls_entropy_func() 358 buf, MBEDTLS_ENTROPY_BLOCK_SIZE, buf)) != 0) { in mbedtls_entropy_func() 366 memcpy(output, buf, len); in mbedtls_entropy_func() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/hashes/ |
| H A D | sha3_test.c | 15 unsigned char buf[200], hash[224 / 8]; in sha3_224_test() 34 XMEMSET(buf, c1, sizeof(buf)); in sha3_224_test() 45 sha3_process(&c, buf, sizeof(buf) / 2); in sha3_224_test() 46 sha3_process(&c, buf + sizeof(buf) / 2, sizeof(buf) / 2); in sha3_224_test() 72 unsigned char buf[200], hash[256 / 8]; in sha3_256_test() 90 XMEMSET(buf, c1, sizeof(buf)); in sha3_256_test() 101 sha3_process(&c, buf, sizeof(buf)); in sha3_256_test() 109 sha3_process(&c, buf, sizeof(buf) / 2); in sha3_256_test() 110 sha3_process(&c, buf + sizeof(buf) / 2, sizeof(buf) / 2); in sha3_256_test() 166 unsigned char buf[200], hash[384 / 8]; in sha3_384_test() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/misc/pkcs5/ |
| H A D | pkcs_5_2.c | 31 unsigned char *buf[2]; in pkcs_5_alg2() local 48 buf[0] = XMALLOC(MAXBLOCKSIZE * 2); in pkcs_5_alg2() 50 if (hmac == NULL || buf[0] == NULL) { in pkcs_5_alg2() 54 if (buf[0] != NULL) { in pkcs_5_alg2() 55 XFREE(buf[0]); in pkcs_5_alg2() 60 buf[1] = buf[0] + MAXBLOCKSIZE; in pkcs_5_alg2() 67 zeromem(buf[0], MAXBLOCKSIZE*2); in pkcs_5_alg2() 70 STORE32H(blkno, buf[1]); in pkcs_5_alg2() 80 if ((err = hmac_process(hmac, buf[1], 4)) != CRYPT_OK) { in pkcs_5_alg2() 84 if ((err = hmac_done(hmac, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/generalizedtime/ |
| H A D | der_decode_generalizedtime.c | 31 y = s_char_to_int(buf[x])*10 + s_char_to_int(buf[x+1]); \ 37 …y = s_char_to_int(buf[x])*1000 + s_char_to_int(buf[x+1])*100 + s_char_to_int(buf[x+2])*10 + s_cha… 52 unsigned char buf[32]; in der_decode_generalizedtime() local 61 if (*inlen < 2UL || (in[1] >= sizeof(buf)) || ((in[1] + 2UL) > *inlen)) { in der_decode_generalizedtime() 76 buf[x] = y; in der_decode_generalizedtime() 107 if (buf[x] == 'Z') { in der_decode_generalizedtime() 110 if (buf[x] == '.') { in der_decode_generalizedtime() 112 while (buf[x] >= '0' && buf[x] <= '9') { in der_decode_generalizedtime() 114 if (x >= sizeof(buf)) return CRYPT_INVALID_PACKET; in der_decode_generalizedtime() 116 out->fs += s_char_to_int(buf[x]); in der_decode_generalizedtime() [all …]
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_panic.c | 38 static TEE_Result check_access(uint32_t flags, void *buf, size_t len) in check_access() argument 43 if (!buf) in check_access() 47 return TEE_CheckMemoryAccessRights(flags, buf, len); in check_access() 52 void __utee_check_outbuf_annotation(void *buf, size_t *len) in __utee_check_outbuf_annotation() argument 57 check_access(ACCESS_W_ANY, buf, *len)); in __utee_check_outbuf_annotation() 60 void __utee_check_gp11_outbuf_annotation(void *buf, uint32_t *len) in __utee_check_gp11_outbuf_annotation() argument 65 check_access(ACCESS_W_ANY, buf, *len)); in __utee_check_gp11_outbuf_annotation() 68 void __utee_check_instring_annotation(const char *buf) in __utee_check_instring_annotation() argument 71 check_access(ACCESS_R, (char *)buf, strlen(buf) + 1)); in __utee_check_instring_annotation() 74 void __utee_check_outstring_annotation(char *buf, size_t *len) in __utee_check_outstring_annotation() argument [all …]
|
| /optee_os/core/lib/zlib/ |
| H A D | adler32.c | 17 #define DO1(buf,i) {adler += (buf)[i]; sum2 += adler;} argument 18 #define DO2(buf,i) DO1(buf,i); DO1(buf,i+1); argument 19 #define DO4(buf,i) DO2(buf,i); DO2(buf,i+2); argument 20 #define DO8(buf,i) DO4(buf,i); DO4(buf,i+4); argument 21 #define DO16(buf) DO8(buf,0); DO8(buf,8); argument 64 uLong ZEXPORT adler32_z(adler, buf, len) in adler32_z() argument 66 const Bytef *buf; 78 adler += buf[0]; 88 if (buf == Z_NULL) 94 adler += *buf++; [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ltc_ecc_export_point.c | 11 unsigned char buf[ECC_BUF_SIZE]; in ltc_ecc_export_point() local 14 if (size > sizeof(buf)) return CRYPT_BUFFER_OVERFLOW; in ltc_ecc_export_point() 26 zeromem(buf, sizeof(buf)); in ltc_ecc_export_point() 27 if ((err = mp_to_unsigned_bin(x, buf + (size - xsize))) != CRYPT_OK) return err; in ltc_ecc_export_point() 28 XMEMCPY(out+1, buf, size); in ltc_ecc_export_point() 40 zeromem(buf, sizeof(buf)); in ltc_ecc_export_point() 41 if ((err = mp_to_unsigned_bin(x, buf + (size - xsize))) != CRYPT_OK) return err; in ltc_ecc_export_point() 42 XMEMCPY(out+1, buf, size); in ltc_ecc_export_point() 44 zeromem(buf, sizeof(buf)); in ltc_ecc_export_point() 45 if ((err = mp_to_unsigned_bin(y, buf + (size - ysize))) != CRYPT_OK) return err; in ltc_ecc_export_point() [all …]
|
| /optee_os/core/drivers/crypto/caam/utils/ |
| H A D | utils_mem.c | 94 static enum caam_status mem_alloc_buf(struct caambuf *buf, size_t size, in mem_alloc_buf() argument 97 buf->data = mem_alloc(size, type); in mem_alloc_buf() 99 if (!buf->data) in mem_alloc_buf() 102 buf->paddr = virt_to_phys(buf->data); in mem_alloc_buf() 103 if (!buf->paddr) { in mem_alloc_buf() 104 caam_free_buf(buf); in mem_alloc_buf() 108 buf->length = size; in mem_alloc_buf() 109 buf->nocache = 0; in mem_alloc_buf() 145 enum caam_status caam_alloc_buf(struct caambuf *buf, size_t size) in caam_alloc_buf() argument 147 return mem_alloc_buf(buf, size, MEM_TYPE_NORMAL); in caam_alloc_buf() [all …]
|
| H A D | utils_sgt.c | 41 op_size = MIN(rem_length, insgt->buf[idx].length); in caam_sgt_cache_op() 42 if (!insgt->buf[idx].nocache) in caam_sgt_cache_op() 43 cache_operation(op, (void *)insgt->buf[idx].data, in caam_sgt_cache_op() 56 CAAM_SGT_ENTRY(&sgt->sgt[idx], sgt->buf[idx].paddr, in caam_sgt_fill_table() 57 sgt->buf[idx].length); in caam_sgt_fill_table() 61 CAAM_SGT_ENTRY_FINAL(&sgt->sgt[idx], sgt->buf[idx].paddr, in caam_sgt_fill_table() 62 sgt->buf[idx].length); in caam_sgt_fill_table() 84 for (; idx < from->number && off >= from->buf[idx].length; idx++) in caam_sgt_derive() 85 off -= from->buf[idx].length; in caam_sgt_derive() 89 rlength -= MIN(rlength, from->buf[idx].length - off); in caam_sgt_derive() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/math/ |
| H A D | rand_prime.c | 17 unsigned char *buf; in rand_prime() local 40 buf = XCALLOC(1, len); in rand_prime() 41 if (buf == NULL) { in rand_prime() 47 if (prng_descriptor[wprng]->read(buf, len, prng) != (unsigned long)len) { in rand_prime() 48 XFREE(buf); in rand_prime() 53 buf[0] |= 0x80 | 0x40; in rand_prime() 54 buf[len-1] |= 0x01 | ((type & USE_BBS) ? 0x02 : 0x00); in rand_prime() 57 if ((err = mp_read_unsigned_bin(N, buf, len)) != CRYPT_OK) { in rand_prime() 58 XFREE(buf); in rand_prime() 64 XFREE(buf); in rand_prime() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/misc/bcrypt/ |
| H A D | bcrypt.c | 83 unsigned char *buf[3], blkbuf[4]; in bcrypt_pbkdf_openbsd() local 105 buf[0] = XMALLOC(MAXBLOCKSIZE * 3); in bcrypt_pbkdf_openbsd() 107 if (buf[0] == NULL || hashed_pass == NULL) { in bcrypt_pbkdf_openbsd() 111 if (buf[0] != NULL) { in bcrypt_pbkdf_openbsd() 112 XFREE(buf[0]); in bcrypt_pbkdf_openbsd() 117 buf[1] = buf[0] + MAXBLOCKSIZE; in bcrypt_pbkdf_openbsd() 118 buf[2] = buf[1] + MAXBLOCKSIZE; in bcrypt_pbkdf_openbsd() 136 zeromem(buf[0], MAXBLOCKSIZE*2); in bcrypt_pbkdf_openbsd() 139 if ((err = hash_memory_multi(hash_idx, buf[0], &x, in bcrypt_pbkdf_openbsd() 146 …if ((err = s_bcrypt_pbkdf_hash(hashed_pass, hashed_pass_len, buf[0], x, buf[1], &y)) != CRYPT_OK) { in bcrypt_pbkdf_openbsd() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/ec25519/ |
| H A D | ec25519_crypto_ctx.c | 14 unsigned char *buf = out; in ec25519_crypto_ctx() local 23 XMEMCPY(buf, prefix, prefix_len); in ec25519_crypto_ctx() 24 buf += prefix_len; in ec25519_crypto_ctx() 25 XMEMCPY(buf, &flag, 1); in ec25519_crypto_ctx() 26 buf++; in ec25519_crypto_ctx() 27 XMEMCPY(buf, &ctxlen8, 1); in ec25519_crypto_ctx() 28 buf++; in ec25519_crypto_ctx() 32 XMEMCPY(buf, ctx, ctxlen); in ec25519_crypto_ctx() 33 buf += ctxlen; in ec25519_crypto_ctx() 36 *outlen = buf-out; in ec25519_crypto_ctx()
|
| /optee_os/core/arch/arm/plat-telechips/scripts/ |
| H A D | tcmktool.py | 18 buf = inputfile.read(ALIGN_SIZE) 19 if len(buf) == 0: 21 sha.update(buf.ljust(ALIGN_SIZE, b'\0')) 39 buf = bytearray(offset - outputfile.tell()) 40 buf[0:4] = b'HDR\0' # Marker 41 buf[4:8] = length.to_bytes(4, byteorder='little') 42 buf[8:12] = offset.to_bytes(4, byteorder='little') 43 buf[16:20] = socname.ljust(4, b'\0')[-4:] 44 buf[20:32] = imagename.ljust(12, b'\0')[0:12] 45 buf[32:48] = imageversion.ljust(16, b'\0')[0:16] [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/utctime/ |
| H A D | der_decode_utctime.c | 30 y = s_char_to_int(buf[x])*10 + s_char_to_int(buf[x+1]); \ 44 unsigned char buf[32] = { 0 }; /* initialize as all zeroes */ in der_decode_utctime() local 53 if (*inlen < 2UL || (in[1] >= sizeof(buf)) || ((in[1] + 2UL) > *inlen)) { in der_decode_utctime() 63 buf[x] = y; in der_decode_utctime() 90 if (buf[x] == 'Z') { in der_decode_utctime() 93 if (buf[x] == '+' || buf[x] == '-') { in der_decode_utctime() 94 out->off_dir = (buf[x++] == '+') ? 0 : 1; in der_decode_utctime() 104 if (buf[x] == 'Z') { in der_decode_utctime() 107 if (buf[x] == '+' || buf[x] == '-') { in der_decode_utctime() 108 out->off_dir = (buf[x++] == '+') ? 0 : 1; in der_decode_utctime()
|
| /optee_os/core/lib/libtomcrypt/src/encauth/eax/ |
| H A D | eax_init.c | 29 unsigned char *buf; in eax_init() local 48 buf = XMALLOC(MAXBLOCKSIZE); in eax_init() 51 if (buf == NULL || omac == NULL) { in eax_init() 52 if (buf != NULL) { in eax_init() 53 XFREE(buf); in eax_init() 62 zeromem(buf, MAXBLOCKSIZE); in eax_init() 68 if ((err = omac_process(omac, buf, blklen)) != CRYPT_OK) { in eax_init() 82 zeromem(buf, MAXBLOCKSIZE); in eax_init() 83 buf[blklen - 1] = 1; in eax_init() 90 if ((err = omac_process(&eax->headeromac, buf, blklen)) != CRYPT_OK) { in eax_init() [all …]
|
| /optee_os/core/pta/stm32mp/ |
| H A D | bsec_pta.c | 35 uint32_t *buf = (uint32_t *)params[1].memref.buffer; in bsec_read_mem() local 45 if (pt != exp_pt || !buf || !size || in bsec_read_mem() 58 otp_id++, buf++) { in bsec_read_mem() 64 *buf = 0x0; in bsec_read_mem() 68 res = stm32_bsec_read_otp(buf, otp_id); in bsec_read_mem() 70 *buf); in bsec_read_mem() 77 res = stm32_bsec_shadow_read_otp(buf, otp_id); in bsec_read_mem() 78 FMSG("Read fuse %"PRIu32" val: %#"PRIx32, otp_id, *buf); in bsec_read_mem() 83 *buf = PTA_BSEC_LOCK_ERROR; in bsec_read_mem() 86 *buf = 0; in bsec_read_mem() [all …]
|
| /optee_os/core/lib/libfdt/ |
| H A D | fdt_empty_tree.c | 13 int fdt_create_empty_tree(void *buf, int bufsize) in fdt_create_empty_tree() argument 17 err = fdt_create(buf, bufsize); in fdt_create_empty_tree() 21 err = fdt_finish_reservemap(buf); in fdt_create_empty_tree() 25 err = fdt_begin_node(buf, ""); in fdt_create_empty_tree() 29 err = fdt_end_node(buf); in fdt_create_empty_tree() 33 err = fdt_finish(buf); in fdt_create_empty_tree() 37 return fdt_open_into(buf, buf, bufsize); in fdt_create_empty_tree()
|
| /optee_os/core/lib/libtomcrypt/src/pk/pkcs1/ |
| H A D | pkcs_1_mgf1.c | 29 unsigned char *buf; in pkcs_1_mgf1() local 44 buf = XMALLOC(hLen); in pkcs_1_mgf1() 45 if (md == NULL || buf == NULL) { in pkcs_1_mgf1() 49 if (buf != NULL) { in pkcs_1_mgf1() 50 XFREE(buf); in pkcs_1_mgf1() 60 STORE32H(counter, buf); in pkcs_1_mgf1() 70 if ((err = hash_descriptor[hash_idx]->process(md, buf, 4)) != CRYPT_OK) { in pkcs_1_mgf1() 73 if ((err = hash_descriptor[hash_idx]->done(md, buf)) != CRYPT_OK) { in pkcs_1_mgf1() 79 *mask++ = buf[x]; in pkcs_1_mgf1() 86 zeromem(buf, hLen); in pkcs_1_mgf1() [all …]
|
| /optee_os/core/drivers/crypto/caam/blob/ |
| H A D | caam_blob.c | 27 struct caambuf buf = { }; in caam_blob_mkvb_init() local 32 res = caam_calloc_align_buf(&buf, MKVB_SIZE); in caam_blob_mkvb_init() 45 caam_desc_add_ptr(desc, buf.paddr); in caam_blob_mkvb_init() 49 cache_operation(TEE_CACHEFLUSH, buf.data, buf.length); in caam_blob_mkvb_init() 58 cache_operation(TEE_CACHEINVALIDATE, buf.data, MKVB_SIZE); in caam_blob_mkvb_init() 59 BLOB_DUMPBUF("MKVB", buf.data, buf.length); in caam_blob_mkvb_init() 60 memcpy(&stored_key, buf.data, buf.length); in caam_blob_mkvb_init() 66 caam_free_buf(&buf); in caam_blob_mkvb_init()
|