| /optee_os/core/tee/ |
| H A D | tee_fs_rpc.c | 109 size_t data_len, void **out_data) in tee_fs_rpc_read_init() argument 119 data_len, &mobj); in tee_fs_rpc_read_init() 127 [1] = THREAD_PARAM_MEMREF(OUT, mobj, 0, data_len), in tee_fs_rpc_read_init() 137 size_t *data_len) in tee_fs_rpc_read_final() argument 142 *data_len = op->params[1].u.memref.size; in tee_fs_rpc_read_final() 148 size_t data_len, void **data) in tee_fs_rpc_write_init() argument 158 data_len, &mobj); in tee_fs_rpc_write_init() 166 [1] = THREAD_PARAM_MEMREF(IN, mobj, 0, data_len), in tee_fs_rpc_write_init()
|
| H A D | tee_svc_cryp.c | 679 TEE_Result (*to_binary)(void *attr, void *data, size_t data_len, 681 bool (*from_binary)(void *attr, const void *data, size_t data_len, 689 size_t data_len, size_t *offs) in op_u32_to_binary_helper() argument 697 if (data && next_offs <= data_len) { in op_u32_to_binary_helper() 707 size_t data_len, size_t *offs) in op_u32_from_binary_helper() argument 711 if (!data || (*offs + sizeof(field)) > data_len) in op_u32_from_binary_helper() 761 size_t data_len, size_t *offs) in op_attr_secret_value_to_binary() argument 767 res = op_u32_to_binary_helper(key->key_size, data, data_len, offs); in op_attr_secret_value_to_binary() 774 if (data && next_offs <= data_len) in op_attr_secret_value_to_binary() 782 size_t data_len, size_t *offs) in op_attr_secret_value_from_binary() argument [all …]
|
| /optee_os/core/lib/qcbor/src/ |
| H A D | UsefulBuf.c | 246 if(pMe->data_len > pMe->UB.len) { /* Check #1 */ in UsefulOutBuf_InsertUsefulBuf() 269 if(uInsertionPos > pMe->data_len) { /* Check #3 */ in UsefulOutBuf_InsertUsefulBuf() 278 size_t uNumBytesToMove = pMe->data_len - uInsertionPos; /* PtrMath #2 */ in UsefulOutBuf_InsertUsefulBuf() 294 pMe->data_len += NewData.len; in UsefulOutBuf_InsertUsefulBuf() 360 if(pMe->data_len > pMe->UB.len) { /* Check #1 */ in UsefulOutBuf_Advance() 380 pMe->data_len += uAmount; in UsefulOutBuf_Advance() 398 return (UsefulBufC){pMe->UB.ptr, pMe->data_len}; in UsefulOutBuf_OutUBuf()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_msg.c | 764 size_t ad_len_field = rec->data_len; in ssl_extract_add_data_from_record() 945 || rec->buf_len - rec->data_offset < rec->data_len in mbedtls_ssl_encrypt_buf() 957 post_avail = rec->buf_len - (rec->data_len + rec->data_offset); in mbedtls_ssl_encrypt_buf() 959 data, rec->data_len); in mbedtls_ssl_encrypt_buf() 961 if (rec->data_len > MBEDTLS_SSL_OUT_CONTENT_LEN) { in mbedtls_ssl_encrypt_buf() 964 rec->data_len, in mbedtls_ssl_encrypt_buf() 984 ssl_compute_padding_length(rec->data_len, in mbedtls_ssl_encrypt_buf() 987 &rec->data_len, in mbedtls_ssl_encrypt_buf() 1008 ssl_compute_padding_length(rec->data_len, in mbedtls_ssl_encrypt_buf() 1018 &rec->data_len, in mbedtls_ssl_encrypt_buf() [all …]
|
| H A D | cipher.c | 871 size_t data_len) in add_pkcs_padding() argument 873 size_t padding_len = output_len - data_len; in add_pkcs_padding() 877 output[data_len + i] = (unsigned char) padding_len; in add_pkcs_padding() 888 size_t *data_len) in mbedtls_get_pkcs_padding() argument 893 if (NULL == input || NULL == data_len) { in mbedtls_get_pkcs_padding() 912 *data_len = mbedtls_ct_if(bad, 0, input_len - padding_len); in mbedtls_get_pkcs_padding() 923 size_t output_len, size_t data_len) in add_one_and_zeros_padding() argument 925 size_t padding_len = output_len - data_len; in add_one_and_zeros_padding() 928 output[data_len] = 0x80; in add_one_and_zeros_padding() 930 output[data_len + i] = 0x00; in add_one_and_zeros_padding() [all …]
|
| H A D | x509_create.c | 141 size_t *data_len) in parse_attribute_value_string() argument 172 *data_len = (size_t) (d - data); in parse_attribute_value_string() 206 size_t *data_len, in parse_attribute_value_hex_der_encoded() argument 247 if (mbedtls_asn1_get_len(&p, der + der_length, data_len) != 0) { in parse_attribute_value_hex_der_encoded() 254 if (*data_len > MBEDTLS_X509_MAX_DN_NAME_SIZE) { in parse_attribute_value_hex_der_encoded() 259 for (size_t i = 0; i < *data_len; i++) { in parse_attribute_value_hex_der_encoded() 267 if (*data_len > data_size) { in parse_attribute_value_hex_der_encoded() 270 memcpy(data, p, *data_len); in parse_attribute_value_hex_der_encoded() 293 size_t data_len = 0; in mbedtls_x509_string_to_names() local 330 data, sizeof(data), &data_len, &tag); in mbedtls_x509_string_to_names() [all …]
|
| H A D | psa_util.c | 561 size_t data_len; in mbedtls_ecdsa_der_to_raw() local 578 ret = mbedtls_asn1_get_tag(&p, der + der_len, &data_len, in mbedtls_ecdsa_der_to_raw() 587 ret = convert_der_to_raw_single_int(p, data_len, raw_tmp, coordinate_size); in mbedtls_ecdsa_der_to_raw() 592 data_len -= ret; in mbedtls_ecdsa_der_to_raw() 595 ret = convert_der_to_raw_single_int(p, data_len, raw_tmp + coordinate_size, in mbedtls_ecdsa_der_to_raw() 601 data_len -= ret; in mbedtls_ecdsa_der_to_raw()
|
| H A D | pkcs12.c | 245 static void pkcs12_fill_buffer(unsigned char *data, size_t data_len, in pkcs12_fill_buffer() argument 252 while (data_len > 0) { in pkcs12_fill_buffer() 253 use_len = (data_len > fill_len) ? fill_len : data_len; in pkcs12_fill_buffer() 256 data_len -= use_len; in pkcs12_fill_buffer()
|
| H A D | cipher_invasive.h | 23 size_t *data_len);
|
| H A D | ctr_drbg.c | 162 const unsigned char *data, size_t data_len) in block_cipher_df() argument 185 if (data_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT) { in block_cipher_df() 200 MBEDTLS_PUT_UINT32_BE(data_len, p, 0); in block_cipher_df() 203 memcpy(p, data, data_len); in block_cipher_df() 204 p[data_len] = 0x80; in block_cipher_df() 206 buf_len = MBEDTLS_CTR_DRBG_BLOCKSIZE + 8 + data_len + 1; in block_cipher_df()
|
| H A D | psa_crypto_storage.c | 232 uint8_t data_len[4]; member 253 MBEDTLS_PUT_UINT32_LE(data_length, storage_format->data_len, 0); in psa_format_key_data_for_storage() 291 *key_data_length = MBEDTLS_GET_UINT32_LE(storage_format->data_len, 0); in psa_parse_key_data_from_storage()
|
| H A D | pem.c | 244 static int pem_check_pkcs_padding(unsigned char *input, size_t input_len, size_t *data_len) in pem_check_pkcs_padding() argument 257 *data_len = input_len - pad_len; in pem_check_pkcs_padding() 259 for (i = *data_len; i < input_len; i++) { in pem_check_pkcs_padding()
|
| H A D | chacha20.c | 248 size_t data_len, in mbedtls_chacha20_crypt() argument 267 ret = mbedtls_chacha20_update(&ctx, data_len, input, output); in mbedtls_chacha20_crypt()
|
| H A D | hmac_drbg.c | 99 const unsigned char *data, size_t data_len) in mbedtls_hmac_drbg_seed_buf() argument 122 if ((ret = mbedtls_hmac_drbg_update(ctx, data, data_len)) != 0) { in mbedtls_hmac_drbg_seed_buf()
|
| H A D | ssl_tls12_server.c | 3715 size_t data_len = (size_t) (*p++); in ssl_parse_client_key_exchange() local 3731 if (data_len < 1 || data_len > buf_len) { in ssl_parse_client_key_exchange() 3734 data_len, buf_len)); in ssl_parse_client_key_exchange() 3739 if (data_len > sizeof(handshake->xxdh_psa_peerkey)) { in ssl_parse_client_key_exchange() 3742 data_len, in ssl_parse_client_key_exchange() 3746 memcpy(handshake->xxdh_psa_peerkey, p, data_len); in ssl_parse_client_key_exchange() 3747 handshake->xxdh_psa_peerkey_len = data_len; in ssl_parse_client_key_exchange()
|
| /optee_os/ta/pkcs11/src/ |
| H A D | processing_aes.c | 121 size_t data_len = 0; in tee_ae_decrypt_update() local 151 data_len = in_size + ctx->pending_size - ctx->tag_byte_len; in tee_ae_decrypt_update() 156 uint32_t len = MIN(data_len, ctx->pending_size); in tee_ae_decrypt_update() 191 data_len -= len; in tee_ae_decrypt_update() 195 if (data_len) { in tee_ae_decrypt_update() 199 in, data_len, NULL, &size); in tee_ae_decrypt_update() 216 in, data_len, ct + ct_size, &size); in tee_ae_decrypt_update() 227 data_len = in_size - data_len; in tee_ae_decrypt_update() 228 if (data_len > (ctx->tag_byte_len - ctx->pending_size)) { in tee_ae_decrypt_update() 234 if (data_len) { in tee_ae_decrypt_update() [all …]
|
| /optee_os/core/include/tee/ |
| H A D | tee_fs_rpc.h | 36 size_t data_len, void **out_data); 38 size_t *data_len); 42 size_t data_len, void **data);
|
| H A D | tee_svc_cryp.h | 82 size_t num_params, const void *data, size_t data_len, 91 size_t *data_len); 93 size_t data_len);
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | stm32_saes.h | 53 size_t data_len); 55 uint8_t *data, size_t data_len); 58 uint8_t *data_out, size_t data_len);
|
| /optee_os/core/pta/tests/ |
| H A D | fs_htree.c | 25 size_t data_len; member 125 if (offs + sz <= a->data_len) in test_read_final() 127 else if (offs <= a->data_len) in test_read_final() 128 *bytes = a->data_len - offs; in test_read_final() 156 if (end > a->data_len) in test_write_final() 157 a->data_len = end; in test_write_final() 266 aux->data_len = 0; in htree_test_rewrite() 490 memcpy(aux2.data, aux->data, aux->data_len); in test_corrupt_type() 574 aux->data_len = 0; in test_corrupt()
|
| /optee_os/core/pta/ |
| H A D | system.c | 66 size_t data_len = sizeof(TEE_UUID); in system_derive_ta_unique_key() local 101 if (ADD_OVERFLOW(data_len, params[0].memref.size, &data_len)) in system_derive_ta_unique_key() 104 data = bb_alloc(data_len); in system_derive_ta_unique_key() 122 res = huk_subkey_derive(HUK_SUBKEY_UNIQUE_TA, data, data_len, in system_derive_ta_unique_key() 132 bb_free_wipe(data, data_len); in system_derive_ta_unique_key()
|
| /optee_os/core/lib/qcbor/inc/qcbor/ |
| H A D | UsefulBuf.h | 845 size_t data_len; /* length of the valid data, the insertion point */ member 1931 pMe->data_len = 0; in UsefulOutBuf_Reset() 1938 return pMe->data_len; in UsefulOutBuf_GetEndPosition() 1944 return 0 == pMe->data_len; in UsefulOutBuf_AtStart() 2201 return pMe->UB.len - pMe->data_len; in UsefulOutBuf_RoomLeft() 2223 R.ptr = (uint8_t *)pUOutBuf->UB.ptr + pUOutBuf->data_len; in UsefulOutBuf_GetOutPlace()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | hmac_drbg.h | 223 const unsigned char *data, size_t data_len);
|
| H A D | cipher.h | 332 void(*MBEDTLS_PRIVATE(add_padding))(unsigned char *output, size_t olen, size_t data_len); 333 int(*MBEDTLS_PRIVATE(get_padding))(unsigned char *input, size_t ilen, size_t *data_len);
|
| /optee_os/lib/libutee/include/ |
| H A D | utee_syscalls.h | 161 size_t data_len, const void *sig, size_t sig_len);
|