| /optee_os/core/lib/libtomcrypt/src/pk/ec25519/ |
| H A D | ec25519_crypto_ctx.c | 12 int ec25519_crypto_ctx(unsigned char *out, unsigned long *outlen, unsigned char flag, const unsigne… in ec25519_crypto_ctx() argument 25 XMEMCPY(buf, &flag, 1); in ec25519_crypto_ctx()
|
| /optee_os/core/drivers/regulator/ |
| H A D | regulator_dt.c | 27 unsigned int flag; member 33 .flag = REGULATOR_ALWAYS_ON, 37 .flag = REGULATOR_PULL_DOWN, 41 .flag = REGULATOR_BOOT_ON, 45 .flag = REGULATOR_OVER_CURRENT, 293 regulator->flags |= fp->flag; in parse_dt()
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | sm2-kep.c | 133 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument 228 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S() 452 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in crypto_acipher_sm2_kep_derive() local 458 res = sm2_kep_compute_S(S1, sizeof(S1), flag, &U, in crypto_acipher_sm2_kep_derive() 475 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in crypto_acipher_sm2_kep_derive() local 482 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, in crypto_acipher_sm2_kep_derive()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | sm2-kep.c | 103 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument 176 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S() 359 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in sm2_kep_derive() local 365 res = sm2_kep_compute_S(S1, sizeof(S1), flag, U, in sm2_kep_derive() 382 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in sm2_kep_derive() local 389 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, U, in sm2_kep_derive()
|
| /optee_os/lib/libutils/isoc/ |
| H A D | sprintf.c | 23 int __sprintf_chk(char *str, int flag __unused, size_t slen, in __sprintf_chk()
|
| /optee_os/lib/libutils/isoc/include/ |
| H A D | stdio.h | 23 int __sprintf_chk(char *str, int flag, size_t slen, const char *fmt, ...)
|
| /optee_os/core/drivers/ |
| H A D | zynqmp_pm.c | 72 uint32_t flag; member 139 efuse_op->flag = op; in efuse_op()
|
| H A D | versal_trng.c | 402 uint32_t flag, const uint8_t *pstr) in trng_df_algorithm() argument 424 if (flag == DF_SEED) in trng_df_algorithm()
|
| /optee_os/ta/pkcs11/src/ |
| H A D | processing_ec.c | 809 uint32_t flag = 0; in pkcs2tee_proc_params_eddsa() local 816 rc = serialargs_get_u32(&args, &flag); in pkcs2tee_proc_params_eddsa() 838 ctx->flag = flag; in pkcs2tee_proc_params_eddsa()
|
| H A D | processing.h | 75 uint32_t flag; member
|
| H A D | processing_asymm.c | 565 if (eddsa_ctx->flag) { in step_asymm_operation()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_private.h | 413 unsigned char flag,
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 2272 When that flag is on, standard GNU C printf format specifiers 2302 * Implicitly add PSA_KEY_USAGE_SIGN_MESSAGE key usage policy flag when 2303 PSA_KEY_USAGE_SIGN_HASH flag is set and PSA_KEY_USAGE_VERIFY_MESSAGE flag 2304 when PSA_KEY_USAGE_VERIFY_HASH flag is set. This usage flag extension 2313 in bits rather than bytes, with an additional flag to indicate if the 2338 through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK. 2814 * Align MSVC error flag with GCC and Clang. Contributed by Carlos Gomes 3345 that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default 3536 * Add MBEDTLS_MPI_GEN_PRIME_FLAG_LOW_ERR flag to mbedtls_mpi_gen_prime() and 3943 with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct. [all …]
|
| /optee_os/ |
| H A D | CHANGELOG.md | 863 attempts to create an existing persistent object without the overwrite flag 1236 * The linux driver will set the 'privileged' flag (TEE_GEN_CAP_PRIVILEGED) on
|