Home
last modified time | relevance | path

Searched refs:flag (Results 1 – 14 of 14) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/pk/ec25519/
H A Dec25519_crypto_ctx.c12 int ec25519_crypto_ctx(unsigned char *out, unsigned long *outlen, unsigned char flag, const unsigne… in ec25519_crypto_ctx() argument
25 XMEMCPY(buf, &flag, 1); in ec25519_crypto_ctx()
/optee_os/core/drivers/regulator/
H A Dregulator_dt.c27 unsigned int flag; member
33 .flag = REGULATOR_ALWAYS_ON,
37 .flag = REGULATOR_PULL_DOWN,
41 .flag = REGULATOR_BOOT_ON,
45 .flag = REGULATOR_OVER_CURRENT,
293 regulator->flags |= fp->flag; in parse_dt()
/optee_os/lib/libmbedtls/core/
H A Dsm2-kep.c133 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument
228 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S()
452 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in crypto_acipher_sm2_kep_derive() local
458 res = sm2_kep_compute_S(S1, sizeof(S1), flag, &U, in crypto_acipher_sm2_kep_derive()
475 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in crypto_acipher_sm2_kep_derive() local
482 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, in crypto_acipher_sm2_kep_derive()
/optee_os/core/lib/libtomcrypt/
H A Dsm2-kep.c103 static TEE_Result sm2_kep_compute_S(uint8_t *S, size_t S_len, uint8_t flag, in sm2_kep_compute_S() argument
176 res = crypto_hash_update(ctx, &flag, sizeof(flag)); in sm2_kep_compute_S()
359 uint8_t flag = p->is_initiator ? 0x02 : 0x03; in sm2_kep_derive() local
365 res = sm2_kep_compute_S(S1, sizeof(S1), flag, U, in sm2_kep_derive()
382 uint8_t flag = p->is_initiator ? 0x03 : 0x02; in sm2_kep_derive() local
389 res = sm2_kep_compute_S(p->conf_out, TEE_SM3_HASH_SIZE, flag, U, in sm2_kep_derive()
/optee_os/lib/libutils/isoc/
H A Dsprintf.c23 int __sprintf_chk(char *str, int flag __unused, size_t slen, in __sprintf_chk()
/optee_os/lib/libutils/isoc/include/
H A Dstdio.h23 int __sprintf_chk(char *str, int flag, size_t slen, const char *fmt, ...)
/optee_os/core/drivers/
H A Dzynqmp_pm.c72 uint32_t flag; member
139 efuse_op->flag = op; in efuse_op()
H A Dversal_trng.c402 uint32_t flag, const uint8_t *pstr) in trng_df_algorithm() argument
424 if (flag == DF_SEED) in trng_df_algorithm()
/optee_os/ta/pkcs11/src/
H A Dprocessing_ec.c809 uint32_t flag = 0; in pkcs2tee_proc_params_eddsa() local
816 rc = serialargs_get_u32(&args, &flag); in pkcs2tee_proc_params_eddsa()
838 ctx->flag = flag; in pkcs2tee_proc_params_eddsa()
H A Dprocessing.h75 uint32_t flag; member
H A Dprocessing_asymm.c565 if (eddsa_ctx->flag) { in step_asymm_operation()
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_private.h413 unsigned char flag,
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog2272 When that flag is on, standard GNU C printf format specifiers
2302 * Implicitly add PSA_KEY_USAGE_SIGN_MESSAGE key usage policy flag when
2303 PSA_KEY_USAGE_SIGN_HASH flag is set and PSA_KEY_USAGE_VERIFY_MESSAGE flag
2304 when PSA_KEY_USAGE_VERIFY_HASH flag is set. This usage flag extension
2313 in bits rather than bytes, with an additional flag to indicate if the
2338 through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK.
2814 * Align MSVC error flag with GCC and Clang. Contributed by Carlos Gomes
3345 that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
3536 * Add MBEDTLS_MPI_GEN_PRIME_FLAG_LOW_ERR flag to mbedtls_mpi_gen_prime() and
3943 with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct.
[all …]
/optee_os/
H A DCHANGELOG.md863 attempts to create an existing persistent object without the overwrite flag
1236 * The linux driver will set the 'privileged' flag (TEE_GEN_CAP_PRIVILEGED) on