Searched refs:challenge (Results 1 – 4 of 4) sorted by relevance
502 static void attest_get_option_flags(struct q_useful_buf_c *challenge, in attest_get_option_flags() argument512 if ((challenge->len == PSA_INITIAL_ATTEST_CHALLENGE_SIZE_64) && in attest_get_option_flags()513 (challenge->ptr)) { in attest_get_option_flags()514 challenge_end = ((uint8_t *)challenge->ptr) + challenge->len; in attest_get_option_flags()515 challenge_data = ((uint8_t *)challenge->ptr) + option_flags_size; in attest_get_option_flags()529 (void)memcpy(option_flags, challenge->ptr, option_flags_size); in attest_get_option_flags()640 attest_create_token(struct q_useful_buf_c *challenge, in attest_create_token() argument658 attest_get_option_flags(challenge, &option_flags, &key_select); in attest_create_token()688 challenge); in attest_create_token()719 struct q_useful_buf_c challenge; in initial_attest_get_token() local[all …]
29 * The allowed size of input challenge in bytes: 32, 48, 64159 * \param[in] auth_challenge Pointer to buffer where challenge input is164 * \param[in] challenge_size Size of challenge object in bytes.186 * \param[in] challenge_size Size of challenge object in bytes. This must be187 * a supported challenge size (as above).
35 Technical challenge40 dynamic loading functionality. One major challenge to be solved in the Cortex-M
39 - **Auth challenge**: Input object from caller. Can be a single nonce from