Home
last modified time | relevance | path

Searched refs:payload (Results 1 – 25 of 27) sorted by relevance

12

/trusted-firmware-m-latest/platform/ext/target/arm/rse/common/rse_comms/
Drse_comms_protocol_embed.c21 if (msg_len < (sizeof(*msg) - sizeof(msg->payload))) { in rse_protocol_embed_deserialize_msg()
44 || payload_size > sizeof(msg->payload) in rse_protocol_embed_deserialize_msg()
45 || sizeof(*msg) - sizeof(msg->payload) + payload_size > msg_len ) { in rse_protocol_embed_deserialize_msg()
50 memcpy(req->param_copy_buf, msg->payload, payload_size); in rse_protocol_embed_deserialize_msg()
81 if (payload_size + len > sizeof(reply->payload)) { in rse_protocol_embed_serialize_reply()
85 memcpy(reply->payload + payload_size, req->out_vec[i].base, len); in rse_protocol_embed_serialize_reply()
90 *reply_size = sizeof(*reply) - sizeof(reply->payload) + payload_size; in rse_protocol_embed_serialize_reply()
102 *reply_size = sizeof(*reply) - sizeof(reply->payload); in rse_protocol_embed_serialize_error()
Drse_comms_protocol_embed.h24 uint8_t payload[RSE_COMMS_PAYLOAD_MAX_SIZE]; variable
30 uint8_t payload[RSE_COMMS_PAYLOAD_MAX_SIZE]; variable
/trusted-firmware-m-latest/platform/ext/target/arm/corstone1000/rse_comms/
Drse_comms_protocol_embed.c21 if (msg_len < (sizeof(*msg) - sizeof(msg->payload))) { in rse_protocol_embed_deserialize_msg()
44 || payload_size > sizeof(msg->payload) in rse_protocol_embed_deserialize_msg()
45 || sizeof(*msg) - sizeof(msg->payload) + payload_size > msg_len ) { in rse_protocol_embed_deserialize_msg()
50 memcpy(req->param_copy_buf, msg->payload, payload_size); in rse_protocol_embed_deserialize_msg()
81 if (payload_size + len > sizeof(reply->payload)) { in rse_protocol_embed_serialize_reply()
85 memcpy(reply->payload + payload_size, req->out_vec[i].base, len); in rse_protocol_embed_serialize_reply()
90 *reply_size = sizeof(*reply) - sizeof(reply->payload) + payload_size; in rse_protocol_embed_serialize_reply()
102 *reply_size = sizeof(*reply) - sizeof(reply->payload); in rse_protocol_embed_serialize_error()
Drse_comms_protocol_embed.h24 uint8_t payload[RSE_COMMS_PAYLOAD_MAX_SIZE]; variable
30 uint8_t payload[RSE_COMMS_PAYLOAD_MAX_SIZE]; variable
/trusted-firmware-m-latest/lib/ext/t_cose/test/
Dt_cose_sign_verify_test.c29 struct q_useful_buf_c payload; in sign_verify_basic_test_alg() local
60 &payload, /* Payload from signed_cose */ in sign_verify_basic_test_alg()
69 if(q_useful_buf_compare(payload, Q_USEFUL_BUF_FROM_SZ_LITERAL("payload"))) { in sign_verify_basic_test_alg()
124 struct q_useful_buf_c payload; in sign_verify_sig_fail_test() local
179 &payload, /* Payload from signed_cose */ in sign_verify_sig_fail_test()
206 struct q_useful_buf_c payload; in sign_verify_make_cwt_test() local
301 &payload, /* Payload from signed_cose */ in sign_verify_make_cwt_test()
321 if(q_useful_buf_compare(payload, expected_payload)) { in sign_verify_make_cwt_test()
349 struct q_useful_buf_c payload; in size_test() local
353 payload = Q_USEFUL_BUF_FROM_SZ_LITERAL("payload"); in size_test()
[all …]
Dt_cose_test.c30 struct q_useful_buf_c payload; in short_circuit_self_test() local
61 &payload, in short_circuit_self_test()
69 if(q_useful_buf_compare(payload, Q_USEFUL_BUF_FROM_SZ_LITERAL("payload"))) { in short_circuit_self_test()
88 struct q_useful_buf_c payload; in short_circuit_verify_fail_test() local
131 &payload, in short_circuit_verify_fail_test()
232 struct q_useful_buf_c payload; in short_circuit_make_cwt_test() local
328 &payload, in short_circuit_make_cwt_test()
338 if(q_useful_buf_compare(payload, q_useful_buf_tail(fp2, 2))) { in short_circuit_make_cwt_test()
358 struct q_useful_buf_c payload; in short_circuit_decode_only_test() local
413 &payload, in short_circuit_decode_only_test()
[all …]
Dt_cose_make_test_messages.h139 struct q_useful_buf_c payload,
Dt_cose_make_test_messages.c569 struct q_useful_buf_c payload, in t_cose_test_message_sign1_sign() argument
590 QCBOREncode_AddEncoded(&encode_context, payload); in t_cose_test_message_sign1_sign()
/trusted-firmware-m-latest/lib/ext/t_cose/src/
Dt_cose_mac0_verify.c36 struct q_useful_buf_c payload, in short_circuit_verify() argument
61 t_cose_crypto_hash_update(&hash_ctx, payload); in short_circuit_verify()
92 struct q_useful_buf_c *payload, in t_cose_mac0_verify() argument
110 *payload = NULL_Q_USEFUL_BUF_C; in t_cose_mac0_verify()
183 *payload = item.val.string; in t_cose_mac0_verify()
214 *payload); in t_cose_mac0_verify()
225 *payload, in t_cose_mac0_verify()
253 return_value = t_cose_crypto_hmac_update(&hmac_ctx, *payload); in t_cose_mac0_verify()
Dt_cose_util.c58 struct q_useful_buf_c payload) in create_tbm() argument
89 QCBOREncode_AddBytesLenOnly(&cbor_encode_ctx, payload); in create_tbm()
156 struct q_useful_buf_c payload, in create_tbs_hash() argument
202 QCBOREncode_AddBytesLenOnly(&cbor_encode_ctx, payload); in create_tbs_hash()
252 t_cose_crypto_hash_update(&hash_ctx, payload); in create_tbs_hash()
Dt_cose_sign1_verify.c72 struct q_useful_buf_c *payload, in t_cose_sign1_verify() argument
97 *payload = NULL_Q_USEFUL_BUF_C; in t_cose_sign1_verify()
174 *payload = item.val.string; in t_cose_sign1_verify()
207 *payload, in t_cose_sign1_verify()
Dt_cose_util.h155 struct q_useful_buf_c payload);
192 struct q_useful_buf_c payload,
Dt_cose_mac0_sign.c152 struct q_useful_buf_c payload, in short_circuit_tag() argument
195 t_cose_crypto_hash_update(&hash_ctx, payload); in short_circuit_tag()
Dt_cose_sign1_sign.c429 struct q_useful_buf_c payload, in t_cose_sign1_sign() argument
450 QCBOREncode_AddEncoded(&encode_context, payload); in t_cose_sign1_sign()
Dt_cose_crypto.h581 struct q_useful_buf_c payload);
/trusted-firmware-m-latest/docs/platform/arm/rse/
Drse_comms.rst70 uint8_t payload[RSE_COMMS_PAYLOAD_MAX_SIZE];
79 The ``payload`` array then contains the invec data packed contiguously in order.
81 in io_size. The caller does not need to pad the payload to the maximum size. The
82 maximum payload size for this protocol, ``RSE_COMMS_PAYLOAD_MAX_SIZE``, is a
90 uint8_t payload[RSE_COMMS_PAYLOAD_MAX_SIZE];
95 ``payload`` buffer contains the outvec data serialized contiguously in outvec
130 sending the MHU reply message, so no further payload is sent in the reply
/trusted-firmware-m-latest/platform/ext/target/arm/rse/common/libraries/
Dsds.h30 const void *payload; member
Dsds.c285 if (struct_desc->payload == NULL) { in sds_struct_add_internal()
302 struct_desc->payload, struct_desc->size); in sds_struct_add_internal()
/trusted-firmware-m-latest/platform/ext/target/arm/rse/common/dpe/
Ddpe_plat.c38 .payload = &ctx_handle, in dpe_plat_share_context_with_ap()
/trusted-firmware-m-latest/lib/ext/t_cose/inc/
Dt_cose_sign1_verify.h179 struct q_useful_buf_c *payload,
Dt_cose_mac0_verify.h91 struct q_useful_buf_c *payload,
Dt_cose_sign1_sign.h249 struct q_useful_buf_c payload,
/trusted-firmware-m-latest/lib/ext/t_cose/crypto_adapters/
Dt_cose_psa_crypto.c507 struct q_useful_buf_c payload) in t_cose_crypto_hmac_update() argument
516 payload.ptr, payload.len); in t_cose_crypto_hmac_update()
/trusted-firmware-m-latest/lib/ext/t_cose/
DREADME.md197 The payload to sign must be in one contiguous buffer and be passed in. It can be allocated
201 larger than the combined size of the payload and key id for ECDSA 256. It can be
223 * The payload input and output and the signed structure input and output must be in
/trusted-firmware-m-latest/docs/security/security_advisories/
Dcc3xx_partial_tag_compare_on_chacha20_poly1305.rst105 a malicious payload to actively exploit such partial verification.

12