/dports/sysutils/u-boot-utilite/u-boot-2015.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 210 struct rollback_space_kernel rsk; in tis_sendrecv() local 214 rsk.struct_version = 2; in tis_sendrecv() 215 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in tis_sendrecv() 216 rsk.kernel_versions = 0; in tis_sendrecv() 217 rsk.crc8 = crc8((unsigned char *)&rsk, in tis_sendrecv() 220 memcpy(data, &rsk, sizeof(rsk)); in tis_sendrecv()
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfssl/wolfcrypt/ |
H A D | sakke.h | 113 ecc_point* rsk; member 137 SakkeKeyRsk rsk; member 174 ecc_point* rsk); 176 ecc_point* rsk, int* valid); 188 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 191 word32 sz, ecc_point* rsk); 211 const ecc_point* rsk, byte* table, word32* len); 212 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | sakke.h | 113 ecc_point* rsk; member 137 SakkeKeyRsk rsk; member 174 ecc_point* rsk); 176 ecc_point* rsk, int* valid); 188 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 191 word32 sz, ecc_point* rsk); 211 const ecc_point* rsk, byte* table, word32* len); 212 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | sakke.h | 113 ecc_point* rsk; member 137 SakkeKeyRsk rsk; member 174 ecc_point* rsk); 176 ecc_point* rsk, int* valid); 188 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 191 word32 sz, ecc_point* rsk); 211 const ecc_point* rsk, byte* table, word32* len); 212 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | sakke.h | 113 ecc_point* rsk; member 137 SakkeKeyRsk rsk; member 174 ecc_point* rsk); 176 ecc_point* rsk, int* valid); 188 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 191 word32 sz, ecc_point* rsk); 211 const ecc_point* rsk, byte* table, word32* len); 212 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | sakke.h | 113 ecc_point* rsk; member 137 SakkeKeyRsk rsk; member 174 ecc_point* rsk); 176 ecc_point* rsk, int* valid); 188 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 191 word32 sz, ecc_point* rsk); 211 const ecc_point* rsk, byte* table, word32* len); 212 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/doc/dox_comments/header_files/ |
H A D | sakke.h | 29 ecc_point* rsk); 34 ecc_point* rsk, int* valid); 39 const ecc_point* rsk, byte* table, word32* len); 63 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 69 word32 sz, ecc_point* rsk); 135 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/doc/dox_comments/header_files/ |
H A D | sakke.h | 29 ecc_point* rsk); 34 ecc_point* rsk, int* valid); 39 const ecc_point* rsk, byte* table, word32* len); 63 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 69 word32 sz, ecc_point* rsk); 135 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/doc/dox_comments/header_files/ |
H A D | sakke.h | 29 ecc_point* rsk); 34 ecc_point* rsk, int* valid); 39 const ecc_point* rsk, byte* table, word32* len); 63 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 69 word32 sz, ecc_point* rsk); 135 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/doc/dox_comments/header_files/ |
H A D | sakke.h | 29 ecc_point* rsk); 34 ecc_point* rsk, int* valid); 39 const ecc_point* rsk, byte* table, word32* len); 63 WOLFSSL_API int wc_EncodeSakkeRsk(const SakkeKey* key, ecc_point* rsk, 69 word32 sz, ecc_point* rsk); 135 WOLFSSL_API int wc_SetSakkeRsk(SakkeKey* key, const ecc_point* rsk, byte* table,
|
/dports/emulators/qemu42/qemu-4.2.1/roms/u-boot/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/emulators/qemu5/qemu-5.2.0/roms/u-boot/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-olinuxino-lime/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-olinuxino-lime2/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-chip/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-cubox-hummingboard/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-cubieboard2/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-cubieboard/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-firefly-rk3399/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-a13-olinuxino/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-sinovoip-bpi-m3/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-a64-olinuxino/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-sopine/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-rpi/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|
/dports/sysutils/u-boot-qemu-arm64/u-boot-2021.07/drivers/tpm/ |
H A D | tpm_tis_sandbox.c | 272 struct rollback_space_kernel rsk; in sandbox_tpm_xfer() local 276 memset(&rsk, 0, sizeof(struct rollback_space_kernel)); in sandbox_tpm_xfer() 277 rsk.struct_version = 2; in sandbox_tpm_xfer() 278 rsk.uid = ROLLBACK_SPACE_KERNEL_UID; in sandbox_tpm_xfer() 279 rsk.crc8 = crc8(0, (unsigned char *)&rsk, in sandbox_tpm_xfer() 282 memcpy(data, &rsk, sizeof(rsk)); in sandbox_tpm_xfer()
|