/optee_client/libckteec/src/ |
A D | invoke_ta.c | 60 shm->size = size; in ckteec_alloc_shm() 75 TEEC_SharedMemory *ckteec_register_shm(void *buffer, size_t size, in ckteec_register_shm() argument 94 shm->size = size; in ckteec_register_shm() 149 op.params[0].tmpref.size = sizeof(ta_rc); in ckteec_invoke_ta() 172 if (op.params[0].memref.size == sizeof(ta_rc)) in ckteec_invoke_ta() 175 if (op.params[0].tmpref.size != sizeof(ta_rc)) in ckteec_invoke_ta() 190 *out2_size = op.params[2].memref.size; in ckteec_invoke_ta() 192 *out3_size = op.params[3].memref.size; in ckteec_invoke_ta() 208 op.params[0].tmpref.size = sizeof(status); in ping_ta() 210 op.params[2].tmpref.size = sizeof(ta_version); in ping_ta() [all …]
|
A D | serializer.c | 28 head.attrs_size = obj->size - sizeof(head); in finalize_serial_object() 61 CK_RV serialize_buffer(struct serializer *obj, void *data, size_t size) in serialize_buffer() argument 63 return serialize(&obj->buffer, &obj->size, data, size); in serialize_buffer()
|
A D | pkcs11_processing.c | 51 memcpy(buf, obj.buffer, obj.size); in ck_create_object() 903 ctrl_size = sizeof(session_handle) + smecha.size + sattr.size; in ck_generate_key() 917 buf += smecha.size; in ck_generate_key() 1352 sattr.size; in ck_derive_key() 1369 buf += smecha.size; in ck_derive_key() 1475 ctrl_size = sizeof(session_handle) + smecha.size + pub_sattr.size + in ck_generate_key_pair() 1476 priv_sattr.size; in ck_generate_key_pair() 1490 buf += smecha.size; in ck_generate_key_pair() 1493 buf += pub_sattr.size; in ck_generate_key_pair() 1649 smecha.size + sattr.size; in ck_unwrap_key() [all …]
|
A D | serialize_ck.c | 100 rv = serialize_32b(obj, obj2.size); in serialize_indirect_attribute() 289 if (out->ulValueLen < in->size) { in deserialize_ck_attribute() 290 out->ulValueLen = in->size; in deserialize_ck_attribute() 322 in->size / sizeof(uint32_t)); in deserialize_ck_attribute() 329 out->ulValueLen = in->size; in deserialize_ck_attribute() 392 uint32_t size = 0; in serialize_mecha_aes_ctr() local 399 rv = serialize_32b(obj, size); in serialize_mecha_aes_ctr() 436 uint32_t size = 0; in serialize_mecha_key_deriv_str() local 443 rv = serialize_32b(obj, size); in serialize_mecha_key_deriv_str() 459 uint32_t size = 0; in serialize_mecha_aes_cbc_encrypt_data() local [all …]
|
A D | serializer.h | 19 size_t size; /* serial buffer current byte size */ member 30 CK_RV serialize_buffer(struct serializer *obj, void *data, size_t size);
|
A D | invoke_ta.h | 26 TEEC_SharedMemory *ckteec_alloc_shm(size_t size, enum ckteec_shm_dir dir); 37 TEEC_SharedMemory *ckteec_register_shm(void *buffer, size_t size,
|
A D | pkcs11_token.c | 69 size_t size = 0; in ck_slot_get_list() local 85 size = client_count * sizeof(*slot_ids); in ck_slot_get_list() 87 shm = ckteec_alloc_shm(size, CKTEEC_SHM_OUT); in ck_slot_get_list() 92 NULL, shm, &size, NULL, NULL); in ck_slot_get_list() 95 *count = size / sizeof(*slot_ids); in ck_slot_get_list() 141 if (rv != CKR_OK || out_size != out->size) { in ck_slot_get_info() 211 if (out_size != out_shm->size) { in ck_token_get_info() 367 if (rv != CKR_OK || out_size != out->size) { in ck_token_mechanism_info() 433 if (rv != CKR_OK || out_size != out->size) { in ck_open_session() 534 if (rv != CKR_OK || out_size != out->size) { in ck_get_session_info()
|
/optee_client/tee-supplicant/src/ |
A D | tee_supplicant.c | 78 size_t size; member 256 if ((sz + offs) > tshm->size) in get_param() 260 shm->size = sz; in get_param() 278 size_t size = 0; in load_ta() local 292 size = shm_ta.size; in load_ta() 305 if (shm_ta.buffer && size > shm_ta.size) in load_ta() 322 data.size = size; in alloc_shm() 361 data.length = size; in register_local_shm() 394 shm->size = val->b; in process_alloc() 502 return rpmb_process_request(req.buffer, req.size, rsp.buffer, rsp.size); in process_rpmb() [all …]
|
A D | rpmb.c | 251 size_t size; member 263 .size = EMU_RPMB_SIZE_BYTES 376 size_t size = nfrm * 256; in ioctl_emu_mem_transfer() local 380 if (start > mem->size || start + size > mem->size) { in ioctl_emu_mem_transfer()
|
A D | teec_ta_load.c | 61 uint32_t size; member
|
/optee_client/libteec/src/ |
A D | tee_client_api.c | 136 data.size = size; in teec_shm_alloc() 152 data.length = size; in teec_shm_register() 215 shm->size = tmpref->size; in teec_pre_process_tmpref() 218 if (tmpref->size) in teec_pre_process_tmpref() 239 tmpref->size); in teec_pre_process_tmpref() 244 MEMREF_SIZE(param) = tmpref->size; in teec_pre_process_tmpref() 276 MEMREF_SIZE(param) = shm->size; in teec_pre_process_whole() 311 (memref->offset + memref->size > shm->size)) in teec_pre_process_partial() 791 s = shm->size; in TEEC_RegisterSharedMemory() 875 shm->size = data.size; in TEEC_RegisterSharedMemoryFileDescriptor() [all …]
|
A D | teec_benchmark.c | 91 uint64_t *size) in benchmark_get_bench_buf_paddr() argument 112 *size = op.params[0].value.b; in benchmark_get_bench_buf_paddr() 119 static void *mmap_paddr(intptr_t paddr, uint64_t size) in mmap_paddr() argument 133 hw_addr = (intptr_t *)mmap(0, size, PROT_READ|PROT_WRITE, in mmap_paddr()
|
/optee_client/libseteec/src/ |
A D | se.c | 136 op.params[1].tmpref.size = hdr_len; in se_apdu_request() 138 op.params[2].tmpref.size = src_len; in se_apdu_request() 140 op.params[3].tmpref.size = *dst_len; in se_apdu_request() 146 *dst_len = op.params[3].tmpref.size; in se_apdu_request()
|
/optee_client/public/ |
A D | tee_client_api.h | 292 size_t size; member 321 size_t size; member 341 size_t size; member
|
/optee_client/libteec/include/linux/ |
A D | tee.h | 105 __u64 size; member 137 __u64 size; member
|
/optee_client/libckteec/include/ |
A D | pkcs11_ta.h | 1019 uint32_t size; member
|