/optee_os/lib/libutils/isoc/newlib/ |
A D | memset.c | 81 unsigned long buffer; variable 102 buffer = (d << 8) | d; 103 buffer |= (buffer << 16); 105 buffer = (buffer << i) | buffer; 109 *aligned_addr++ = buffer; 110 *aligned_addr++ = buffer; 111 *aligned_addr++ = buffer; 112 *aligned_addr++ = buffer; 117 *aligned_addr++ = buffer;
|
/optee_os/core/drivers/crypto/se050/glue/ |
A D | i2c.c | 22 ret = imx_i2c_read(req->bus, req->chip, req->buffer, in native_i2c_transfer() 25 ret = imx_i2c_write(req->bus, req->chip, req->buffer, in native_i2c_transfer() 34 static int i2c_transfer(uint8_t *buffer, int len, enum rpc_i2c_mode mode) in i2c_transfer() argument 40 .buffer = buffer, in i2c_transfer() 55 int glue_i2c_read(uint8_t *buffer, int len) in glue_i2c_read() argument 57 return i2c_transfer(buffer, len, RPC_I2C_MODE_READ); in glue_i2c_read() 60 int glue_i2c_write(uint8_t *buffer, int len) in glue_i2c_write() argument 62 return i2c_transfer(buffer, len, RPC_I2C_MODE_WRITE); in glue_i2c_write()
|
/optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_ssh_ecdsa_encode_name.c | 25 int ecc_ssh_ecdsa_encode_name(char *buffer, unsigned long *buflen, const ecc_key *key) in ecc_ssh_ecdsa_encode_name() argument 32 LTC_ARGCHK(buffer != NULL); in ecc_ssh_ecdsa_encode_name() 42 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp256"); in ecc_ssh_ecdsa_encode_name() 46 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp384"); in ecc_ssh_ecdsa_encode_name() 50 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp521"); in ecc_ssh_ecdsa_encode_name() 53 size = snprintf(buffer, *buflen, "ecdsa-sha2-%s", oidstr); in ecc_ssh_ecdsa_encode_name()
|
/optee_os/core/pta/tests/ |
A D | invoke.c | 190 in = (uint8_t *)p[0].memref.buffer; in test_entry_params() 196 *(uint8_t *)p[0].memref.buffer = d8; in test_entry_params() 204 in = (uint8_t *)p[1].memref.buffer; in test_entry_params() 210 *(uint8_t *)p[1].memref.buffer = d8; in test_entry_params() 218 in = (uint8_t *)p[2].memref.buffer; in test_entry_params() 232 in = (uint8_t *)p[3].memref.buffer; in test_entry_params() 252 char *src = p[0].memref.buffer; in test_inject_sdp() 253 char *dst = p[1].memref.buffer; in test_inject_sdp() 296 char *buf = p[0].memref.buffer; in test_transform_sdp() 334 char *src = p[0].memref.buffer; in test_dump_sdp() [all …]
|
/optee_os/lib/libutils/isoc/ |
A D | bget.doc | 25 entire buffer pool. 29 * Quantisation of buffer sizes to a power of two to 168 void bpool(void *buffer, bufsize len); 172 storage to the overall buffer pool. 176 Allocate a buffer of <size> bytes. The address of the buffer is 178 buffer. 184 available to allocate the buffer. 186 void *bgetr(void *buffer, bufsize newsize); 191 the original buffer remains intact. 311 a buffer pool. */ [all …]
|
/optee_os/lib/libutee/ |
A D | tee_api.c | 53 b = params[n].memref.buffer; in copy_param() 101 memcpy(b, params[n].memref.buffer, s); in copy_param() 103 b = params[n].memref.buffer; in copy_param() 138 memcpy(params[n].memref.buffer, tmp_va[n], in update_out_param() 414 void *TEE_Realloc(void *buffer, uint32_t newSize) in TEE_Realloc() argument 417 TEE_Free(buffer); in TEE_Realloc() 421 if (buffer == TEE_NULL_SIZED_VA) in TEE_Realloc() 424 return realloc(buffer, newSize); in TEE_Realloc() 427 void TEE_Free(void *buffer) in TEE_Free() argument 429 if (buffer != TEE_NULL_SIZED_VA) in TEE_Free() [all …]
|
/optee_os/core/arch/arm/kernel/ |
A D | otp_stubs.c | 26 __weak int tee_otp_get_die_id(uint8_t *buffer, size_t len) in tee_otp_get_die_id() argument 28 if (huk_subkey_derive(HUK_SUBKEY_DIE_ID, NULL, 0, buffer, len)) in tee_otp_get_die_id() 45 uint8_t *buffer, size_t len) in tee_otp_get_ta_enc_key() argument 50 ta_pub_key_modulus_size, buffer, len)) in tee_otp_get_ta_enc_key()
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | md2.c | 103 memset( ctx->buffer, 0, 16 ); in mbedtls_md2_starts_ret() 124 ctx->state[i + 16] = ctx->buffer[i]; in mbedtls_internal_md2_process() 126 (unsigned char)( ctx->buffer[i] ^ ctx->state[i]); in mbedtls_internal_md2_process() 146 ( ctx->cksum[i] ^ PI_SUBST[ctx->buffer[i] ^ t] ); in mbedtls_internal_md2_process() 181 memcpy( ctx->buffer + ctx->left, input, fill ); in mbedtls_md2_update_ret() 220 ctx->buffer[i] = x; in mbedtls_md2_finish_ret() 225 memcpy( ctx->buffer, ctx->cksum, 16 ); in mbedtls_md2_finish_ret()
|
A D | base64.c | 358 unsigned char buffer[128]; in mbedtls_base64_self_test() local 365 if( mbedtls_base64_encode( buffer, sizeof( buffer ), &len, src, 64 ) != 0 || in mbedtls_base64_self_test() 366 memcmp( base64_test_enc, buffer, 88 ) != 0 ) in mbedtls_base64_self_test() 379 if( mbedtls_base64_decode( buffer, sizeof( buffer ), &len, src, 88 ) != 0 || in mbedtls_base64_self_test() 380 memcmp( base64_test_dec, buffer, 64 ) != 0 ) in mbedtls_base64_self_test()
|
A D | sha512.c | 369 memcpy( (void *) (ctx->buffer + left), input, fill ); in mbedtls_sha512_update_ret() 371 if( ( ret = mbedtls_internal_sha512_process( ctx, ctx->buffer ) ) != 0 ) in mbedtls_sha512_update_ret() 389 memcpy( (void *) (ctx->buffer + left), input, ilen ); in mbedtls_sha512_update_ret() 421 ctx->buffer[used++] = 0x80; in mbedtls_sha512_finish_ret() 426 memset( ctx->buffer + used, 0, 112 - used ); in mbedtls_sha512_finish_ret() 431 memset( ctx->buffer + used, 0, 128 - used ); in mbedtls_sha512_finish_ret() 433 if( ( ret = mbedtls_internal_sha512_process( ctx, ctx->buffer ) ) != 0 ) in mbedtls_sha512_finish_ret() 436 memset( ctx->buffer, 0, 112 ); in mbedtls_sha512_finish_ret() 446 sha512_put_uint64_be( high, ctx->buffer, 112 ); in mbedtls_sha512_finish_ret() 447 sha512_put_uint64_be( low, ctx->buffer, 120 ); in mbedtls_sha512_finish_ret() [all …]
|
A D | md5.c | 281 memcpy( (void *) (ctx->buffer + left), input, fill ); in mbedtls_md5_update_ret() 282 if( ( ret = mbedtls_internal_md5_process( ctx, ctx->buffer ) ) != 0 ) in mbedtls_md5_update_ret() 301 memcpy( (void *) (ctx->buffer + left), input, ilen ); in mbedtls_md5_update_ret() 331 ctx->buffer[used++] = 0x80; in mbedtls_md5_finish_ret() 336 memset( ctx->buffer + used, 0, 56 - used ); in mbedtls_md5_finish_ret() 341 memset( ctx->buffer + used, 0, 64 - used ); in mbedtls_md5_finish_ret() 343 if( ( ret = mbedtls_internal_md5_process( ctx, ctx->buffer ) ) != 0 ) in mbedtls_md5_finish_ret() 346 memset( ctx->buffer, 0, 56 ); in mbedtls_md5_finish_ret() 356 PUT_UINT32_LE( low, ctx->buffer, 56 ); in mbedtls_md5_finish_ret() 357 PUT_UINT32_LE( high, ctx->buffer, 60 ); in mbedtls_md5_finish_ret() [all …]
|
A D | sha256.c | 321 memcpy( (void *) (ctx->buffer + left), input, fill ); in mbedtls_sha256_update_ret() 323 if( ( ret = mbedtls_internal_sha256_process( ctx, ctx->buffer ) ) != 0 ) in mbedtls_sha256_update_ret() 341 memcpy( (void *) (ctx->buffer + left), input, ilen ); in mbedtls_sha256_update_ret() 373 ctx->buffer[used++] = 0x80; in mbedtls_sha256_finish_ret() 378 memset( ctx->buffer + used, 0, 56 - used ); in mbedtls_sha256_finish_ret() 383 memset( ctx->buffer + used, 0, 64 - used ); in mbedtls_sha256_finish_ret() 385 if( ( ret = mbedtls_internal_sha256_process( ctx, ctx->buffer ) ) != 0 ) in mbedtls_sha256_finish_ret() 388 memset( ctx->buffer, 0, 56 ); in mbedtls_sha256_finish_ret() 398 PUT_UINT32_BE( high, ctx->buffer, 56 ); in mbedtls_sha256_finish_ret() 399 PUT_UINT32_BE( low, ctx->buffer, 60 ); in mbedtls_sha256_finish_ret() [all …]
|
/optee_os/ta/pkcs11/src/ |
A D | pkcs11_token.c | 252 if (out->memref.buffer) in entry_ck_slot_list() 464 if (out->memref.buffer) in entry_ck_token_mecha_ids() 1496 params[0].memref.buffer = seed; in seed_rng_pool() 1542 if (in->memref.size && !in->memref.buffer) in entry_ck_seed_random() 1569 void *buffer = NULL; in entry_ck_generate_random() local 1586 if (out->memref.size && !out->memref.buffer) in entry_ck_generate_random() 1594 if (!buffer) in entry_ck_generate_random() 1597 data = out->memref.buffer; in entry_ck_generate_random() 1603 TEE_GenerateRandom(buffer, count); in entry_ck_generate_random() 1604 TEE_MemMove(data, buffer, count); in entry_ck_generate_random() [all …]
|
/optee_os/core/pta/ |
A D | system.c | 47 entropy_input = params[0].memref.buffer; in system_rng_reseed() 90 (uaddr_t)params[1].memref.buffer, in system_derive_ta_unique_key() 106 memcpy(data + sizeof(TEE_UUID), params[0].memref.buffer, in system_derive_ta_unique_key() 110 params[1].memref.buffer, in system_derive_ta_unique_key() 220 uuid = params[0].memref.buffer; in system_dlopen() 250 uuid = params[0].memref.buffer; in system_dlsym() 254 sym = params[1].memref.buffer; in system_dlsym() 283 res = tpm_get_event_log(params[0].memref.buffer, &size); in system_get_tpm_event_log() 302 res = tee_invoke_supp_plugin_rpc(params[0].memref.buffer, /* uuid */ in system_supp_plugin_invoke() 305 params[2].memref.buffer, /* data */ in system_supp_plugin_invoke()
|
A D | apdu.c | 70 params[1].memref.buffer, in invoke_command() 72 params[2].memref.buffer, in invoke_command() 74 params[3].memref.buffer, in invoke_command()
|
/optee_os/ta/trusted_keys/ |
A D | entry.c | 44 if (!params[0].memref.buffer || !params[0].memref.size) in get_random() 52 memcpy(params[0].memref.buffer, rng_buf, params[0].memref.size); in get_random() 79 params[0].memref.buffer = extra; in derive_unique_key() 83 params[1].memref.buffer = key; in derive_unique_key() 173 attr.content.ref.buffer = huk_key; in huk_crypt() 221 in = params[0].memref.buffer; in seal_trusted_key() 223 out = params[1].memref.buffer; in seal_trusted_key() 264 in = params[0].memref.buffer; in unseal_trusted_key() 266 out = params[1].memref.buffer; in unseal_trusted_key()
|
/optee_os/core/kernel/ |
A D | msg_param.c | 62 static bool msg_param_extract_pages(paddr_t buffer, paddr_t *pages, in msg_param_extract_pages() argument 71 if (buffer & SMALL_PAGE_MASK) in msg_param_extract_pages() 78 mobj = mobj_mapped_shm_alloc(&buffer, 1, 0, 0); in msg_param_extract_pages()
|
A D | huk_subkey.c | 19 static TEE_Result get_otp_die_id(uint8_t *buffer, size_t len) in get_otp_die_id() argument 25 return tee_otp_get_die_id(buffer, len); in get_otp_die_id() 28 buffer[i] = pattern[i % 4]; in get_otp_die_id()
|
/optee_os/out/arm/export-ta_arm64/host_include/ |
A D | tee_api.h | 83 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer, 92 void *TEE_Realloc(void *buffer, uint32_t newSize); 94 void TEE_Free(void *buffer); 116 uint32_t attributeID, void *buffer, 140 const void *buffer, uint32_t length); 192 TEE_Result TEE_ReadObjectData(TEE_ObjectHandle object, void *buffer, 195 TEE_Result TEE_WriteObjectData(TEE_ObjectHandle object, const void *buffer, 355 const uint8_t *buffer, 359 TEE_Result TEE_BigIntConvertToOctetString(uint8_t *buffer, uint32_t *bufferLen,
|
/optee_os/out/arm/export-ta_arm64/include/ |
A D | tee_api.h | 83 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer, 92 void *TEE_Realloc(void *buffer, uint32_t newSize); 94 void TEE_Free(void *buffer); 116 uint32_t attributeID, void *buffer, 140 const void *buffer, uint32_t length); 192 TEE_Result TEE_ReadObjectData(TEE_ObjectHandle object, void *buffer, 195 TEE_Result TEE_WriteObjectData(TEE_ObjectHandle object, const void *buffer, 355 const uint8_t *buffer, 359 TEE_Result TEE_BigIntConvertToOctetString(uint8_t *buffer, uint32_t *bufferLen,
|
/optee_os/lib/libutee/include/ |
A D | tee_api.h | 83 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer, 92 void *TEE_Realloc(void *buffer, uint32_t newSize); 94 void TEE_Free(void *buffer); 116 uint32_t attributeID, void *buffer, 140 const void *buffer, uint32_t length); 192 TEE_Result TEE_ReadObjectData(TEE_ObjectHandle object, void *buffer, 195 TEE_Result TEE_WriteObjectData(TEE_ObjectHandle object, const void *buffer, 355 const uint8_t *buffer, 359 TEE_Result TEE_BigIntConvertToOctetString(uint8_t *buffer, uint32_t *bufferLen,
|
/optee_os/out/arm/export-ta_arm32/host_include/ |
A D | tee_api.h | 83 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer, 92 void *TEE_Realloc(void *buffer, uint32_t newSize); 94 void TEE_Free(void *buffer); 116 uint32_t attributeID, void *buffer, 140 const void *buffer, uint32_t length); 192 TEE_Result TEE_ReadObjectData(TEE_ObjectHandle object, void *buffer, 195 TEE_Result TEE_WriteObjectData(TEE_ObjectHandle object, const void *buffer, 355 const uint8_t *buffer, 359 TEE_Result TEE_BigIntConvertToOctetString(uint8_t *buffer, uint32_t *bufferLen,
|
/optee_os/out/arm/export-ta_arm32/include/ |
A D | tee_api.h | 83 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer, 92 void *TEE_Realloc(void *buffer, uint32_t newSize); 94 void TEE_Free(void *buffer); 116 uint32_t attributeID, void *buffer, 140 const void *buffer, uint32_t length); 192 TEE_Result TEE_ReadObjectData(TEE_ObjectHandle object, void *buffer, 195 TEE_Result TEE_WriteObjectData(TEE_ObjectHandle object, const void *buffer, 355 const uint8_t *buffer, 359 TEE_Result TEE_BigIntConvertToOctetString(uint8_t *buffer, uint32_t *bufferLen,
|
/optee_os/core/include/kernel/ |
A D | tee_common_otp.h | 19 int tee_otp_get_die_id(uint8_t *buffer, size_t len); 20 TEE_Result tee_otp_get_ta_enc_key(uint32_t key_type, uint8_t *buffer,
|
/optee_os/core/drivers/crypto/se050/core/ |
A D | die_id.c | 13 int tee_otp_get_die_id(uint8_t *buffer, size_t len) in tee_otp_get_die_id() argument 25 if (tee_hash_createdigest(TEE_ALG_SHA256, die_id, die_id_len, buffer, in tee_otp_get_die_id()
|