/optee_test/ta/crypt/ |
A D | cryp_taf.c | 150 size_t size = 0; in ta_entry_cipher_init() local 157 size = 0; in ta_entry_cipher_init() 163 size = params[1].memref.size; in ta_entry_cipher_init() 203 size_t size = 0; in ta_entry_mac_init() local 210 size = 0; in ta_entry_mac_init() 216 size = params[1].memref.size; in ta_entry_mac_init() 220 TEE_MACInit(op, buffer, size); in ta_entry_mac_init() 635 params[1].memref.size, b2, in ta_entry_ae_encrypt_final() 637 ¶ms[3].memref.size); in ta_entry_ae_encrypt_final() 668 params[1].memref.size, b2, in ta_entry_ae_decrypt_final() [all …]
|
A D | aes_taf.c | 38 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt() 42 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt() 48 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_encrypt() 79 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt() 83 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt() 89 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_decrypt()
|
A D | sha2_taf.c | 23 if (params[1].memref.size < SHA224_DIGEST_SIZE) in ta_entry_sha224() 27 (unsigned int)params[0].memref.size, in ta_entry_sha224() 46 if (params[1].memref.size < SHA256_DIGEST_SIZE) in ta_entry_sha256() 50 (unsigned int)params[0].memref.size, in ta_entry_sha256()
|
A D | mbedtls_taf.c | 86 params[0].memref.size); in ta_entry_mbedtls_check_cert() 93 params[1].memref.size); in ta_entry_mbedtls_check_cert() 241 params[0].memref.size); in ta_entry_mbedtls_sign_cert() 320 sz = params[1].memref.size; in ta_entry_mbedtls_sign_cert() 324 params[1].memref.size = sz; in ta_entry_mbedtls_sign_cert() 326 ret = snprintf(params[2].memref.buffer, params[2].memref.size, in ta_entry_mbedtls_sign_cert() 333 if ((size_t)ret >= params[2].memref.size) in ta_entry_mbedtls_sign_cert() 335 params[2].memref.size = ret + 1; in ta_entry_mbedtls_sign_cert()
|
/optee_test/host/xtest/gp/include/ |
A D | xml_crypto_api.h | 59 b.size = 0; 62 b.size = size; \ 67 b.size = 0; \ 1044 out_buffer->size += in_buffer[id].size; in collapse_crypto_buffers() 1137 .size = 64, in Invoke_Crypto_GetOperationInfoMultiple() 1714 ae_encrypt_tag.size = op.params[2].memref.size; in Invoke_Crypto_AEEncryptFinal() 1874 saved_random.size = op.params[3].memref.size; in Invoke_Crypto_GenerateRandom() 1966 saved_digest.size = op.params[3].memref.size; in Invoke_Crypto_DigestDoFinal() 2031 s_dgst.size = op.params[3].memref.size; in Invoke_Crypto_AsymmetricSignDigest() 3398 mac->size = op.params[3].memref.size; in mac_compute_final() [all …]
|
A D | xml_client_api.h | 152 uint32_t size, uint32_t flags) in RegisterSharedMemory() argument 155 shm->size = size; in RegisterSharedMemory() 156 shm->buffer = malloc(size); in RegisterSharedMemory() 161 #define AllocateTempMemory(temp_mem, size) \ argument 162 temp_mem = malloc(size) 297 .parent = shm, .size = sz, .offset = offs, in TEEC_prepare_OperationEachParameter_memref() 308 .buffer = buf, .size = sz, in TEEC_prepare_OperationEachParameter_tmpref() 319 (op)->params[(param_num)].memref.size); \ 327 memref.size); \ 340 (op)->params[(param_num)].tmpref.size); \ [all …]
|
A D | xml_timearithm_api.h | 887 uint32_t size) in Invoke_NewBigInt() argument 893 uint32_t role, uint32_t size, in Macro_StoreBigInt() argument 901 .size = value_size, in Macro_StoreBigInt() 915 op.params[0].value.b = size; in Macro_StoreBigInt() 918 shm_value.size); in Macro_StoreBigInt() 931 size_t size) in Invoke_BigIntConvertToOctetString() argument 937 .size = (size + 7) / 8, in Invoke_BigIntConvertToOctetString() 946 SET_SHARED_MEMORY_OPERATION_PARAMETER(2, 0, &shm, shm.size); in Invoke_BigIntConvertToOctetString() 954 size_t sz = op.params[2].memref.size; in Invoke_BigIntConvertToOctetString() 970 size_t size, in Invoke_BigIntConvertFromOctetString() argument [all …]
|
/optee_test/host/xtest/ |
A D | sdp_basic.c | 71 alloc_data.len = size; in allocate_ion_buffer_old_api() 139 alloc_data.len = size; in allocate_ion_buffer() 440 size_t sdp_size = size; in sdp_basic_test() 451 size -= 255; in sdp_basic_test() 537 op.params[0].memref.size = size; in invoke_out_of_bounds() 541 op.params[1].memref.size = size; in invoke_out_of_bounds() 560 out->size, offset, size, in invoke_out_of_bounds() 569 out->size, offset, size, in invoke_out_of_bounds() 590 size, ion_heap, fd); in sdp_out_of_bounds_memref_test() 603 size = out->size; in sdp_out_of_bounds_memref_test() [all …]
|
A D | benchmark_2000.c | 33 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2001() local 36 sha_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2001() 47 size_t size = 4096; /* Buffer size */ in xtest_tee_benchmark_2002() local 50 sha_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2002() 73 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2011() local 75 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2011() 87 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2012() local 89 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2012()
|
A D | sha_perf.c | 153 in_shm.size = sz + offset; in alloc_shm() 158 out_shm.size = hash_size(algo); in alloc_shm() 225 read_random(in, size); in run_test_once() 308 alloc_shm(size, algo, offset); in sha_perf_run_test() 318 op.params[0].memref.size = size + offset; in sha_perf_run_test() 321 op.params[1].memref.size = hash_size(algo); in sha_perf_run_test() 326 algo_str(algo), size); in sha_perf_run_test() 348 mb_per_sec(size, stats.m + 2 * sd), in sha_perf_run_test() 349 mb_per_sec(size, stats.m - 2 * sd)); in sha_perf_run_test() 390 size_t size = 1024; /* Buffer size (-s) */ in sha_perf_runner_cmd_parser() local [all …]
|
A D | aes_perf.c | 245 shm->size = sz; in allocate_shm() 396 read_random(in, size); in feed_input() 398 memset(in, 0, size); in feed_input() 404 feed_input(in, size, random); in run_feed_input() 410 feed_input(in, size, random); in run_feed_input() 419 feed_input(data, size, random); in run_feed_input() 420 munmap(data, size); in run_feed_input() 470 op.params[0].memref.size = size; in aes_perf_run_test() 472 op.params[1].memref.size = size; in aes_perf_run_test() 628 size = atoi(argv[i]); in aes_perf_runner_cmd_parser() [all …]
|
A D | regression_1000.c | 481 size_t size) in xtest_tee_test_invalid_mem_access2() argument 488 shm.size = size; in xtest_tee_test_invalid_mem_access2() 501 op.params[1].memref.size = size; in xtest_tee_test_invalid_mem_access2() 1059 op.params[0].memref.size = a->shm->size; in test_1013_thread() 1239 int size = 17000; in xtest_tee_test_1014() local 1335 shm.size = 8 * page_size; in xtest_tee_test_1017() 1394 op.params[0].memref.size = shm->size / 2; in invoke_1byte_out_of_bounds() 1395 op.params[0].memref.offset = shm->size - (shm->size / 2) + 1; in invoke_1byte_out_of_bounds() 1934 shm.size = 0; in xtest_tee_test_1025() 1942 shm.size = 0; in xtest_tee_test_1025() [all …]
|
A D | sdp_basic.h | 22 int allocate_ion_buffer(size_t size, int heap_id, int verbosity); 24 size_t size, size_t loop, int ion_heap, 27 int sdp_out_of_bounds_memref_test(size_t size, int ion_heap, int verbosity);
|
A D | regression_5000.c | 35 (op)->params[(param_num)].memref.size); \ 41 (op)->params[(param_num)].memref.size); \ 53 (op)->params[(param_num)].tmpref.size); \ 59 (op)->params[(param_num)].memref.size); \ 65 TEEC_SharedMemory *shm, size_t size, in RegisterSharedMemory() argument 69 shm->size = size; in RegisterSharedMemory() 75 TEEC_SharedMemory *shm, size_t size, in AllocateSharedMemory() argument 79 shm->size = size; in AllocateSharedMemory() 98 size_t size = 1024; in Allocate_In() local 105 AllocateSharedMemory(&cs->context, &shm, size, in Allocate_In() [all …]
|
/optee_test/ta/sdp_basic/ |
A D | ta_sdp_basic.c | 39 if (params[sec_idx].memref.size < params[ns_idx].memref.size) in cmd_inject() 54 params[ns_idx].memref.size); in cmd_inject() 64 params[sec_idx].memref.size); in cmd_inject() 91 params[sec_idx].memref.size); in cmd_inject() 133 params[0].memref.size); in cmd_transform() 148 params[0].memref.size); in cmd_transform() 152 params[0].memref.size, rc); in cmd_transform() 159 sz = params[0].memref.size; in cmd_transform() 165 params[0].memref.size); in cmd_transform() 169 params[0].memref.size, rc); in cmd_transform() [all …]
|
/optee_test/ta/sims/ |
A D | ta_sims.c | 13 uint32_t size; member 42 if (params[0].memref.size != sizeof(*uuid)) in sims_open_ta_session() 49 TEE_MemMove(uuid, params[0].memref.buffer, params[0].memref.size); in sims_open_ta_session() 104 if (storage[index].size > params[1].memref.size) in sims_read() 112 params[1].memref.size); in sims_read() 135 storage[index].data = TEE_Malloc(params[1].memref.size, 0); in sims_write() 137 storage[index].size = 0; in sims_write() 140 storage[index].size = params[1].memref.size; in sims_write() 143 params[1].memref.size); in sims_write() 175 if (params[0].memref.buffer && params[0].memref.size) { in sims_entry_panic() [all …]
|
/optee_test/host/xtest/gp/patches/ |
A D | 0006-TTA_TCF-fix-CmdTEEGetPropertyA-_withoutEnum.patch | 40 + pParams[1].memref.size); 41 + pPropName[pParams[1].memref.size] = 0; 67 + pParams[1].memref.size); 68 + pPropName[pParams[1].memref.size] = 0; 94 + pParams[1].memref.size); 95 + pPropName[pParams[1].memref.size] = 0; 121 + pParams[1].memref.size); 122 + pPropName[pParams[1].memref.size] = 0; 148 + pParams[1].memref.size); 175 + pParams[1].memref.size); [all …]
|
A D | 0007-TTAs-revert-to-v1.1-types.patch | 24 …rationInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, size_t *size) 25 …tionInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, uint32_t *size) 27 const size_t allocatedSize = *size; 46 …ationInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, size_t *size); 47 …ionInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, uint32_t *size); 78 pParams[1].memref.size); 79 pPropName[pParams[1].memref.size] = 0;
|
/optee_test/ta/socket/ |
A D | ta_entry.c | 62 if (params[2].memref.size < sizeof(struct sock_handle)) { in ta_entry_tcp_open() 63 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_tcp_open() 70 params[1].memref.size); in ta_entry_tcp_open() 79 params[2].memref.size = sizeof(h); in ta_entry_tcp_open() 102 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_udp_open() 109 params[1].memref.size); in ta_entry_udp_open() 118 params[2].memref.size = sizeof(h); in ta_entry_udp_open() 159 if (params[0].memref.size != sizeof(*h)) in ta_entry_send() 163 params[2].value.b = params[1].memref.size; in ta_entry_send() 188 ¶ms[1].memref.size, params[2].value.a); in ta_entry_recv() [all …]
|
/optee_test/ta/storage/ |
A D | storage.c | 41 params[0].memref.size); in ta_storage_cmd_open() 51 object_id, params[0].memref.size, in ta_storage_cmd_open() 83 params[0].memref.size); in ta_storage_cmd_create() 95 object_id, params[0].memref.size, in ta_storage_cmd_create() 98 params[3].memref.size, &o); in ta_storage_cmd_create() 129 params[0].memref.size); in ta_storage_cmd_create_overwrite() 139 object_id, params[0].memref.size, in ta_storage_cmd_create_overwrite() 172 b0 = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_read() 196 b0 = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_write() 262 params[1].memref.size); in ta_storage_cmd_rename() [all …]
|
/optee_test/ta/concurrent_large/ |
A D | ta_entry.c | 62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop() 100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256() 102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256() 107 out_len = params[3].memref.size; in ta_entry_sha256() 123 params[2].memref.size, out, &out_len); in ta_entry_sha256() 128 params[3].memref.size = out_len; in ta_entry_sha256()
|
/optee_test/ta/concurrent/ |
A D | ta_entry.c | 62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop() 100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256() 102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256() 107 out_len = params[3].memref.size; in ta_entry_sha256() 123 params[2].memref.size, out, &out_len); in ta_entry_sha256() 128 params[3].memref.size = out_len; in ta_entry_sha256()
|
/optee_test/ta/rpc_test/ |
A D | ta_rpc.c | 51 TEE_Malloc(pParams[n].memref.size, 0); in rpc_call_cryp() 54 params[n].memref.size = pParams[n].memref.size; in rpc_call_cryp() 59 pParams[n].memref.size); in rpc_call_cryp() 93 params[n].memref.size); in rpc_call_cryp() 94 pParams[n].memref.size = params[n].memref.size; in rpc_call_cryp()
|
/optee_test/host/xtest/adbg/src/ |
A D | adbg_run.c | 77 size_t size = 0; in Do_ADBG_AppendToSuite() local 80 size = strlen(Source_p->SuiteID_p); in Do_ADBG_AppendToSuite() 82 size += strlen(Dest_p->SuiteID_p); in Do_ADBG_AppendToSuite() 83 size += 1; /* '+' */ in Do_ADBG_AppendToSuite() 85 size += 1; /* '\0' */ in Do_ADBG_AppendToSuite() 86 p = malloc(size); in Do_ADBG_AppendToSuite() 92 snprintf(p, size, "%s+%s", Dest_p->SuiteID_p, in Do_ADBG_AppendToSuite() 95 snprintf(p, size, "%s", Source_p->SuiteID_p); in Do_ADBG_AppendToSuite()
|
/optee_test/ta/os_test/ |
A D | os_test.c | 59 if (size > 4 || bblen != size) { in check_binprop_ones() 475 params[0].memref.size); in test_mem_access_right() 481 params[0].memref.size); in test_mem_access_right() 534 l_params[0].memref.size = sizeof(buf); in test_mem_access_right() 536 l_params[1].memref.size = 0; in test_mem_access_right() 728 return tee_map_zi(size, 0); in malloc_wrapper() 948 params[0].memref.size); in ta_entry_params_access_rights() 954 params[0].memref.size); in ta_entry_params_access_rights() 1145 bufsize = params[0].memref.size; in ta_entry_ta2ta_memref_mix() 1147 params[2].memref.size != bufsize) in ta_entry_ta2ta_memref_mix() [all …]
|