| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/ |
| H A D | cryp_taf.c | 59 if (params[1].memref.size < sizeof(TEE_OperationInfo)) in ta_entry_get_operation_info() 61 params[1].memref.size = sizeof(TEE_OperationInfo); in ta_entry_get_operation_info() 63 TEE_GetOperationInfo(op, params[1].memref.buffer); in ta_entry_get_operation_info() 128 TEE_DigestUpdate(op, params[1].memref.buffer, params[1].memref.size); in ta_entry_digest_update() 142 params[1].memref.buffer, params[1].memref.size, in ta_entry_digest_do_final() 143 params[2].memref.buffer, ¶ms[2].memref.size); in ta_entry_digest_do_final() 162 buffer = params[1].memref.buffer; in ta_entry_cipher_init() 163 size = params[1].memref.size; in ta_entry_cipher_init() 181 params[1].memref.buffer, params[1].memref.size, in ta_entry_cipher_update() 182 params[2].memref.buffer, ¶ms[2].memref.size); in ta_entry_cipher_update() [all …]
|
| H A D | aes_taf.c | 38 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt() 42 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt() 48 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_encrypt() 51 const unsigned char *ciphertext = params[0].memref.buffer; in ta_entry_aes256ecb_encrypt() 52 unsigned char *plaintext = params[1].memref.buffer; in ta_entry_aes256ecb_encrypt() 79 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt() 83 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt() 89 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_decrypt() 92 const unsigned char *ciphertext = params[0].memref.buffer; in ta_entry_aes256ecb_decrypt() 93 unsigned char *plaintext = params[1].memref.buffer; in ta_entry_aes256ecb_decrypt()
|
| H A D | sha2_taf.c | 23 if (params[1].memref.size < SHA224_DIGEST_SIZE) in ta_entry_sha224() 26 sha224((unsigned char *)params[0].memref.buffer, in ta_entry_sha224() 27 (unsigned int)params[0].memref.size, in ta_entry_sha224() 28 (unsigned char *)params[1].memref.buffer); in ta_entry_sha224() 46 if (params[1].memref.size < SHA256_DIGEST_SIZE) in ta_entry_sha256() 49 sha256((unsigned char *)params[0].memref.buffer, in ta_entry_sha256() 50 (unsigned int)params[0].memref.size, in ta_entry_sha256() 51 (unsigned char *)params[1].memref.buffer); in ta_entry_sha256()
|
| H A D | mbedtls_taf.c | 85 ret = mbedtls_x509_crt_parse(&crt, params[0].memref.buffer, in ta_entry_mbedtls_check_cert() 86 params[0].memref.size); in ta_entry_mbedtls_check_cert() 92 ret = mbedtls_x509_crt_parse(&trust_crt, params[1].memref.buffer, in ta_entry_mbedtls_check_cert() 93 params[1].memref.size); in ta_entry_mbedtls_check_cert() 240 ret = mbedtls_x509_csr_parse(&csr, params[0].memref.buffer, in ta_entry_mbedtls_sign_cert() 241 params[0].memref.size); in ta_entry_mbedtls_sign_cert() 320 sz = params[1].memref.size; in ta_entry_mbedtls_sign_cert() 321 res = write_cert(&crt, params[1].memref.buffer, &sz); in ta_entry_mbedtls_sign_cert() 324 params[1].memref.size = sz; in ta_entry_mbedtls_sign_cert() 326 ret = snprintf(params[2].memref.buffer, params[2].memref.size, in ta_entry_mbedtls_sign_cert() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/sdp_basic/ |
| H A D | ta_sdp_basic.c | 39 if (params[sec_idx].memref.size < params[ns_idx].memref.size) in cmd_inject() 53 params[ns_idx].memref.buffer, in cmd_inject() 54 params[ns_idx].memref.size); in cmd_inject() 63 params[sec_idx].memref.buffer, in cmd_inject() 64 params[sec_idx].memref.size); in cmd_inject() 78 rc = TEE_CacheFlush(params[sec_idx].memref.buffer, in cmd_inject() 79 params[sec_idx].memref.size); in cmd_inject() 82 params[sec_idx].memref.buffer, in cmd_inject() 83 params[sec_idx].memref.size, rc); in cmd_inject() 89 TEE_MemMove(params[sec_idx].memref.buffer, in cmd_inject() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/socket/ |
| H A D | ta_entry.c | 62 if (params[2].memref.size < sizeof(struct sock_handle)) { in ta_entry_tcp_open() 63 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_tcp_open() 69 setup.server_addr = strndup(params[1].memref.buffer, in ta_entry_tcp_open() 70 params[1].memref.size); in ta_entry_tcp_open() 78 memcpy(params[2].memref.buffer, &h, sizeof(h)); in ta_entry_tcp_open() 79 params[2].memref.size = sizeof(h); in ta_entry_tcp_open() 101 if (params[2].memref.size < sizeof(struct sock_handle)) { in ta_entry_udp_open() 102 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_udp_open() 108 setup.server_addr = strndup(params[1].memref.buffer, in ta_entry_udp_open() 109 params[1].memref.size); in ta_entry_udp_open() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/storage/ |
| H A D | storage.c | 36 object_id = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_open() 40 TEE_MemMove(object_id, params[0].memref.buffer, in ta_storage_cmd_open() 41 params[0].memref.size); in ta_storage_cmd_open() 44 object_id = params[0].memref.buffer; in ta_storage_cmd_open() 51 object_id, params[0].memref.size, in ta_storage_cmd_open() 78 object_id = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_create() 82 TEE_MemMove(object_id, params[0].memref.buffer, in ta_storage_cmd_create() 83 params[0].memref.size); in ta_storage_cmd_create() 86 object_id = params[0].memref.buffer; in ta_storage_cmd_create() 95 object_id, params[0].memref.size, in ta_storage_cmd_create() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rpc_test/ |
| H A D | ta_rpc.c | 50 params[n].memref.buffer = in rpc_call_cryp() 51 TEE_Malloc(pParams[n].memref.size, 0); in rpc_call_cryp() 52 if (!params[n].memref.buffer) in rpc_call_cryp() 54 params[n].memref.size = pParams[n].memref.size; in rpc_call_cryp() 57 TEE_MemMove(params[n].memref.buffer, in rpc_call_cryp() 58 pParams[n].memref.buffer, in rpc_call_cryp() 59 pParams[n].memref.size); in rpc_call_cryp() 91 TEE_MemMove(pParams[n].memref.buffer, in rpc_call_cryp() 92 params[n].memref.buffer, in rpc_call_cryp() 93 params[n].memref.size); in rpc_call_cryp() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/sims/ |
| H A D | ta_sims.c | 42 if (params[0].memref.size != sizeof(*uuid)) in sims_open_ta_session() 49 TEE_MemMove(uuid, params[0].memref.buffer, params[0].memref.size); in sims_open_ta_session() 104 if (storage[index].size > params[1].memref.size) in sims_read() 111 TEE_MemMove(params[1].memref.buffer, storage[index].data, in sims_read() 112 params[1].memref.size); in sims_read() 135 storage[index].data = TEE_Malloc(params[1].memref.size, 0); in sims_write() 140 storage[index].size = params[1].memref.size; in sims_write() 142 TEE_MemMove(storage[index].data, params[1].memref.buffer, in sims_write() 143 params[1].memref.size); in sims_write() 175 if (params[0].memref.buffer && params[0].memref.size) { in sims_entry_panic() [all …]
|
| /OK3568_Linux_fs/buildroot/package/rockchip/tee-user-app/extra_app/ta/ |
| H A D | keybox.c | 116 res = rk_get_trng(buf, params[0].memref.size); in TA_InvokeCommandEntryPoint() 122 g_hash = js_hash(0x47c6a7e6, buf, params[0].memref.size); in TA_InvokeCommandEntryPoint() 123 TEE_MemMove(params[0].memref.buffer, buf, params[0].memref.size); in TA_InvokeCommandEntryPoint() 150 if (params[0].memref.size > 64) in TA_InvokeCommandEntryPoint() 154 res = rk_get_trng(buf, params[0].memref.size); in TA_InvokeCommandEntryPoint() 168 params[0].memref.size, &count); in TA_InvokeCommandEntryPoint() 174 if (count != params[0].memref.size) in TA_InvokeCommandEntryPoint() 179 TEE_MemMove(params[0].memref.buffer, buf, params[0].memref.size); in TA_InvokeCommandEntryPoint() 190 if (params[0].memref.size > 64) in TA_InvokeCommandEntryPoint() 193 TEE_MemMove(buf, params[0].memref.buffer, params[0].memref.size); in TA_InvokeCommandEntryPoint() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/concurrent/ |
| H A D | ta_entry.c | 62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop() 65 params[1].value.b = inc_active_count(params[0].memref.buffer); in ta_entry_busy_loop() 77 dec_active_count(params[0].memref.buffer); in ta_entry_busy_loop() 100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256() 102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256() 105 params[1].value.b = inc_active_count(params[0].memref.buffer); in ta_entry_sha256() 107 out_len = params[3].memref.size; in ta_entry_sha256() 122 res = TEE_DigestDoFinal(op, params[2].memref.buffer, in ta_entry_sha256() 123 params[2].memref.size, out, &out_len); in ta_entry_sha256() 127 TEE_MemMove(params[3].memref.buffer, out, out_len); in ta_entry_sha256() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/concurrent_large/ |
| H A D | ta_entry.c | 62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop() 65 params[1].value.b = inc_active_count(params[0].memref.buffer); in ta_entry_busy_loop() 77 dec_active_count(params[0].memref.buffer); in ta_entry_busy_loop() 100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256() 102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256() 105 params[1].value.b = inc_active_count(params[0].memref.buffer); in ta_entry_sha256() 107 out_len = params[3].memref.size; in ta_entry_sha256() 122 res = TEE_DigestDoFinal(op, params[2].memref.buffer, in ta_entry_sha256() 123 params[2].memref.size, out, &out_len); in ta_entry_sha256() 127 TEE_MemMove(params[3].memref.buffer, out, out_len); in ta_entry_sha256() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/os_test/ |
| H A D | os_test.c | 474 params[0].memref.buffer, in test_mem_access_right() 475 params[0].memref.size); in test_mem_access_right() 480 params[0].memref.buffer, in test_mem_access_right() 481 params[0].memref.size); in test_mem_access_right() 533 l_params[0].memref.buffer = buf; in test_mem_access_right() 534 l_params[0].memref.size = sizeof(buf); in test_mem_access_right() 535 l_params[1].memref.buffer = NULL; in test_mem_access_right() 536 l_params[1].memref.size = 0; in test_mem_access_right() 911 l_params[0].memref.buffer = in; in ta_entry_client() 912 l_params[0].memref.size = sizeof(sha256_in); in ta_entry_client() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/ta/rk_test/ |
| H A D | rktest_transfer_data.c | 24 IMSG("Get the params[1]: %s", (char *)params[1].memref.buffer); in handle_transfer_data() 26 params[2].memref.buffer, params[2].memref.size); in handle_transfer_data() 32 TEE_MemMove(params[2].memref.buffer, params[1].memref.buffer, params[2].memref.size); in handle_transfer_data()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_test/ |
| H A D | rktest_transfer_data.c | 24 IMSG("Get the params[1]: %s", (char *)params[1].memref.buffer); in handle_transfer_data() 26 params[2].memref.buffer, params[2].memref.size); in handle_transfer_data() 32 TEE_MemMove(params[2].memref.buffer, params[1].memref.buffer, params[2].memref.size); in handle_transfer_data()
|
| H A D | rktest_crypto_hw.c | 82 taParams[0].memref.buffer = config; in rk_user_ta_cipher() 83 taParams[0].memref.size = sizeof(*config); in rk_user_ta_cipher() 84 taParams[1].memref.buffer = src; in rk_user_ta_cipher() 85 taParams[1].memref.size = len; in rk_user_ta_cipher() 137 res = rk_user_ta_cipher(&config, params[0].memref.buffer, params[0].memref.size); in handle_crypto_hw() 152 res = rk_user_ta_cipher(&config, params[0].memref.buffer, params[0].memref.size); in handle_crypto_hw()
|
| /OK3568_Linux_fs/external/security/librkcrypto/third_party/optee_client/libteec/src/ |
| H A D | tee_client_api.c | 248 TEEC_RegisteredMemoryReference *memref, in teec_pre_process_whole() argument 252 uint32_t flags = memref->parent->flags & inout; in teec_pre_process_whole() 264 shm = memref->parent; in teec_pre_process_whole() 280 TEEC_RegisteredMemoryReference *memref, in teec_pre_process_partial() argument 303 shm = memref->parent; in teec_pre_process_partial() 308 if ((memref->offset + memref->size < memref->offset) || in teec_pre_process_partial() 309 (memref->offset + memref->size > shm->size)) in teec_pre_process_partial() 318 memcpy((char *)shm->shadow_buffer + memref->offset, in teec_pre_process_partial() 319 (char *)shm->buffer + memref->offset, memref->size); in teec_pre_process_partial() 322 MEMREF_SHM_OFFS(param) = memref->offset; in teec_pre_process_partial() [all …]
|
| /OK3568_Linux_fs/u-boot/lib/optee_clientApi/ |
| H A D | OpteeClientRPC.c | 97 (size_t)TeeSmc32Param[0].u.memref.buf_ptr; in OpteeRpcCmdLoadTa() 98 TeeLoadTaCmdSize = TeeSmc32Param[0].u.memref.size; in OpteeRpcCmdLoadTa() 140 TeeSmc32Param[1].u.memref.buf_ptr = AllocAddress; in OpteeRpcCmdLoadTa() 141 TeeSmc32Param[1].u.memref.size = ImageSize; in OpteeRpcCmdLoadTa() 170 if (TeeSmc32Param[1].u.memref.buf_ptr == 0) { in OpteeRpcCmdLoadV2Ta() 172 TeeSmc32Param[1].u.memref.size = 0; in OpteeRpcCmdLoadV2Ta() 177 (uint64_t)TeeSmc32Param[1].u.memref.buf_ptr, in OpteeRpcCmdLoadV2Ta() 178 (uint64_t)TeeSmc32Param[1].u.memref.size); in OpteeRpcCmdLoadV2Ta() 212 AllocAddress = TeeSmc32Param[0].u.memref.buf_ptr; in OpteeRpcCmdFreeTa() 213 ImageSize = TeeSmc32Param[0].u.memref.size; in OpteeRpcCmdFreeTa() [all …]
|
| H A D | OpteeClientRkNewFs_v2.c | 882 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_open() 884 filename = (char *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_open() 916 filename = (char *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_create() 918 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_create() 990 data = (uint8_t *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_read() 992 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_read() 996 len = params[1].u.memref.size; in ree_fs_new_read() 1022 params[1].u.memref.size = di; in ree_fs_new_read() 1042 data = (uint8_t *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_write() 1044 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_write() [all …]
|
| H A D | OpteeClientRkNewFs_v1.c | 969 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_open() 971 filename = (char *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_open() 1009 filename = (char *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_create() 1011 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_create() 1089 data = (uint8_t *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_read() 1091 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_read() 1095 len = params[1].u.memref.size; in ree_fs_new_read() 1120 params[1].u.memref.size = di; in ree_fs_new_read() 1145 data = (uint8_t *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_write() 1147 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_write() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/tee/optee/ |
| H A D | core.c | 70 p->u.memref.size = mp->u.tmem.size; in optee_from_msg_param() 74 p->u.memref.shm_offs = 0; in optee_from_msg_param() 75 p->u.memref.shm = NULL; in optee_from_msg_param() 81 p->u.memref.shm_offs = mp->u.tmem.buf_ptr - pa; in optee_from_msg_param() 82 p->u.memref.shm = shm; in optee_from_msg_param() 89 p->u.memref.size = mp->u.rmem.size; in optee_from_msg_param() 94 p->u.memref.shm_offs = 0; in optee_from_msg_param() 95 p->u.memref.shm = NULL; in optee_from_msg_param() 98 p->u.memref.shm_offs = mp->u.rmem.offs; in optee_from_msg_param() 99 p->u.memref.shm = shm; in optee_from_msg_param() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/aes_perf/ |
| H A D | ta_aes_perf.c | 45 param->memref.buffer, 1); in is_inbuf_a_secure_memref() 62 param->memref.buffer, 1); in is_outbuf_a_secure_memref() 71 res = TEE_CacheFlush(param->memref.buffer, in flush_memref_buffer() 72 param->memref.size); in flush_memref_buffer() 133 in = params[0].memref.buffer; in cmd_process() 134 insz = params[0].memref.size; in cmd_process() 135 out = params[1].memref.buffer; in cmd_process() 136 outsz = params[1].memref.size; in cmd_process()
|
| /OK3568_Linux_fs/buildroot/package/rockchip/tee-user-app/extra_app/host/ |
| H A D | main.c | 140 operation.params[0].memref.parent = &sm; in process_key() 141 operation.params[0].memref.offset = 0; in process_key() 142 operation.params[0].memref.size = sm.size; in process_key() 170 operation.params[0].memref.parent = &sm; in process_key() 171 operation.params[0].memref.offset = 0; in process_key() 172 operation.params[0].memref.size = sm.size; in process_key() 186 operation.params[0].memref.parent = &sm; in process_key() 187 operation.params[0].memref.offset = 0; in process_key() 188 operation.params[0].memref.size = sm.size; in process_key()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/xtest/ |
| H A D | sdp_basic.c | 261 op.params[1].memref.parent = shm; in inject_sdp_data() 262 op.params[1].memref.size = len; in inject_sdp_data() 263 op.params[1].memref.offset = offset; in inject_sdp_data() 301 op.params[0].memref.parent = shm; in transform_sdp_data() 302 op.params[0].memref.size = len; in transform_sdp_data() 303 op.params[0].memref.offset = offset; in transform_sdp_data() 342 op.params[0].memref.parent = shm; in dump_sdp_data() 343 op.params[0].memref.size = len; in dump_sdp_data() 344 op.params[0].memref.offset = offset; in dump_sdp_data() 534 op.params[0].memref.parent = in; in invoke_out_of_bounds() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_public_api/ |
| H A D | rk_derive_key_api.c | 36 taParams[0].memref.buffer = extra; in rk_derive_ta_unique_key() 37 taParams[0].memref.size = extra_size; in rk_derive_ta_unique_key() 38 taParams[1].memref.buffer = key; in rk_derive_ta_unique_key() 39 taParams[1].memref.size = key_size; in rk_derive_ta_unique_key()
|