Home
last modified time | relevance | path

Searched refs:memref (Results 1 – 25 of 76) sorted by relevance

1234

/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/
H A Dcryp_taf.c59 if (params[1].memref.size < sizeof(TEE_OperationInfo)) in ta_entry_get_operation_info()
61 params[1].memref.size = sizeof(TEE_OperationInfo); in ta_entry_get_operation_info()
63 TEE_GetOperationInfo(op, params[1].memref.buffer); in ta_entry_get_operation_info()
128 TEE_DigestUpdate(op, params[1].memref.buffer, params[1].memref.size); in ta_entry_digest_update()
142 params[1].memref.buffer, params[1].memref.size, in ta_entry_digest_do_final()
143 params[2].memref.buffer, &params[2].memref.size); in ta_entry_digest_do_final()
162 buffer = params[1].memref.buffer; in ta_entry_cipher_init()
163 size = params[1].memref.size; in ta_entry_cipher_init()
181 params[1].memref.buffer, params[1].memref.size, in ta_entry_cipher_update()
182 params[2].memref.buffer, &params[2].memref.size); in ta_entry_cipher_update()
[all …]
H A Daes_taf.c38 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt()
42 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt()
48 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_encrypt()
51 const unsigned char *ciphertext = params[0].memref.buffer; in ta_entry_aes256ecb_encrypt()
52 unsigned char *plaintext = params[1].memref.buffer; in ta_entry_aes256ecb_encrypt()
79 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt()
83 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt()
89 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_decrypt()
92 const unsigned char *ciphertext = params[0].memref.buffer; in ta_entry_aes256ecb_decrypt()
93 unsigned char *plaintext = params[1].memref.buffer; in ta_entry_aes256ecb_decrypt()
H A Dsha2_taf.c23 if (params[1].memref.size < SHA224_DIGEST_SIZE) in ta_entry_sha224()
26 sha224((unsigned char *)params[0].memref.buffer, in ta_entry_sha224()
27 (unsigned int)params[0].memref.size, in ta_entry_sha224()
28 (unsigned char *)params[1].memref.buffer); in ta_entry_sha224()
46 if (params[1].memref.size < SHA256_DIGEST_SIZE) in ta_entry_sha256()
49 sha256((unsigned char *)params[0].memref.buffer, in ta_entry_sha256()
50 (unsigned int)params[0].memref.size, in ta_entry_sha256()
51 (unsigned char *)params[1].memref.buffer); in ta_entry_sha256()
H A Dmbedtls_taf.c85 ret = mbedtls_x509_crt_parse(&crt, params[0].memref.buffer, in ta_entry_mbedtls_check_cert()
86 params[0].memref.size); in ta_entry_mbedtls_check_cert()
92 ret = mbedtls_x509_crt_parse(&trust_crt, params[1].memref.buffer, in ta_entry_mbedtls_check_cert()
93 params[1].memref.size); in ta_entry_mbedtls_check_cert()
240 ret = mbedtls_x509_csr_parse(&csr, params[0].memref.buffer, in ta_entry_mbedtls_sign_cert()
241 params[0].memref.size); in ta_entry_mbedtls_sign_cert()
320 sz = params[1].memref.size; in ta_entry_mbedtls_sign_cert()
321 res = write_cert(&crt, params[1].memref.buffer, &sz); in ta_entry_mbedtls_sign_cert()
324 params[1].memref.size = sz; in ta_entry_mbedtls_sign_cert()
326 ret = snprintf(params[2].memref.buffer, params[2].memref.size, in ta_entry_mbedtls_sign_cert()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/sdp_basic/
H A Dta_sdp_basic.c39 if (params[sec_idx].memref.size < params[ns_idx].memref.size) in cmd_inject()
53 params[ns_idx].memref.buffer, in cmd_inject()
54 params[ns_idx].memref.size); in cmd_inject()
63 params[sec_idx].memref.buffer, in cmd_inject()
64 params[sec_idx].memref.size); in cmd_inject()
78 rc = TEE_CacheFlush(params[sec_idx].memref.buffer, in cmd_inject()
79 params[sec_idx].memref.size); in cmd_inject()
82 params[sec_idx].memref.buffer, in cmd_inject()
83 params[sec_idx].memref.size, rc); in cmd_inject()
89 TEE_MemMove(params[sec_idx].memref.buffer, in cmd_inject()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/socket/
H A Dta_entry.c62 if (params[2].memref.size < sizeof(struct sock_handle)) { in ta_entry_tcp_open()
63 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_tcp_open()
69 setup.server_addr = strndup(params[1].memref.buffer, in ta_entry_tcp_open()
70 params[1].memref.size); in ta_entry_tcp_open()
78 memcpy(params[2].memref.buffer, &h, sizeof(h)); in ta_entry_tcp_open()
79 params[2].memref.size = sizeof(h); in ta_entry_tcp_open()
101 if (params[2].memref.size < sizeof(struct sock_handle)) { in ta_entry_udp_open()
102 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_udp_open()
108 setup.server_addr = strndup(params[1].memref.buffer, in ta_entry_udp_open()
109 params[1].memref.size); in ta_entry_udp_open()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/storage/
H A Dstorage.c36 object_id = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_open()
40 TEE_MemMove(object_id, params[0].memref.buffer, in ta_storage_cmd_open()
41 params[0].memref.size); in ta_storage_cmd_open()
44 object_id = params[0].memref.buffer; in ta_storage_cmd_open()
51 object_id, params[0].memref.size, in ta_storage_cmd_open()
78 object_id = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_create()
82 TEE_MemMove(object_id, params[0].memref.buffer, in ta_storage_cmd_create()
83 params[0].memref.size); in ta_storage_cmd_create()
86 object_id = params[0].memref.buffer; in ta_storage_cmd_create()
95 object_id, params[0].memref.size, in ta_storage_cmd_create()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rpc_test/
H A Dta_rpc.c50 params[n].memref.buffer = in rpc_call_cryp()
51 TEE_Malloc(pParams[n].memref.size, 0); in rpc_call_cryp()
52 if (!params[n].memref.buffer) in rpc_call_cryp()
54 params[n].memref.size = pParams[n].memref.size; in rpc_call_cryp()
57 TEE_MemMove(params[n].memref.buffer, in rpc_call_cryp()
58 pParams[n].memref.buffer, in rpc_call_cryp()
59 pParams[n].memref.size); in rpc_call_cryp()
91 TEE_MemMove(pParams[n].memref.buffer, in rpc_call_cryp()
92 params[n].memref.buffer, in rpc_call_cryp()
93 params[n].memref.size); in rpc_call_cryp()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/sims/
H A Dta_sims.c42 if (params[0].memref.size != sizeof(*uuid)) in sims_open_ta_session()
49 TEE_MemMove(uuid, params[0].memref.buffer, params[0].memref.size); in sims_open_ta_session()
104 if (storage[index].size > params[1].memref.size) in sims_read()
111 TEE_MemMove(params[1].memref.buffer, storage[index].data, in sims_read()
112 params[1].memref.size); in sims_read()
135 storage[index].data = TEE_Malloc(params[1].memref.size, 0); in sims_write()
140 storage[index].size = params[1].memref.size; in sims_write()
142 TEE_MemMove(storage[index].data, params[1].memref.buffer, in sims_write()
143 params[1].memref.size); in sims_write()
175 if (params[0].memref.buffer && params[0].memref.size) { in sims_entry_panic()
[all …]
/OK3568_Linux_fs/buildroot/package/rockchip/tee-user-app/extra_app/ta/
H A Dkeybox.c116 res = rk_get_trng(buf, params[0].memref.size); in TA_InvokeCommandEntryPoint()
122 g_hash = js_hash(0x47c6a7e6, buf, params[0].memref.size); in TA_InvokeCommandEntryPoint()
123 TEE_MemMove(params[0].memref.buffer, buf, params[0].memref.size); in TA_InvokeCommandEntryPoint()
150 if (params[0].memref.size > 64) in TA_InvokeCommandEntryPoint()
154 res = rk_get_trng(buf, params[0].memref.size); in TA_InvokeCommandEntryPoint()
168 params[0].memref.size, &count); in TA_InvokeCommandEntryPoint()
174 if (count != params[0].memref.size) in TA_InvokeCommandEntryPoint()
179 TEE_MemMove(params[0].memref.buffer, buf, params[0].memref.size); in TA_InvokeCommandEntryPoint()
190 if (params[0].memref.size > 64) in TA_InvokeCommandEntryPoint()
193 TEE_MemMove(buf, params[0].memref.buffer, params[0].memref.size); in TA_InvokeCommandEntryPoint()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/concurrent/
H A Dta_entry.c62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop()
65 params[1].value.b = inc_active_count(params[0].memref.buffer); in ta_entry_busy_loop()
77 dec_active_count(params[0].memref.buffer); in ta_entry_busy_loop()
100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256()
102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256()
105 params[1].value.b = inc_active_count(params[0].memref.buffer); in ta_entry_sha256()
107 out_len = params[3].memref.size; in ta_entry_sha256()
122 res = TEE_DigestDoFinal(op, params[2].memref.buffer, in ta_entry_sha256()
123 params[2].memref.size, out, &out_len); in ta_entry_sha256()
127 TEE_MemMove(params[3].memref.buffer, out, out_len); in ta_entry_sha256()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/concurrent_large/
H A Dta_entry.c62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop()
65 params[1].value.b = inc_active_count(params[0].memref.buffer); in ta_entry_busy_loop()
77 dec_active_count(params[0].memref.buffer); in ta_entry_busy_loop()
100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256()
102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256()
105 params[1].value.b = inc_active_count(params[0].memref.buffer); in ta_entry_sha256()
107 out_len = params[3].memref.size; in ta_entry_sha256()
122 res = TEE_DigestDoFinal(op, params[2].memref.buffer, in ta_entry_sha256()
123 params[2].memref.size, out, &out_len); in ta_entry_sha256()
127 TEE_MemMove(params[3].memref.buffer, out, out_len); in ta_entry_sha256()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/os_test/
H A Dos_test.c474 params[0].memref.buffer, in test_mem_access_right()
475 params[0].memref.size); in test_mem_access_right()
480 params[0].memref.buffer, in test_mem_access_right()
481 params[0].memref.size); in test_mem_access_right()
533 l_params[0].memref.buffer = buf; in test_mem_access_right()
534 l_params[0].memref.size = sizeof(buf); in test_mem_access_right()
535 l_params[1].memref.buffer = NULL; in test_mem_access_right()
536 l_params[1].memref.size = 0; in test_mem_access_right()
911 l_params[0].memref.buffer = in; in ta_entry_client()
912 l_params[0].memref.size = sizeof(sha256_in); in ta_entry_client()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v1/ta/rk_test/
H A Drktest_transfer_data.c24 IMSG("Get the params[1]: %s", (char *)params[1].memref.buffer); in handle_transfer_data()
26 params[2].memref.buffer, params[2].memref.size); in handle_transfer_data()
32 TEE_MemMove(params[2].memref.buffer, params[1].memref.buffer, params[2].memref.size); in handle_transfer_data()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_test/
H A Drktest_transfer_data.c24 IMSG("Get the params[1]: %s", (char *)params[1].memref.buffer); in handle_transfer_data()
26 params[2].memref.buffer, params[2].memref.size); in handle_transfer_data()
32 TEE_MemMove(params[2].memref.buffer, params[1].memref.buffer, params[2].memref.size); in handle_transfer_data()
H A Drktest_crypto_hw.c82 taParams[0].memref.buffer = config; in rk_user_ta_cipher()
83 taParams[0].memref.size = sizeof(*config); in rk_user_ta_cipher()
84 taParams[1].memref.buffer = src; in rk_user_ta_cipher()
85 taParams[1].memref.size = len; in rk_user_ta_cipher()
137 res = rk_user_ta_cipher(&config, params[0].memref.buffer, params[0].memref.size); in handle_crypto_hw()
152 res = rk_user_ta_cipher(&config, params[0].memref.buffer, params[0].memref.size); in handle_crypto_hw()
/OK3568_Linux_fs/external/security/librkcrypto/third_party/optee_client/libteec/src/
H A Dtee_client_api.c248 TEEC_RegisteredMemoryReference *memref, in teec_pre_process_whole() argument
252 uint32_t flags = memref->parent->flags & inout; in teec_pre_process_whole()
264 shm = memref->parent; in teec_pre_process_whole()
280 TEEC_RegisteredMemoryReference *memref, in teec_pre_process_partial() argument
303 shm = memref->parent; in teec_pre_process_partial()
308 if ((memref->offset + memref->size < memref->offset) || in teec_pre_process_partial()
309 (memref->offset + memref->size > shm->size)) in teec_pre_process_partial()
318 memcpy((char *)shm->shadow_buffer + memref->offset, in teec_pre_process_partial()
319 (char *)shm->buffer + memref->offset, memref->size); in teec_pre_process_partial()
322 MEMREF_SHM_OFFS(param) = memref->offset; in teec_pre_process_partial()
[all …]
/OK3568_Linux_fs/u-boot/lib/optee_clientApi/
H A DOpteeClientRPC.c97 (size_t)TeeSmc32Param[0].u.memref.buf_ptr; in OpteeRpcCmdLoadTa()
98 TeeLoadTaCmdSize = TeeSmc32Param[0].u.memref.size; in OpteeRpcCmdLoadTa()
140 TeeSmc32Param[1].u.memref.buf_ptr = AllocAddress; in OpteeRpcCmdLoadTa()
141 TeeSmc32Param[1].u.memref.size = ImageSize; in OpteeRpcCmdLoadTa()
170 if (TeeSmc32Param[1].u.memref.buf_ptr == 0) { in OpteeRpcCmdLoadV2Ta()
172 TeeSmc32Param[1].u.memref.size = 0; in OpteeRpcCmdLoadV2Ta()
177 (uint64_t)TeeSmc32Param[1].u.memref.buf_ptr, in OpteeRpcCmdLoadV2Ta()
178 (uint64_t)TeeSmc32Param[1].u.memref.size); in OpteeRpcCmdLoadV2Ta()
212 AllocAddress = TeeSmc32Param[0].u.memref.buf_ptr; in OpteeRpcCmdFreeTa()
213 ImageSize = TeeSmc32Param[0].u.memref.size; in OpteeRpcCmdFreeTa()
[all …]
H A DOpteeClientRkNewFs_v2.c882 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_open()
884 filename = (char *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_open()
916 filename = (char *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_create()
918 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_create()
990 data = (uint8_t *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_read()
992 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_read()
996 len = params[1].u.memref.size; in ree_fs_new_read()
1022 params[1].u.memref.size = di; in ree_fs_new_read()
1042 data = (uint8_t *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_write()
1044 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_write()
[all …]
H A DOpteeClientRkNewFs_v1.c969 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_open()
971 filename = (char *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_open()
1009 filename = (char *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_create()
1011 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_create()
1089 data = (uint8_t *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_read()
1091 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_read()
1095 len = params[1].u.memref.size; in ree_fs_new_read()
1120 params[1].u.memref.size = di; in ree_fs_new_read()
1145 data = (uint8_t *)(size_t)params[1].u.memref.shm_id; in ree_fs_new_write()
1147 params[1].u.memref.shm_id, params[1].u.memref.shm_offs); in ree_fs_new_write()
[all …]
/OK3568_Linux_fs/kernel/drivers/tee/optee/
H A Dcore.c70 p->u.memref.size = mp->u.tmem.size; in optee_from_msg_param()
74 p->u.memref.shm_offs = 0; in optee_from_msg_param()
75 p->u.memref.shm = NULL; in optee_from_msg_param()
81 p->u.memref.shm_offs = mp->u.tmem.buf_ptr - pa; in optee_from_msg_param()
82 p->u.memref.shm = shm; in optee_from_msg_param()
89 p->u.memref.size = mp->u.rmem.size; in optee_from_msg_param()
94 p->u.memref.shm_offs = 0; in optee_from_msg_param()
95 p->u.memref.shm = NULL; in optee_from_msg_param()
98 p->u.memref.shm_offs = mp->u.rmem.offs; in optee_from_msg_param()
99 p->u.memref.shm = shm; in optee_from_msg_param()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/aes_perf/
H A Dta_aes_perf.c45 param->memref.buffer, 1); in is_inbuf_a_secure_memref()
62 param->memref.buffer, 1); in is_outbuf_a_secure_memref()
71 res = TEE_CacheFlush(param->memref.buffer, in flush_memref_buffer()
72 param->memref.size); in flush_memref_buffer()
133 in = params[0].memref.buffer; in cmd_process()
134 insz = params[0].memref.size; in cmd_process()
135 out = params[1].memref.buffer; in cmd_process()
136 outsz = params[1].memref.size; in cmd_process()
/OK3568_Linux_fs/buildroot/package/rockchip/tee-user-app/extra_app/host/
H A Dmain.c140 operation.params[0].memref.parent = &sm; in process_key()
141 operation.params[0].memref.offset = 0; in process_key()
142 operation.params[0].memref.size = sm.size; in process_key()
170 operation.params[0].memref.parent = &sm; in process_key()
171 operation.params[0].memref.offset = 0; in process_key()
172 operation.params[0].memref.size = sm.size; in process_key()
186 operation.params[0].memref.parent = &sm; in process_key()
187 operation.params[0].memref.offset = 0; in process_key()
188 operation.params[0].memref.size = sm.size; in process_key()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/host/xtest/
H A Dsdp_basic.c261 op.params[1].memref.parent = shm; in inject_sdp_data()
262 op.params[1].memref.size = len; in inject_sdp_data()
263 op.params[1].memref.offset = offset; in inject_sdp_data()
301 op.params[0].memref.parent = shm; in transform_sdp_data()
302 op.params[0].memref.size = len; in transform_sdp_data()
303 op.params[0].memref.offset = offset; in transform_sdp_data()
342 op.params[0].memref.parent = shm; in dump_sdp_data()
343 op.params[0].memref.size = len; in dump_sdp_data()
344 op.params[0].memref.offset = offset; in dump_sdp_data()
534 op.params[0].memref.parent = in; in invoke_out_of_bounds()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_public_api/
H A Drk_derive_key_api.c36 taParams[0].memref.buffer = extra; in rk_derive_ta_unique_key()
37 taParams[0].memref.size = extra_size; in rk_derive_ta_unique_key()
38 taParams[1].memref.buffer = key; in rk_derive_ta_unique_key()
39 taParams[1].memref.size = key_size; in rk_derive_ta_unique_key()

1234