| /optee_os/core/kernel/ |
| H A D | ldelf_loader.c | 119 struct ldelf_arg *arg = NULL; in ldelf_init_with_ldelf() local 126 usr_stack -= ROUNDUP(sizeof(*arg), STACK_ALIGNMENT); in ldelf_init_with_ldelf() 127 arg = (struct ldelf_arg *)usr_stack; in ldelf_init_with_ldelf() 130 res = clear_user(arg, sizeof(*arg)); in ldelf_init_with_ldelf() 134 res = PUT_USER_SCALAR(uctx->ts_ctx->uuid, &arg->uuid); in ldelf_init_with_ldelf() 138 res = thread_enter_user_mode((vaddr_t)arg, 0, 0, 0, in ldelf_init_with_ldelf() 156 res = BB_MEMDUP_USER(arg, sizeof(*arg), &arg_bbuf); in ldelf_init_with_ldelf() 182 bb_free(arg_bbuf, sizeof(*arg)); in ldelf_init_with_ldelf() 191 struct dump_entry_arg *arg = NULL; ldelf_dump_state() local 322 size_t *arg = NULL; ldelf_dump_ftrace() local 376 struct dl_entry_arg *arg = NULL; ldelf_dlopen() local 431 struct dl_entry_arg *arg = NULL; ldelf_dlsym() local [all...] |
| H A D | semihosting.c | 84 struct semihosting_param_t arg = { }; in semihosting_open() local 110 arg.param0 = (uintptr_t)fname; in semihosting_open() 111 arg.param1 = semi_open_flags; in semihosting_open() 112 arg.param2 = strlen(fname); in semihosting_open() 114 return (int)__do_semihosting(SEMIHOSTING_SYS_OPEN, (uintptr_t)&arg); in semihosting_open() 128 struct semihosting_param_t arg = { in semihosting_read() local 134 return __do_semihosting(SEMIHOSTING_SYS_READ, (uintptr_t)&arg); in semihosting_read() 147 struct semihosting_param_t arg = { in semihosting_write() local 153 return __do_semihosting(SEMIHOSTING_SYS_WRITE, (uintptr_t)&arg); in semihosting_write() 164 struct semihosting_param_t arg = { in semihosting_close() local [all …]
|
| /optee_os/ldelf/ |
| H A D | main.c | 32 static void __noreturn __maybe_unused dump_ta_state(struct dump_entry_arg *arg) in dump_ta_state() argument 45 arg->num_maps, arg->maps, mpool_base); in dump_ta_state() 48 if (arg->is_32bit) in dump_ta_state() 49 ta_elf_stack_trace_a32(arg->arm32.regs); in dump_ta_state() 51 ta_elf_stack_trace_a64(arg->arm64.fp, arg->arm64.sp, in dump_ta_state() 52 arg->arm64.pc); in dump_ta_state() 54 ta_elf_stack_trace_riscv(arg->rv.fp, arg in dump_ta_state() 114 dl_entry(struct dl_entry_arg * arg) dl_entry() argument 137 ldelf(struct ldelf_arg * arg) ldelf() argument [all...] |
| H A D | dl.c | 11 TEE_Result dlopen_entry(struct dl_entry_arg *arg) in dlopen_entry() argument 15 if (arg->dlopen.flags != (RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE)) in dlopen_entry() 18 if (!memcmp(&arg->dlopen.uuid, &zero, sizeof(zero))) in dlopen_entry() 21 return ta_elf_add_library(&arg->dlopen.uuid); in dlopen_entry() 24 TEE_Result dlsym_entry(struct dl_entry_arg *arg) in dlsym_entry() argument 29 if (memcmp(&arg->dlsym.uuid, &zero, sizeof(zero))) { in dlsym_entry() 30 elf = ta_elf_find_elf(&arg->dlsym.uuid); in dlsym_entry() 35 return ta_elf_resolve_sym(arg->dlsym.symbol, &arg->dlsym.val, NULL, in dlsym_entry()
|
| H A D | dl.h | 12 TEE_Result dlopen_entry(struct dl_entry_arg *arg); 13 TEE_Result dlsym_entry(struct dl_entry_arg *arg);
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes.c | 15 int pbes_decrypt(const pbes_arg *arg, unsigned char *dec_data, unsigned long *dec_size) in pbes_decrypt() argument 23 LTC_ARGCHK(arg != NULL); in pbes_decrypt() 24 LTC_ARGCHK(arg->type.kdf != NULL); in pbes_decrypt() 28 hid = find_hash(arg->type.h); in pbes_decrypt() 30 cid = find_cipher(arg->type.c); in pbes_decrypt() 33 klen = arg->type.keylen; in pbes_decrypt() 36 if (arg->key_bits != 0) { in pbes_decrypt() 38 if ((arg->key_bits % 8) != 0) return CRYPT_INVALID_KEYSIZE; in pbes_decrypt() 40 klen = arg->key_bits / 8; in pbes_decrypt() 44 if (arg->iv != NULL) { in pbes_decrypt() [all …]
|
| /optee_os/lib/libutils/ext/ |
| H A D | fault_mitigation.c | 43 void __weak ___ftmn_callee_done(struct ftmn_func_arg *arg, in ___ftmn_callee_done() argument 47 arg->hash ^= my_hash; in ___ftmn_callee_done() 48 arg->res = arg->hash ^ res; in ___ftmn_callee_done() 51 void __weak ___ftmn_callee_done_not_zero(struct ftmn_func_arg *arg, in ___ftmn_callee_done_not_zero() argument 57 arg->hash ^= my_hash; in ___ftmn_callee_done_not_zero() 58 arg->res = arg->hash ^ res; in ___ftmn_callee_done_not_zero() 61 void __weak ___ftmn_callee_done_memcmp(struct ftmn_func_arg *arg, in ___ftmn_callee_done_memcmp() argument 76 arg->hash ^= my_hash; in ___ftmn_callee_done_memcmp() 77 arg->res = arg->hash ^ res; in ___ftmn_callee_done_memcmp() 80 void __weak ___ftmn_callee_done_check(struct ftmn_func_arg *arg, in ___ftmn_callee_done_check() argument [all …]
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | ipi.c | 22 struct versal_cmd_args *arg) in versal_sha3_request() argument 30 if (arg->data[0]) { in versal_sha3_request() 32 reg_pair_from_64(virt_to_phys(arg->ibuf[0].mem.buf), &b, &a); in versal_sha3_request() 35 cmd.data[3] = arg->data[0]; in versal_sha3_request() 37 cmd.ibuf[0].mem = arg->ibuf[0].mem; in versal_sha3_request() 40 reg_pair_from_64(virt_to_phys(arg->ibuf[0].mem.buf), &b, &a); in versal_sha3_request() 44 cmd.ibuf[0].mem = arg->ibuf[0].mem; in versal_sha3_request() 51 struct versal_cmd_args *arg) in versal_aes_update_aad_request() argument 57 reg_pair_from_64(virt_to_phys(arg->ibuf[0].mem.buf), &b, &a); in versal_aes_update_aad_request() 62 cmd.data[3] = arg->data[0]; in versal_aes_update_aad_request() [all …]
|
| H A D | authenc.c | 198 struct versal_cmd_args arg = { }; in replay_init() local 201 if (versal_crypto_request(VERSAL_AES_INIT, &arg, &err)) { in replay_init() 206 arg.data[arg.dlen++] = engine.init.key_len; in replay_init() 207 arg.data[arg.dlen++] = engine.key_src; in replay_init() 208 arg.ibuf[0].mem = engine.init.key; in replay_init() 210 if (versal_crypto_request(VERSAL_AES_WRITE_KEY, &arg, &err)) { in replay_init() 215 memset(&arg, 0, sizeof(arg)); in replay_init() 217 arg.ibuf[0].mem = engine.init.init_buf; in replay_init() 218 arg.ibuf[1].mem = engine.init.nonce; in replay_init() 219 arg.ibuf[1].only_cache = true; in replay_init() [all …]
|
| H A D | ecc.c | 152 struct versal_cmd_args arg = { }; in verify() local 182 arg.data[0] = key->curve; in verify() 183 arg.dlen = 1; in verify() 184 arg.ibuf[0].mem = x; in verify() 186 &arg, &err)) { in verify() 191 memset(&arg, 0, sizeof(arg)); in verify() 207 arg.ibuf[0].mem = cmd_buf; in verify() 208 arg.ibuf[1].mem = p; in verify() 209 arg.ibuf[1].only_cache = true; in verify() 210 arg.ibuf[2].mem = x; in verify() [all …]
|
| H A D | rsa.c | 37 struct versal_cmd_args arg = { }; in do_encrypt() local 92 arg.ibuf[0].mem = cmd_buf; in do_encrypt() 93 arg.ibuf[1].mem = cipher; in do_encrypt() 94 arg.ibuf[2].mem = msg; in do_encrypt() 95 arg.ibuf[3].mem = key; in do_encrypt() 97 if (versal_crypto_request(VERSAL_RSA_PUBLIC_ENCRYPT, &arg, &err)) { in do_encrypt() 128 struct versal_cmd_args arg = { }; in do_decrypt() local 183 arg.ibuf[0].mem = cmd_buf; in do_decrypt() 184 arg.ibuf[1].mem = msg; in do_decrypt() 185 arg.ibuf[2].mem = cipher; in do_decrypt() [all …]
|
| /optee_os/core/tee/ |
| H A D | entry_std.c | 364 static void entry_open_session(struct optee_msg_arg *arg, uint32_t num_params) in entry_open_session() argument 375 res = get_open_session_meta(num_params, arg->params, &num_meta, &uuid, in entry_open_session() 380 res = copy_in_params(arg->params + num_meta, num_params - num_meta, in entry_open_session() 389 copy_out_param(¶m, num_params - num_meta, arg->params + num_meta, in entry_open_session() 405 arg->session = s->id; in entry_open_session() 407 arg->session = 0; in entry_open_session() 408 arg->ret = res; in entry_open_session() 409 arg->ret_origin = err_orig; in entry_open_session() 412 static void entry_close_session(struct optee_msg_arg *arg, uint32_t num_params) in entry_close_session() argument 425 s = tee_ta_find_session(arg->session, &tee_open_sessions); in entry_close_session() [all …]
|
| /optee_os/core/arch/riscv/kernel/ |
| H A D | thread_optee_abi.c | 101 size_t *num_params, struct optee_msg_arg **arg, in get_msg_arg() argument 114 *arg = p; in get_msg_arg() 115 *num_params = READ_ONCE((*arg)->num_params); in get_msg_arg() 144 static uint32_t call_entry_std(struct optee_msg_arg *arg, size_t num_params, in call_entry_std() argument 166 if (tee_entry_std(arg, num_params)) in call_entry_std() 186 struct optee_msg_arg *arg = NULL; in std_entry_with_parg() local 196 arg = phys_to_virt(parg, MEM_AREA_NSEC_SHM, in std_entry_with_parg() 198 if (!arg) in std_entry_with_parg() 201 num_params = READ_ONCE(arg->num_params); in std_entry_with_parg() 207 rpc_arg = (void *)((uint8_t *)arg + sz); in std_entry_with_parg() [all …]
|
| H A D | sbi.c | 58 int sbi_hsm_hart_start(uint32_t hartid, paddr_t start_addr, unsigned long arg) in sbi_hsm_hart_start() argument 63 arg); in sbi_hsm_hart_start()
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | thread_optee_smc.c | 100 size_t *num_params, struct optee_msg_arg **arg, in get_msg_arg() argument 113 *arg = p; in get_msg_arg() 114 *num_params = READ_ONCE((*arg)->num_params); in get_msg_arg() 143 static uint32_t call_entry_std(struct optee_msg_arg *arg, size_t num_params, in call_entry_std() argument 165 if (tee_entry_std(arg, num_params)) in call_entry_std() 185 struct optee_msg_arg *arg = NULL; in std_entry_with_parg() local 195 arg = phys_to_virt(parg, MEM_AREA_NSEC_SHM, in std_entry_with_parg() 197 if (!arg) in std_entry_with_parg() 200 num_params = READ_ONCE(arg->num_params); in std_entry_with_parg() 206 rpc_arg = (void *)((uint8_t *)arg + sz); in std_entry_with_parg() [all …]
|
| /optee_os/core/drivers/ |
| H A D | versal_puf.c | 111 struct versal_ipi_cmd arg = { }; in versal_puf_register() local 123 arg.ibuf[0].mem = request; in versal_puf_register() 124 arg.ibuf[1].mem = syndrome_data_addr; in versal_puf_register() 125 arg.ibuf[2].mem = hash_addr; in versal_puf_register() 126 arg.ibuf[3].mem = aux_addr; in versal_puf_register() 127 arg.ibuf[4].mem = puf_id_addr; in versal_puf_register() 128 arg.ibuf[5].mem = efuse_syn_data_addr; in versal_puf_register() 142 arg.data[0] = PUF_API_ID(VERSAL_PUF_REGISTER); in versal_puf_register() 143 reg_pair_from_64(virt_to_phys(arg.ibuf[0].mem.buf), in versal_puf_register() 144 &arg.data[2], &arg.data[1]); in versal_puf_register() [all …]
|
| H A D | versal_sha3_384.c | 22 struct versal_cmd_args arg = { .dlen = 1, }; in input_plaintext() local 33 arg.data[0] = first | VERSAL_SHA3_384_NEXT_PACKET | len; in input_plaintext() 34 arg.ibuf[0].mem = p; in input_plaintext() 35 ret = versal_crypto_request(VERSAL_SHA3_UPDATE, &arg, NULL); in input_plaintext() 49 struct versal_cmd_args arg = { }; in get_ciphertext() local 55 arg.ibuf[0].mem = p; in get_ciphertext() 56 ret = versal_crypto_request(VERSAL_SHA3_UPDATE, &arg, NULL); in get_ciphertext() 91 struct versal_cmd_args arg = { }; in versal_sha3_384_init() local 94 ret = versal_crypto_request(VERSAL_SHA3_KAT, &arg, NULL); in versal_sha3_384_init()
|
| H A D | versal_nvm.c | 118 struct versal_nvm_buf *ibufs, uint32_t *arg) in prepare_cmd() argument 125 if (arg) in prepare_cmd() 126 cmd->data[i++] = *arg; in prepare_cmd() 145 struct versal_nvm_buf *ibufs, uint32_t *arg) in efuse_req() argument 150 ret = prepare_cmd(&cmd, efuse, ibufs, arg); in efuse_req() 186 uint32_t *arg = NULL; in versal_nvm_read() local 206 arg = &val; in versal_nvm_read() 210 arg = &val; in versal_nvm_read() 214 arg = &val; in versal_nvm_read() 218 arg = &val; in versal_nvm_read() [all …]
|
| /optee_os/lib/libutils/ext/include/ |
| H A D | fault_mitigation.h | 106 struct ftmn_func_arg arg; member 227 void ___ftmn_callee_done(struct ftmn_func_arg *arg, unsigned long my_hash, 229 void ___ftmn_callee_done_not_zero(struct ftmn_func_arg *arg, 232 void ___ftmn_callee_done_memcmp(struct ftmn_func_arg *arg, 236 void ___ftmn_callee_done_check(struct ftmn_func_arg *arg, unsigned long my_hash, 240 void ___ftmn_callee_update_not_zero(struct ftmn_func_arg *arg, 253 struct ftmn_func_arg *arg, unsigned long res); 295 *ftmn->arg_pp = &ftmn->arg; in __ftmn_push_linked_call() 296 ftmn->arg.hash = my_hash; in __ftmn_push_linked_call() 311 assert(f->arg.hash == (f->my_hash ^ f->called_hash)); in __ftmn_copy_linked_call_res() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
| H A D | rsa_key.c | 21 void **arg[10] = { 0 }; in s_mpi_shrink_multi() local 33 arg[n] = cur; in s_mpi_shrink_multi() 34 if ((err = mp_init_copy(&tmp[n], *arg[n])) != CRYPT_OK) { in s_mpi_shrink_multi() 44 while (n != 0 && arg[--n] != NULL) { in s_mpi_shrink_multi() 45 mp_clear(*arg[n]); in s_mpi_shrink_multi() 46 *arg[n] = tmp[n]; in s_mpi_shrink_multi()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | platform.c | 115 int mbedtls_platform_win32_vsnprintf(char *s, size_t n, const char *fmt, va_list arg) in mbedtls_platform_win32_vsnprintf() argument 125 ret = vsnprintf_s(s, n, _TRUNCATE, fmt, arg); in mbedtls_platform_win32_vsnprintf() 127 ret = vsnprintf(s, n, fmt, arg); in mbedtls_platform_win32_vsnprintf() 144 const char *format, va_list arg) in platform_vsnprintf_uninit() argument 149 ((void) arg); in platform_vsnprintf_uninit() 158 va_list arg) = MBEDTLS_PLATFORM_STD_VSNPRINTF; 162 va_list arg)) in mbedtls_platform_set_vsnprintf() argument
|
| /optee_os/scripts/ |
| H A D | get_maintainer.py | 267 for arg in args.arg + downloads: 268 if os.path.exists(arg): 269 patches = split_patchset(arg) 273 arglist.append(arg) 275 for arg in arglist + split_patches: 278 if os.path.exists(arg): 280 (patch_paths, approved_by) = get_paths_from_patch(arg) 285 patch_paths = [PurePath(arg).as_posix()]
|
| /optee_os/core/include/tee/ |
| H A D | entry_std.h | 20 TEE_Result tee_entry_std(struct optee_msg_arg *arg, uint32_t num_params); 21 TEE_Result __tee_entry_std(struct optee_msg_arg *arg, uint32_t num_params);
|
| /optee_os/ta/pkcs11/scripts/ |
| H A D | verify-helpers.sh | 69 arg="$1" 72 case $arg in 80 echo "error: invalid argument: ${arg}" 1>&2
|
| /optee_os/core/drivers/rstctrl/ |
| H A D | stm32_rstctrl.c | 69 static TEE_Result stm32_rstctrl_get_dev(struct dt_pargs *arg, in stm32_rstctrl_get_dev() argument 76 if (arg->args_count != 1) in stm32_rstctrl_get_dev() 79 control_id = arg->args[0]; in stm32_rstctrl_get_dev()
|