| /optee_os/lib/libutils/isoc/newlib/ |
| H A D | memset.c | 81 unsigned long buffer; variable 102 buffer = (d << 8) | d; 103 buffer |= (buffer << 16); 105 buffer = (buffer << i) | buffer; 109 *aligned_addr++ = buffer; 110 *aligned_addr++ = buffer; 111 *aligned_addr++ = buffer; 112 *aligned_addr++ = buffer; 117 *aligned_addr++ = buffer;
|
| /optee_os/core/drivers/crypto/se050/glue/ |
| H A D | i2c.c | 17 static int i2c_transfer(uint8_t *buffer, int len, enum rpc_i2c_mode mode) in i2c_transfer() argument 23 .buffer = buffer, in i2c_transfer() 38 int glue_i2c_read(uint8_t *buffer, int len) in glue_i2c_read() argument 40 return i2c_transfer(buffer, len, RPC_I2C_MODE_READ); in glue_i2c_read() 43 int glue_i2c_write(uint8_t *buffer, int len) in glue_i2c_write() argument 45 return i2c_transfer(buffer, len, RPC_I2C_MODE_WRITE); in glue_i2c_write()
|
| H A D | i2c_imx.c | 17 ret = imx_i2c_read(req->bus, req->chip, req->buffer, in native_i2c_transfer() 20 ret = imx_i2c_write(req->bus, req->chip, req->buffer, in native_i2c_transfer()
|
| /optee_os/core/arch/arm/plat-rockchip/ |
| H A D | platform_rk3588.c | 177 uint8_t buffer[HW_UNIQUE_KEY_LENGTH] = { }; in generate_huk() 182 res = hw_get_random_bytes(buffer, sizeof(buffer)); in generate_huk() 187 for (i = 0; i < ARRAY_SIZE(buffer); i++) { in generate_huk() 188 if (buffer[i] != 0) in generate_huk() 194 memcpy(hwkey->data, buffer, HW_UNIQUE_KEY_LENGTH); in generate_huk() 202 uint32_t buffer[ROCKCHIP_OTP_HUK_SIZE] = { }; in persist_huk() 204 static_assert(sizeof(buffer) == sizeof(hwkey->data)); in persist_huk() 206 memcpy(buffer, hwkey->data, HW_UNIQUE_KEY_LENGTH); in persist_huk() 209 res = rockchip_otp_write_secure(buffer, ROCKCHIP_OTP_HUK_INDE in persist_huk() 176 uint8_t buffer[HW_UNIQUE_KEY_LENGTH] = { }; generate_huk() local 201 uint32_t buffer[ROCKCHIP_OTP_HUK_SIZE] = { }; persist_huk() local 218 uint32_t buffer[ROCKCHIP_OTP_HUK_SIZE] = { }; read_huk() local [all...] |
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_ssh_ecdsa_encode_name.c | 20 int ecc_ssh_ecdsa_encode_name(char *buffer, unsigned long *buflen, const ecc_key *key) in ecc_ssh_ecdsa_encode_name() argument 26 LTC_ARGCHK(buffer != NULL); in ecc_ssh_ecdsa_encode_name() 36 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp256"); in ecc_ssh_ecdsa_encode_name() 40 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp384"); in ecc_ssh_ecdsa_encode_name() 44 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp521"); in ecc_ssh_ecdsa_encode_name() 47 size = snprintf(buffer, *buflen, "ecdsa-sha2-%s", oidstr); in ecc_ssh_ecdsa_encode_name()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_pake.c | 312 operation->buffer, in mbedtls_psa_pake_output_internal() 313 sizeof(operation->buffer), in mbedtls_psa_pake_output_internal() 324 operation->buffer, in mbedtls_psa_pake_output_internal() 325 sizeof(operation->buffer), in mbedtls_psa_pake_output_internal() 354 length = operation->buffer[operation->buffer_offset]; in mbedtls_psa_pake_output_internal() 366 operation->buffer + operation->buffer_offset, in mbedtls_psa_pake_output_internal() 375 mbedtls_platform_zeroize(operation->buffer, sizeof(operation->buffer)); in mbedtls_psa_pake_output_internal() 448 sizeof(operation->buffer)) { in mbedtls_psa_pake_input_internal() 452 memcpy(operation->buffer + operation->buffer_length, in mbedtls_psa_pake_input_internal() 462 if (operation->buffer_length + input_length + 1 > sizeof(operation->buffer)) { in mbedtls_psa_pake_input_internal() [all …]
|
| H A D | base64.c | 282 unsigned char buffer[128]; in mbedtls_base64_self_test() local 290 if (mbedtls_base64_encode(buffer, sizeof(buffer), &len, src, 64) != 0 || in mbedtls_base64_self_test() 291 memcmp(base64_test_enc, buffer, 88) != 0) { in mbedtls_base64_self_test() 305 if (mbedtls_base64_decode(buffer, sizeof(buffer), &len, src, 88) != 0 || in mbedtls_base64_self_test() 306 memcmp(base64_test_dec, buffer, 64) != 0) { in mbedtls_base64_self_test()
|
| /optee_os/core/kernel/ |
| H A D | otp_stubs.c | 29 __weak int tee_otp_get_die_id(uint8_t *buffer, size_t len) in tee_otp_get_die_id() argument 31 if (huk_subkey_derive(HUK_SUBKEY_DIE_ID, NULL, 0, buffer, len)) in tee_otp_get_die_id() 48 uint8_t *buffer, size_t len) in tee_otp_get_ta_enc_key() argument 53 ta_pub_key_modulus_size, buffer, len)) in tee_otp_get_ta_enc_key()
|
| H A D | msg_param.c | 62 static bool msg_param_extract_pages(paddr_t buffer, paddr_t *pages, in msg_param_extract_pages() argument 71 if (buffer & SMALL_PAGE_MASK) in msg_param_extract_pages() 78 mobj = mobj_mapped_shm_alloc(&buffer, 1, 0, 0); in msg_param_extract_pages()
|
| /optee_os/lib/libutee/ |
| H A D | tee_api.c | 54 a = (vaddr_t)params[n].memref.buffer; in copy_param() 84 a = (vaddr_t)params[n].memref.buffer; in copy_gp11_param() 197 memcpy(params[n].memref.buffer, tmp_va[n], in update_out_param() 227 memcpy(params[n].memref.buffer, tmp_va[n], in update_out_gp11_param() 269 ta_params[n].memref.buffer, in check_mem_access_rights_params() 296 void *buf = params[n].memref.buffer; in check_invoke_param() 561 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer, in TEE_CheckMemoryAccessRights() argument 573 if (_utee_check_access_rights(accessFlags, buffer, size)) in TEE_CheckMemoryAccessRights() 584 if (check_mem_access_rights_params(flags, buffer, size)) in TEE_CheckMemoryAccessRights() 587 if (malloc_buffer_overlaps_heap(buffer, size) && in TEE_CheckMemoryAccessRights() [all …]
|
| H A D | user_ta_entry_compat.c | 25 gp11_params[n].memref.buffer = params[n].memref.buffer; in to_gp11_param() 51 params[n].memref.buffer = gp11_params[n].memref.buffer; in from_gp11_param()
|
| H A D | tee_api_objects.c | 25 ua[n].a = (uintptr_t)attrs[n].content.ref.buffer; in __utee_from_attr() 43 ua[n].a = (uintptr_t)attrs[n].content.ref.buffer; in __utee_from_gp11_attr() 198 uint32_t attributeID, void *buffer, in TEE_GetObjectBufferAttribute() argument 219 buffer, &sz); in TEE_GetObjectBufferAttribute() 235 void *buffer, uint32_t *size) in __GP11_TEE_GetObjectBufferAttribute() argument 242 res = TEE_GetObjectBufferAttribute(object, attributeID, buffer, &l); in __GP11_TEE_GetObjectBufferAttribute() 440 const void *buffer, size_t length) in TEE_InitRefAttribute() argument 447 attr->content.ref.buffer = (void *)buffer; in TEE_InitRefAttribute() 453 const void *buffer, uint32_t length) in __GP11_TEE_InitRefAttribute() argument 460 attr->content.ref.buffer = (void *)buffer; in __GP11_TEE_InitRefAttribute() [all …]
|
| /optee_os/core/pta/tests/ |
| H A D | invoke.c | 87 if (p[0].memref.buffer || p[0].memref.size) in test_entry_memref_null() 180 p[0].memref.buffer, p[0].memref.size, p[1].memref.buffer, in test_entry_params() 181 p[1].memref.size, p[2].memref.buffer, p[2].memref.size, in test_entry_params() 182 p[3].memref.buffer, p[3].memref.size); in test_entry_params() 189 in = (uint8_t *)p[0].memref.buffer; in test_entry_params() 195 *(uint8_t *)p[0].memref.buffer = d8; in test_entry_params() 203 in = (uint8_t *)p[1].memref.buffer; in test_entry_params() 209 *(uint8_t *)p[1].memref.buffer = d8; in test_entry_params() 217 in = (uint8_t *)p[2].memref.buffer; in test_entry_params() 223 *(uint8_t *)p[2].memref.buffer = d8; in test_entry_params() [all …]
|
| /optee_os/lib/libutils/isoc/ |
| H A D | bget.doc | 11 overhead required for buffer pool management. It automatically 25 entire buffer pool. 29 * Quantisation of buffer sizes to a power of two to 70 buffer pools may not be larger than a segment, but since BGET allows any 71 number of separate buffer pools, there is no limit on the total storage 91 buffer allocation (often in a separate RAM address space distinct from 94 the buffer pool area in RAM, then allocate buffers with bget() and 105 Initially define a buffer pool of an appropriate size with 111 brel(). If a buffer allocation request fails, obtain more storage from 112 the underlying operating system, add it to the buffer pool by another [all …]
|
| /optee_os/core/pta/ |
| H A D | system.c | 44 entropy_input = params[0].memref.buffer; in system_rng_reseed() 95 (uaddr_t)params[1].memref.buffer, in system_derive_ta_unique_key() 111 res = copy_from_user(data + sizeof(TEE_UUID), params[0].memref.buffer, in system_derive_ta_unique_key() 127 res = copy_to_user(params[1].memref.buffer, subkey_bbuf, in system_derive_ta_unique_key() 239 if (!params[0].memref.buffer || params[0].memref.size != sizeof(uuid)) in system_dlopen() 242 res = copy_from_user(&uuid, params[0].memref.buffer, sizeof(uuid)); in system_dlopen() 272 if (!params[0].memref.buffer || params[0].memref.size != sizeof(uuid)) in system_dlsym() 275 res = copy_from_user(&uuid, params[0].memref.buffer, sizeof(uuid)); in system_dlsym() 279 if (!params[1].memref.buffer) in system_dlsym() 281 res = bb_strndup_user(params[1].memref.buffer, params[1].memref.size, in system_dlsym() [all …]
|
| H A D | rtc.c | 73 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*pta_time))) in rtc_pta_get_time() 76 pta_time = params[0].memref.buffer; in rtc_pta_get_time() 101 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*pta_time))) in rtc_pta_set_time() 104 pta_time = params[0].memref.buffer; in rtc_pta_set_time() 162 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*pta_alarm))) in rtc_pta_read_alarm() 165 pta_alarm = params[0].memref.buffer; in rtc_pta_read_alarm() 188 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*pta_alarm))) in rtc_pta_set_alarm() 191 pta_alarm = params[0].memref.buffer; in rtc_pta_set_alarm() 278 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*info))) in rtc_pta_get_info() 281 info = params[0].memref.buffer; in rtc_pta_get_info()
|
| H A D | apdu.c | 70 params[1].memref.buffer, in invoke_command() 72 params[2].memref.buffer, in invoke_command() 74 params[3].memref.buffer, in invoke_command()
|
| /optee_os/lib/libutee/include/ |
| H A D | tee_api_types.h | 51 void *buffer; member 62 void *buffer; member 126 void *buffer; member 139 void *buffer; member 209 uint8_t *buffer; member
|
| H A D | tee_internal_api.h | 111 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer, 114 void *buffer, uint32_t size); 123 void *TEE_Realloc(void *buffer, size_t newSize); 124 void *__GP11_TEE_Realloc(void *buffer, uint32_t newSize); 126 void TEE_Free(void *buffer); 159 uint32_t attributeID, void *buffer, 163 void *buffer, uint32_t *size); 192 const void *buffer, size_t length); 195 const void *buffer, uint32_t length); 272 TEE_Result TEE_ReadObjectData(TEE_ObjectHandle object, void *buffer, [all …]
|
| /optee_os/core/drivers/nvmem/ |
| H A D | nvmem_die_id.c | 19 int tee_otp_get_die_id(uint8_t *buffer, size_t len) in tee_otp_get_die_id() argument 22 if (huk_subkey_derive(HUK_SUBKEY_DIE_ID, NULL, 0, buffer, len)) in tee_otp_get_die_id() 27 memcpy(buffer, die_id, MIN(die_id_len, len)); in tee_otp_get_die_id()
|
| /optee_os/core/include/kernel/ |
| H A D | tee_common_otp.h | 19 int tee_otp_get_die_id(uint8_t *buffer, size_t len); 20 TEE_Result tee_otp_get_ta_enc_key(uint32_t key_type, uint8_t *buffer,
|
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_token.c | 264 if (out->memref.buffer) in entry_ck_slot_list() 270 for (token_id = 0, id = out->memref.buffer; token_id < TOKEN_COUNT; in entry_ck_slot_list() 336 serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); in entry_ck_slot_info() 353 TEE_MemMove(out->memref.buffer, &info, out->memref.size); in entry_ck_slot_info() 390 serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); in entry_ck_token_info() 420 TEE_MemMove(out->memref.buffer, &info, sizeof(info)); in entry_ck_token_info() 457 serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); in entry_ck_token_mecha_ids() 476 if (out->memref.buffer) in entry_ck_token_mecha_ids() 488 TEE_MemMove(out->memref.buffer, array, out->memref.size); in entry_ck_token_mecha_ids() 513 serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); in entry_ck_token_mecha_info() [all …]
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | die_id.c | 13 int tee_otp_get_die_id(uint8_t *buffer, size_t len) in tee_otp_get_die_id() argument 25 if (tee_hash_createdigest(TEE_ALG_SHA256, die_id, die_id_len, buffer, in tee_otp_get_die_id()
|
| /optee_os/ta/trusted_keys/ |
| H A D | entry.c | 44 if (!params[0].memref.buffer || !params[0].memref.size) in get_random() 52 memcpy(params[0].memref.buffer, rng_buf, params[0].memref.size); in get_random() 79 params[0].memref.buffer = extra; in derive_unique_key() 83 params[1].memref.buffer = key; in derive_unique_key() 173 attr.content.ref.buffer = huk_key; in huk_crypt() 221 in = params[0].memref.buffer; in seal_trusted_key() 223 out = params[1].memref.buffer; in seal_trusted_key() 264 in = params[0].memref.buffer; in unseal_trusted_key() 266 out = params[1].memref.buffer; in unseal_trusted_key()
|
| /optee_os/core/pta/imx/ |
| H A D | manufacturing_protection.c | 29 data = params[0].memref.buffer; in mp_get_public_key() 60 msg = params[0].memref.buffer; in mp_signature() 62 sig = params[1].memref.buffer; in mp_signature() 64 mpmr = params[2].memref.buffer; in mp_signature()
|