Home
last modified time | relevance | path

Searched refs:buffer (Results 1 – 25 of 109) sorted by relevance

12345

/optee_os/lib/libutils/isoc/newlib/
H A Dmemset.c81 unsigned long buffer; variable
102 buffer = (d << 8) | d;
103 buffer |= (buffer << 16);
105 buffer = (buffer << i) | buffer;
109 *aligned_addr++ = buffer;
110 *aligned_addr++ = buffer;
111 *aligned_addr++ = buffer;
112 *aligned_addr++ = buffer;
117 *aligned_addr++ = buffer;
/optee_os/core/drivers/crypto/se050/glue/
H A Di2c.c17 static int i2c_transfer(uint8_t *buffer, int len, enum rpc_i2c_mode mode) in i2c_transfer() argument
23 .buffer = buffer, in i2c_transfer()
38 int glue_i2c_read(uint8_t *buffer, int len) in glue_i2c_read() argument
40 return i2c_transfer(buffer, len, RPC_I2C_MODE_READ); in glue_i2c_read()
43 int glue_i2c_write(uint8_t *buffer, int len) in glue_i2c_write() argument
45 return i2c_transfer(buffer, len, RPC_I2C_MODE_WRITE); in glue_i2c_write()
H A Di2c_imx.c17 ret = imx_i2c_read(req->bus, req->chip, req->buffer, in native_i2c_transfer()
20 ret = imx_i2c_write(req->bus, req->chip, req->buffer, in native_i2c_transfer()
/optee_os/core/arch/arm/plat-rockchip/
H A Dplatform_rk3588.c177 uint8_t buffer[HW_UNIQUE_KEY_LENGTH] = { }; in generate_huk()
182 res = hw_get_random_bytes(buffer, sizeof(buffer)); in generate_huk()
187 for (i = 0; i < ARRAY_SIZE(buffer); i++) { in generate_huk()
188 if (buffer[i] != 0) in generate_huk()
194 memcpy(hwkey->data, buffer, HW_UNIQUE_KEY_LENGTH); in generate_huk()
202 uint32_t buffer[ROCKCHIP_OTP_HUK_SIZE] = { }; in persist_huk()
204 static_assert(sizeof(buffer) == sizeof(hwkey->data)); in persist_huk()
206 memcpy(buffer, hwkey->data, HW_UNIQUE_KEY_LENGTH); in persist_huk()
209 res = rockchip_otp_write_secure(buffer, ROCKCHIP_OTP_HUK_INDE in persist_huk()
176 uint8_t buffer[HW_UNIQUE_KEY_LENGTH] = { }; generate_huk() local
201 uint32_t buffer[ROCKCHIP_OTP_HUK_SIZE] = { }; persist_huk() local
218 uint32_t buffer[ROCKCHIP_OTP_HUK_SIZE] = { }; read_huk() local
[all...]
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
H A Decc_ssh_ecdsa_encode_name.c20 int ecc_ssh_ecdsa_encode_name(char *buffer, unsigned long *buflen, const ecc_key *key) in ecc_ssh_ecdsa_encode_name() argument
26 LTC_ARGCHK(buffer != NULL); in ecc_ssh_ecdsa_encode_name()
36 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp256"); in ecc_ssh_ecdsa_encode_name()
40 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp384"); in ecc_ssh_ecdsa_encode_name()
44 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp521"); in ecc_ssh_ecdsa_encode_name()
47 size = snprintf(buffer, *buflen, "ecdsa-sha2-%s", oidstr); in ecc_ssh_ecdsa_encode_name()
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_pake.c312 operation->buffer, in mbedtls_psa_pake_output_internal()
313 sizeof(operation->buffer), in mbedtls_psa_pake_output_internal()
324 operation->buffer, in mbedtls_psa_pake_output_internal()
325 sizeof(operation->buffer), in mbedtls_psa_pake_output_internal()
354 length = operation->buffer[operation->buffer_offset]; in mbedtls_psa_pake_output_internal()
366 operation->buffer + operation->buffer_offset, in mbedtls_psa_pake_output_internal()
375 mbedtls_platform_zeroize(operation->buffer, sizeof(operation->buffer)); in mbedtls_psa_pake_output_internal()
448 sizeof(operation->buffer)) { in mbedtls_psa_pake_input_internal()
452 memcpy(operation->buffer + operation->buffer_length, in mbedtls_psa_pake_input_internal()
462 if (operation->buffer_length + input_length + 1 > sizeof(operation->buffer)) { in mbedtls_psa_pake_input_internal()
[all …]
H A Dbase64.c282 unsigned char buffer[128]; in mbedtls_base64_self_test() local
290 if (mbedtls_base64_encode(buffer, sizeof(buffer), &len, src, 64) != 0 || in mbedtls_base64_self_test()
291 memcmp(base64_test_enc, buffer, 88) != 0) { in mbedtls_base64_self_test()
305 if (mbedtls_base64_decode(buffer, sizeof(buffer), &len, src, 88) != 0 || in mbedtls_base64_self_test()
306 memcmp(base64_test_dec, buffer, 64) != 0) { in mbedtls_base64_self_test()
/optee_os/core/kernel/
H A Dotp_stubs.c29 __weak int tee_otp_get_die_id(uint8_t *buffer, size_t len) in tee_otp_get_die_id() argument
31 if (huk_subkey_derive(HUK_SUBKEY_DIE_ID, NULL, 0, buffer, len)) in tee_otp_get_die_id()
48 uint8_t *buffer, size_t len) in tee_otp_get_ta_enc_key() argument
53 ta_pub_key_modulus_size, buffer, len)) in tee_otp_get_ta_enc_key()
H A Dmsg_param.c62 static bool msg_param_extract_pages(paddr_t buffer, paddr_t *pages, in msg_param_extract_pages() argument
71 if (buffer & SMALL_PAGE_MASK) in msg_param_extract_pages()
78 mobj = mobj_mapped_shm_alloc(&buffer, 1, 0, 0); in msg_param_extract_pages()
/optee_os/lib/libutee/
H A Dtee_api.c54 a = (vaddr_t)params[n].memref.buffer; in copy_param()
84 a = (vaddr_t)params[n].memref.buffer; in copy_gp11_param()
197 memcpy(params[n].memref.buffer, tmp_va[n], in update_out_param()
227 memcpy(params[n].memref.buffer, tmp_va[n], in update_out_gp11_param()
269 ta_params[n].memref.buffer, in check_mem_access_rights_params()
296 void *buf = params[n].memref.buffer; in check_invoke_param()
561 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer, in TEE_CheckMemoryAccessRights() argument
573 if (_utee_check_access_rights(accessFlags, buffer, size)) in TEE_CheckMemoryAccessRights()
584 if (check_mem_access_rights_params(flags, buffer, size)) in TEE_CheckMemoryAccessRights()
587 if (malloc_buffer_overlaps_heap(buffer, size) && in TEE_CheckMemoryAccessRights()
[all …]
H A Duser_ta_entry_compat.c25 gp11_params[n].memref.buffer = params[n].memref.buffer; in to_gp11_param()
51 params[n].memref.buffer = gp11_params[n].memref.buffer; in from_gp11_param()
H A Dtee_api_objects.c25 ua[n].a = (uintptr_t)attrs[n].content.ref.buffer; in __utee_from_attr()
43 ua[n].a = (uintptr_t)attrs[n].content.ref.buffer; in __utee_from_gp11_attr()
198 uint32_t attributeID, void *buffer, in TEE_GetObjectBufferAttribute() argument
219 buffer, &sz); in TEE_GetObjectBufferAttribute()
235 void *buffer, uint32_t *size) in __GP11_TEE_GetObjectBufferAttribute() argument
242 res = TEE_GetObjectBufferAttribute(object, attributeID, buffer, &l); in __GP11_TEE_GetObjectBufferAttribute()
440 const void *buffer, size_t length) in TEE_InitRefAttribute() argument
447 attr->content.ref.buffer = (void *)buffer; in TEE_InitRefAttribute()
453 const void *buffer, uint32_t length) in __GP11_TEE_InitRefAttribute() argument
460 attr->content.ref.buffer = (void *)buffer; in __GP11_TEE_InitRefAttribute()
[all …]
/optee_os/core/pta/tests/
H A Dinvoke.c87 if (p[0].memref.buffer || p[0].memref.size) in test_entry_memref_null()
180 p[0].memref.buffer, p[0].memref.size, p[1].memref.buffer, in test_entry_params()
181 p[1].memref.size, p[2].memref.buffer, p[2].memref.size, in test_entry_params()
182 p[3].memref.buffer, p[3].memref.size); in test_entry_params()
189 in = (uint8_t *)p[0].memref.buffer; in test_entry_params()
195 *(uint8_t *)p[0].memref.buffer = d8; in test_entry_params()
203 in = (uint8_t *)p[1].memref.buffer; in test_entry_params()
209 *(uint8_t *)p[1].memref.buffer = d8; in test_entry_params()
217 in = (uint8_t *)p[2].memref.buffer; in test_entry_params()
223 *(uint8_t *)p[2].memref.buffer = d8; in test_entry_params()
[all …]
/optee_os/lib/libutils/isoc/
H A Dbget.doc11 overhead required for buffer pool management. It automatically
25 entire buffer pool.
29 * Quantisation of buffer sizes to a power of two to
70 buffer pools may not be larger than a segment, but since BGET allows any
71 number of separate buffer pools, there is no limit on the total storage
91 buffer allocation (often in a separate RAM address space distinct from
94 the buffer pool area in RAM, then allocate buffers with bget() and
105 Initially define a buffer pool of an appropriate size with
111 brel(). If a buffer allocation request fails, obtain more storage from
112 the underlying operating system, add it to the buffer pool by another
[all …]
/optee_os/core/pta/
H A Dsystem.c44 entropy_input = params[0].memref.buffer; in system_rng_reseed()
95 (uaddr_t)params[1].memref.buffer, in system_derive_ta_unique_key()
111 res = copy_from_user(data + sizeof(TEE_UUID), params[0].memref.buffer, in system_derive_ta_unique_key()
127 res = copy_to_user(params[1].memref.buffer, subkey_bbuf, in system_derive_ta_unique_key()
239 if (!params[0].memref.buffer || params[0].memref.size != sizeof(uuid)) in system_dlopen()
242 res = copy_from_user(&uuid, params[0].memref.buffer, sizeof(uuid)); in system_dlopen()
272 if (!params[0].memref.buffer || params[0].memref.size != sizeof(uuid)) in system_dlsym()
275 res = copy_from_user(&uuid, params[0].memref.buffer, sizeof(uuid)); in system_dlsym()
279 if (!params[1].memref.buffer) in system_dlsym()
281 res = bb_strndup_user(params[1].memref.buffer, params[1].memref.size, in system_dlsym()
[all …]
H A Drtc.c73 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*pta_time))) in rtc_pta_get_time()
76 pta_time = params[0].memref.buffer; in rtc_pta_get_time()
101 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*pta_time))) in rtc_pta_set_time()
104 pta_time = params[0].memref.buffer; in rtc_pta_set_time()
162 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*pta_alarm))) in rtc_pta_read_alarm()
165 pta_alarm = params[0].memref.buffer; in rtc_pta_read_alarm()
188 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*pta_alarm))) in rtc_pta_set_alarm()
191 pta_alarm = params[0].memref.buffer; in rtc_pta_set_alarm()
278 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*info))) in rtc_pta_get_info()
281 info = params[0].memref.buffer; in rtc_pta_get_info()
H A Dapdu.c70 params[1].memref.buffer, in invoke_command()
72 params[2].memref.buffer, in invoke_command()
74 params[3].memref.buffer, in invoke_command()
/optee_os/lib/libutee/include/
H A Dtee_api_types.h51 void *buffer; member
62 void *buffer; member
126 void *buffer; member
139 void *buffer; member
209 uint8_t *buffer; member
H A Dtee_internal_api.h111 TEE_Result TEE_CheckMemoryAccessRights(uint32_t accessFlags, void *buffer,
114 void *buffer, uint32_t size);
123 void *TEE_Realloc(void *buffer, size_t newSize);
124 void *__GP11_TEE_Realloc(void *buffer, uint32_t newSize);
126 void TEE_Free(void *buffer);
159 uint32_t attributeID, void *buffer,
163 void *buffer, uint32_t *size);
192 const void *buffer, size_t length);
195 const void *buffer, uint32_t length);
272 TEE_Result TEE_ReadObjectData(TEE_ObjectHandle object, void *buffer,
[all …]
/optee_os/core/drivers/nvmem/
H A Dnvmem_die_id.c19 int tee_otp_get_die_id(uint8_t *buffer, size_t len) in tee_otp_get_die_id() argument
22 if (huk_subkey_derive(HUK_SUBKEY_DIE_ID, NULL, 0, buffer, len)) in tee_otp_get_die_id()
27 memcpy(buffer, die_id, MIN(die_id_len, len)); in tee_otp_get_die_id()
/optee_os/core/include/kernel/
H A Dtee_common_otp.h19 int tee_otp_get_die_id(uint8_t *buffer, size_t len);
20 TEE_Result tee_otp_get_ta_enc_key(uint32_t key_type, uint8_t *buffer,
/optee_os/ta/pkcs11/src/
H A Dpkcs11_token.c264 if (out->memref.buffer) in entry_ck_slot_list()
270 for (token_id = 0, id = out->memref.buffer; token_id < TOKEN_COUNT; in entry_ck_slot_list()
336 serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); in entry_ck_slot_info()
353 TEE_MemMove(out->memref.buffer, &info, out->memref.size); in entry_ck_slot_info()
390 serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); in entry_ck_token_info()
420 TEE_MemMove(out->memref.buffer, &info, sizeof(info)); in entry_ck_token_info()
457 serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); in entry_ck_token_mecha_ids()
476 if (out->memref.buffer) in entry_ck_token_mecha_ids()
488 TEE_MemMove(out->memref.buffer, array, out->memref.size); in entry_ck_token_mecha_ids()
513 serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); in entry_ck_token_mecha_info()
[all …]
/optee_os/core/drivers/crypto/se050/core/
H A Ddie_id.c13 int tee_otp_get_die_id(uint8_t *buffer, size_t len) in tee_otp_get_die_id() argument
25 if (tee_hash_createdigest(TEE_ALG_SHA256, die_id, die_id_len, buffer, in tee_otp_get_die_id()
/optee_os/ta/trusted_keys/
H A Dentry.c44 if (!params[0].memref.buffer || !params[0].memref.size) in get_random()
52 memcpy(params[0].memref.buffer, rng_buf, params[0].memref.size); in get_random()
79 params[0].memref.buffer = extra; in derive_unique_key()
83 params[1].memref.buffer = key; in derive_unique_key()
173 attr.content.ref.buffer = huk_key; in huk_crypt()
221 in = params[0].memref.buffer; in seal_trusted_key()
223 out = params[1].memref.buffer; in seal_trusted_key()
264 in = params[0].memref.buffer; in unseal_trusted_key()
266 out = params[1].memref.buffer; in unseal_trusted_key()
/optee_os/core/pta/imx/
H A Dmanufacturing_protection.c29 data = params[0].memref.buffer; in mp_get_public_key()
60 msg = params[0].memref.buffer; in mp_signature()
62 sig = params[1].memref.buffer; in mp_signature()
64 mpmr = params[2].memref.buffer; in mp_signature()

12345