Home
last modified time | relevance | path

Searched refs:heap (Results 1 – 6 of 6) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/library/
H A Dmemory_buffer_alloc.c68 static buffer_alloc_ctx heap; variable
95 memory_header *cur = heap.first; in debug_chain()
104 cur = heap.first_free; in debug_chain()
155 memory_header *prv = heap.first, *cur; in verify_chain()
165 if (heap.first->prev != NULL) { in verify_chain()
173 cur = heap.first->next; in verify_chain()
201 memory_header *new, *cur = heap.first_free; in buffer_alloc_calloc()
210 if (heap.buf == NULL || heap.first == NULL) { in buffer_alloc_calloc()
250 heap.alloc_count++; in buffer_alloc_calloc()
264 heap.first_free = cur->next_free; in buffer_alloc_calloc()
[all …]
/optee_os/core/arch/arm/dts/
H A Dhikey.dts17 compatible = "linaro,secure-heap";
/optee_os/lib/libutee/include/
H A Dpta_stats.h73 struct pta_stats_alloc heap; member
/optee_os/core/kernel/
H A Dtee_ta_manager.c937 stats->heap.allocated = param.u[0].val.a; in dump_ta_stats()
938 stats->heap.max_allocated = param.u[0].val.b; in dump_ta_stats()
939 stats->heap.size = param.u[1].val.a; in dump_ta_stats()
940 stats->heap.num_alloc_fail = param.u[1].val.b; in dump_ta_stats()
941 stats->heap.biggest_alloc_fail = param.u[2].val.a; in dump_ta_stats()
942 stats->heap.biggest_alloc_fail_used = param.u[2].val.b; in dump_ta_stats()
944 memset(&stats->heap, 0, sizeof(stats->heap)); in dump_ta_stats()
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog150 * Zeroize a temporary heap buffer used in psa_key_derivation_output_key()
152 * Zeroize temporary heap buffers used in PSA operations.
622 * Use heap memory to allocate DER encoded public/private key.
664 the buffer, causing a heap buffer overflow.
854 * Fix a remotely exploitable heap buffer overflow in TLS handshake parsing.
949 * Use heap memory to allocate DER encoded RSA private key.
1068 * Fix a potential heap buffer overread in TLS 1.3 client-side when
1286 * Fix potential heap buffer overread and overwrite in DTLS if
1513 could thus potentially leak the key through freed heap.
1520 * Fix a potential heap buffer overread in TLS 1.2 server-side when
[all …]
/optee_os/
H A DCHANGELOG.md1463 * Use a global setting for core heap size (CFG_CORE_HEAP_SIZE), 64K by default.