Searched refs:heap (Results 1 – 6 of 6) sorted by relevance
68 static buffer_alloc_ctx heap; variable95 memory_header *cur = heap.first; in debug_chain()104 cur = heap.first_free; in debug_chain()155 memory_header *prv = heap.first, *cur; in verify_chain()165 if (heap.first->prev != NULL) { in verify_chain()173 cur = heap.first->next; in verify_chain()201 memory_header *new, *cur = heap.first_free; in buffer_alloc_calloc()210 if (heap.buf == NULL || heap.first == NULL) { in buffer_alloc_calloc()250 heap.alloc_count++; in buffer_alloc_calloc()264 heap.first_free = cur->next_free; in buffer_alloc_calloc()[all …]
17 compatible = "linaro,secure-heap";
73 struct pta_stats_alloc heap; member
937 stats->heap.allocated = param.u[0].val.a; in dump_ta_stats()938 stats->heap.max_allocated = param.u[0].val.b; in dump_ta_stats()939 stats->heap.size = param.u[1].val.a; in dump_ta_stats()940 stats->heap.num_alloc_fail = param.u[1].val.b; in dump_ta_stats()941 stats->heap.biggest_alloc_fail = param.u[2].val.a; in dump_ta_stats()942 stats->heap.biggest_alloc_fail_used = param.u[2].val.b; in dump_ta_stats()944 memset(&stats->heap, 0, sizeof(stats->heap)); in dump_ta_stats()
150 * Zeroize a temporary heap buffer used in psa_key_derivation_output_key()152 * Zeroize temporary heap buffers used in PSA operations.622 * Use heap memory to allocate DER encoded public/private key.664 the buffer, causing a heap buffer overflow.854 * Fix a remotely exploitable heap buffer overflow in TLS handshake parsing.949 * Use heap memory to allocate DER encoded RSA private key.1068 * Fix a potential heap buffer overread in TLS 1.3 client-side when1286 * Fix potential heap buffer overread and overwrite in DTLS if1513 could thus potentially leak the key through freed heap.1520 * Fix a potential heap buffer overread in TLS 1.2 server-side when[all …]
1463 * Use a global setting for core heap size (CFG_CORE_HEAP_SIZE), 64K by default.