| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_ciphersuites_internal.h | 16 mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(const mbedtls_ssl_ciphersuite_t *info); 18 psa_algorithm_t mbedtls_ssl_get_ciphersuite_sig_pk_psa_alg(const mbedtls_ssl_ciphersuite_t *info); 19 psa_key_usage_t mbedtls_ssl_get_ciphersuite_sig_pk_psa_usage(const mbedtls_ssl_ciphersuite_t *info); 21 mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(const mbedtls_ssl_ciphersuite_t *info); 24 int mbedtls_ssl_ciphersuite_uses_ec(const mbedtls_ssl_ciphersuite_t *info); 25 int mbedtls_ssl_ciphersuite_uses_psk(const mbedtls_ssl_ciphersuite_t *info); 28 static inline int mbedtls_ssl_ciphersuite_has_pfs(const mbedtls_ssl_ciphersuite_t *info) in mbedtls_ssl_ciphersuite_has_pfs() argument 30 switch (info->MBEDTLS_PRIVATE(key_exchange)) { in mbedtls_ssl_ciphersuite_has_pfs() 46 static inline int mbedtls_ssl_ciphersuite_no_pfs(const mbedtls_ssl_ciphersuite_t *info) in mbedtls_ssl_ciphersuite_no_pfs() argument 48 switch (info->MBEDTLS_PRIVATE(key_exchange)) { in mbedtls_ssl_ciphersuite_no_pfs() [all …]
|
| H A D | hkdf.c | 18 const unsigned char *info, size_t info_len, in mbedtls_hkdf() argument 28 info, info_len, okm, okm_len); in mbedtls_hkdf() 64 size_t prk_len, const unsigned char *info, in mbedtls_hkdf_expand() argument 86 if (info == NULL) { in mbedtls_hkdf_expand() 87 info = (const unsigned char *) ""; in mbedtls_hkdf_expand() 131 ret = mbedtls_md_hmac_update(&ctx, info, info_len); in mbedtls_hkdf_expand()
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_objects.c | 58 struct utee_object_info info = { }; in TEE_GetObjectInfo() local 61 res = _utee_cryp_obj_get_info((unsigned long)object, &info); in TEE_GetObjectInfo() 66 if (info.obj_type == TEE_TYPE_CORRUPTED_OBJECT) { in TEE_GetObjectInfo() 74 objectInfo->objectType = info.obj_type; in TEE_GetObjectInfo() 75 objectInfo->objectSize = info.obj_size; in TEE_GetObjectInfo() 76 objectInfo->maxObjectSize = info.max_obj_size; in TEE_GetObjectInfo() 77 objectInfo->objectUsage = info.obj_usage; in TEE_GetObjectInfo() 78 objectInfo->dataSize = info.data_size; in TEE_GetObjectInfo() 79 objectInfo->dataPosition = info.data_pos; in TEE_GetObjectInfo() 80 objectInfo->handleFlags = info.handle_flags; in TEE_GetObjectInfo() [all …]
|
| H A D | tee_api_operations.c | 20 TEE_OperationInfo info; member 317 op->info.algorithm = algorithm; in TEE_AllocateOperation() 318 op->info.operationClass = TEE_ALG_GET_CLASS(algorithm); in TEE_AllocateOperation() 321 op->info.operationClass = TEE_OPERATION_ASYMMETRIC_SIGNATURE; in TEE_AllocateOperation() 323 op->info.mode = mode; in TEE_AllocateOperation() 324 op->info.digestLength = TEE_ALG_GET_DIGEST_SIZE(algorithm); in TEE_AllocateOperation() 325 op->info.maxKeySize = maxKeySize; in TEE_AllocateOperation() 326 op->info.requiredKeyUsage = req_key_usage; in TEE_AllocateOperation() 327 op->info.handleState = handle_state; in TEE_AllocateOperation() 333 if (op->info.operationClass == TEE_OPERATION_DIGEST) in TEE_AllocateOperation() [all …]
|
| H A D | user_ta_entry.c | 44 struct dl_phdr_info info; member 56 static int _init_iterate_phdr_cb(struct dl_phdr_info *info, in _init_iterate_phdr_cb() argument 67 qe->info = *info; in _init_iterate_phdr_cb() 73 static void _get_fn_array(struct dl_phdr_info *info, Elf_Sword tag_a, in _get_fn_array() argument 82 for (i = 0; i < info->dlpi_phnum; i++) { in _get_fn_array() 83 phdr = info->dlpi_phdr + i; in _get_fn_array() 87 dyn = (Elf_Dyn *)(phdr->p_vaddr + info->dlpi_addr); in _get_fn_array() 95 info->dlpi_addr); in _get_fn_array() 120 _get_fn_array(&qe->info, DT_INIT_ARRAY, DT_INIT_ARRAYSZ, &fn, in __utee_call_elf_init_fn() 136 static int _fini_iterate_phdr_cb(struct dl_phdr_info *info, in _fini_iterate_phdr_cb() argument [all …]
|
| /optee_os/lib/libutee/include/ |
| H A D | elf64.h | 146 #define ELF64_R_SYM(info) ((info) >> 32) argument 147 #define ELF64_R_TYPE(info) ((info) & 0xffffffffL) argument 152 #define ELF64_R_TYPE_DATA(info) (((Elf64_Xword)(info)<<32)>>40) argument 153 #define ELF64_R_TYPE_ID(info) (((Elf64_Xword)(info)<<56)>>56) argument 173 #define ELF64_M_SYM(info) ((info)>>8) argument 174 #define ELF64_M_SIZE(info) ((unsigned char)(info)) argument 202 #define ELF64_ST_BIND(info) ((info) >> 4) argument 203 #define ELF64_ST_TYPE(info) ((info) & 0xf) argument
|
| H A D | elf32.h | 137 #define ELF32_R_SYM(info) ((info) >> 8) argument 138 #define ELF32_R_TYPE(info) ((unsigned char)(info)) argument 166 #define ELF32_M_SYM(info) ((info)>>8) argument 167 #define ELF32_M_SIZE(info) ((unsigned char)(info)) argument 195 #define ELF32_ST_BIND(info) ((info) >> 4) argument 196 #define ELF32_ST_TYPE(info) ((info) & 0xf) argument
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | cipher.h | 438 const mbedtls_cipher_info_t *info) in mbedtls_cipher_info_get_type() argument 440 if (info == NULL) { in mbedtls_cipher_info_get_type() 443 return (mbedtls_cipher_type_t) info->MBEDTLS_PRIVATE(type); in mbedtls_cipher_info_get_type() 457 const mbedtls_cipher_info_t *info) in mbedtls_cipher_info_get_mode() argument 459 if (info == NULL) { in mbedtls_cipher_info_get_mode() 462 return (mbedtls_cipher_mode_t) info->MBEDTLS_PRIVATE(mode); in mbedtls_cipher_info_get_mode() 478 const mbedtls_cipher_info_t *info) in mbedtls_cipher_info_get_key_bitlen() argument 480 if (info == NULL) { in mbedtls_cipher_info_get_key_bitlen() 483 return ((size_t) info->MBEDTLS_PRIVATE(key_bitlen)) << MBEDTLS_KEY_BITLEN_SHIFT; in mbedtls_cipher_info_get_key_bitlen() 499 const mbedtls_cipher_info_t *info) in mbedtls_cipher_info_get_name() argument [all …]
|
| H A D | hkdf.h | 58 const unsigned char *info, size_t info_len, 117 size_t prk_len, const unsigned char *info,
|
| H A D | ssl_ciphersuites.h | 466 static inline const char *mbedtls_ssl_ciphersuite_get_name(const mbedtls_ssl_ciphersuite_t *info) in mbedtls_ssl_ciphersuite_get_name() argument 468 return info->MBEDTLS_PRIVATE(name); in mbedtls_ssl_ciphersuite_get_name() 471 static inline int mbedtls_ssl_ciphersuite_get_id(const mbedtls_ssl_ciphersuite_t *info) in mbedtls_ssl_ciphersuite_get_id() argument 473 return info->MBEDTLS_PRIVATE(id); in mbedtls_ssl_ciphersuite_get_id() 476 size_t mbedtls_ssl_ciphersuite_get_cipher_key_bitlen(const mbedtls_ssl_ciphersuite_t *info);
|
| /optee_os/core/tee/ |
| H A D | tee_svc_storage.c | 150 o->info.dataSize = size - sizeof(head) - head.attr_size; in tee_svc_storage_read_head() 151 o->info.objectSize = head.objectSize; in tee_svc_storage_read_head() 153 o->info.objectType = head.objectType; in tee_svc_storage_read_head() 211 o->info.handleFlags = TEE_HANDLE_FLAG_PERSISTENT | in syscall_storage_obj_open() 259 res = tee_obj_set_type(o, attr_o->info.objectType, in tee_svc_storage_init_file() 260 attr_o->info.maxObjectSize); in tee_svc_storage_init_file() 267 o->pobj->obj_info_usage = attr_o->info.objectUsage; in tee_svc_storage_init_file() 268 o->info.objectSize = attr_o->info.objectSize; in tee_svc_storage_init_file() 291 head.objectSize = o->info.objectSize; in tee_svc_storage_init_file() 292 head.maxObjectSize = o->info.maxObjectSize; in tee_svc_storage_init_file() [all …]
|
| H A D | tee_svc_cryp.c | 1174 struct utee_object_info *info) in syscall_cryp_obj_get_info() argument 1186 o_info.obj_type = o->info.objectType; in syscall_cryp_obj_get_info() 1187 o_info.obj_size = o->info.objectSize; in syscall_cryp_obj_get_info() 1188 o_info.max_obj_size = o->info.maxObjectSize; in syscall_cryp_obj_get_info() 1189 if (o->info.handleFlags & TEE_HANDLE_FLAG_PERSISTENT) { in syscall_cryp_obj_get_info() 1194 o_info.obj_usage = o->info.objectUsage; in syscall_cryp_obj_get_info() 1196 o_info.data_size = o->info.dataSize; in syscall_cryp_obj_get_info() 1197 o_info.data_pos = o->info.dataPosition; in syscall_cryp_obj_get_info() 1198 o_info.handle_flags = o->info.handleFlags; in syscall_cryp_obj_get_info() 1199 res = copy_to_user_private(info, &o_info, sizeof(o_info)); in syscall_cryp_obj_get_info() [all …]
|
| H A D | tee_cryp_hkdf.c | 66 size_t prk_len, const uint8_t *info, in hkdf_expand() argument 85 if (!info) in hkdf_expand() 124 res = crypto_mac_update(ctx, info, info_len); in hkdf_expand() 146 const uint8_t *info, size_t info_len, uint8_t *okm, in tee_cryp_hkdf() argument 157 res = hkdf_expand(hash_id, prk, prk_len, info, info_len, okm, in tee_cryp_hkdf()
|
| /optee_os/core/drivers/ |
| H A D | stm32_uart.c | 116 struct dt_node_info info = { }; in stm32_uart_init_from_dt_node() local 118 fdt_fill_device_info(fdt, &info, node); in stm32_uart_init_from_dt_node() 120 if (info.status == DT_STATUS_DISABLED) in stm32_uart_init_from_dt_node() 123 assert(info.reg != DT_INFO_INVALID_REG && in stm32_uart_init_from_dt_node() 124 info.reg_size != DT_INFO_INVALID_REG_SIZE); in stm32_uart_init_from_dt_node() 131 pd->base.pa = info.reg; in stm32_uart_init_from_dt_node() 145 info.reg_size); in stm32_uart_init_from_dt_node()
|
| H A D | stm32_hsem.c | 175 struct dt_node_info info = { }; in parse_dt() local 178 fdt_fill_device_info(fdt, &info, node); in parse_dt() 179 assert(info.reg != DT_INFO_INVALID_REG && in parse_dt() 180 info.reg_size != DT_INFO_INVALID_REG_SIZE); in parse_dt() 182 addr.pa = info.reg; in parse_dt() 183 hsem_d->base = io_pa_or_va_secure(&addr, info.reg_size); in parse_dt()
|
| H A D | stm32_ipcc.c | 256 struct dt_node_info info = { }; in parse_dt() local 262 fdt_fill_device_info(fdt, &info, node); in parse_dt() 263 assert(info.reg != DT_INFO_INVALID_REG && in parse_dt() 264 info.reg_size != DT_INFO_INVALID_REG_SIZE); in parse_dt() 266 addr.pa = info.reg; in parse_dt() 267 ipcc_d->base = io_pa_or_va_secure(&addr, info.reg_size); in parse_dt()
|
| /optee_os/core/drivers/pm/sam/ |
| H A D | at91_pm.c | 148 const struct wakeup_source_info *info; member 153 { .compatible = "atmel,sama5d2-gem", .info = &ws_info[0] }, 154 { .compatible = "atmel,at91rm9200-rtc", .info = &ws_info[1] }, 155 { .compatible = "atmel,sama5d3-udc", .info = &ws_info[2] }, 156 { .compatible = "atmel,at91rm9200-ohci", .info = &ws_info[2] }, 157 { .compatible = "usb-ohci", .info = &ws_info[2] }, 158 { .compatible = "atmel,at91sam9g45-ehci", .info = &ws_info[2] }, 159 { .compatible = "usb-ehci", .info = &ws_info[2] }, 160 { .compatible = "atmel,sama5d2-sdhci", .info = &ws_info[3] } 163 { .compatible = "microchip,sama7g5-rtc", .info = &ws_info[1] }, [all …]
|
| /optee_os/core/lib/libtomcrypt/src/misc/hkdf/ |
| H A D | hkdf.c | 31 int hkdf_expand(int hash_idx, const unsigned char *info, unsigned long infolen, in hkdf_expand() argument 54 if (info == NULL && infolen != 0) { in hkdf_expand() 64 if (info != NULL) { in hkdf_expand() 65 XMEMCPY(T + hashsize, info, infolen); in hkdf_expand() 103 const unsigned char *info, unsigned long infolen, in hkdf() argument 127 err = hkdf_expand(hash_idx, info, infolen, extracted, hashsize, out, outlen); in hkdf()
|
| /optee_os/core/pta/ |
| H A D | rtc.c | 267 struct pta_rtc_info *info = NULL; in rtc_pta_get_info() local 278 if (!IS_ALIGNED_WITH_TYPE(params[0].memref.buffer, typeof(*info))) in rtc_pta_get_info() 281 info = params[0].memref.buffer; in rtc_pta_get_info() 282 if (!info || params[0].memref.size != sizeof(*info)) in rtc_pta_get_info() 285 memset(info, 0, sizeof(*info)); in rtc_pta_get_info() 291 info->version = PTA_RTC_INFO_VERSION; in rtc_pta_get_info() 294 info->features |= PTA_RTC_FEATURE_CORRECTION; in rtc_pta_get_info() 296 info->features |= PTA_RTC_FEATURE_ALARM; in rtc_pta_get_info() 298 info->features |= PTA_RTC_FEATURE_WAKEUP_ALARM; in rtc_pta_get_info() 300 rtc_pta_copy_time_from_optee(&info->range_min, &range_min); in rtc_pta_get_info() [all …]
|
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_token.c | 286 static void set_token_description(struct pkcs11_slot_info *info) in set_token_description() argument 288 char desc[sizeof(info->slot_description) + 1] = { 0 }; in set_token_description() 305 TEE_MemMove(info->slot_description, desc, n); in set_token_description() 306 pad_str(info->slot_description, sizeof(info->slot_description)); in set_token_description() 320 struct pkcs11_slot_info info = { in entry_ck_slot_info() local 329 sizeof(info.slot_description)); in entry_ck_slot_info() 331 sizeof(info.manufacturer_id)); in entry_ck_slot_info() 333 if (ptypes != exp_pt || out->memref.size != sizeof(info)) in entry_ck_slot_info() 348 set_token_description(&info); in entry_ck_slot_info() 350 pad_str(info.manufacturer_id, sizeof(info.manufacturer_id)); in entry_ck_slot_info() [all …]
|
| /optee_os/core/drivers/rstctrl/ |
| H A D | stm32_rstctrl.c | 93 struct dt_node_info info = { }; in stm32_rstctrl_provider_probe() local 97 fdt_fill_device_info(fdt, &info, offs); in stm32_rstctrl_provider_probe() 99 assert(info.reg == RCC_BASE && in stm32_rstctrl_provider_probe() 100 info.reg_size != DT_INFO_INVALID_REG_SIZE); in stm32_rstctrl_provider_probe()
|
| /optee_os/core/drivers/bnxt/ |
| H A D | bnxt_fw.c | 179 uint32_t info; member 584 struct nitro_crash_addr_info *info = NULL; in bnxt_crash_config() local 593 info = malloc(sizeof(struct nitro_crash_addr_info)); in bnxt_crash_config() 594 if (!info) { in bnxt_crash_config() 599 memset(info, 0, sizeof(struct nitro_crash_addr_info)); in bnxt_crash_config() 601 info->signature = BNXT_CRASH_INFO_SIGNATURE; in bnxt_crash_config() 602 info->version = 0x01000000 | MAX_CRASH_ADDR_ITEM; in bnxt_crash_config() 605 item = &info->table[0]; in bnxt_crash_config() 606 item->info = 0; in bnxt_crash_config() 613 (const char *)info + sizeof(uint32_t), in bnxt_crash_config() [all …]
|
| /optee_os/core/arch/arm/cpu/ |
| H A D | cortex-a35.mk | 5 platform-cflags-debug-info = -gdwarf-2 6 platform-aflags-debug-info = -gdwarf-2
|
| H A D | cortex-a320.mk | 7 platform-cflags-debug-info = -gdwarf-2 8 platform-aflags-debug-info = -gdwarf-2
|
| /optee_os/core/arch/arm/plat-automotive_rd/ |
| H A D | conf.mk | 24 platform-cflags-debug-info = -gdwarf-4 25 platform-aflags-debug-info = -gdwarf-4
|