| /optee_os/lib/libutils/ext/arch/arm/ |
| H A D | memtag.c | 58 static void set_tags_dc_gva(vaddr_t va, size_t size, size_t dcsz) in set_tags_dc_gva() argument 63 size -= dcsz; in set_tags_dc_gva() 64 } while (size); in set_tags_dc_gva() 67 static void clear_mem_dc_gzva(vaddr_t va, size_t size, size_t dcsz) in clear_mem_dc_gzva() argument 72 size -= dcsz; in clear_mem_dc_gzva() 73 } while (size); in clear_mem_dc_gzva() 76 static void *set_tags_helper(void *addr, size_t size) in set_tags_helper() argument 79 vaddr_t end = va + size; in set_tags_helper() 82 assert(!(size & MEMTAG_GRANULE_MASK)); in set_tags_helper() 90 static void *set_tags_dc_helper(void *addr, size_t size) in set_tags_dc_helper() argument [all …]
|
| /optee_os/lib/libutils/isoc/include/ |
| H A D | malloc.h | 22 void *malloc(size_t size); 23 void *malloc_flags(uint32_t flags, void *ptr, size_t alignment, size_t size); 24 void *calloc(size_t nmemb, size_t size); 25 void *realloc(void *ptr, size_t size); 26 void *memalign(size_t alignment, size_t size); 31 void *aligned_alloc(size_t alignment, size_t size); 36 size_t size, const char *fname, int lineno); 40 #define malloc(size) __mdbg_alloc(MAF_NULL, NULL, 1, 1, \ argument 41 (size), __FILE__, __LINE__) 42 #define malloc_flags(flags, ptr, align, size) \ argument [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ltc_ecc_export_point.c | 8 …nt(unsigned char *out, unsigned long *outlen, void *x, void *y, unsigned long size, int compressed) in ltc_ecc_export_point() argument 14 if (size > sizeof(buf)) return CRYPT_BUFFER_OVERFLOW; in ltc_ecc_export_point() 15 if ((xsize = mp_unsigned_bin_size(x)) > size) return CRYPT_BUFFER_OVERFLOW; in ltc_ecc_export_point() 16 if ((ysize = mp_unsigned_bin_size(y)) > size) return CRYPT_BUFFER_OVERFLOW; in ltc_ecc_export_point() 19 if (*outlen < (1 + size)) { in ltc_ecc_export_point() 20 *outlen = 1 + size; in ltc_ecc_export_point() 27 if ((err = mp_to_unsigned_bin(x, buf + (size - xsize))) != CRYPT_OK) return err; in ltc_ecc_export_point() 28 XMEMCPY(out+1, buf, size); in ltc_ecc_export_point() 30 *outlen = 1 + size; in ltc_ecc_export_point() 33 if (*outlen < (1 + 2*size)) { in ltc_ecc_export_point() [all …]
|
| H A D | ecc_get_key.c | 18 unsigned long size, ksize; in ecc_get_key() local 25 size = key->dp.size; in ecc_get_key() 30 …if ((err = ltc_ecc_export_point(out, outlen, key->pubkey.x, key->pubkey.y, size, compressed)) != C… in ecc_get_key() 36 if (size > *outlen) { in ecc_get_key() 37 *outlen = size; in ecc_get_key() 40 *outlen = size; in ecc_get_key() 41 …if ((ksize = mp_unsigned_bin_size(key->k)) > size) return CRYPT_BUFFER_OV… in ecc_get_key() 43 if ((err = mp_to_unsigned_bin(key->k, out + (size - ksize))) != CRYPT_OK) return err; in ecc_get_key() 44 zeromem(out, size - ksize); in ecc_get_key()
|
| H A D | ecc_ssh_ecdsa_encode_name.c | 24 int err, size = 0; in ecc_ssh_ecdsa_encode_name() local 36 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp256"); in ecc_ssh_ecdsa_encode_name() 40 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp384"); in ecc_ssh_ecdsa_encode_name() 44 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp521"); in ecc_ssh_ecdsa_encode_name() 47 size = snprintf(buffer, *buflen, "ecdsa-sha2-%s", oidstr); in ecc_ssh_ecdsa_encode_name() 52 if (size < 0) { in ecc_ssh_ecdsa_encode_name() 54 } else if ((unsigned)size >= *buflen) { in ecc_ssh_ecdsa_encode_name() 59 *buflen = size + 1; /* the string length + NUL byte */ in ecc_ssh_ecdsa_encode_name()
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/choice/ |
| H A D | der_decode_choice.c | 23 unsigned long size, x, z; in der_decode_choice() local 42 size = list[x].size; in der_decode_choice() 77 if (der_decode_bit_string(in, *inlen, data, &size) == CRYPT_OK) { in der_decode_choice() 78 if (der_length_bit_string(size, &z) == CRYPT_OK) { in der_decode_choice() 80 list[x].size = size; in der_decode_choice() 88 if (der_decode_raw_bit_string(in, *inlen, data, &size) == CRYPT_OK) { in der_decode_choice() 89 if (der_length_bit_string(size, &z) == CRYPT_OK) { in der_decode_choice() 91 list[x].size = size; in der_decode_choice() 99 if (der_decode_octet_string(in, *inlen, data, &size) == CRYPT_OK) { in der_decode_choice() 100 if (der_length_octet_string(size, &z) == CRYPT_OK) { in der_decode_choice() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/misc/ssh/ |
| H A D | ssh_encode_sequence_multi.c | 24 ulong32 size; in ssh_encode_sequence_multi() local 36 size = 0; in ssh_encode_sequence_multi() 43 size++; in ssh_encode_sequence_multi() 47 size += 4; in ssh_encode_sequence_multi() 51 size += 8; in ssh_encode_sequence_multi() 56 size += va_arg(args, unsigned long); in ssh_encode_sequence_multi() 57 size += 4; in ssh_encode_sequence_multi() 62 size += 4; in ssh_encode_sequence_multi() 64 size += mp_unsigned_bin_size(vdata); in ssh_encode_sequence_multi() 65 if ((mp_count_bits(vdata) & 7) == 0) size++; /* Zero padding if high bit set */ in ssh_encode_sequence_multi() [all …]
|
| H A D | ssh_decode_sequence_multi.c | 31 ulong32 size; in ssh_decode_sequence_multi() local 54 size = 0xFFFFFFFFU; in ssh_decode_sequence_multi() 58 size = 1; in ssh_decode_sequence_multi() 61 size = 4; in ssh_decode_sequence_multi() 64 size = 8; in ssh_decode_sequence_multi() 69 LOAD32H(size, in); in ssh_decode_sequence_multi() 82 if (remaining < size) { in ssh_decode_sequence_multi() 86 remaining -= size; in ssh_decode_sequence_multi() 127 if (size + 1 >= *bufsize) { in ssh_decode_sequence_multi() 131 if (size > 0) { in ssh_decode_sequence_multi() [all …]
|
| /optee_os/core/mm/ |
| H A D | phys_mem.c | 55 return nex_ta_pool->size; in nex_phys_mem_get_ta_size() 57 return nex_core_pool->size - TEE_RAM_VA_SIZE; in nex_phys_mem_get_ta_size() 70 return pool && core_is_buffer_inside(addr, 1, pool->lo, pool->size); in is_in_pool_range() 89 size_t size, uint32_t flags) in mm_alloc() argument 94 mm = tee_mm_alloc_flags(p0, size, flags); in mm_alloc() 96 mm = tee_mm_alloc_flags(p1, size, flags); in mm_alloc() 101 tee_mm_entry_t *nex_phys_mem_core_alloc(size_t size) in nex_phys_mem_core_alloc() argument 103 return mm_alloc(nex_core_pool, NULL, size, MAF_NULL); in nex_phys_mem_core_alloc() 106 tee_mm_entry_t *nex_phys_mem_ta_alloc(size_t size) in nex_phys_mem_ta_alloc() argument 108 return mm_alloc(nex_ta_pool, nex_core_pool, size, MAF_NULL); in nex_phys_mem_ta_alloc() [all …]
|
| H A D | tee_mm.c | 15 bool tee_mm_init(tee_mm_pool_t *pool, paddr_t lo, paddr_size_t size, in tee_mm_init() argument 26 size = ROUNDDOWN2(size - rounded, 1 << shift); in tee_mm_init() 28 assert(((uint64_t)size >> shift) < (uint64_t)UINT32_MAX); in tee_mm_init() 32 .size = size, in tee_mm_init() 44 pool->entry->offset = ((size - 1) >> shift) + 1; in tee_mm_init() 81 sz += entry->size; in tee_mm_stats_allocated() 100 stats->size = pool->size; in tee_mm_get_pool_stats() 122 tee_mm_entry_t *tee_mm_alloc_flags(tee_mm_pool_t *pool, size_t size, in tee_mm_alloc_flags() argument 145 if (!size) in tee_mm_alloc_flags() 148 psize = ((size - 1) >> pool->shift) + 1; in tee_mm_alloc_flags() [all …]
|
| /optee_os/core/kernel/ |
| H A D | asan.c | 33 uintptr_t size; member 49 static bool addr_crosses_scale_boundary(vaddr_t addr, size_t size) in addr_crosses_scale_boundary() argument 52 ((addr + size - 1) >> ASAN_BLOCK_SHIFT); in addr_crosses_scale_boundary() 189 static void asan_report(vaddr_t addr, size_t size) in asan_report() argument 216 addr, size); in asan_report() 281 size_t size) in asan_shadow_Nbyte_isvalid() argument 285 for (; i < size; i++) { in asan_shadow_Nbyte_isvalid() 293 static __always_inline void check_access(vaddr_t addr, size_t size) in check_access() argument 297 void *end = (void *)(addr + size); in check_access() 301 if (size == 0) in check_access() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/set/ |
| H A D | der_encode_setof.c | 14 unsigned long size; member 24 r = XMEMCMP(A->start, B->start, MIN(A->size, B->size)); in s_qsort_helper() 26 if (r == 0 && A->size != B->size) { in s_qsort_helper() 27 if (A->size > B->size) { in s_qsort_helper() 28 for (x = B->size; x < A->size; x++) { in s_qsort_helper() 34 for (x = A->size; x < B->size; x++) { in s_qsort_helper() 113 edges[x].size = y; in der_encode_setof() 116 edges[x].size = 0; in der_encode_setof() 118 edges[x].size = (edges[x].size << 8) | ((unsigned long)ptr[z++]); in der_encode_setof() 123 edges[x].size += z; in der_encode_setof() [all …]
|
| /optee_os/ta/pkcs11/src/ |
| H A D | attributes.c | 31 void *data, size_t size) in add_attribute() argument 43 data32 = size; in add_attribute() 48 rc = serialize(bstart, &buf_len, data, size); in add_attribute() 54 (*head)->attrs_size += 2 * sizeof(uint32_t) + size; in add_attribute() 75 next_off = sizeof(pkcs11_ref) + pkcs11_ref.size; in _remove_attribute() 80 if (empty && pkcs11_ref.size) in _remove_attribute() 119 next_off = sizeof(pkcs11_ref) + pkcs11_ref.size; in get_attribute_ptrs() 130 if (pkcs11_ref.size) in get_attribute_ptrs() 137 *attr_size_ptr++ = pkcs11_ref.size; in get_attribute_ptrs() 173 uint32_t size = 0; in get_attribute() local [all …]
|
| H A D | serializer.c | 20 void serialargs_init(struct serialargs *args, void *in, size_t size) in serialargs_init() argument 24 args->size = size; in serialargs_init() 27 enum pkcs11_rc serialargs_get(struct serialargs *args, void *out, size_t size) in serialargs_get() argument 32 rc = serialargs_get_ptr(args, &src, size); in serialargs_get() 34 TEE_MemMove(out, src, size); in serialargs_get() 41 void **out, size_t size) in alloc_and_get() argument 48 if (ADD_OVERFLOW(buf0_sz, size, &sz)) in alloc_and_get() 56 rc = serialargs_get_ptr(args, &src, size); in alloc_and_get() 67 TEE_MemMove(ptr + buf0_sz, src, size); in alloc_and_get() 75 void **out, size_t size) in serialargs_alloc_and_get() argument [all …]
|
| /optee_os/core/drivers/crypto/ele/ |
| H A D | memutils.c | 15 cache_operation(op, ele_buf->data, ele_buf->size); in imx_ele_buf_cache_op() 19 size_t size) in imx_ele_buf_alloc() argument 21 if (!ele_buf || !size) in imx_ele_buf_alloc() 24 ele_buf->data = alloc_cache_aligned(size); in imx_ele_buf_alloc() 39 ele_buf->size = size; in imx_ele_buf_alloc() 42 memcpy(ele_buf->data, buf, size); in imx_ele_buf_alloc() 55 ele_buf->size = 0; in imx_ele_buf_free() 60 size_t size) in imx_ele_buf_copy() argument 62 if (!ele_buf || !buf || !size) in imx_ele_buf_copy() 65 if (size < ele_buf->size) in imx_ele_buf_copy() [all …]
|
| /optee_os/core/include/mm/ |
| H A D | phys_mem.h | 17 tee_mm_entry_t *nex_phys_mem_core_alloc(size_t size); 18 tee_mm_entry_t *nex_phys_mem_ta_alloc(size_t size); 19 tee_mm_entry_t *nex_phys_mem_alloc2(paddr_t base, size_t size); 20 void nex_phys_mem_partial_carve_out(paddr_t base, size_t size); 29 tee_mm_entry_t *phys_mem_core_alloc(size_t size); 30 tee_mm_entry_t *phys_mem_ta_alloc(size_t size); 31 tee_mm_entry_t *phys_mem_alloc2(paddr_t base, size_t size); 47 static inline tee_mm_entry_t *phys_mem_core_alloc(size_t size) in phys_mem_core_alloc() argument 49 return nex_phys_mem_core_alloc(size); in phys_mem_core_alloc() 52 static inline tee_mm_entry_t *phys_mem_ta_alloc(size_t size) in phys_mem_ta_alloc() argument [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/custom_type/ |
| H A D | der_decode_custom_type.c | 50 unsigned long size, x, y, z, blksize; in der_decode_custom_type_ex() local 99 outlen = root->size; in der_decode_custom_type_ex() 144 size = list[i].size; in der_decode_custom_type_ex() 210 if ((err = der_decode_bit_string(in + x, z, data, &size)) != CRYPT_OK) { in der_decode_custom_type_ex() 214 list[i].size = size; in der_decode_custom_type_ex() 215 if ((err = der_length_bit_string(size, &z)) != CRYPT_OK) { in der_decode_custom_type_ex() 222 if ((err = der_decode_raw_bit_string(in + x, z, data, &size)) != CRYPT_OK) { in der_decode_custom_type_ex() 226 list[i].size = size; in der_decode_custom_type_ex() 227 if ((err = der_length_bit_string(size, &z)) != CRYPT_OK) { in der_decode_custom_type_ex() 234 if ((err = der_decode_octet_string(in + x, z, data, &size)) != CRYPT_OK) { in der_decode_custom_type_ex() [all …]
|
| /optee_os/lib/libutils/ext/include/ |
| H A D | memtag.h | 30 void *(*set_tags)(void *addr, size_t size, uint8_t tag); 31 void *(*set_random_tags)(void *addr, size_t size); 32 void (*clear_mem)(void *addr, size_t size); 39 static inline void *__memtag_disabled_set_tags(void *addr, size_t size __unused, in __memtag_disabled_set_tags() 46 size_t size __unused) in __memtag_disabled_set_random_tags() 51 static inline void __memtag_disabled_clear_mem(void *addr, size_t size) in __memtag_disabled_clear_mem() argument 53 memset(addr, 0, size); in __memtag_disabled_clear_mem() 75 static inline void *memtag_set_tags(void *addr, size_t size, uint8_t tag) in memtag_set_tags() argument 78 return __memtag_ops->set_tags(addr, size, tag); in memtag_set_tags() 80 return __memtag_disabled_set_tags(addr, size, tag); in memtag_set_tags() [all …]
|
| H A D | confine_array_index.h | 70 static inline size_t confine_array_index(size_t index, size_t size) { in confine_array_index() argument 81 : "r"(index), "r"(size) in confine_array_index() 87 static inline size_t confine_array_index(size_t index, size_t size) in confine_array_index() argument 113 : "+r" (ret_val) : "r" (size) : "cc"); in confine_array_index() 120 : "+r" (ret_val) : "r" (size) : "cc"); in confine_array_index() 128 static inline size_t confine_array_index(size_t index, size_t size) { in confine_array_index() argument 140 : "r"(index), "r"(size) in confine_array_index() 147 static inline size_t confine_array_index(size_t index, size_t size) { in confine_array_index() argument 152 if (index < size) in confine_array_index()
|
| /optee_os/scripts/ |
| H A D | mem_usage.py | 46 def print_sect(name, addr, size, round_up=False, print_num_pages=False): argument 49 if size == 0: 54 size_kib = (size - 1) / 1024 + 1 56 size_kib = size / 1024 57 num_pages = (size - 1) / 4096 + 1 59 printf('%-16s %.8X - %.8X size %.8X %3d KiB', name, addr, addr + size, 60 size, size_kib) 66 def print_pager_stat(name, size): argument 67 size_kib = size / 1024 69 printf('%d ', size) [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/sequence/ |
| H A D | der_decode_sequence_flexi.c | 132 l->size = 1; in s_der_decode_sequence_flexi() 151 l->size = 1; in s_der_decode_sequence_flexi() 174 …l->size = len * 8; /* *8 because we store decoded bits one per char and they are encoded 8 per cha… in s_der_decode_sequence_flexi() 176 if ((l->data = XCALLOC(1, l->size)) == NULL) { in s_der_decode_sequence_flexi() 181 if ((err = der_decode_bit_string(in, *inlen, l->data, &l->size)) != CRYPT_OK) { in s_der_decode_sequence_flexi() 185 if ((err = der_length_bit_string(l->size, &len)) != CRYPT_OK) { in s_der_decode_sequence_flexi() 197 l->size = len; in s_der_decode_sequence_flexi() 199 if ((l->data = XCALLOC(1, l->size)) == NULL) { in s_der_decode_sequence_flexi() 204 if ((err = der_decode_octet_string(in, *inlen, l->data, &l->size)) != CRYPT_OK) { in s_der_decode_sequence_flexi() 208 if ((err = der_length_octet_string(l->size, &len)) != CRYPT_OK) { in s_der_decode_sequence_flexi() [all …]
|
| /optee_os/core/arch/arm/dts/ |
| H A D | fsl-lx2160a-qds.dts | 38 #size-cells = <0>; 43 #size-cells = <0>; 49 #size-cells = <0>; 55 #size-cells = <0>; 61 #size-cells = <0>; 67 #size-cells = <0>; 73 #size-cells = <0>; 79 #size-cells = <0>; 85 #size-cells = <0>; 91 #size-cells = <0>; [all …]
|
| /optee_os/core/drivers/bnxt/ |
| H A D | bnxt_fw.c | 152 uint32_t size; /* Size in bytes */ member 180 uint32_t size; member 215 static uint32_t ape_host_view_addr_get(uint32_t bnxt_view_addr, uint32_t size) in ape_host_view_addr_get() argument 220 for (; region->size != 0; region++) { in ape_host_view_addr_get() 224 if (bnxt_view_addr >= (region->c_base + region->size)) in ape_host_view_addr_get() 227 if (size > (region->c_base + region->size - bnxt_view_addr)) { in ape_host_view_addr_get() 229 bnxt_view_addr, size); in ape_host_view_addr_get() 423 size_t size = 0; in ape_section_copy() local 440 size = ape_section_uncompress(section_data, in ape_section_copy() 444 if (size >= work_buff_size) { in ape_section_copy() [all …]
|
| /optee_os/core/drivers/crypto/caam/ |
| H A D | caam_key.c | 104 size_t size) in data_to_serialized_key() argument 106 assert(data && size); in data_to_serialized_key() 107 assert(size > sizeof(struct caam_key_serialized)); in data_to_serialized_key() 134 static enum caam_key_type get_key_type(const uint8_t *data, size_t size) in get_key_type() argument 136 struct caam_key_serialized *key = data_to_serialized_key(data, size); in get_key_type() 150 static size_t get_key_sec_size(const uint8_t *data, size_t size) in get_key_sec_size() argument 152 struct caam_key_serialized *key = data_to_serialized_key(data, size); in get_key_sec_size() 155 return size; in get_key_sec_size() 166 static unsigned long get_key_buf_offset(const uint8_t *data, size_t size) in get_key_buf_offset() argument 168 struct caam_key_serialized *key = data_to_serialized_key(data, size); in get_key_buf_offset() [all …]
|
| /optee_os/lib/libutee/ |
| H A D | tcb.c | 53 unsigned long size; member 57 #define DTV_SIZE(size) (sizeof(union dtv) + (size)) argument 91 size_t size = 0; in __utee_tcb_init() local 121 size = DTV_SIZE((__elf_phdr_info.count + 1) * sizeof(union dtv)); in __utee_tcb_init() 122 _tcb->dtv = malloc_flags(MAF_ZERO_INIT, _tcb->dtv, 1, size); in __utee_tcb_init() 124 EMSG("DTV allocation failed (%zu bytes)", size); in __utee_tcb_init() 129 size = 0; in __utee_tcb_init() 136 if (size + phdr->p_memsz <= _tls_size) { in __utee_tcb_init() 140 _tcb->dtv[i + 1].tls = _tcb->tls + size; in __utee_tcb_init() 142 memcpy(_tcb->tls + size, in __utee_tcb_init() [all …]
|