Home
last modified time | relevance | path

Searched +full:- +full:- +full:depth (Results 1 – 25 of 29) sorted by relevance

12

/optee_os/scripts/
H A Dftrace_format.py2 # SPDX-License-Identifier: BSD-2-Clause
11 # <binary data> is an array of 64-bit integers.
12 # - When the topmost byte is 0, the entry indicates a function return and the
14 # - A non-zero value is a stack depth, indicating a function entry, and the
42 def display(depth, val): argument
44 if depth != 0:
45 curr_depth = depth
50 line = f" TIME | {depth:3} | " + " " * depth + f"0x{val:016x}()"
58 curr_depth = curr_depth - 1
69 if magic == -1:
[all …]
H A Dsign_encrypt.py2 # SPDX-License-Identifier: BSD-2-Clause
46 h.update(namespace_bytes + bytes(name, 'utf-8'))
78 '--uuid', required=True, type=uuid_parse,
83 '--key', required=True, help='''
91 '--enc-key', required=False, help='Encryption key string')
95 '--enc-key-type', required=False,
103 '--ta-version', required=False, type=int_parse, default=0, help='''
104 TA version stored as a 32-bit unsigned integer and used for
110 '--sig', required=True, dest='sigf',
115 '--dig', required=True, dest='digf',
[all …]
/optee_os/core/lib/libfdt/
H A Dfdt.c1 // SPDX-License-Identifier: (GPL-2.0-or-later OR BSD-2-Clause)
3 * libfdt - Flat Device Tree manipulation
14 * Minimal sanity check for a read-only tree. fdt_ro_probe_() checks
25 return -FDT_ERR_BADVERSION; in fdt_ro_probe_()
27 return -FDT_ERR_BADVERSION; in fdt_ro_probe_()
29 /* Unfinished sequential-write blob */ in fdt_ro_probe_()
31 return -FDT_ERR_BADSTATE; in fdt_ro_probe_()
33 return -FDT_ERR_BADMAGIC; in fdt_ro_probe_()
39 return -FDT_ERR_TRUNCATED; in fdt_ro_probe_()
78 return -FDT_ERR_BADMAGIC; in fdt_check_header()
[all …]
H A Dfdt_ro.c1 // SPDX-License-Identifier: (GPL-2.0-or-later OR BSD-2-Clause)
3 * libfdt - Flat Device Tree manipulation
47 err = -FDT_ERR_BADOFFSET; in fdt_get_string()
50 len = totalsize - absoffset; in fdt_get_string()
58 if ((fdt_size_dt_strings(fdt) - stroffset) < len) in fdt_get_string()
59 len = fdt_size_dt_strings(fdt) - stroffset; in fdt_get_string()
63 || (stroffset < -fdt_size_dt_strings(fdt))) in fdt_get_string()
65 if ((-stroffset) < len) in fdt_get_string()
66 len = -stroffset; in fdt_get_string()
68 err = -FDT_ERR_INTERNAL; in fdt_get_string()
[all …]
H A Dfdt_wip.c1 // SPDX-License-Identifier: (GPL-2.0-or-later OR BSD-2-Clause)
3 * libfdt - Flat Device Tree manipulation
27 return -FDT_ERR_NOSPACE; in fdt_setprop_inplace_namelen_partial()
44 return -FDT_ERR_NOSPACE; in fdt_setprop_inplace()
75 int depth = 0; in fdt_node_end_offset_() local
77 while ((offset >= 0) && (depth >= 0)) in fdt_node_end_offset_()
78 offset = fdt_next_node(fdt, offset, &depth); in fdt_node_end_offset_()
92 endoffset - nodeoffset); in fdt_nop_node()
/optee_os/core/drivers/crypto/caam/hal/imx_6_7/
H A Dhal_ctrl.c1 // SPDX-License-Identifier: BSD-2-Clause
3 * Copyright 2018-2019 NXP
37 * to a depth of 1 (default depth is 4) to preclude this situation in caam_hal_ctrl_init()
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/sequence/
H A Dder_decode_sequence_flexi.c1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */
2 /* SPDX-License-Identifier: Unlicense */
21 (*l)->next = XCALLOC(1, sizeof(ltc_asn1_list)); in s_new_element()
22 if ((*l)->next == NULL) { in s_new_element()
25 (*l)->next->prev = *l; in s_new_element()
26 *l = (*l)->next; in s_new_element()
36 @param depth The depth/level of decoding recursion we've already reached
39 …ence_flexi(const unsigned char *in, unsigned long *inlen, ltc_asn1_list **out, unsigned long depth) in s_der_decode_sequence_flexi() argument
73 if (l->type != LTC_ASN1_EOL) { in s_der_decode_sequence_flexi()
75 len_len = *inlen - id_len; in s_der_decode_sequence_flexi()
[all …]
/optee_os/mk/
H A Dcleandirs.mk5 define _enum-parent-dirs
6 $(if $(1),$(1) $(if $(filter / ./,$(dir $(1))),,$(call enum-parent-dirs,$(dir $(1)))),)
9 define enum-parent-dirs
10 $(call _enum-parent-dirs,$(patsubst %/,%,$(1)))
18 # intermediate levels, in depth first order so that rmdir can process them in
22 define cleandirs-for-rmdir
25 $(call enum-parent-dirs,$(d)))))))
28 RMDIR := rmdir --ignore-fail-on-non-empty
30 # Remove files with "rm -f".
34 define do-rm-f
[all …]
/optee_os/core/lib/libfdt/include/
H A Dlibfdt.h1 /* SPDX-License-Identifier: (GPL-2.0-or-later OR BSD-2-Clause) */
5 * libfdt - Flat Device Tree manipulation
30 * offset which is out-of-bounds, or which points to an
39 * length, or the phandle value was either 0 or -1, which are
43 * tree created by the sequential-write functions, which is
48 /* FDT_ERR_TRUNCATED: FDT or a sub-block is improperly
53 * device tree at all - it is missing the flattened device
58 * read-write functions, this may mean that fdt_open_into() is
65 /* FDT_ERR_BADLAYOUT: For read-write functions, the given
66 * device tree has it's sub-blocks in an order that the
[all …]
/optee_os/core/drivers/
H A Dhi16xx_uart.c1 // SPDX-License-Identifier: BSD-2-Clause
16 #define UART_DLL 0x00 /* Lower-bit frequency divider register */
19 #define UART_DLH 0x04 /* Upper-bit frequency divider register */
46 #define UART_FCR_FIFO_EN 0x1 /* Enable FIFO (depth: 32 bytes) */
55 #define UART_USR_BUSY_BIT 0 /* 0: idle/non-activated, 1: busy */
66 return io_pa_or_va(&pd->base, HI16XX_UART_REG_SIZE); in chip_to_base()
118 pd->base.pa = base; in hi16xx_uart_init()
119 pd->chip.ops = &hi16xx_uart_ops; in hi16xx_uart_init()
139 hi16xx_uart_flush(&pd->chip); in hi16xx_uart_init()
H A Dstm32_rng.c1 // SPDX-License-Identifier: BSD-3-Clause
3 * Copyright (c) 2018-2024, STMicroelectronics
106 return io_pa_or_va(&stm32_rng->base, 1); in get_base()
119 * the reset automatically (auto-reset).
120 * 2. If SECS was set in step 1 (no auto-reset) wait for CONDRST
124 * 3. If SECS was set in step 1 (no auto-reset) wait for SECS to be
132 if (!dev->error_conceal) { in conceal_seed_error_cond_reset()
141 dev->error_to_ref = in conceal_seed_error_cond_reset()
143 dev->error_conceal = true; in conceal_seed_error_cond_reset()
145 /* RNG auto-reset (step 2.) */ in conceal_seed_error_cond_reset()
[all …]
/optee_os/lib/libutils/ext/ftrace/
H A Dftrace.c1 // SPDX-License-Identifier: BSD-2-Clause
51 s = TAILQ_FIRST(&tsd->sess_stack); in get_fbuf()
53 if (!s || tsd->ctx != s->ctx) in get_fbuf()
56 if (!is_ta_ctx(s->ctx) || to_ta_ctx(s->ctx)->panicked) in get_fbuf()
59 if (s->fbuf && s->fbuf->syscall_trace_enabled && in get_fbuf()
60 !s->fbuf->syscall_trace_suspended) in get_fbuf()
61 return s->fbuf; in get_fbuf()
73 size_t idx = fbuf->curr_idx; in add_elem()
78 elem = (uint64_t *)((vaddr_t)fbuf + fbuf->buf_off) + idx; in add_elem()
82 if ((idx + 1) * sizeof(*elem) > fbuf->max_size) { in add_elem()
[all …]
/optee_os/core/include/
H A Dsigned_hdr.h1 /* SPDX-License-Identifier: BSD-2-Clause */
23 * struct shdr - signed header
57 if (ADD_OVERFLOW(s, shdr->hash_size, &s) || in shdr_get_size()
58 ADD_OVERFLOW(s, shdr->sig_size, &s)) in shdr_get_size()
66 #define SHDR_GET_SIG(x) (SHDR_GET_HASH(x) + (x)->hash_size)
69 * struct shdr_subkey - subkey header
74 * @max_depth: Maximum depth supported below this subkey
90 * If @name_size is non-zero it indicates that a name field of this size
125 * struct shdr_bootstrap_ta - bootstrap TA subheader
135 * struct shdr_encrypted_ta - encrypted TA header
[all …]
/optee_os/lib/libmbedtls/mbedtls/library/
H A Decdsa.c5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
11 * SEC1 https://www.secg.org/sec1-v2.pdf
35 * Sub-context for ecdsa_verify()
46 * Init verify restart sub-context
50 mbedtls_mpi_init(&ctx->u1); in ecdsa_restart_ver_init()
51 mbedtls_mpi_init(&ctx->u2); in ecdsa_restart_ver_init()
52 ctx->state = ecdsa_ver_init; in ecdsa_restart_ver_init()
56 * Free the components of a verify restart sub-context
64 mbedtls_mpi_free(&ctx->u1); in ecdsa_restart_ver_free()
65 mbedtls_mpi_free(&ctx->u2); in ecdsa_restart_ver_free()
[all …]
H A Decp.c5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
11 * SEC1 https://www.secg.org/sec1-v2.pdf
12 * GECC = Guide to Elliptic Curve Cryptography - Hankerson, Menezes, Vanstone
13 * FIPS 186-3 http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf
15 * - https://www.rfc-editor.org/rfc/rfc4492
17 * - https://www.rfc-editor.org/rfc/rfc7748
19 * [Curve25519] https://cr.yp.to/ecdh/curve25519-20060209.pdf
21 * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis
23 * Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302.
24 * <http://link.springer.com/chapter/10.1007/3-540-48059-5_25>
[all …]
/optee_os/core/arch/arm/dts/
H A Dstm32mp15xx-dhcor-avenger96.dtsi1 // SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause)
3 * Copyright (C) Linaro Ltd 2019 - All Rights Reserved
9 #include "stm32mp15xx-dhcor-io1v8.dtsi"
22 cec_clock: clk-cec-fixed {
23 #clock-cells = <0>;
24 compatible = "fixed-clock";
25 clock-frequency = <24000000>;
29 stdout-path = "serial0:115200n8";
32 hdmi-out {
33 compatible = "hdmi-connector";
[all …]
/optee_os/core/kernel/
H A Dlockdep.c1 // SPDX-License-Identifier: BSD-2-Clause
16 /* Flags used for depth-first topological sorting */
19 /* Flag used during breadth-first search (print shortest cycle) */
31 if (node->lock_id == lock_id) in lockdep_add_to_graph()
38 node->lock_id = lock_id; in lockdep_add_to_graph()
39 STAILQ_INIT(&node->edges); in lockdep_add_to_graph()
85 STAILQ_FOREACH(edge, &from->edges, link) in lockdep_add_edge()
86 if (edge->to == to) in lockdep_add_edge()
92 edge->to = to; in lockdep_add_edge()
93 edge->call_stack_from = dup_call_stack(call_stack_from); in lockdep_add_edge()
[all …]
H A Duser_ta.c1 // SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2015-2022 Linaro Limited
58 up_bbuf->types = p->types; in init_utee_param()
64 switch (TEE_PARAM_TYPE_GET(p->types, n)) { in init_utee_param()
69 b = p->u[n].mem.size; in init_utee_param()
73 a = p->u[n].val.a; in init_utee_param()
74 b = p->u[n].val.b; in init_utee_param()
82 up_bbuf->vals[n * 2] = a; in init_utee_param()
83 up_bbuf->vals[n * 2 + 1] = b; in init_utee_param()
105 switch (TEE_PARAM_TYPE_GET(p->types, n)) { in update_from_utee_param()
[all …]
H A Ddt_driver.c1 // SPDX-License-Identifier: BSD-2-Clause
22 * struct dt_driver_probe - Node instance in secure FDT to probe a driver for
41 * struct dt_driver_provider - DT related info on probed device
144 if (phandle == (uint32_t)-1) { in dt_driver_register_provider()
154 prv->nodeoffset = nodeoffset; in dt_driver_register_provider()
155 prv->type = type; in dt_driver_register_provider()
156 prv->provider_cells = provider_cells; in dt_driver_register_provider()
157 prv->phandle = phandle; in dt_driver_register_provider()
158 prv->get_of_device = get_of_device; in dt_driver_register_provider()
159 prv->priv_data = priv; in dt_driver_register_provider()
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dx509_crt.h8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
85 … /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */
98 #define MBEDTLS_X509_ID_FLAG(id) (1 << ((id) - 1))
113 * For example to allow SHA-224 in addition to the default:
118 * Or to allow only RSA-3072+ with SHA-256:
256 * Max size of verification chain: end-entity + intermediates + trusted root
286 mbedtls_x509_crt *MBEDTLS_PRIVATE(parent); /* non-null iff parent_in in progress */
291 int MBEDTLS_PRIVATE(parent_is_trusted); /* -1 if find_parent is not in progress */
316 * - SHA2 hashes with at least 256 bits: SHA-256, SHA-384, SHA-512.
317 * - Elliptic curves with 255 bits and above except secp256k1.
[all …]
H A Decp.h9 * <em>RFC-4492: Elliptic Curve Cryptography (ECC) Cipher Suites
12 * <em>RFC-2409: The Internet Key Exchange (IKE)</em> defines ECP
19 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
35 #define MBEDTLS_ERR_ECP_BAD_INPUT_DATA -0x4F80
37 #define MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL -0x4F00
39 #define MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE -0x4E80
41 #define MBEDTLS_ERR_ECP_VERIFY_FAILED -0x4E00
43 #define MBEDTLS_ERR_ECP_ALLOC_FAILED -0x4D80
45 #define MBEDTLS_ERR_ECP_RANDOM_FAILED -0x4D00
47 #define MBEDTLS_ERR_ECP_INVALID_KEY -0x4C80
[all …]
/optee_os/core/lib/libtomcrypt/src/hashes/
H A Dblake2s.c1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */
2 /* SPDX-License-Identifier: Unlicense */
5 BLAKE2 reference source code package - reference C implementations
11 - CC0 1.0 Universal : http://creativecommons.org/publicdomain/zero/1.0
12 - OpenSSL license : https://www.openssl.org/source/license.html
13 - Apache 2.0 : http://www.apache.org/licenses/LICENSE-2.0
53 unsigned char depth;
66 "blake2s-128",
81 "blake2s-160",
96 "blake2s-224",
[all …]
H A Dblake2b.c1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */
2 /* SPDX-License-Identifier: Unlicense */
5 BLAKE2 reference source code package - reference C implementations
11 - CC0 1.0 Universal : http://creativecommons.org/publicdomain/zero/1.0
12 - OpenSSL license : https://www.openssl.org/source/license.html
13 - Apache 2.0 : http://www.apache.org/licenses/LICENSE-2.0
54 unsigned char depth;
68 "blake2b-160",
83 "blake2b-256",
98 "blake2b-384",
[all …]
/optee_os/core/tee/
H A Dfs_htree.c1 // SPDX-License-Identifier: BSD-2-Clause
32 #define NODE_ID_TO_BLOCK_NUM(id) ((id) - 1)
40 * +----------------------------+
43 * +----------------------------+
46 * +----------------------------+
49 * +----------------------------+
52 * +----------------------------+
55 * +----------------------------+
117 res = ht->stor->rpc_read_init(ht->stor_aux, &op, type, idx, vers, &p); in rpc_read()
121 res = ht->stor->rpc_read_final(&op, &bytes); in rpc_read()
[all …]
/optee_os/.github/workflows/
H A Dci.yml6 group: ci-${{ github.ref }} # unique per branch
7 cancel-in-progress: true # cancel previous runs on the same branch
11 runs-on: ubuntu-latest
14 - name: Checkout
17 fetch-depth: 0 # full history so checkpatch can check commit IDs in commit messages
18 - name: Update Git config
19 run: git config --global --add safe.directory ${GITHUB_WORKSPACE}
20 - name: Run checkpatch
24 set -e
26 mkdir -p /tmp/linux/scripts
[all …]

12