| /optee_os/scripts/ |
| H A D | ftrace_format.py | 2 # SPDX-License-Identifier: BSD-2-Clause 11 # <binary data> is an array of 64-bit integers. 12 # - When the topmost byte is 0, the entry indicates a function return and the 14 # - A non-zero value is a stack depth, indicating a function entry, and the 42 def display(depth, val): argument 44 if depth != 0: 45 curr_depth = depth 50 line = f" TIME | {depth:3} | " + " " * depth + f"0x{val:016x}()" 58 curr_depth = curr_depth - 1 69 if magic == -1: [all …]
|
| H A D | sign_encrypt.py | 2 # SPDX-License-Identifier: BSD-2-Clause 46 h.update(namespace_bytes + bytes(name, 'utf-8')) 78 '--uuid', required=True, type=uuid_parse, 83 '--key', required=True, help=''' 91 '--enc-key', required=False, help='Encryption key string') 95 '--enc-key-type', required=False, 103 '--ta-version', required=False, type=int_parse, default=0, help=''' 104 TA version stored as a 32-bit unsigned integer and used for 110 '--sig', required=True, dest='sigf', 115 '--dig', required=True, dest='digf', [all …]
|
| /optee_os/core/lib/libfdt/ |
| H A D | fdt.c | 1 // SPDX-License-Identifier: (GPL-2.0-or-later OR BSD-2-Clause) 3 * libfdt - Flat Device Tree manipulation 14 * Minimal sanity check for a read-only tree. fdt_ro_probe_() checks 25 return -FDT_ERR_BADVERSION; in fdt_ro_probe_() 27 return -FDT_ERR_BADVERSION; in fdt_ro_probe_() 29 /* Unfinished sequential-write blob */ in fdt_ro_probe_() 31 return -FDT_ERR_BADSTATE; in fdt_ro_probe_() 33 return -FDT_ERR_BADMAGIC; in fdt_ro_probe_() 39 return -FDT_ERR_TRUNCATED; in fdt_ro_probe_() 78 return -FDT_ERR_BADMAGIC; in fdt_check_header() [all …]
|
| H A D | fdt_ro.c | 1 // SPDX-License-Identifier: (GPL-2.0-or-later OR BSD-2-Clause) 3 * libfdt - Flat Device Tree manipulation 47 err = -FDT_ERR_BADOFFSET; in fdt_get_string() 50 len = totalsize - absoffset; in fdt_get_string() 58 if ((fdt_size_dt_strings(fdt) - stroffset) < len) in fdt_get_string() 59 len = fdt_size_dt_strings(fdt) - stroffset; in fdt_get_string() 63 || (stroffset < -fdt_size_dt_strings(fdt))) in fdt_get_string() 65 if ((-stroffset) < len) in fdt_get_string() 66 len = -stroffset; in fdt_get_string() 68 err = -FDT_ERR_INTERNAL; in fdt_get_string() [all …]
|
| H A D | fdt_wip.c | 1 // SPDX-License-Identifier: (GPL-2.0-or-later OR BSD-2-Clause) 3 * libfdt - Flat Device Tree manipulation 27 return -FDT_ERR_NOSPACE; in fdt_setprop_inplace_namelen_partial() 44 return -FDT_ERR_NOSPACE; in fdt_setprop_inplace() 75 int depth = 0; in fdt_node_end_offset_() local 77 while ((offset >= 0) && (depth >= 0)) in fdt_node_end_offset_() 78 offset = fdt_next_node(fdt, offset, &depth); in fdt_node_end_offset_() 92 endoffset - nodeoffset); in fdt_nop_node()
|
| /optee_os/core/drivers/crypto/caam/hal/imx_6_7/ |
| H A D | hal_ctrl.c | 1 // SPDX-License-Identifier: BSD-2-Clause 3 * Copyright 2018-2019 NXP 37 * to a depth of 1 (default depth is 4) to preclude this situation in caam_hal_ctrl_init()
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/der/sequence/ |
| H A D | der_decode_sequence_flexi.c | 1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */ 2 /* SPDX-License-Identifier: Unlicense */ 21 (*l)->next = XCALLOC(1, sizeof(ltc_asn1_list)); in s_new_element() 22 if ((*l)->next == NULL) { in s_new_element() 25 (*l)->next->prev = *l; in s_new_element() 26 *l = (*l)->next; in s_new_element() 36 @param depth The depth/level of decoding recursion we've already reached 39 …ence_flexi(const unsigned char *in, unsigned long *inlen, ltc_asn1_list **out, unsigned long depth) in s_der_decode_sequence_flexi() argument 73 if (l->type != LTC_ASN1_EOL) { in s_der_decode_sequence_flexi() 75 len_len = *inlen - id_len; in s_der_decode_sequence_flexi() [all …]
|
| /optee_os/mk/ |
| H A D | cleandirs.mk | 5 define _enum-parent-dirs 6 $(if $(1),$(1) $(if $(filter / ./,$(dir $(1))),,$(call enum-parent-dirs,$(dir $(1)))),) 9 define enum-parent-dirs 10 $(call _enum-parent-dirs,$(patsubst %/,%,$(1))) 18 # intermediate levels, in depth first order so that rmdir can process them in 22 define cleandirs-for-rmdir 25 $(call enum-parent-dirs,$(d))))))) 28 RMDIR := rmdir --ignore-fail-on-non-empty 30 # Remove files with "rm -f". 34 define do-rm-f [all …]
|
| /optee_os/core/lib/libfdt/include/ |
| H A D | libfdt.h | 1 /* SPDX-License-Identifier: (GPL-2.0-or-later OR BSD-2-Clause) */ 5 * libfdt - Flat Device Tree manipulation 30 * offset which is out-of-bounds, or which points to an 39 * length, or the phandle value was either 0 or -1, which are 43 * tree created by the sequential-write functions, which is 48 /* FDT_ERR_TRUNCATED: FDT or a sub-block is improperly 53 * device tree at all - it is missing the flattened device 58 * read-write functions, this may mean that fdt_open_into() is 65 /* FDT_ERR_BADLAYOUT: For read-write functions, the given 66 * device tree has it's sub-blocks in an order that the [all …]
|
| /optee_os/core/drivers/ |
| H A D | hi16xx_uart.c | 1 // SPDX-License-Identifier: BSD-2-Clause 16 #define UART_DLL 0x00 /* Lower-bit frequency divider register */ 19 #define UART_DLH 0x04 /* Upper-bit frequency divider register */ 46 #define UART_FCR_FIFO_EN 0x1 /* Enable FIFO (depth: 32 bytes) */ 55 #define UART_USR_BUSY_BIT 0 /* 0: idle/non-activated, 1: busy */ 66 return io_pa_or_va(&pd->base, HI16XX_UART_REG_SIZE); in chip_to_base() 118 pd->base.pa = base; in hi16xx_uart_init() 119 pd->chip.ops = &hi16xx_uart_ops; in hi16xx_uart_init() 139 hi16xx_uart_flush(&pd->chip); in hi16xx_uart_init()
|
| H A D | stm32_rng.c | 1 // SPDX-License-Identifier: BSD-3-Clause 3 * Copyright (c) 2018-2024, STMicroelectronics 106 return io_pa_or_va(&stm32_rng->base, 1); in get_base() 119 * the reset automatically (auto-reset). 120 * 2. If SECS was set in step 1 (no auto-reset) wait for CONDRST 124 * 3. If SECS was set in step 1 (no auto-reset) wait for SECS to be 132 if (!dev->error_conceal) { in conceal_seed_error_cond_reset() 141 dev->error_to_ref = in conceal_seed_error_cond_reset() 143 dev->error_conceal = true; in conceal_seed_error_cond_reset() 145 /* RNG auto-reset (step 2.) */ in conceal_seed_error_cond_reset() [all …]
|
| /optee_os/lib/libutils/ext/ftrace/ |
| H A D | ftrace.c | 1 // SPDX-License-Identifier: BSD-2-Clause 51 s = TAILQ_FIRST(&tsd->sess_stack); in get_fbuf() 53 if (!s || tsd->ctx != s->ctx) in get_fbuf() 56 if (!is_ta_ctx(s->ctx) || to_ta_ctx(s->ctx)->panicked) in get_fbuf() 59 if (s->fbuf && s->fbuf->syscall_trace_enabled && in get_fbuf() 60 !s->fbuf->syscall_trace_suspended) in get_fbuf() 61 return s->fbuf; in get_fbuf() 73 size_t idx = fbuf->curr_idx; in add_elem() 78 elem = (uint64_t *)((vaddr_t)fbuf + fbuf->buf_off) + idx; in add_elem() 82 if ((idx + 1) * sizeof(*elem) > fbuf->max_size) { in add_elem() [all …]
|
| /optee_os/core/include/ |
| H A D | signed_hdr.h | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 23 * struct shdr - signed header 57 if (ADD_OVERFLOW(s, shdr->hash_size, &s) || in shdr_get_size() 58 ADD_OVERFLOW(s, shdr->sig_size, &s)) in shdr_get_size() 66 #define SHDR_GET_SIG(x) (SHDR_GET_HASH(x) + (x)->hash_size) 69 * struct shdr_subkey - subkey header 74 * @max_depth: Maximum depth supported below this subkey 90 * If @name_size is non-zero it indicates that a name field of this size 125 * struct shdr_bootstrap_ta - bootstrap TA subheader 135 * struct shdr_encrypted_ta - encrypted TA header [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ecdsa.c | 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 11 * SEC1 https://www.secg.org/sec1-v2.pdf 35 * Sub-context for ecdsa_verify() 46 * Init verify restart sub-context 50 mbedtls_mpi_init(&ctx->u1); in ecdsa_restart_ver_init() 51 mbedtls_mpi_init(&ctx->u2); in ecdsa_restart_ver_init() 52 ctx->state = ecdsa_ver_init; in ecdsa_restart_ver_init() 56 * Free the components of a verify restart sub-context 64 mbedtls_mpi_free(&ctx->u1); in ecdsa_restart_ver_free() 65 mbedtls_mpi_free(&ctx->u2); in ecdsa_restart_ver_free() [all …]
|
| H A D | ecp.c | 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 11 * SEC1 https://www.secg.org/sec1-v2.pdf 12 * GECC = Guide to Elliptic Curve Cryptography - Hankerson, Menezes, Vanstone 13 * FIPS 186-3 http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf 15 * - https://www.rfc-editor.org/rfc/rfc4492 17 * - https://www.rfc-editor.org/rfc/rfc7748 19 * [Curve25519] https://cr.yp.to/ecdh/curve25519-20060209.pdf 21 * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis 23 * Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302. 24 * <http://link.springer.com/chapter/10.1007/3-540-48059-5_25> [all …]
|
| /optee_os/core/arch/arm/dts/ |
| H A D | stm32mp15xx-dhcor-avenger96.dtsi | 1 // SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) 3 * Copyright (C) Linaro Ltd 2019 - All Rights Reserved 9 #include "stm32mp15xx-dhcor-io1v8.dtsi" 22 cec_clock: clk-cec-fixed { 23 #clock-cells = <0>; 24 compatible = "fixed-clock"; 25 clock-frequency = <24000000>; 29 stdout-path = "serial0:115200n8"; 32 hdmi-out { 33 compatible = "hdmi-connector"; [all …]
|
| /optee_os/core/kernel/ |
| H A D | lockdep.c | 1 // SPDX-License-Identifier: BSD-2-Clause 16 /* Flags used for depth-first topological sorting */ 19 /* Flag used during breadth-first search (print shortest cycle) */ 31 if (node->lock_id == lock_id) in lockdep_add_to_graph() 38 node->lock_id = lock_id; in lockdep_add_to_graph() 39 STAILQ_INIT(&node->edges); in lockdep_add_to_graph() 85 STAILQ_FOREACH(edge, &from->edges, link) in lockdep_add_edge() 86 if (edge->to == to) in lockdep_add_edge() 92 edge->to = to; in lockdep_add_edge() 93 edge->call_stack_from = dup_call_stack(call_stack_from); in lockdep_add_edge() [all …]
|
| H A D | user_ta.c | 1 // SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2015-2022 Linaro Limited 58 up_bbuf->types = p->types; in init_utee_param() 64 switch (TEE_PARAM_TYPE_GET(p->types, n)) { in init_utee_param() 69 b = p->u[n].mem.size; in init_utee_param() 73 a = p->u[n].val.a; in init_utee_param() 74 b = p->u[n].val.b; in init_utee_param() 82 up_bbuf->vals[n * 2] = a; in init_utee_param() 83 up_bbuf->vals[n * 2 + 1] = b; in init_utee_param() 105 switch (TEE_PARAM_TYPE_GET(p->types, n)) { in update_from_utee_param() [all …]
|
| H A D | dt_driver.c | 1 // SPDX-License-Identifier: BSD-2-Clause 22 * struct dt_driver_probe - Node instance in secure FDT to probe a driver for 41 * struct dt_driver_provider - DT related info on probed device 144 if (phandle == (uint32_t)-1) { in dt_driver_register_provider() 154 prv->nodeoffset = nodeoffset; in dt_driver_register_provider() 155 prv->type = type; in dt_driver_register_provider() 156 prv->provider_cells = provider_cells; in dt_driver_register_provider() 157 prv->phandle = phandle; in dt_driver_register_provider() 158 prv->get_of_device = get_of_device; in dt_driver_register_provider() 159 prv->priv_data = priv; in dt_driver_register_provider() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | x509_crt.h | 8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 85 … /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */ 98 #define MBEDTLS_X509_ID_FLAG(id) (1 << ((id) - 1)) 113 * For example to allow SHA-224 in addition to the default: 118 * Or to allow only RSA-3072+ with SHA-256: 256 * Max size of verification chain: end-entity + intermediates + trusted root 286 mbedtls_x509_crt *MBEDTLS_PRIVATE(parent); /* non-null iff parent_in in progress */ 291 int MBEDTLS_PRIVATE(parent_is_trusted); /* -1 if find_parent is not in progress */ 316 * - SHA2 hashes with at least 256 bits: SHA-256, SHA-384, SHA-512. 317 * - Elliptic curves with 255 bits and above except secp256k1. [all …]
|
| H A D | ecp.h | 9 * <em>RFC-4492: Elliptic Curve Cryptography (ECC) Cipher Suites 12 * <em>RFC-2409: The Internet Key Exchange (IKE)</em> defines ECP 19 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 35 #define MBEDTLS_ERR_ECP_BAD_INPUT_DATA -0x4F80 37 #define MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL -0x4F00 39 #define MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE -0x4E80 41 #define MBEDTLS_ERR_ECP_VERIFY_FAILED -0x4E00 43 #define MBEDTLS_ERR_ECP_ALLOC_FAILED -0x4D80 45 #define MBEDTLS_ERR_ECP_RANDOM_FAILED -0x4D00 47 #define MBEDTLS_ERR_ECP_INVALID_KEY -0x4C80 [all …]
|
| /optee_os/core/lib/libtomcrypt/src/hashes/ |
| H A D | blake2s.c | 1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */ 2 /* SPDX-License-Identifier: Unlicense */ 5 BLAKE2 reference source code package - reference C implementations 11 - CC0 1.0 Universal : http://creativecommons.org/publicdomain/zero/1.0 12 - OpenSSL license : https://www.openssl.org/source/license.html 13 - Apache 2.0 : http://www.apache.org/licenses/LICENSE-2.0 53 unsigned char depth; 66 "blake2s-128", 81 "blake2s-160", 96 "blake2s-224", [all …]
|
| H A D | blake2b.c | 1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */ 2 /* SPDX-License-Identifier: Unlicense */ 5 BLAKE2 reference source code package - reference C implementations 11 - CC0 1.0 Universal : http://creativecommons.org/publicdomain/zero/1.0 12 - OpenSSL license : https://www.openssl.org/source/license.html 13 - Apache 2.0 : http://www.apache.org/licenses/LICENSE-2.0 54 unsigned char depth; 68 "blake2b-160", 83 "blake2b-256", 98 "blake2b-384", [all …]
|
| /optee_os/core/tee/ |
| H A D | fs_htree.c | 1 // SPDX-License-Identifier: BSD-2-Clause 32 #define NODE_ID_TO_BLOCK_NUM(id) ((id) - 1) 40 * +----------------------------+ 43 * +----------------------------+ 46 * +----------------------------+ 49 * +----------------------------+ 52 * +----------------------------+ 55 * +----------------------------+ 117 res = ht->stor->rpc_read_init(ht->stor_aux, &op, type, idx, vers, &p); in rpc_read() 121 res = ht->stor->rpc_read_final(&op, &bytes); in rpc_read() [all …]
|
| /optee_os/.github/workflows/ |
| H A D | ci.yml | 6 group: ci-${{ github.ref }} # unique per branch 7 cancel-in-progress: true # cancel previous runs on the same branch 11 runs-on: ubuntu-latest 14 - name: Checkout 17 fetch-depth: 0 # full history so checkpatch can check commit IDs in commit messages 18 - name: Update Git config 19 run: git config --global --add safe.directory ${GITHUB_WORKSPACE} 20 - name: Run checkpatch 24 set -e 26 mkdir -p /tmp/linux/scripts [all …]
|