Home
last modified time | relevance | path

Searched refs:size (Results 1 – 25 of 439) sorted by relevance

12345678910>>...18

/optee_os/lib/libutils/ext/arch/arm/
H A Dmemtag.c58 static void set_tags_dc_gva(vaddr_t va, size_t size, size_t dcsz) in set_tags_dc_gva() argument
63 size -= dcsz; in set_tags_dc_gva()
64 } while (size); in set_tags_dc_gva()
67 static void clear_mem_dc_gzva(vaddr_t va, size_t size, size_t dcsz) in clear_mem_dc_gzva() argument
72 size -= dcsz; in clear_mem_dc_gzva()
73 } while (size); in clear_mem_dc_gzva()
76 static void *set_tags_helper(void *addr, size_t size) in set_tags_helper() argument
79 vaddr_t end = va + size; in set_tags_helper()
82 assert(!(size & MEMTAG_GRANULE_MASK)); in set_tags_helper()
90 static void *set_tags_dc_helper(void *addr, size_t size) in set_tags_dc_helper() argument
[all …]
/optee_os/lib/libutils/isoc/include/
H A Dmalloc.h22 void *malloc(size_t size);
23 void *malloc_flags(uint32_t flags, void *ptr, size_t alignment, size_t size);
24 void *calloc(size_t nmemb, size_t size);
25 void *realloc(void *ptr, size_t size);
26 void *memalign(size_t alignment, size_t size);
31 void *aligned_alloc(size_t alignment, size_t size);
36 size_t size, const char *fname, int lineno);
40 #define malloc(size) __mdbg_alloc(MAF_NULL, NULL, 1, 1, \ argument
41 (size), __FILE__, __LINE__)
42 #define malloc_flags(flags, ptr, align, size) \ argument
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/ecc/
H A Dltc_ecc_export_point.c8 …nt(unsigned char *out, unsigned long *outlen, void *x, void *y, unsigned long size, int compressed) in ltc_ecc_export_point() argument
14 if (size > sizeof(buf)) return CRYPT_BUFFER_OVERFLOW; in ltc_ecc_export_point()
15 if ((xsize = mp_unsigned_bin_size(x)) > size) return CRYPT_BUFFER_OVERFLOW; in ltc_ecc_export_point()
16 if ((ysize = mp_unsigned_bin_size(y)) > size) return CRYPT_BUFFER_OVERFLOW; in ltc_ecc_export_point()
19 if (*outlen < (1 + size)) { in ltc_ecc_export_point()
20 *outlen = 1 + size; in ltc_ecc_export_point()
27 if ((err = mp_to_unsigned_bin(x, buf + (size - xsize))) != CRYPT_OK) return err; in ltc_ecc_export_point()
28 XMEMCPY(out+1, buf, size); in ltc_ecc_export_point()
30 *outlen = 1 + size; in ltc_ecc_export_point()
33 if (*outlen < (1 + 2*size)) { in ltc_ecc_export_point()
[all …]
H A Decc_get_key.c18 unsigned long size, ksize; in ecc_get_key() local
25 size = key->dp.size; in ecc_get_key()
30 …if ((err = ltc_ecc_export_point(out, outlen, key->pubkey.x, key->pubkey.y, size, compressed)) != C… in ecc_get_key()
36 if (size > *outlen) { in ecc_get_key()
37 *outlen = size; in ecc_get_key()
40 *outlen = size; in ecc_get_key()
41 …if ((ksize = mp_unsigned_bin_size(key->k)) > size) return CRYPT_BUFFER_OV… in ecc_get_key()
43 if ((err = mp_to_unsigned_bin(key->k, out + (size - ksize))) != CRYPT_OK) return err; in ecc_get_key()
44 zeromem(out, size - ksize); in ecc_get_key()
H A Decc_ssh_ecdsa_encode_name.c24 int err, size = 0; in ecc_ssh_ecdsa_encode_name() local
36 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp256"); in ecc_ssh_ecdsa_encode_name()
40 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp384"); in ecc_ssh_ecdsa_encode_name()
44 size = snprintf(buffer, *buflen, "ecdsa-sha2-nistp521"); in ecc_ssh_ecdsa_encode_name()
47 size = snprintf(buffer, *buflen, "ecdsa-sha2-%s", oidstr); in ecc_ssh_ecdsa_encode_name()
52 if (size < 0) { in ecc_ssh_ecdsa_encode_name()
54 } else if ((unsigned)size >= *buflen) { in ecc_ssh_ecdsa_encode_name()
59 *buflen = size + 1; /* the string length + NUL byte */ in ecc_ssh_ecdsa_encode_name()
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/choice/
H A Dder_decode_choice.c23 unsigned long size, x, z; in der_decode_choice() local
42 size = list[x].size; in der_decode_choice()
77 if (der_decode_bit_string(in, *inlen, data, &size) == CRYPT_OK) { in der_decode_choice()
78 if (der_length_bit_string(size, &z) == CRYPT_OK) { in der_decode_choice()
80 list[x].size = size; in der_decode_choice()
88 if (der_decode_raw_bit_string(in, *inlen, data, &size) == CRYPT_OK) { in der_decode_choice()
89 if (der_length_bit_string(size, &z) == CRYPT_OK) { in der_decode_choice()
91 list[x].size = size; in der_decode_choice()
99 if (der_decode_octet_string(in, *inlen, data, &size) == CRYPT_OK) { in der_decode_choice()
100 if (der_length_octet_string(size, &z) == CRYPT_OK) { in der_decode_choice()
[all …]
/optee_os/core/lib/libtomcrypt/src/misc/ssh/
H A Dssh_encode_sequence_multi.c24 ulong32 size; in ssh_encode_sequence_multi() local
36 size = 0; in ssh_encode_sequence_multi()
43 size++; in ssh_encode_sequence_multi()
47 size += 4; in ssh_encode_sequence_multi()
51 size += 8; in ssh_encode_sequence_multi()
56 size += va_arg(args, unsigned long); in ssh_encode_sequence_multi()
57 size += 4; in ssh_encode_sequence_multi()
62 size += 4; in ssh_encode_sequence_multi()
64 size += mp_unsigned_bin_size(vdata); in ssh_encode_sequence_multi()
65 if ((mp_count_bits(vdata) & 7) == 0) size++; /* Zero padding if high bit set */ in ssh_encode_sequence_multi()
[all …]
H A Dssh_decode_sequence_multi.c31 ulong32 size; in ssh_decode_sequence_multi() local
54 size = 0xFFFFFFFFU; in ssh_decode_sequence_multi()
58 size = 1; in ssh_decode_sequence_multi()
61 size = 4; in ssh_decode_sequence_multi()
64 size = 8; in ssh_decode_sequence_multi()
69 LOAD32H(size, in); in ssh_decode_sequence_multi()
82 if (remaining < size) { in ssh_decode_sequence_multi()
86 remaining -= size; in ssh_decode_sequence_multi()
127 if (size + 1 >= *bufsize) { in ssh_decode_sequence_multi()
131 if (size > 0) { in ssh_decode_sequence_multi()
[all …]
/optee_os/core/mm/
H A Dphys_mem.c55 return nex_ta_pool->size; in nex_phys_mem_get_ta_size()
57 return nex_core_pool->size - TEE_RAM_VA_SIZE; in nex_phys_mem_get_ta_size()
70 return pool && core_is_buffer_inside(addr, 1, pool->lo, pool->size); in is_in_pool_range()
89 size_t size, uint32_t flags) in mm_alloc() argument
94 mm = tee_mm_alloc_flags(p0, size, flags); in mm_alloc()
96 mm = tee_mm_alloc_flags(p1, size, flags); in mm_alloc()
101 tee_mm_entry_t *nex_phys_mem_core_alloc(size_t size) in nex_phys_mem_core_alloc() argument
103 return mm_alloc(nex_core_pool, NULL, size, MAF_NULL); in nex_phys_mem_core_alloc()
106 tee_mm_entry_t *nex_phys_mem_ta_alloc(size_t size) in nex_phys_mem_ta_alloc() argument
108 return mm_alloc(nex_ta_pool, nex_core_pool, size, MAF_NULL); in nex_phys_mem_ta_alloc()
[all …]
H A Dtee_mm.c15 bool tee_mm_init(tee_mm_pool_t *pool, paddr_t lo, paddr_size_t size, in tee_mm_init() argument
26 size = ROUNDDOWN2(size - rounded, 1 << shift); in tee_mm_init()
28 assert(((uint64_t)size >> shift) < (uint64_t)UINT32_MAX); in tee_mm_init()
32 .size = size, in tee_mm_init()
44 pool->entry->offset = ((size - 1) >> shift) + 1; in tee_mm_init()
81 sz += entry->size; in tee_mm_stats_allocated()
100 stats->size = pool->size; in tee_mm_get_pool_stats()
122 tee_mm_entry_t *tee_mm_alloc_flags(tee_mm_pool_t *pool, size_t size, in tee_mm_alloc_flags() argument
145 if (!size) in tee_mm_alloc_flags()
148 psize = ((size - 1) >> pool->shift) + 1; in tee_mm_alloc_flags()
[all …]
/optee_os/core/kernel/
H A Dasan.c33 uintptr_t size; member
49 static bool addr_crosses_scale_boundary(vaddr_t addr, size_t size) in addr_crosses_scale_boundary() argument
52 ((addr + size - 1) >> ASAN_BLOCK_SHIFT); in addr_crosses_scale_boundary()
189 static void asan_report(vaddr_t addr, size_t size) in asan_report() argument
216 addr, size); in asan_report()
281 size_t size) in asan_shadow_Nbyte_isvalid() argument
285 for (; i < size; i++) { in asan_shadow_Nbyte_isvalid()
293 static __always_inline void check_access(vaddr_t addr, size_t size) in check_access() argument
297 void *end = (void *)(addr + size); in check_access()
301 if (size == 0) in check_access()
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/set/
H A Dder_encode_setof.c14 unsigned long size; member
24 r = XMEMCMP(A->start, B->start, MIN(A->size, B->size)); in s_qsort_helper()
26 if (r == 0 && A->size != B->size) { in s_qsort_helper()
27 if (A->size > B->size) { in s_qsort_helper()
28 for (x = B->size; x < A->size; x++) { in s_qsort_helper()
34 for (x = A->size; x < B->size; x++) { in s_qsort_helper()
113 edges[x].size = y; in der_encode_setof()
116 edges[x].size = 0; in der_encode_setof()
118 edges[x].size = (edges[x].size << 8) | ((unsigned long)ptr[z++]); in der_encode_setof()
123 edges[x].size += z; in der_encode_setof()
[all …]
/optee_os/ta/pkcs11/src/
H A Dattributes.c31 void *data, size_t size) in add_attribute() argument
43 data32 = size; in add_attribute()
48 rc = serialize(bstart, &buf_len, data, size); in add_attribute()
54 (*head)->attrs_size += 2 * sizeof(uint32_t) + size; in add_attribute()
75 next_off = sizeof(pkcs11_ref) + pkcs11_ref.size; in _remove_attribute()
80 if (empty && pkcs11_ref.size) in _remove_attribute()
119 next_off = sizeof(pkcs11_ref) + pkcs11_ref.size; in get_attribute_ptrs()
130 if (pkcs11_ref.size) in get_attribute_ptrs()
137 *attr_size_ptr++ = pkcs11_ref.size; in get_attribute_ptrs()
173 uint32_t size = 0; in get_attribute() local
[all …]
H A Dserializer.c20 void serialargs_init(struct serialargs *args, void *in, size_t size) in serialargs_init() argument
24 args->size = size; in serialargs_init()
27 enum pkcs11_rc serialargs_get(struct serialargs *args, void *out, size_t size) in serialargs_get() argument
32 rc = serialargs_get_ptr(args, &src, size); in serialargs_get()
34 TEE_MemMove(out, src, size); in serialargs_get()
41 void **out, size_t size) in alloc_and_get() argument
48 if (ADD_OVERFLOW(buf0_sz, size, &sz)) in alloc_and_get()
56 rc = serialargs_get_ptr(args, &src, size); in alloc_and_get()
67 TEE_MemMove(ptr + buf0_sz, src, size); in alloc_and_get()
75 void **out, size_t size) in serialargs_alloc_and_get() argument
[all …]
/optee_os/core/drivers/crypto/ele/
H A Dmemutils.c15 cache_operation(op, ele_buf->data, ele_buf->size); in imx_ele_buf_cache_op()
19 size_t size) in imx_ele_buf_alloc() argument
21 if (!ele_buf || !size) in imx_ele_buf_alloc()
24 ele_buf->data = alloc_cache_aligned(size); in imx_ele_buf_alloc()
39 ele_buf->size = size; in imx_ele_buf_alloc()
42 memcpy(ele_buf->data, buf, size); in imx_ele_buf_alloc()
55 ele_buf->size = 0; in imx_ele_buf_free()
60 size_t size) in imx_ele_buf_copy() argument
62 if (!ele_buf || !buf || !size) in imx_ele_buf_copy()
65 if (size < ele_buf->size) in imx_ele_buf_copy()
[all …]
/optee_os/core/include/mm/
H A Dphys_mem.h17 tee_mm_entry_t *nex_phys_mem_core_alloc(size_t size);
18 tee_mm_entry_t *nex_phys_mem_ta_alloc(size_t size);
19 tee_mm_entry_t *nex_phys_mem_alloc2(paddr_t base, size_t size);
20 void nex_phys_mem_partial_carve_out(paddr_t base, size_t size);
29 tee_mm_entry_t *phys_mem_core_alloc(size_t size);
30 tee_mm_entry_t *phys_mem_ta_alloc(size_t size);
31 tee_mm_entry_t *phys_mem_alloc2(paddr_t base, size_t size);
47 static inline tee_mm_entry_t *phys_mem_core_alloc(size_t size) in phys_mem_core_alloc() argument
49 return nex_phys_mem_core_alloc(size); in phys_mem_core_alloc()
52 static inline tee_mm_entry_t *phys_mem_ta_alloc(size_t size) in phys_mem_ta_alloc() argument
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/custom_type/
H A Dder_decode_custom_type.c50 unsigned long size, x, y, z, blksize; in der_decode_custom_type_ex() local
99 outlen = root->size; in der_decode_custom_type_ex()
144 size = list[i].size; in der_decode_custom_type_ex()
210 if ((err = der_decode_bit_string(in + x, z, data, &size)) != CRYPT_OK) { in der_decode_custom_type_ex()
214 list[i].size = size; in der_decode_custom_type_ex()
215 if ((err = der_length_bit_string(size, &z)) != CRYPT_OK) { in der_decode_custom_type_ex()
222 if ((err = der_decode_raw_bit_string(in + x, z, data, &size)) != CRYPT_OK) { in der_decode_custom_type_ex()
226 list[i].size = size; in der_decode_custom_type_ex()
227 if ((err = der_length_bit_string(size, &z)) != CRYPT_OK) { in der_decode_custom_type_ex()
234 if ((err = der_decode_octet_string(in + x, z, data, &size)) != CRYPT_OK) { in der_decode_custom_type_ex()
[all …]
/optee_os/lib/libutils/ext/include/
H A Dmemtag.h30 void *(*set_tags)(void *addr, size_t size, uint8_t tag);
31 void *(*set_random_tags)(void *addr, size_t size);
32 void (*clear_mem)(void *addr, size_t size);
39 static inline void *__memtag_disabled_set_tags(void *addr, size_t size __unused, in __memtag_disabled_set_tags()
46 size_t size __unused) in __memtag_disabled_set_random_tags()
51 static inline void __memtag_disabled_clear_mem(void *addr, size_t size) in __memtag_disabled_clear_mem() argument
53 memset(addr, 0, size); in __memtag_disabled_clear_mem()
75 static inline void *memtag_set_tags(void *addr, size_t size, uint8_t tag) in memtag_set_tags() argument
78 return __memtag_ops->set_tags(addr, size, tag); in memtag_set_tags()
80 return __memtag_disabled_set_tags(addr, size, tag); in memtag_set_tags()
[all …]
H A Dconfine_array_index.h70 static inline size_t confine_array_index(size_t index, size_t size) { in confine_array_index() argument
81 : "r"(index), "r"(size) in confine_array_index()
87 static inline size_t confine_array_index(size_t index, size_t size) in confine_array_index() argument
113 : "+r" (ret_val) : "r" (size) : "cc"); in confine_array_index()
120 : "+r" (ret_val) : "r" (size) : "cc"); in confine_array_index()
128 static inline size_t confine_array_index(size_t index, size_t size) { in confine_array_index() argument
140 : "r"(index), "r"(size) in confine_array_index()
147 static inline size_t confine_array_index(size_t index, size_t size) { in confine_array_index() argument
152 if (index < size) in confine_array_index()
/optee_os/scripts/
H A Dmem_usage.py46 def print_sect(name, addr, size, round_up=False, print_num_pages=False): argument
49 if size == 0:
54 size_kib = (size - 1) / 1024 + 1
56 size_kib = size / 1024
57 num_pages = (size - 1) / 4096 + 1
59 printf('%-16s %.8X - %.8X size %.8X %3d KiB', name, addr, addr + size,
60 size, size_kib)
66 def print_pager_stat(name, size): argument
67 size_kib = size / 1024
69 printf('%d ', size)
[all …]
/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/sequence/
H A Dder_decode_sequence_flexi.c132 l->size = 1; in s_der_decode_sequence_flexi()
151 l->size = 1; in s_der_decode_sequence_flexi()
174 …l->size = len * 8; /* *8 because we store decoded bits one per char and they are encoded 8 per cha… in s_der_decode_sequence_flexi()
176 if ((l->data = XCALLOC(1, l->size)) == NULL) { in s_der_decode_sequence_flexi()
181 if ((err = der_decode_bit_string(in, *inlen, l->data, &l->size)) != CRYPT_OK) { in s_der_decode_sequence_flexi()
185 if ((err = der_length_bit_string(l->size, &len)) != CRYPT_OK) { in s_der_decode_sequence_flexi()
197 l->size = len; in s_der_decode_sequence_flexi()
199 if ((l->data = XCALLOC(1, l->size)) == NULL) { in s_der_decode_sequence_flexi()
204 if ((err = der_decode_octet_string(in, *inlen, l->data, &l->size)) != CRYPT_OK) { in s_der_decode_sequence_flexi()
208 if ((err = der_length_octet_string(l->size, &len)) != CRYPT_OK) { in s_der_decode_sequence_flexi()
[all …]
/optee_os/core/arch/arm/dts/
H A Dfsl-lx2160a-qds.dts38 #size-cells = <0>;
43 #size-cells = <0>;
49 #size-cells = <0>;
55 #size-cells = <0>;
61 #size-cells = <0>;
67 #size-cells = <0>;
73 #size-cells = <0>;
79 #size-cells = <0>;
85 #size-cells = <0>;
91 #size-cells = <0>;
[all …]
/optee_os/core/drivers/bnxt/
H A Dbnxt_fw.c152 uint32_t size; /* Size in bytes */ member
180 uint32_t size; member
215 static uint32_t ape_host_view_addr_get(uint32_t bnxt_view_addr, uint32_t size) in ape_host_view_addr_get() argument
220 for (; region->size != 0; region++) { in ape_host_view_addr_get()
224 if (bnxt_view_addr >= (region->c_base + region->size)) in ape_host_view_addr_get()
227 if (size > (region->c_base + region->size - bnxt_view_addr)) { in ape_host_view_addr_get()
229 bnxt_view_addr, size); in ape_host_view_addr_get()
423 size_t size = 0; in ape_section_copy() local
440 size = ape_section_uncompress(section_data, in ape_section_copy()
444 if (size >= work_buff_size) { in ape_section_copy()
[all …]
/optee_os/core/drivers/crypto/caam/
H A Dcaam_key.c104 size_t size) in data_to_serialized_key() argument
106 assert(data && size); in data_to_serialized_key()
107 assert(size > sizeof(struct caam_key_serialized)); in data_to_serialized_key()
134 static enum caam_key_type get_key_type(const uint8_t *data, size_t size) in get_key_type() argument
136 struct caam_key_serialized *key = data_to_serialized_key(data, size); in get_key_type()
150 static size_t get_key_sec_size(const uint8_t *data, size_t size) in get_key_sec_size() argument
152 struct caam_key_serialized *key = data_to_serialized_key(data, size); in get_key_sec_size()
155 return size; in get_key_sec_size()
166 static unsigned long get_key_buf_offset(const uint8_t *data, size_t size) in get_key_buf_offset() argument
168 struct caam_key_serialized *key = data_to_serialized_key(data, size); in get_key_buf_offset()
[all …]
/optee_os/lib/libutee/
H A Dtcb.c53 unsigned long size; member
57 #define DTV_SIZE(size) (sizeof(union dtv) + (size)) argument
91 size_t size = 0; in __utee_tcb_init() local
121 size = DTV_SIZE((__elf_phdr_info.count + 1) * sizeof(union dtv)); in __utee_tcb_init()
122 _tcb->dtv = malloc_flags(MAF_ZERO_INIT, _tcb->dtv, 1, size); in __utee_tcb_init()
124 EMSG("DTV allocation failed (%zu bytes)", size); in __utee_tcb_init()
129 size = 0; in __utee_tcb_init()
136 if (size + phdr->p_memsz <= _tls_size) { in __utee_tcb_init()
140 _tcb->dtv[i + 1].tls = _tcb->tls + size; in __utee_tcb_init()
142 memcpy(_tcb->tls + size, in __utee_tcb_init()
[all …]

12345678910>>...18