/optee_test-3.20.0/host/xtest/gp/include/ |
A D | xml_crypto_api.h | 59 b.size = 0; 62 b.size = size; \ 67 b.size = 0; \ 1044 out_buffer->size += in_buffer[id].size; in collapse_crypto_buffers() 1137 .size = 64, in Invoke_Crypto_GetOperationInfoMultiple() 1714 ae_encrypt_tag.size = op.params[2].memref.size; in Invoke_Crypto_AEEncryptFinal() 1874 saved_random.size = op.params[3].memref.size; in Invoke_Crypto_GenerateRandom() 1966 saved_digest.size = op.params[3].memref.size; in Invoke_Crypto_DigestDoFinal() 2031 s_dgst.size = op.params[3].memref.size; in Invoke_Crypto_AsymmetricSignDigest() 3398 mac->size = op.params[3].memref.size; in mac_compute_final() [all …]
|
A D | xml_client_api.h | 152 uint32_t size, uint32_t flags) in RegisterSharedMemory() argument 155 shm->size = size; in RegisterSharedMemory() 156 shm->buffer = malloc(size); in RegisterSharedMemory() 161 #define AllocateTempMemory(temp_mem, size) \ argument 162 temp_mem = malloc(size) 297 .parent = shm, .size = sz, .offset = offs, in TEEC_prepare_OperationEachParameter_memref() 308 .buffer = buf, .size = sz, in TEEC_prepare_OperationEachParameter_tmpref() 319 (op)->params[(param_num)].memref.size); \ 327 memref.size); \ 340 (op)->params[(param_num)].tmpref.size); \ [all …]
|
A D | xml_timearithm_api.h | 887 uint32_t size) in Invoke_NewBigInt() argument 893 uint32_t role, uint32_t size, in Macro_StoreBigInt() argument 901 .size = value_size, in Macro_StoreBigInt() 915 op.params[0].value.b = size; in Macro_StoreBigInt() 918 shm_value.size); in Macro_StoreBigInt() 931 size_t size) in Invoke_BigIntConvertToOctetString() argument 937 .size = (size + 7) / 8, in Invoke_BigIntConvertToOctetString() 946 SET_SHARED_MEMORY_OPERATION_PARAMETER(2, 0, &shm, shm.size); in Invoke_BigIntConvertToOctetString() 954 size_t sz = op.params[2].memref.size; in Invoke_BigIntConvertToOctetString() 970 size_t size, in Invoke_BigIntConvertFromOctetString() argument [all …]
|
/optee_test-3.20.0/host/xtest/ |
A D | sdp_basic.h | 33 int allocate_dma_buffer(size_t size, const char *heap_name, int verbosity); 34 static inline int allocate_buffer(size_t size, const char *heap_name, int heap_id, int verbosity) in allocate_buffer() argument 38 return allocate_dma_buffer(size, heap_name, verbosity); in allocate_buffer() 41 int allocate_ion_buffer(size_t size, const char *heap_name, int heap_id, int verbosity); 42 static inline int allocate_buffer(size_t size, const char *heap_name, int heap_id, int verbosity) in allocate_buffer() argument 44 return allocate_ion_buffer(size, heap_name, heap_id, verbosity); in allocate_buffer() 48 size_t size, size_t loop, const char *heap_name, int ion_heap, 51 int sdp_out_of_bounds_memref_test(size_t size, const char *heap_name, int ion_heap, int verbosity);
|
A D | sdp_basic.c | 70 alloc_data.len = size; in allocate_ion_buffer_old_api() 139 alloc_data.len = size; in allocate_ion_buffer() 171 data.len = size; in allocate_dma_buffer() 475 size_t sdp_size = size; in sdp_basic_test() 486 size -= 255; in sdp_basic_test() 572 op.params[0].memref.size = size; in invoke_out_of_bounds() 576 op.params[1].memref.size = size; in invoke_out_of_bounds() 595 out->size, offset, size, in invoke_out_of_bounds() 604 out->size, offset, size, in invoke_out_of_bounds() 638 size = out->size; in sdp_out_of_bounds_memref_test() [all …]
|
A D | benchmark_2000.c | 33 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2001() local 36 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2001() 47 size_t size = 4096; /* Buffer size */ in xtest_tee_benchmark_2002() local 50 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2002() 73 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2011() local 75 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2011() 87 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2012() local 89 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2012()
|
A D | hash_perf.c | 174 in_shm.size = sz + offset; in alloc_shm() 179 out_shm.size = hash_size(algo); in alloc_shm() 246 read_random(in, size); in run_test_once() 329 alloc_shm(size, algo, offset); in hash_perf_run_test() 339 op.params[0].memref.size = size + offset; in hash_perf_run_test() 342 op.params[1].memref.size = hash_size(algo); in hash_perf_run_test() 347 algo_str(algo), size); in hash_perf_run_test() 369 mb_per_sec(size, stats.m + 2 * sd), in hash_perf_run_test() 370 mb_per_sec(size, stats.m - 2 * sd)); in hash_perf_run_test() 411 size_t size = 1024; /* Buffer size (-s) */ in hash_perf_runner_cmd_parser() local [all …]
|
A D | aes_perf.c | 248 shm->size = sz; in allocate_shm() 399 read_random(in, size); in feed_input() 401 memset(in, 0, size); in feed_input() 407 feed_input(in, size, random); in run_feed_input() 413 feed_input(in, size, random); in run_feed_input() 422 feed_input(data, size, random); in run_feed_input() 423 munmap(data, size); in run_feed_input() 473 op.params[0].memref.size = size; in aes_perf_run_test() 475 op.params[1].memref.size = size; in aes_perf_run_test() 631 size = atoi(argv[i]); in aes_perf_runner_cmd_parser() [all …]
|
A D | regression_1000.c | 502 size_t size) in xtest_tee_test_invalid_mem_access2() argument 509 shm.size = size; in xtest_tee_test_invalid_mem_access2() 522 op.params[1].memref.size = size; in xtest_tee_test_invalid_mem_access2() 1080 op.params[0].memref.size = a->shm->size; in test_1013_thread() 1260 int size = 17000; in xtest_tee_test_1014() local 1356 shm.size = 8 * page_size; in xtest_tee_test_1017() 1415 op.params[0].memref.size = shm->size / 2; in invoke_1byte_out_of_bounds() 1416 op.params[0].memref.offset = shm->size - (shm->size / 2) + 1; in invoke_1byte_out_of_bounds() 1955 shm.size = 0; in xtest_tee_test_1025() 1963 shm.size = 0; in xtest_tee_test_1025() [all …]
|
A D | regression_5000.c | 35 (op)->params[(param_num)].memref.size); \ 41 (op)->params[(param_num)].memref.size); \ 53 (op)->params[(param_num)].tmpref.size); \ 59 (op)->params[(param_num)].memref.size); \ 65 TEEC_SharedMemory *shm, size_t size, in RegisterSharedMemory() argument 69 shm->size = size; in RegisterSharedMemory() 75 TEEC_SharedMemory *shm, size_t size, in AllocateSharedMemory() argument 79 shm->size = size; in AllocateSharedMemory() 98 size_t size = 1024; in Allocate_In() local 105 AllocateSharedMemory(&cs->context, &shm, size, in Allocate_In() [all …]
|
A D | stats.c | 37 uint32_t size; /* Total size for this allocator */ member 152 stats_size_bytes = op.params[1].tmpref.size; in stat_alloc() 162 op.params[1].tmpref.size = stats_size_bytes; in stat_alloc() 169 if (op.params[1].tmpref.size != stats_size_bytes) in stat_alloc() 172 stats_size_bytes, op.params[1].tmpref.size); in stat_alloc() 185 stats[n].size); in stat_alloc() 248 stats_size_bytes = op.params[0].tmpref.size; in stat_loaded_ta() 268 op.params[0].tmpref.size = stats_size_bytes; in stat_loaded_ta() 280 for (n = 0; n < op.params[0].tmpref.size / sizeof(*stats); n++) { in stat_loaded_ta() 303 stats[n].heap.size); in stat_loaded_ta()
|
/optee_test-3.20.0/ta/crypt/ |
A D | cryp_taf.c | 241 size_t size = 0; in ta_entry_cipher_init() local 248 size = 0; in ta_entry_cipher_init() 254 size = params[1].memref.size; in ta_entry_cipher_init() 294 size_t size = 0; in ta_entry_mac_init() local 301 size = 0; in ta_entry_mac_init() 307 size = params[1].memref.size; in ta_entry_mac_init() 311 TEE_MACInit(op, buffer, size); in ta_entry_mac_init() 726 params[1].memref.size, b2, in ta_entry_ae_encrypt_final() 728 ¶ms[3].memref.size); in ta_entry_ae_encrypt_final() 759 params[1].memref.size, b2, in ta_entry_ae_decrypt_final() [all …]
|
A D | aes_taf.c | 38 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt() 42 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt() 48 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_encrypt() 79 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt() 83 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt() 89 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_decrypt()
|
A D | sha2_taf.c | 23 if (params[1].memref.size < SHA224_DIGEST_SIZE) in ta_entry_sha224() 27 (unsigned int)params[0].memref.size, in ta_entry_sha224() 46 if (params[1].memref.size < SHA256_DIGEST_SIZE) in ta_entry_sha256() 50 (unsigned int)params[0].memref.size, in ta_entry_sha256()
|
/optee_test-3.20.0/ta/sdp_basic/ |
A D | ta_sdp_basic.c | 39 if (params[sec_idx].memref.size < params[ns_idx].memref.size) in cmd_inject() 54 params[ns_idx].memref.size); in cmd_inject() 64 params[sec_idx].memref.size); in cmd_inject() 91 params[sec_idx].memref.size); in cmd_inject() 133 params[0].memref.size); in cmd_transform() 148 params[0].memref.size); in cmd_transform() 152 params[0].memref.size, rc); in cmd_transform() 159 sz = params[0].memref.size; in cmd_transform() 165 params[0].memref.size); in cmd_transform() 169 params[0].memref.size, rc); in cmd_transform() [all …]
|
/optee_test-3.20.0/ta/sims/ |
A D | ta_sims.c | 13 uint32_t size; member 42 if (params[0].memref.size != sizeof(*uuid)) in sims_open_ta_session() 49 TEE_MemMove(uuid, params[0].memref.buffer, params[0].memref.size); in sims_open_ta_session() 104 if (storage[index].size > params[1].memref.size) in sims_read() 112 params[1].memref.size); in sims_read() 135 storage[index].data = TEE_Malloc(params[1].memref.size, 0); in sims_write() 137 storage[index].size = 0; in sims_write() 140 storage[index].size = params[1].memref.size; in sims_write() 143 params[1].memref.size); in sims_write() 175 if (params[0].memref.buffer && params[0].memref.size) { in sims_entry_panic() [all …]
|
/optee_test-3.20.0/host/xtest/gp/patches/ |
A D | 0006-TTA_TCF-fix-CmdTEEGetPropertyA-_withoutEnum.patch | 40 + pParams[1].memref.size); 41 + pPropName[pParams[1].memref.size] = 0; 67 + pParams[1].memref.size); 68 + pPropName[pParams[1].memref.size] = 0; 94 + pParams[1].memref.size); 95 + pPropName[pParams[1].memref.size] = 0; 121 + pParams[1].memref.size); 122 + pPropName[pParams[1].memref.size] = 0; 148 + pParams[1].memref.size); 175 + pParams[1].memref.size); [all …]
|
A D | 0007-TTAs-revert-to-v1.1-types.patch | 24 …rationInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, size_t *size) 25 …tionInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, uint32_t *size) 27 const size_t allocatedSize = *size; 46 …ationInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, size_t *size); 47 …ionInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, uint32_t *size); 78 pParams[1].memref.size); 79 pPropName[pParams[1].memref.size] = 0;
|
/optee_test-3.20.0/ta/socket/ |
A D | ta_entry.c | 62 if (params[2].memref.size < sizeof(struct sock_handle)) { in ta_entry_tcp_open() 63 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_tcp_open() 70 params[1].memref.size); in ta_entry_tcp_open() 79 params[2].memref.size = sizeof(h); in ta_entry_tcp_open() 102 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_udp_open() 109 params[1].memref.size); in ta_entry_udp_open() 118 params[2].memref.size = sizeof(h); in ta_entry_udp_open() 159 if (params[0].memref.size != sizeof(*h)) in ta_entry_send() 163 params[2].value.b = params[1].memref.size; in ta_entry_send() 188 ¶ms[1].memref.size, params[2].value.a); in ta_entry_recv() [all …]
|
/optee_test-3.20.0/ta/storage/ |
A D | storage.c | 42 params[0].memref.size); in ta_storage_cmd_open() 53 object_id, params[0].memref.size, in ta_storage_cmd_open() 86 params[0].memref.size); in ta_storage_cmd_create() 99 object_id, params[0].memref.size, in ta_storage_cmd_create() 102 params[3].memref.size, &o); in ta_storage_cmd_create() 133 params[0].memref.size); in ta_storage_cmd_create_overwrite() 143 object_id, params[0].memref.size, in ta_storage_cmd_create_overwrite() 176 b0 = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_read() 200 b0 = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_write() 267 params[1].memref.size); in ta_storage_cmd_rename() [all …]
|
/optee_test-3.20.0/ta/concurrent/ |
A D | ta_entry.c | 62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop() 100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256() 102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256() 107 out_len = params[3].memref.size; in ta_entry_sha256() 123 params[2].memref.size, out, &out_len); in ta_entry_sha256() 128 params[3].memref.size = out_len; in ta_entry_sha256()
|
/optee_test-3.20.0/ta/concurrent_large/ |
A D | ta_entry.c | 62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop() 100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256() 102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256() 107 out_len = params[3].memref.size; in ta_entry_sha256() 123 params[2].memref.size, out, &out_len); in ta_entry_sha256() 128 params[3].memref.size = out_len; in ta_entry_sha256()
|
/optee_test-3.20.0/ta/rpc_test/ |
A D | ta_rpc.c | 51 TEE_Malloc(pParams[n].memref.size, 0); in rpc_call_cryp() 54 params[n].memref.size = pParams[n].memref.size; in rpc_call_cryp() 59 pParams[n].memref.size); in rpc_call_cryp() 93 params[n].memref.size); in rpc_call_cryp() 94 pParams[n].memref.size = params[n].memref.size; in rpc_call_cryp()
|
/optee_test-3.20.0/host/xtest/adbg/src/ |
A D | adbg_run.c | 77 size_t size = 0; in Do_ADBG_AppendToSuite() local 80 size = strlen(Source_p->SuiteID_p); in Do_ADBG_AppendToSuite() 82 size += strlen(Dest_p->SuiteID_p); in Do_ADBG_AppendToSuite() 83 size += 1; /* '+' */ in Do_ADBG_AppendToSuite() 85 size += 1; /* '\0' */ in Do_ADBG_AppendToSuite() 86 p = malloc(size); in Do_ADBG_AppendToSuite() 92 snprintf(p, size, "%s+%s", Dest_p->SuiteID_p, in Do_ADBG_AppendToSuite() 95 snprintf(p, size, "%s", Source_p->SuiteID_p); in Do_ADBG_AppendToSuite()
|
/optee_test-3.20.0/ta/os_test/ |
A D | os_test.c | 61 if (size > 4 || bblen != size) { in check_binprop_ones() 477 params[0].memref.size); in test_mem_access_right() 483 params[0].memref.size); in test_mem_access_right() 536 l_params[0].memref.size = sizeof(buf); in test_mem_access_right() 538 l_params[1].memref.size = 0; in test_mem_access_right() 730 return tee_map_zi(size, 0); in malloc_wrapper() 950 params[0].memref.size); in ta_entry_params_access_rights() 956 params[0].memref.size); in ta_entry_params_access_rights() 1147 bufsize = params[0].memref.size; in ta_entry_ta2ta_memref_mix() 1149 params[2].memref.size != bufsize) in ta_entry_ta2ta_memref_mix() [all …]
|