/optee_os-3.20.0/core/arch/arm/kernel/ |
A D | ldelf_loader.c | 113 memset(arg, 0, sizeof(*arg)); in ldelf_init_with_ldelf() 138 (uaddr_t)arg, sizeof(*arg)); in ldelf_init_with_ldelf() 190 (uaddr_t)arg, sizeof(*arg)); in ldelf_dump_state() 196 memset(arg, 0, sizeof(*arg) + n * sizeof(struct dump_map)); in ldelf_dump_state() 308 (uaddr_t)arg, sizeof(*arg)); in ldelf_dump_ftrace() 314 *arg = *blen; in ldelf_dump_ftrace() 337 *blen = *arg; in ldelf_dump_ftrace() 363 (uaddr_t)arg, sizeof(*arg)); in ldelf_dlopen() 369 memset(arg, 0, sizeof(*arg)); in ldelf_dlopen() 416 (uaddr_t)arg, sizeof(*arg) + len + 1); in ldelf_dlsym() [all …]
|
A D | thread_optee_smc.c | 114 *arg = p; in get_msg_arg() 198 if (!arg) in std_entry_with_parg() 472 if (!arg) { in get_rpc_arg() 479 if (!arg) { in get_rpc_arg() 489 arg->cmd = cmd; in get_rpc_arg() 529 *arg_ret = arg; in get_rpc_arg() 559 return arg->ret; in get_rpc_arg_res() 566 void *arg = NULL; in thread_rpc_cmd() local 596 void *arg = NULL; in thread_rpc_free() local 618 if (arg->ret || arg->num_params != 1) in get_rpc_alloc_res() [all …]
|
A D | thread_spmc.c | 1021 struct optee_msg_arg *arg = NULL; in yielding_call_with_arg() local 1037 arg = mobj_get_va(mobj, offset, sizeof(*arg)); in yielding_call_with_arg() 1038 if (!arg) in yielding_call_with_arg() 1125 if (!arg) { in get_rpc_arg() 1130 memset(arg, 0, sz); in get_rpc_arg() 1131 arg->cmd = cmd; in get_rpc_arg() 1132 arg->num_params = num_params; in get_rpc_arg() 1162 *arg_ret = arg; in get_rpc_arg() 1187 return arg->ret; in get_rpc_arg_res() 1198 struct optee_msg_arg *arg = NULL; in thread_rpc_cmd() local [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pbes/ |
A D | pbes.c | 23 LTC_ARGCHK(arg != NULL); in pbes_decrypt() 28 hid = find_hash(arg->type.h); in pbes_decrypt() 30 cid = find_cipher(arg->type.c); in pbes_decrypt() 33 klen = arg->type.keylen; in pbes_decrypt() 36 if (arg->key_bits != 0) { in pbes_decrypt() 40 klen = arg->key_bits / 8; in pbes_decrypt() 44 if (arg->iv != NULL) { in pbes_decrypt() 45 iv = arg->iv->data; in pbes_decrypt() 48 klen += arg->type.blocklen; in pbes_decrypt() 53 …if ((err = arg->type.kdf(arg->pwd, arg->pwdlen, arg->salt->data, arg->salt->size, arg->iterations,… in pbes_decrypt() [all …]
|
/optee_os-3.20.0/ldelf/ |
A D | main.c | 41 arg->num_maps, arg->maps, mpool_base); in dump_ta_state() 43 if (arg->is_arm32) in dump_ta_state() 46 ta_elf_stack_trace_a64(arg->arm64.fp, arg->arm64.sp, in dump_ta_state() 47 arg->arm64.pc); in dump_ta_state() 108 switch (arg->cmd) { in dl_entry() 110 arg->ret = dlopen_entry(arg); in dl_entry() 113 arg->ret = dlsym_entry(arg); in dl_entry() 143 ta_elf_load_main(&arg->uuid, &arg->is_32bit, &arg->stack_ptr, in ldelf() 144 &arg->flags); in ldelf() 161 arg->ftrace_entry = 0; in ldelf() [all …]
|
A D | dl.c | 11 TEE_Result dlopen_entry(struct dl_entry_arg *arg) in dlopen_entry() argument 15 if (arg->dlopen.flags != (RTLD_NOW | RTLD_GLOBAL | RTLD_NODELETE)) in dlopen_entry() 18 if (!memcmp(&arg->dlopen.uuid, &zero, sizeof(zero))) in dlopen_entry() 21 return ta_elf_add_library(&arg->dlopen.uuid); in dlopen_entry() 24 TEE_Result dlsym_entry(struct dl_entry_arg *arg) in dlsym_entry() argument 29 if (memcmp(&arg->dlsym.uuid, &zero, sizeof(zero))) { in dlsym_entry() 30 elf = ta_elf_find_elf(&arg->dlsym.uuid); in dlsym_entry() 35 return ta_elf_resolve_sym(arg->dlsym.symbol, &arg->dlsym.val, NULL, in dlsym_entry()
|
A D | dl.h | 12 TEE_Result dlopen_entry(struct dl_entry_arg *arg); 13 TEE_Result dlsym_entry(struct dl_entry_arg *arg);
|
/optee_os-3.20.0/lib/libutils/ext/ |
A D | fault_mitigation.c | 47 arg->hash ^= my_hash; in ___ftmn_callee_done() 48 arg->res = arg->hash ^ res; in ___ftmn_callee_done() 57 arg->hash ^= my_hash; in ___ftmn_callee_done_not_zero() 58 arg->res = arg->hash ^ res; in ___ftmn_callee_done_not_zero() 76 arg->hash ^= my_hash; in ___ftmn_callee_done_memcmp() 77 arg->res = arg->hash ^ res; in ___ftmn_callee_done_memcmp() 92 if (arg) { in ___ftmn_callee_done_check() 93 arg->hash ^= my_hash; in ___ftmn_callee_done_check() 94 arg->res = check->res ^ FTMN_DEFAULT_HASH ^ arg->hash; in ___ftmn_callee_done_check() 104 arg->res = arg->hash ^ res; in ___ftmn_callee_update_not_zero() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/versal/ |
A D | ipi.c | 22 struct versal_cmd_args *arg) in versal_sha3_request() argument 30 if (arg->data[0]) { in versal_sha3_request() 35 cmd.data[3] = arg->data[0]; in versal_sha3_request() 37 cmd.ibuf[0].mem = arg->ibuf[0].mem; in versal_sha3_request() 51 struct versal_cmd_args *arg) in versal_aes_update_aad_request() argument 62 cmd.data[3] = arg->data[0]; in versal_aes_update_aad_request() 64 cmd.ibuf[0].mem = arg->ibuf[0].mem; in versal_aes_update_aad_request() 85 cmd.data[i] = arg->data[i - 1]; in versal_crypto_request() 88 if (!arg->ibuf[0].mem.buf) in versal_crypto_request() 96 if (!arg->ibuf[1].mem.buf) in versal_crypto_request() [all …]
|
A D | authenc.c | 206 arg.data[arg.dlen++] = engine.init.key_len; in replay_init() 207 arg.data[arg.dlen++] = engine.key_src; in replay_init() 215 memset(&arg, 0, sizeof(arg)); in replay_init() 234 arg.data[arg.dlen++] = p->mem.len % 16 ? p->mem.alloc_len : p->mem.len; in replay_aad() 348 arg.data[arg.dlen++] = key_len; in do_init() 349 arg.data[arg.dlen++] = engine.key_src; in do_init() 358 memset(&arg, 0, sizeof(arg)); in do_init() 432 arg.data[arg.dlen++] = p.len % 16 ? p.alloc_len : p.len; in do_update_aad() 433 arg.ibuf[0].mem = p; in do_update_aad() 494 arg.ibuf[1].mem = q; in update_payload() [all …]
|
A D | ecc.c | 199 arg.dlen = 1; in verify() 200 arg.ibuf[0].mem = x; in verify() 202 &arg, &err)) { in verify() 207 memset(&arg, 0, sizeof(arg)); in verify() 221 arg.ibuf[1].mem = p; in verify() 223 arg.ibuf[2].mem = x; in verify() 224 arg.ibuf[3].mem = s; in verify() 309 arg.ibuf[1].mem = s; in sign() 426 arg.data[arg.dlen++] = XSECURE_ECDSA_KAT_NIST_P384; in ecc_init() 433 arg.dlen = 0; in ecc_init() [all …]
|
A D | rsa.c | 37 struct versal_cmd_args arg = { }; in do_encrypt() local 93 arg.ibuf[0].mem = cmd_buf; in do_encrypt() 94 arg.ibuf[1].mem = cipher; in do_encrypt() 95 arg.ibuf[2].mem = msg; in do_encrypt() 96 arg.ibuf[3].mem = key; in do_encrypt() 129 struct versal_cmd_args arg = { }; in do_decrypt() local 185 arg.ibuf[0].mem = cmd_buf; in do_decrypt() 186 arg.ibuf[1].mem = msg; in do_decrypt() 187 arg.ibuf[2].mem = cipher; in do_decrypt() 188 arg.ibuf[3].mem = key; in do_decrypt() [all …]
|
/optee_os-3.20.0/core/drivers/ |
A D | versal_puf.c | 123 arg.ibuf[0].mem = request; in versal_puf_register() 125 arg.ibuf[2].mem = hash_addr; in versal_puf_register() 126 arg.ibuf[3].mem = aux_addr; in versal_puf_register() 127 arg.ibuf[4].mem = puf_id_addr; in versal_puf_register() 144 &arg.data[2], &arg.data[1]); in versal_puf_register() 203 arg.ibuf[0].mem = request; in versal_puf_regenerate() 205 arg.ibuf[2].mem = hash_addr; in versal_puf_regenerate() 206 arg.ibuf[3].mem = aux_addr; in versal_puf_regenerate() 207 arg.ibuf[4].mem = puf_id_addr; in versal_puf_regenerate() 224 &arg.data[2], &arg.data[1]); in versal_puf_regenerate() [all …]
|
A D | versal_sha3_384.c | 22 struct versal_cmd_args arg = { .dlen = 1, }; in input_plaintext() local 33 arg.data[0] = first | VERSAL_SHA3_384_NEXT_PACKET | len; in input_plaintext() 34 arg.ibuf[0].mem = p; in input_plaintext() 35 ret = versal_crypto_request(VERSAL_SHA3_UPDATE, &arg, NULL); in input_plaintext() 49 struct versal_cmd_args arg = { }; in get_ciphertext() local 55 arg.ibuf[0].mem = p; in get_ciphertext() 56 ret = versal_crypto_request(VERSAL_SHA3_UPDATE, &arg, NULL); in get_ciphertext() 91 struct versal_cmd_args arg = { }; in versal_sha3_384_init() local 94 ret = versal_crypto_request(VERSAL_SHA3_KAT, &arg, NULL); in versal_sha3_384_init()
|
A D | versal_nvm.c | 125 if (arg) in prepare_cmd() 126 cmd->data[i++] = *arg; in prepare_cmd() 150 ret = prepare_cmd(&cmd, efuse, ibufs, arg); in efuse_req() 186 uint32_t *arg = NULL; in versal_nvm_read() local 206 arg = &val; in versal_nvm_read() 210 arg = &val; in versal_nvm_read() 214 arg = &val; in versal_nvm_read() 218 arg = &val; in versal_nvm_read() 231 uint32_t *arg = NULL; in versal_nvm_write() local 237 arg = &val; in versal_nvm_write() [all …]
|
/optee_os-3.20.0/core/tee/ |
A D | entry_std.c | 393 arg->session = s->id; in entry_open_session() 395 arg->session = 0; in entry_open_session() 396 arg->ret = res; in entry_open_session() 397 arg->ret_origin = err_orig; in entry_open_session() 416 arg->ret = res; in entry_close_session() 452 arg->ret = res; in entry_invoke_command() 453 arg->ret_origin = err_orig; in entry_invoke_command() 477 arg->ret = res; in entry_cancel() 503 arg->ret = TEE_SUCCESS; in register_shm() 514 arg->ret = res; in unregister_shm() [all …]
|
/optee_os-3.20.0/lib/libutils/ext/include/ |
A D | fault_mitigation.h | 106 struct ftmn_func_arg arg; member 282 *ftmn->arg_pp = &ftmn->arg; in __ftmn_push_linked_call() 283 ftmn->arg.hash = my_hash; in __ftmn_push_linked_call() 299 assert(&f->arg == *f->arg_pp); in __ftmn_copy_linked_call_res() 300 assert((f->arg.hash ^ f->arg.res) == res); in __ftmn_copy_linked_call_res() 309 if (IS_ENABLED(CFG_FAULT_MITIGATION) && arg) in __ftmn_calle_swap_hash() 310 arg->hash ^= my_old_hash ^ my_new_hash; in __ftmn_calle_swap_hash() 316 if (IS_ENABLED(CFG_FAULT_MITIGATION) && arg) in __ftmn_callee_done() 317 ___ftmn_callee_done(arg, my_hash, res); in __ftmn_callee_done() 324 if (IS_ENABLED(CFG_FAULT_MITIGATION) && arg) in __ftmn_callee_done_not_zero() [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_key.c | 21 void **arg[10] = { 0 }; in s_mpi_shrink_multi() local 33 arg[n] = cur; in s_mpi_shrink_multi() 34 if ((err = mp_init_copy(&tmp[n], *arg[n])) != CRYPT_OK) { in s_mpi_shrink_multi() 44 while (n != 0 && arg[--n] != NULL) { in s_mpi_shrink_multi() 45 mp_clear(*arg[n]); in s_mpi_shrink_multi() 46 *arg[n] = tmp[n]; in s_mpi_shrink_multi()
|
/optee_os-3.20.0/core/include/tee/ |
A D | entry_std.h | 20 TEE_Result tee_entry_std(struct optee_msg_arg *arg, uint32_t num_params); 21 TEE_Result __tee_entry_std(struct optee_msg_arg *arg, uint32_t num_params);
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | platform.c | 127 int mbedtls_platform_win32_vsnprintf( char *s, size_t n, const char *fmt, va_list arg ) in mbedtls_platform_win32_vsnprintf() argument 136 ret = vsnprintf_s( s, n, _TRUNCATE, fmt, arg ); in mbedtls_platform_win32_vsnprintf() 138 ret = vsnprintf( s, n, fmt, arg ); in mbedtls_platform_win32_vsnprintf() 156 const char * format, va_list arg ) in platform_vsnprintf_uninit() argument 161 ((void) arg); in platform_vsnprintf_uninit() 170 va_list arg ) = MBEDTLS_PLATFORM_STD_VSNPRINTF; 174 va_list arg ) ) in mbedtls_platform_set_vsnprintf() argument
|
/optee_os-3.20.0/ta/pkcs11/scripts/ |
A D | verify-helpers.sh | 69 arg="$1" 72 case $arg in 80 echo "error: invalid argument: ${arg}" 1>&2
|
/optee_os-3.20.0/scripts/ |
A D | get_maintainer.py | 267 for arg in args.arg + downloads: 268 if os.path.exists(arg): 269 patches = split_patchset(arg) 273 arglist.append(arg) 275 for arg in arglist + split_patches: 278 if os.path.exists(arg): 280 (patch_paths, approved_by) = get_paths_from_patch(arg) 285 patch_paths = [PurePath(arg).as_posix()]
|
/optee_os-3.20.0/core/arch/riscv/kernel/ |
A D | sbi.c | 37 int sbi_boot_hart(uint32_t hart_id, paddr_t start_addr, unsigned long arg) in sbi_boot_hart() argument 41 ret = sbi_ecall(SBI_EXT_HSM, SBI_EXT_HSM_HART_START, hart_id, start_addr, arg); in sbi_boot_hart()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | platform.h | 263 int mbedtls_platform_win32_vsnprintf( char *s, size_t n, const char *fmt, va_list arg ); 268 extern int (*mbedtls_vsnprintf)( char * s, size_t n, const char * format, va_list arg ); 278 const char * format, va_list arg ) );
|
/optee_os-3.20.0/core/arch/arm/include/sm/ |
A D | pm.h | 50 int sm_pm_cpu_suspend(uint32_t arg, int (*fn)(uint32_t));
|