Home
last modified time | relevance | path

Searched refs:size (Results 1 – 25 of 58) sorted by relevance

123

/optee_test/ta/crypt/
A Dcryp_taf.c247 &params[1].memref.size); in ta_entry_digest_extract()
254 size_t size = 0; in ta_entry_cipher_init() local
261 size = 0; in ta_entry_cipher_init()
267 size = params[1].memref.size; in ta_entry_cipher_init()
307 size_t size = 0; in ta_entry_mac_init() local
314 size = 0; in ta_entry_mac_init()
320 size = params[1].memref.size; in ta_entry_mac_init()
324 TEE_MACInit(op, buffer, size); in ta_entry_mac_init()
744 params[1].memref.size, b2, in ta_entry_ae_encrypt_final()
746 &params[3].memref.size); in ta_entry_ae_encrypt_final()
[all …]
A Daes_taf.c38 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt()
42 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt()
48 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_encrypt()
79 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt()
83 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt()
89 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_decrypt()
A Dsha2_taf.c23 if (params[1].memref.size < SHA224_DIGEST_SIZE) in ta_entry_sha224()
27 (unsigned int)params[0].memref.size, in ta_entry_sha224()
46 if (params[1].memref.size < SHA256_DIGEST_SIZE) in ta_entry_sha256()
50 (unsigned int)params[0].memref.size, in ta_entry_sha256()
/optee_test/host/xtest/
A Dasym_perf.c265 op.params[1].memref.size = size; in prepare_hash()
267 op.params[2].memref.size = hash_shm.size; in prepare_hash()
271 hash_shm.size = op.params[2].memref.size; in prepare_hash()
341 size : hash_shm.size; in prepare_enc_sign()
343 op.params[1].memref.size = out_shm.size; in prepare_enc_sign()
350 out_shm.size = op.params[1].memref.size; in prepare_enc_sign()
517 op.params[1].memref.size = size; in asym_perf_run_test()
519 op.params[2].memref.size = out_shm.size; in asym_perf_run_test()
525 op.params[2].memref.size = out_shm.size; in asym_perf_run_test()
530 op.params[1].memref.size = out_shm.size; in asym_perf_run_test()
[all …]
A Dsdp_basic.c77 data.len = size; in allocate_dma_buffer()
380 size_t sdp_size = size; in sdp_basic_test()
391 size -= 255; in sdp_basic_test()
394 ref_buf = malloc(size); in sdp_basic_test()
477 op.params[0].memref.size = size; in invoke_out_of_bounds()
481 op.params[1].memref.size = size; in invoke_out_of_bounds()
500 out->size, offset, size, in invoke_out_of_bounds()
509 out->size, offset, size, in invoke_out_of_bounds()
531 size, heap_name, fd); in sdp_out_of_bounds_memref_test()
544 size = out->size; in sdp_out_of_bounds_memref_test()
[all …]
A Dbenchmark_2000.c33 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2001() local
36 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2001()
47 size_t size = 4096; /* Buffer size */ in xtest_tee_benchmark_2002() local
50 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2002()
73 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2011() local
75 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2011()
87 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2012() local
89 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2012()
A Dsdp_basic.h24 int allocate_dma_buffer(size_t size, const char *heap_name, int verbosity);
25 static inline int allocate_buffer(size_t size, const char *heap_name, in allocate_buffer() argument
28 return allocate_dma_buffer(size, heap_name, verbosity); in allocate_buffer()
31 size_t size, size_t loop, const char *heap_name,
34 int sdp_out_of_bounds_memref_test(size_t size, const char *heap_name,
A Dhash_perf.c175 in_shm.size = sz + offset; in alloc_shm()
180 out_shm.size = hash_size(algo); in alloc_shm()
247 read_random(in, size); in run_test_once()
330 alloc_shm(size, algo, offset); in hash_perf_run_test()
340 op.params[0].memref.size = size + offset; in hash_perf_run_test()
343 op.params[1].memref.size = hash_size(algo); in hash_perf_run_test()
348 algo_str(algo), size); in hash_perf_run_test()
370 mb_per_sec(size, stats.m + 2 * sd), in hash_perf_run_test()
371 mb_per_sec(size, stats.m - 2 * sd)); in hash_perf_run_test()
413 size_t size = 1024; /* Buffer size (-s) */ in hash_perf_runner_cmd_parser() local
[all …]
A Dsymm_cipher_perf.c270 shm->size = sz; in allocate_shm()
421 read_random(in, size); in feed_input()
423 memset(in, 0, size); in feed_input()
429 feed_input(in, size, random); in run_feed_input()
435 feed_input(in, size, random); in run_feed_input()
444 feed_input(data, size, random); in run_feed_input()
445 munmap(data, size); in run_feed_input()
495 op.params[0].memref.size = size; in aes_perf_run_test()
497 op.params[1].memref.size = size; in aes_perf_run_test()
702 size = atoi(argv[i]); in aes_perf_runner_cmd_parser()
[all …]
A Dregression_5000.c35 (op)->params[(param_num)].memref.size); \
41 (op)->params[(param_num)].memref.size); \
53 (op)->params[(param_num)].tmpref.size); \
59 (op)->params[(param_num)].memref.size); \
65 TEEC_SharedMemory *shm, size_t size, in RegisterSharedMemory() argument
69 shm->size = size; in RegisterSharedMemory()
75 TEEC_SharedMemory *shm, size_t size, in AllocateSharedMemory() argument
79 shm->size = size; in AllocateSharedMemory()
98 size_t size = 1024; in Allocate_In() local
105 AllocateSharedMemory(&cs->context, &shm, size, in Allocate_In()
[all …]
A Dregression_1000.c550 size_t size) in xtest_tee_test_invalid_mem_access2() argument
557 shm.size = size; in xtest_tee_test_invalid_mem_access2()
570 op.params[1].memref.size = size; in xtest_tee_test_invalid_mem_access2()
1128 op.params[0].memref.size = a->shm->size; in test_1013_thread()
1312 int size = 17000; in xtest_tee_test_1014() local
1427 shm.size = 8 * page_size; in xtest_tee_test_1017()
1486 op.params[0].memref.size = shm->size / 2; in invoke_1byte_out_of_bounds()
1487 op.params[0].memref.offset = shm->size - (shm->size / 2) + 1; in invoke_1byte_out_of_bounds()
2026 shm.size = 0; in xtest_tee_test_1025()
2034 shm.size = 0; in xtest_tee_test_1025()
[all …]
/optee_test/host/xtest/gp/include/
A Dxml_crypto_api.h59 b.size = 0;
62 b.size = size; \
67 b.size = 0; \
1044 out_buffer->size += in_buffer[id].size; in collapse_crypto_buffers()
1137 .size = 64, in Invoke_Crypto_GetOperationInfoMultiple()
1714 ae_encrypt_tag.size = op.params[2].memref.size; in Invoke_Crypto_AEEncryptFinal()
1874 saved_random.size = op.params[3].memref.size; in Invoke_Crypto_GenerateRandom()
1966 saved_digest.size = op.params[3].memref.size; in Invoke_Crypto_DigestDoFinal()
2031 s_dgst.size = op.params[3].memref.size; in Invoke_Crypto_AsymmetricSignDigest()
3398 mac->size = op.params[3].memref.size; in mac_compute_final()
[all …]
A Dxml_client_api.h152 uint32_t size, uint32_t flags) in RegisterSharedMemory() argument
155 shm->size = size; in RegisterSharedMemory()
156 shm->buffer = malloc(size); in RegisterSharedMemory()
161 #define AllocateTempMemory(temp_mem, size) \ argument
162 temp_mem = malloc(size)
297 .parent = shm, .size = sz, .offset = offs, in TEEC_prepare_OperationEachParameter_memref()
308 .buffer = buf, .size = sz, in TEEC_prepare_OperationEachParameter_tmpref()
319 (op)->params[(param_num)].memref.size); \
327 memref.size); \
340 (op)->params[(param_num)].tmpref.size); \
[all …]
/optee_test/ta/sdp_basic/
A Dta_sdp_basic.c39 if (params[sec_idx].memref.size < params[ns_idx].memref.size) in cmd_inject()
54 params[ns_idx].memref.size); in cmd_inject()
64 params[sec_idx].memref.size); in cmd_inject()
79 params[sec_idx].memref.size); in cmd_inject()
91 params[sec_idx].memref.size); in cmd_inject()
133 params[0].memref.size); in cmd_transform()
148 params[0].memref.size); in cmd_transform()
158 sz = params[0].memref.size; in cmd_transform()
164 params[0].memref.size); in cmd_transform()
188 if (params[ns_idx].memref.size < params[sec_idx].memref.size) in cmd_dump()
[all …]
/optee_test/ta/sims/
A Dta_sims.c13 uint32_t size; member
42 if (params[0].memref.size != sizeof(*uuid)) in sims_open_ta_session()
49 TEE_MemMove(uuid, params[0].memref.buffer, params[0].memref.size); in sims_open_ta_session()
104 if (storage[index].size > params[1].memref.size) in sims_read()
112 params[1].memref.size); in sims_read()
135 storage[index].data = TEE_Malloc(params[1].memref.size, 0); in sims_write()
137 storage[index].size = 0; in sims_write()
140 storage[index].size = params[1].memref.size; in sims_write()
143 params[1].memref.size); in sims_write()
175 if (params[0].memref.buffer && params[0].memref.size) { in sims_entry_panic()
[all …]
/optee_test/host/xtest/gp/patches/
A D0006-TTA_TCF-fix-CmdTEEGetPropertyA-_withoutEnum.patch40 + pParams[1].memref.size);
41 + pPropName[pParams[1].memref.size] = 0;
67 + pParams[1].memref.size);
68 + pPropName[pParams[1].memref.size] = 0;
94 + pParams[1].memref.size);
95 + pPropName[pParams[1].memref.size] = 0;
121 + pParams[1].memref.size);
122 + pPropName[pParams[1].memref.size] = 0;
148 + pParams[1].memref.size);
175 + pParams[1].memref.size);
[all …]
A D0016-TEE_Crypto_API.xml.patch43 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
51 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
59 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
67 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
75 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
83 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
91 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
99 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
107 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
115 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor…
[all …]
A D0007-TTAs-revert-to-v1.1-types.patch24 …rationInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, size_t *size)
25 …tionInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, uint32_t *size)
27 const size_t allocatedSize = *size;
46 …ationInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, size_t *size);
47 …ionInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, uint32_t *size);
78 pParams[1].memref.size);
79 pPropName[pParams[1].memref.size] = 0;
/optee_test/ta/socket/
A Dta_entry.c63 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_tcp_open()
70 params[1].memref.size); in ta_entry_tcp_open()
79 params[2].memref.size = sizeof(h); in ta_entry_tcp_open()
109 params[1].memref.size); in ta_entry_udp_open()
118 params[2].memref.size = sizeof(h); in ta_entry_udp_open()
159 if (params[0].memref.size != sizeof(*h)) in ta_entry_send()
163 params[2].value.b = params[1].memref.size; in ta_entry_send()
189 sz = params[1].memref.size; in ta_entry_recv()
192 params[1].memref.size = sz; in ta_entry_recv()
240 sz = params[1].memref.size; in ta_entry_ioctl()
[all …]
/optee_test/ta/storage/
A Dstorage.c44 params[0].memref.size); in ta_storage_cmd_open()
55 object_id, params[0].memref.size, in ta_storage_cmd_open()
88 params[0].memref.size); in ta_storage_cmd_create()
101 object_id, params[0].memref.size, in ta_storage_cmd_create()
104 params[3].memref.size, &o); in ta_storage_cmd_create()
135 params[0].memref.size); in ta_storage_cmd_create_overwrite()
145 object_id, params[0].memref.size, in ta_storage_cmd_create_overwrite()
179 b0 = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_read()
269 params[1].memref.size); in ta_storage_cmd_rename()
648 if (params[1].memref.size < sizeof(oi)) in ta_storage_cmd_get_obj_info()
[all …]
/optee_test/ta/concurrent_large/
A Dta_entry.c62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop()
100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256()
102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256()
107 out_len = params[3].memref.size; in ta_entry_sha256()
123 params[2].memref.size, out, &out_len); in ta_entry_sha256()
128 params[3].memref.size = out_len; in ta_entry_sha256()
/optee_test/ta/concurrent/
A Dta_entry.c62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop()
100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256()
102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256()
107 out_len = params[3].memref.size; in ta_entry_sha256()
123 params[2].memref.size, out, &out_len); in ta_entry_sha256()
128 params[3].memref.size = out_len; in ta_entry_sha256()
/optee_test/ta/rpc_test/
A Dta_rpc.c50 TEE_Malloc(pParams[n].memref.size, 0); in rpc_call_cryp()
53 params[n].memref.size = pParams[n].memref.size; in rpc_call_cryp()
58 pParams[n].memref.size); in rpc_call_cryp()
91 params[n].memref.size); in rpc_call_cryp()
92 pParams[n].memref.size = params[n].memref.size; in rpc_call_cryp()
/optee_test/host/xtest/adbg/src/
A Dadbg_run.c77 size_t size = 0; in Do_ADBG_AppendToSuite() local
80 size = strlen(Source_p->SuiteID_p); in Do_ADBG_AppendToSuite()
82 size += strlen(Dest_p->SuiteID_p); in Do_ADBG_AppendToSuite()
83 size += 1; /* '+' */ in Do_ADBG_AppendToSuite()
85 size += 1; /* '\0' */ in Do_ADBG_AppendToSuite()
86 p = malloc(size); in Do_ADBG_AppendToSuite()
92 snprintf(p, size, "%s+%s", Dest_p->SuiteID_p, in Do_ADBG_AppendToSuite()
95 snprintf(p, size, "%s", Source_p->SuiteID_p); in Do_ADBG_AppendToSuite()
/optee_test/ta/os_test/
A Dos_test.c69 if (size > 4 || bblen != size) { in check_binprop_ones()
479 params[0].memref.size); in test_mem_access_right()
485 params[0].memref.size); in test_mem_access_right()
538 l_params[0].memref.size = sizeof(buf); in test_mem_access_right()
540 l_params[1].memref.size = 0; in test_mem_access_right()
725 return tee_map_zi(size, 0); in malloc_wrapper()
978 params[0].memref.size); in ta_entry_params_access_rights()
984 params[0].memref.size); in ta_entry_params_access_rights()
1220 bufsize = params[0].memref.size; in ta_entry_ta2ta_memref_mix()
1222 params[2].memref.size != bufsize) in ta_entry_ta2ta_memref_mix()
[all …]

Completed in 72 milliseconds

123