| /optee_test/ta/crypt/ |
| A D | cryp_taf.c | 247 ¶ms[1].memref.size); in ta_entry_digest_extract() 254 size_t size = 0; in ta_entry_cipher_init() local 261 size = 0; in ta_entry_cipher_init() 267 size = params[1].memref.size; in ta_entry_cipher_init() 307 size_t size = 0; in ta_entry_mac_init() local 314 size = 0; in ta_entry_mac_init() 320 size = params[1].memref.size; in ta_entry_mac_init() 324 TEE_MACInit(op, buffer, size); in ta_entry_mac_init() 744 params[1].memref.size, b2, in ta_entry_ae_encrypt_final() 746 ¶ms[3].memref.size); in ta_entry_ae_encrypt_final() [all …]
|
| A D | aes_taf.c | 38 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt() 42 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_encrypt() 48 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_encrypt() 79 if ((params[0].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt() 83 if ((params[1].memref.size << 8) % AES_BLOCK_SIZE != 0) in ta_entry_aes256ecb_decrypt() 89 n_input_blocks = params[0].memref.size / (AES_BLOCK_SIZE / 8); in ta_entry_aes256ecb_decrypt()
|
| A D | sha2_taf.c | 23 if (params[1].memref.size < SHA224_DIGEST_SIZE) in ta_entry_sha224() 27 (unsigned int)params[0].memref.size, in ta_entry_sha224() 46 if (params[1].memref.size < SHA256_DIGEST_SIZE) in ta_entry_sha256() 50 (unsigned int)params[0].memref.size, in ta_entry_sha256()
|
| /optee_test/host/xtest/ |
| A D | asym_perf.c | 265 op.params[1].memref.size = size; in prepare_hash() 267 op.params[2].memref.size = hash_shm.size; in prepare_hash() 271 hash_shm.size = op.params[2].memref.size; in prepare_hash() 341 size : hash_shm.size; in prepare_enc_sign() 343 op.params[1].memref.size = out_shm.size; in prepare_enc_sign() 350 out_shm.size = op.params[1].memref.size; in prepare_enc_sign() 517 op.params[1].memref.size = size; in asym_perf_run_test() 519 op.params[2].memref.size = out_shm.size; in asym_perf_run_test() 525 op.params[2].memref.size = out_shm.size; in asym_perf_run_test() 530 op.params[1].memref.size = out_shm.size; in asym_perf_run_test() [all …]
|
| A D | sdp_basic.c | 77 data.len = size; in allocate_dma_buffer() 380 size_t sdp_size = size; in sdp_basic_test() 391 size -= 255; in sdp_basic_test() 394 ref_buf = malloc(size); in sdp_basic_test() 477 op.params[0].memref.size = size; in invoke_out_of_bounds() 481 op.params[1].memref.size = size; in invoke_out_of_bounds() 500 out->size, offset, size, in invoke_out_of_bounds() 509 out->size, offset, size, in invoke_out_of_bounds() 531 size, heap_name, fd); in sdp_out_of_bounds_memref_test() 544 size = out->size; in sdp_out_of_bounds_memref_test() [all …]
|
| A D | benchmark_2000.c | 33 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2001() local 36 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2001() 47 size_t size = 4096; /* Buffer size */ in xtest_tee_benchmark_2002() local 50 hash_perf_run_test(algo, size, CRYPTO_DEF_COUNT, in xtest_tee_benchmark_2002() 73 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2011() local 75 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2011() 87 size_t size = 1024; /* Buffer size */ in xtest_tee_benchmark_2012() local 89 aes_perf_run_test(mode, keysize, decrypt, size, CRYPTO_DEF_UNIT_SIZE, in xtest_tee_benchmark_2012()
|
| A D | sdp_basic.h | 24 int allocate_dma_buffer(size_t size, const char *heap_name, int verbosity); 25 static inline int allocate_buffer(size_t size, const char *heap_name, in allocate_buffer() argument 28 return allocate_dma_buffer(size, heap_name, verbosity); in allocate_buffer() 31 size_t size, size_t loop, const char *heap_name, 34 int sdp_out_of_bounds_memref_test(size_t size, const char *heap_name,
|
| A D | hash_perf.c | 175 in_shm.size = sz + offset; in alloc_shm() 180 out_shm.size = hash_size(algo); in alloc_shm() 247 read_random(in, size); in run_test_once() 330 alloc_shm(size, algo, offset); in hash_perf_run_test() 340 op.params[0].memref.size = size + offset; in hash_perf_run_test() 343 op.params[1].memref.size = hash_size(algo); in hash_perf_run_test() 348 algo_str(algo), size); in hash_perf_run_test() 370 mb_per_sec(size, stats.m + 2 * sd), in hash_perf_run_test() 371 mb_per_sec(size, stats.m - 2 * sd)); in hash_perf_run_test() 413 size_t size = 1024; /* Buffer size (-s) */ in hash_perf_runner_cmd_parser() local [all …]
|
| A D | symm_cipher_perf.c | 270 shm->size = sz; in allocate_shm() 421 read_random(in, size); in feed_input() 423 memset(in, 0, size); in feed_input() 429 feed_input(in, size, random); in run_feed_input() 435 feed_input(in, size, random); in run_feed_input() 444 feed_input(data, size, random); in run_feed_input() 445 munmap(data, size); in run_feed_input() 495 op.params[0].memref.size = size; in aes_perf_run_test() 497 op.params[1].memref.size = size; in aes_perf_run_test() 702 size = atoi(argv[i]); in aes_perf_runner_cmd_parser() [all …]
|
| A D | regression_5000.c | 35 (op)->params[(param_num)].memref.size); \ 41 (op)->params[(param_num)].memref.size); \ 53 (op)->params[(param_num)].tmpref.size); \ 59 (op)->params[(param_num)].memref.size); \ 65 TEEC_SharedMemory *shm, size_t size, in RegisterSharedMemory() argument 69 shm->size = size; in RegisterSharedMemory() 75 TEEC_SharedMemory *shm, size_t size, in AllocateSharedMemory() argument 79 shm->size = size; in AllocateSharedMemory() 98 size_t size = 1024; in Allocate_In() local 105 AllocateSharedMemory(&cs->context, &shm, size, in Allocate_In() [all …]
|
| A D | regression_1000.c | 550 size_t size) in xtest_tee_test_invalid_mem_access2() argument 557 shm.size = size; in xtest_tee_test_invalid_mem_access2() 570 op.params[1].memref.size = size; in xtest_tee_test_invalid_mem_access2() 1128 op.params[0].memref.size = a->shm->size; in test_1013_thread() 1312 int size = 17000; in xtest_tee_test_1014() local 1427 shm.size = 8 * page_size; in xtest_tee_test_1017() 1486 op.params[0].memref.size = shm->size / 2; in invoke_1byte_out_of_bounds() 1487 op.params[0].memref.offset = shm->size - (shm->size / 2) + 1; in invoke_1byte_out_of_bounds() 2026 shm.size = 0; in xtest_tee_test_1025() 2034 shm.size = 0; in xtest_tee_test_1025() [all …]
|
| /optee_test/host/xtest/gp/include/ |
| A D | xml_crypto_api.h | 59 b.size = 0; 62 b.size = size; \ 67 b.size = 0; \ 1044 out_buffer->size += in_buffer[id].size; in collapse_crypto_buffers() 1137 .size = 64, in Invoke_Crypto_GetOperationInfoMultiple() 1714 ae_encrypt_tag.size = op.params[2].memref.size; in Invoke_Crypto_AEEncryptFinal() 1874 saved_random.size = op.params[3].memref.size; in Invoke_Crypto_GenerateRandom() 1966 saved_digest.size = op.params[3].memref.size; in Invoke_Crypto_DigestDoFinal() 2031 s_dgst.size = op.params[3].memref.size; in Invoke_Crypto_AsymmetricSignDigest() 3398 mac->size = op.params[3].memref.size; in mac_compute_final() [all …]
|
| A D | xml_client_api.h | 152 uint32_t size, uint32_t flags) in RegisterSharedMemory() argument 155 shm->size = size; in RegisterSharedMemory() 156 shm->buffer = malloc(size); in RegisterSharedMemory() 161 #define AllocateTempMemory(temp_mem, size) \ argument 162 temp_mem = malloc(size) 297 .parent = shm, .size = sz, .offset = offs, in TEEC_prepare_OperationEachParameter_memref() 308 .buffer = buf, .size = sz, in TEEC_prepare_OperationEachParameter_tmpref() 319 (op)->params[(param_num)].memref.size); \ 327 memref.size); \ 340 (op)->params[(param_num)].tmpref.size); \ [all …]
|
| /optee_test/ta/sdp_basic/ |
| A D | ta_sdp_basic.c | 39 if (params[sec_idx].memref.size < params[ns_idx].memref.size) in cmd_inject() 54 params[ns_idx].memref.size); in cmd_inject() 64 params[sec_idx].memref.size); in cmd_inject() 79 params[sec_idx].memref.size); in cmd_inject() 91 params[sec_idx].memref.size); in cmd_inject() 133 params[0].memref.size); in cmd_transform() 148 params[0].memref.size); in cmd_transform() 158 sz = params[0].memref.size; in cmd_transform() 164 params[0].memref.size); in cmd_transform() 188 if (params[ns_idx].memref.size < params[sec_idx].memref.size) in cmd_dump() [all …]
|
| /optee_test/ta/sims/ |
| A D | ta_sims.c | 13 uint32_t size; member 42 if (params[0].memref.size != sizeof(*uuid)) in sims_open_ta_session() 49 TEE_MemMove(uuid, params[0].memref.buffer, params[0].memref.size); in sims_open_ta_session() 104 if (storage[index].size > params[1].memref.size) in sims_read() 112 params[1].memref.size); in sims_read() 135 storage[index].data = TEE_Malloc(params[1].memref.size, 0); in sims_write() 137 storage[index].size = 0; in sims_write() 140 storage[index].size = params[1].memref.size; in sims_write() 143 params[1].memref.size); in sims_write() 175 if (params[0].memref.buffer && params[0].memref.size) { in sims_entry_panic() [all …]
|
| /optee_test/host/xtest/gp/patches/ |
| A D | 0006-TTA_TCF-fix-CmdTEEGetPropertyA-_withoutEnum.patch | 40 + pParams[1].memref.size); 41 + pPropName[pParams[1].memref.size] = 0; 67 + pParams[1].memref.size); 68 + pPropName[pParams[1].memref.size] = 0; 94 + pParams[1].memref.size); 95 + pPropName[pParams[1].memref.size] = 0; 121 + pParams[1].memref.size); 122 + pPropName[pParams[1].memref.size] = 0; 148 + pParams[1].memref.size); 175 + pParams[1].memref.size); [all …]
|
| A D | 0016-TEE_Crypto_API.xml.patch | 43 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 51 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 59 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 67 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 75 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 83 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 91 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 99 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 107 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… 115 …<description><![CDATA[If the mode is not compatible with the algorithm or key size or if the algor… [all …]
|
| A D | 0007-TTAs-revert-to-v1.1-types.patch | 24 …rationInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, size_t *size) 25 …tionInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, uint32_t *size) 27 const size_t allocatedSize = *size; 46 …ationInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, size_t *size); 47 …ionInfoMultipleToBuffer(const TEE_OperationInfoMultiple *pOpInfo, uint8_t *buffer, uint32_t *size); 78 pParams[1].memref.size); 79 pPropName[pParams[1].memref.size] = 0;
|
| /optee_test/ta/socket/ |
| A D | ta_entry.c | 63 params[2].memref.size = sizeof(struct sock_handle); in ta_entry_tcp_open() 70 params[1].memref.size); in ta_entry_tcp_open() 79 params[2].memref.size = sizeof(h); in ta_entry_tcp_open() 109 params[1].memref.size); in ta_entry_udp_open() 118 params[2].memref.size = sizeof(h); in ta_entry_udp_open() 159 if (params[0].memref.size != sizeof(*h)) in ta_entry_send() 163 params[2].value.b = params[1].memref.size; in ta_entry_send() 189 sz = params[1].memref.size; in ta_entry_recv() 192 params[1].memref.size = sz; in ta_entry_recv() 240 sz = params[1].memref.size; in ta_entry_ioctl() [all …]
|
| /optee_test/ta/storage/ |
| A D | storage.c | 44 params[0].memref.size); in ta_storage_cmd_open() 55 object_id, params[0].memref.size, in ta_storage_cmd_open() 88 params[0].memref.size); in ta_storage_cmd_create() 101 object_id, params[0].memref.size, in ta_storage_cmd_create() 104 params[3].memref.size, &o); in ta_storage_cmd_create() 135 params[0].memref.size); in ta_storage_cmd_create_overwrite() 145 object_id, params[0].memref.size, in ta_storage_cmd_create_overwrite() 179 b0 = TEE_Malloc(params[0].memref.size, 0); in ta_storage_cmd_read() 269 params[1].memref.size); in ta_storage_cmd_rename() 648 if (params[1].memref.size < sizeof(oi)) in ta_storage_cmd_get_obj_info() [all …]
|
| /optee_test/ta/concurrent_large/ |
| A D | ta_entry.c | 62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop() 100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256() 102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256() 107 out_len = params[3].memref.size; in ta_entry_sha256() 123 params[2].memref.size, out, &out_len); in ta_entry_sha256() 128 params[3].memref.size = out_len; in ta_entry_sha256()
|
| /optee_test/ta/concurrent/ |
| A D | ta_entry.c | 62 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_busy_loop() 100 if (params[0].memref.size < sizeof(struct ta_concurrent_shm)) in ta_entry_sha256() 102 if (params[3].memref.size < TEE_SHA256_HASH_SIZE) in ta_entry_sha256() 107 out_len = params[3].memref.size; in ta_entry_sha256() 123 params[2].memref.size, out, &out_len); in ta_entry_sha256() 128 params[3].memref.size = out_len; in ta_entry_sha256()
|
| /optee_test/ta/rpc_test/ |
| A D | ta_rpc.c | 50 TEE_Malloc(pParams[n].memref.size, 0); in rpc_call_cryp() 53 params[n].memref.size = pParams[n].memref.size; in rpc_call_cryp() 58 pParams[n].memref.size); in rpc_call_cryp() 91 params[n].memref.size); in rpc_call_cryp() 92 pParams[n].memref.size = params[n].memref.size; in rpc_call_cryp()
|
| /optee_test/host/xtest/adbg/src/ |
| A D | adbg_run.c | 77 size_t size = 0; in Do_ADBG_AppendToSuite() local 80 size = strlen(Source_p->SuiteID_p); in Do_ADBG_AppendToSuite() 82 size += strlen(Dest_p->SuiteID_p); in Do_ADBG_AppendToSuite() 83 size += 1; /* '+' */ in Do_ADBG_AppendToSuite() 85 size += 1; /* '\0' */ in Do_ADBG_AppendToSuite() 86 p = malloc(size); in Do_ADBG_AppendToSuite() 92 snprintf(p, size, "%s+%s", Dest_p->SuiteID_p, in Do_ADBG_AppendToSuite() 95 snprintf(p, size, "%s", Source_p->SuiteID_p); in Do_ADBG_AppendToSuite()
|
| /optee_test/ta/os_test/ |
| A D | os_test.c | 69 if (size > 4 || bblen != size) { in check_binprop_ones() 479 params[0].memref.size); in test_mem_access_right() 485 params[0].memref.size); in test_mem_access_right() 538 l_params[0].memref.size = sizeof(buf); in test_mem_access_right() 540 l_params[1].memref.size = 0; in test_mem_access_right() 725 return tee_map_zi(size, 0); in malloc_wrapper() 978 params[0].memref.size); in ta_entry_params_access_rights() 984 params[0].memref.size); in ta_entry_params_access_rights() 1220 bufsize = params[0].memref.size; in ta_entry_ta2ta_memref_mix() 1222 params[2].memref.size != bufsize) in ta_entry_ta2ta_memref_mix() [all …]
|