/trusty/user/base/lib/smc/tests/ |
D | smc_test.c | 65 .params[0] = ILLEGAL_SMC, in TEST_F() 74 ASSERT_EQ((int32_t)response.params[0], SM_ERR_UNDEFINED_SMC); in TEST_F() 85 .params[0] = ILLEGAL_SMC, in TEST_F() 103 ASSERT_EQ((int32_t)response.params[0], SM_ERR_UNDEFINED_SMC); in TEST_F() 107 ASSERT_EQ((int32_t)response.params[0], SM_ERR_UNDEFINED_SMC); in TEST_F() 119 .params[0] = SMC_FC_DEBUG_PUTC, in TEST_F() 120 .params[1] = 'd', /* prints 'd' to serial */ in TEST_F() 129 ASSERT_EQ(response.params[0], 0); in TEST_F() 138 .params[0] = SMC_FC_GET_REG_BASE, in TEST_F() 139 .params[1] = SMC_GET_GIC_BASE_GICD, in TEST_F() [all …]
|
/trusty/kernel/lib/trusty/ |
D | smcall.c | 51 *pbuf_id = ((uint64_t)args->params[1] << 32) | args->params[0]; in get_ns_mem_buf() 52 *psz = (ns_size_t)args->params[2]; in get_ns_mem_buf() 87 SMC_FUNCTION(args->smc_nr), args->params[0], args->params[1], in trusty_sm_fastcall() 88 args->params[2]); in trusty_sm_fastcall() 115 SMC_FUNCTION(args->smc_nr), args->params[0], args->params[1], in trusty_sm_stdcall() 116 args->params[2]); in trusty_sm_stdcall() 139 res = virtio_device_reset(args->client_id, args->params[0]); in trusty_sm_stdcall() 143 res = virtio_kick_vq(args->client_id, args->params[0], args->params[1]); in trusty_sm_stdcall() 181 SMC_FUNCTION(args->smc_nr), args->params[0], args->params[1], in trusty_sm_nopcall() 182 args->params[2]); in trusty_sm_nopcall() [all …]
|
/trusty/kernel/services/smc/ |
D | smc_service.c | 106 smc_nr = (uint32_t)request.params[0]; in smc_service_handle_msg() 116 response.msg.params[0] = (ulong)ERR_ACCESS_DENIED; in smc_service_handle_msg() 127 response.msg.params[0] = (ulong)ERR_INVALID_ARGS; in smc_service_handle_msg() 133 .r0 = (ulong)request.params[0], in smc_service_handle_msg() 134 .r1 = (ulong)request.params[1], in smc_service_handle_msg() 135 .r2 = (ulong)request.params[2], in smc_service_handle_msg() 136 .r3 = (ulong)request.params[3], in smc_service_handle_msg() 140 response.msg.params[0] = ret.r0; in smc_service_handle_msg() 141 response.msg.params[1] = ret.r1; in smc_service_handle_msg() 142 response.msg.params[2] = ret.r2; in smc_service_handle_msg() [all …]
|
/trusty/user/app/keymint/ |
D | key_wrapper.rs | 79 params: &[keymint::KeyParam], in create_storage_key() 84 if get_opt_tag_value!(params, BlockMode)?.is_some() { in create_storage_key() 87 let key_size = get_tag_value!(params, KeySize, ErrorCode::UnsupportedTag)?; in create_storage_key() 90 let rollback_resistance = get_bool_tag_value!(params, RollbackResistance)?; in create_storage_key() 132 params: &[keymint::KeyParam], in generate_key() 134 if !get_bool_tag_value!(params, StorageKey)? { in generate_key() 136 return self.0.generate_key(rng, variant, params); in generate_key() 138 self.create_storage_key(None, params) in generate_key() 144 params: &[keymint::KeyParam], in import_key() 146 if !get_bool_tag_value!(params, StorageKey)? { in import_key() [all …]
|
/trusty/kernel/include/shared/lk/ |
D | trusty_benchmark.h | 430 #define PARAM_TEST_NODES_PARAMETRIC(suite_name, bench_name, params) \ argument 432 suite_name##_##bench_name##_bench_##params##_node = { \ 434 .suite = STRINGIFY(suite_name_##params), \ 435 .name = STRINGIFY(bench_name_##params), \ 436 .func = suite_name##_##bench_name##_bench_##params, \ 441 suite_name##_##bench_name##_bench_##params##_add(void) { \ 444 &suite_name##_##bench_name##_bench_##params##_node.node); \ 551 #define BENCH_CORE(suite_name, bench_name, nb_runs, nb_params, params, \ argument 555 STRINGIFY(params)); \ 564 STRINGIFY(bench_name##_##params), &extended_test_name); \ [all …]
|
D | trusty_unittest.h | 349 static inline void update_combined_params(struct combined_params* params, in update_combined_params() argument 353 params->idxs[j] = 0; in update_combined_params() 356 params->current[j] = params->generators[j].gen_param( in update_combined_params() 357 params->generators[j].priv, params->idxs[j]); in update_combined_params() 358 params->idxs[j]++; in update_combined_params() 362 struct combined_params* params = (struct combined_params*)priv; in test_gen_combined_param() local 365 for (int j = 0; j < params->generator_count; j++) { in test_gen_combined_param() 366 update_combined_params(params, j, true); in test_gen_combined_param() 368 return params->current; in test_gen_combined_param() 371 for (int j = 0; j < params->generator_count; j++) { in test_gen_combined_param() [all …]
|
/trusty/user/app/sample/hwcryptokey-test/ |
D | versioned_keys_explicit.rs | 97 let mut params = DerivedKeyParameters { in generate_new_policy_and_clear_key() localVariable 103 let derived_key1 = assert_ok!(hw_device_key.deriveKey(¶ms)); in generate_new_policy_and_clear_key() 125 params.derivationKey = derivation_key2; in generate_new_policy_and_clear_key() 127 let derived_key2 = assert_ok!(hw_device_key.deriveKey(¶ms)); in generate_new_policy_and_clear_key() 159 params.derivationKey = derivation_key3; in generate_new_policy_and_clear_key() 161 let derived_key3 = assert_ok!(hw_device_key.deriveKey(¶ms)); in generate_new_policy_and_clear_key() 195 let params = DerivedKeyParameters { in old_dice_generates_old_clear_key_and_new_policy() localVariable 201 let derived_key = assert_ok!(hw_device_key.deriveKey(¶ms)); in old_dice_generates_old_clear_key_and_new_policy() 258 let params = DerivedKeyParameters { in dice_updates_are_unique() localVariable 264 let derived_key1 = assert_ok!(hw_device_key.deriveKey(¶ms)); in dice_updates_are_unique() [all …]
|
/trusty/user/app/confirmationui/test/ |
D | main.cpp | 77 std::optional<teeui::context<teeui::ConUIParameters>> params; in TEST_P() local 79 params = devices::getDisplayContext(i, _state->magnified); in TEST_P() 80 EXPECT_EQ(params.has_value(), true, "getDisplayContext %d", i); in TEST_P() 82 if (params) { in TEST_P() 84 params->getParam<teeui::RightEdgeOfScreen>()->count() + 1; in TEST_P() 86 params->getParam<teeui::BottomOfScreen>()->count() + 1; in TEST_P() 89 optlayout = devices::getDisplayLayout(i, _state->inverse, *params); in TEST_P()
|
/trusty/kernel/app/stdcalltest/ |
D | stdcalltest.c | 47 return (((uint64_t)args->params[1] << 32) | args->params[0]); in args_get_id() 51 return (size_t)args->params[2]; in args_get_sz() 139 long call_nb = args->params[1]; in stdcalltest_clobber_sve() 143 ret = clobber_sve_asm(args->params[0]); in stdcalltest_clobber_sve() 152 const uint8_t EXPECTED = (uint8_t)args->params[0]; in stdcalltest_clobber_sve()
|
/trusty/kernel/platform/generic-arm64/ |
D | smc_service_access_policy.c | 66 request->params[1] != SMC_ACCESS_CONTROL_ALLOW_ARGS) { in smc_test_request_check() 71 if (request->params[1] == SMC_ACCESS_CONTROL_VALIDATE_ARGS) { in smc_test_request_check() 76 paddr_t paddr = request->params[2]; in smc_test_request_check()
|
/trusty/user/app/keymaster/ |
D | openssl_keymaster_enforcement.cpp | 82 HmacSharingParameters* params) { in GetHmacSharingParameters() argument 88 params->seed = saved_params_.seed; in GetHmacSharingParameters() 89 memcpy(params->nonce, saved_params_.nonce, sizeof(params->nonce)); in GetHmacSharingParameters() 179 for (auto& params : in ComputeSharedHmac() local 181 *context_chunks_pos++ = params.seed; in ComputeSharedHmac() 182 *context_chunks_pos++ = {params.nonce, sizeof(params.nonce)}; in ComputeSharedHmac() 183 found_mine = found_mine || params == saved_params_; in ComputeSharedHmac()
|
D | openssl_keymaster_enforcement.h | 47 HmacSharingParameters* params) override;
|
/trusty/user/base/app/swaes-benchmark/ |
D | swaes-bench.c | 63 static struct crypto_param params[] = { variable 126 uint8_t cpu_idx = param_idx / countof(params); in get_param_name_cb() 127 param_idx = param_idx % countof(params); in get_param_name_cb() 129 params[param_idx].encrypt ? "ENC_" : "DEC_", in get_param_name_cb() 130 params[param_idx].mode == AES_MODE_CBC ? "CBC_" : "GCM_", in get_param_name_cb() 131 params[param_idx].key_size * 8, params[param_idx].input_size); in get_param_name_cb() 135 const struct crypto_param* param = ¶ms[bench_get_param_idx()]; in BENCH_SETUP() 286 BENCH_ALL_CPU(crypto, swaes, RUNS, params) { in BENCH_ALL_CPU() argument
|
/trusty/kernel/lib/sm/ |
D | smcall.c | 55 LTRACEF("param%d: 0x%x\n", _i, (args)->params[_i]); \ 82 return (!args->params[0]) ? 0 : SM_ERR_UNDEFINED_SMC; in smc_nop_secure_monitor() 116 lk_init_level_all(args->params[0] ? LK_INIT_FLAG_CPU_OFF in smc_cpu_suspend() 123 lk_init_level_all(args->params[0] ? LK_INIT_FLAG_CPU_ON in smc_cpu_resume() 131 int32_t index = (int32_t)args->params[0]; in smc_get_version_str()
|
D | sm.c | 84 uint32_t api_version = args->params[0]; in smc_sm_api_version() 155 stdcallstate.args.params[0], stdcallstate.args.params[1], in sm_stdcall_loop() 156 stdcallstate.args.params[2]); in sm_stdcall_loop() 161 stdcallstate.args.params[0], stdcallstate.args.params[1], in sm_stdcall_loop() 162 stdcallstate.args.params[2], ret, ret); in sm_stdcall_loop() 252 ret = sm_nopcall_table[SMC_ENTITY(args.params[0])](&args); in sm_return_and_wait_for_next_stdcall()
|
D | trusty_sched_share.c | 66 return (((uint64_t)args->params[1] << 32) | args->params[0]); in args_get_id() 70 return (size_t)args->params[2]; in args_get_sz()
|
/trusty/kernel/lib/syscall/stubgen/ |
D | stubgen.py | 298 params = parse_check_def(line, struct_types) 301 define_lines += syscall_define % params 302 proto_lines += syscall_proto % params 303 stub_lines += arch.syscall_stub % params 304 rust_lines += syscall_rust_proto % params
|
/trusty/user/base/interface/smc/include/interface/smc/ |
D | smc.h | 33 uint64_t params[SMC_MSG_NUM_PARAMS]; member
|
/trusty/user/base/app/hwaes-benchmark/ |
D | hwaes-bench.c | 53 #define CUR_PARAM params[bench_get_param_idx()] 133 static struct crypto_hwaes_param params[] = { variable 205 params[param_idx].encrypt ? "ENC_" : "DEC_", in get_param_name_cb() 206 params[param_idx].mode == HWAES_CBC_MODE ? "CBC_" : "GCM_", in get_param_name_cb() 207 params[param_idx].key_size * 8, params[param_idx].input_size * 8); in get_param_name_cb() 412 BENCH(crypto, hwaes, RUNS, params) { in BENCH() argument
|
/trusty/user/app/sample/hwcryptohal/server/ |
D | hwcrypto_device_key.rs | 428 let mut params = DerivedKeyParameters { in derived_clear_key() localVariable 433 let key = hw_device_key.deriveKey(¶ms); in derived_clear_key() 437 params.keyPolicy = clear_key_policy; in derived_clear_key() 438 let derived_key = assert_ok!(hw_device_key.deriveKey(¶ms)); in derived_clear_key() 450 params.derivationKey = key; in derived_clear_key() 451 let derived_key = assert_ok!(hw_device_key.deriveKey(¶ms)); in derived_clear_key() 458 params.context = "cont3xt".as_bytes().to_vec(); in derived_clear_key() 459 let derived_key = assert_ok!(hw_device_key.deriveKey(¶ms)); in derived_clear_key()
|
/trusty/user/base/lib/hwbcc/common/ |
D | common.cpp | 81 const cppbor::Map* params = parsed_params->asMap(); in validate_protected_params() local 82 CHECK_NOT_NULL(params); in validate_protected_params() 84 CHECK_EQ(params->size(), 1); in validate_protected_params() 86 const cppbor::Int* algorithm = params->get(1)->asInt(); in validate_protected_params()
|
/trusty/kernel/app/pactest/ |
D | pactest.c | 231 const bool* const* params = GetParam(); in get_params() local 232 p->translation_table = *params[0]; in get_params() 234 p->instr_not_data = !*params[1]; in get_params() 235 p->key_a_not_b = !*params[2]; in get_params()
|
/trusty/kernel/lib/memlog/ |
D | memlog.c | 143 return (((uint64_t)args->params[1] << 32) | args->params[0]); in args_get_id() 147 return (size_t)args->params[2]; in args_get_sz()
|
/trusty/kernel/lib/sm/include/lib/ |
D | sm.h | 43 uint32_t params[SMC_NUM_PARAMS]; member
|
/trusty/user/app/keymint/keys/ |
D | legacy.rs | 92 params: &[KeyParam], in convert_key() 150 let hidden_params = legacy::hidden(params, rots)?; in convert_key() 309 params: &[KeyParam], in convert_legacy_key() 313 self.convert_key(keyblob, params, root_of_trust, sec_level) in convert_legacy_key()
|