/trusty/user/base/lib/hwasan/ |
D | hwasan.c | 44 static inline uintptr_t tag_ptr(uintptr_t ptr, uint8_t tag) { in tag_ptr() argument 45 uint64_t tag_mask = (uint64_t)tag << hwasan_addr_tag_shift; in tag_ptr() 86 for (uint8_t* tag = first_tag; tag <= last_tag; tag++) { in check_address() local 87 if (ptr_tag != *tag) { in check_address() 89 ptr + ((uintptr_t)(tag - first_tag) << HWASAN_SHADOW_SCALE); in check_address() 129 static uint8_t tag = 0; in hwasan_generate_tag() local 131 if (__builtin_add_overflow(tag, 1, &tag)) { in hwasan_generate_tag() 132 tag = 1; in hwasan_generate_tag() 134 return tag; in hwasan_generate_tag() 139 uint8_t tag) { in hwasan_tag_memory_etc() argument [all …]
|
/trusty/kernel/lib/sm/ |
D | shared_mem.c | 155 uint64_t tag, in sm_mem_alloc_obj() argument 164 ext_mem_obj_initialize(&obj->ext_mem_obj, obj_ref, mem_id, tag, in sm_mem_alloc_obj() 184 uint64_t tag, in sm_mem_get_vmm_obj() argument 203 ret = arm_ffa_mem_retrieve_start((uint16_t)client_id, mem_obj_id, tag, in sm_mem_get_vmm_obj() 211 obj = sm_mem_alloc_obj(client_id, mem_obj_id, tag, address_range_count, in sm_mem_get_vmm_obj() 270 uint64_t tag, in ext_mem_get_vmm_obj() argument 275 return sm_mem_get_vmm_obj(client_id, mem_obj_id, tag, size, objp, in ext_mem_get_vmm_obj() 277 } else if (!client_id && !tag) { in ext_mem_get_vmm_obj()
|
/trusty/kernel/lib/extmem/ |
D | external_memory.c | 51 uint64_t tag, in ext_mem_obj_initialize() argument 56 obj->tag = tag; in ext_mem_obj_initialize() 88 if (ext_obj->match_tag != ext_obj->tag) { in ext_mem_obj_check_flags() 90 ext_obj->match_tag, ext_obj->tag); in ext_mem_obj_check_flags() 163 uint64_t tag, in ext_mem_map_obj_id() argument 176 err = ext_mem_get_vmm_obj(client_id, mem_obj_id, tag, size + offset, in ext_mem_map_obj_id() 186 ext_mem_obj_set_match_tag(vmm_obj, tag); in ext_mem_map_obj_id()
|
/trusty/kernel/lib/extmem/include/lib/extmem/ |
D | extmem.h | 79 uint64_t tag; member 118 uint64_t tag, 222 uint64_t tag, 246 uint64_t tag,
|
/trusty/user/base/app/swaes-benchmark/ |
D | swaes-bench.c | 58 uint8_t* tag; member 164 _state->tag = calloc(_state->param->tag_size, 1); in BENCH_SETUP() 165 ASSERT_NE(_state->tag, NULL); in BENCH_SETUP() 182 if (_state->tag) { in BENCH_TEARDOWN() 183 free(_state->tag); in BENCH_TEARDOWN() 225 param->tag_size, _state->tag); in encrypt() 227 ASSERT_EQ(0, memcmp(_state->tag, param->tag, param->tag_size), in encrypt() 257 param->tag_size, (void*)param->tag); in decrypt()
|
D | vectors.h | 5588 const uint8_t* tag; member 5628 .tag = TAG(arg_key_size, arg_input_size), .tag_size = GCM_TAG_LEN, \
|
/trusty/user/base/lib/apploader_package/ |
D | package.cpp | 126 unsigned char* tag = encryptedData + ciphertextSize; in hwaesDecryptAesGcmInPlace() local 135 cryptArgs.tag_in.data_ptr = tag; in hwaesDecryptAesGcmInPlace() 215 uint64_t tag; in apploader_parse_package_metadata() local 216 if (CborReadTag(&in, &tag) != CBOR_READ_RESULT_OK) { in apploader_parse_package_metadata() 221 if (tag != APPLOADER_PACKAGE_CBOR_TAG_APP) { in apploader_parse_package_metadata() 222 TLOGE("Invalid package semantic tag: %" PRIu64 "\n", tag); in apploader_parse_package_metadata() 318 if (CborReadTag(&in, &tag) != CBOR_READ_RESULT_OK) { in apploader_parse_package_metadata()
|
D | cose.cpp | 309 uint64_t tag; in coseIsSigned() local 313 if (CborReadTag(&in, &tag) == CBOR_READ_RESULT_OK) { in coseIsSigned() 314 if (tag == COSE_TAG_SIGN1) { in coseIsSigned() 386 uint64_t tag; in coseCheckEcDsaSignature() local 388 if (CborReadTag(&in, &tag) == CBOR_READ_RESULT_OK) { in coseCheckEcDsaSignature() 389 if (tag != COSE_TAG_SIGN1) { in coseCheckEcDsaSignature() 711 unsigned char* tag = ciphertext + data.size(); in encryptAesGcm() local 800 tag) != 1) { in encryptAesGcm() 962 unsigned char* tag = ciphertext + ciphertextSize; in decryptAesGcmInPlace() local 1036 tag)) { in decryptAesGcmInPlace() [all …]
|
/trusty/user/app/sample/rust-hello-world/ |
D | lib.rs | 43 tag: Tag, field 75 tag: Tag::from(bytes[0]), in deserialize() 95 serializer.serialize_as_bytes(match self.tag { in serialize() 146 tag: Tag::TagString, in on_message() 222 tag: Tag::TagString, in hello_world_test()
|
/trusty/user/base/experimental/lib/tidl/include/lib/tidl/android-base/ |
D | unique_fd.h | 107 tag(fd_, this, nullptr); in release() 123 tag(new_value, previous_tag, this); in reset() 136 static auto tag(int fd, void* old_tag, void* new_tag) 142 static void tag(long, void*, void*) { in tag() function 177 uint64_t tag = android_fdsan_create_owner_tag( in Close() local 180 android_fdsan_close_with_tag(fd, tag); in Close()
|
/trusty/user/app/sample/stats-test/consumer/ |
D | consumer.cpp | 247 VendorAtomValue::Tag tag = input_value.getTag(); in reportVendorAtom() local 248 TLOGD("vendorAtom.values[%d].getTag = %d.\n", idx, tag); in reportVendorAtom() 252 switch (tag) { in reportVendorAtom() 272 idx, tag); in reportVendorAtom() 274 atom_val.tag = tag; in reportVendorAtom()
|
/trusty/user/app/keymint/keys/ |
D | legacy.rs | 10 explicit, get_bool_tag_value, get_opt_tag_value, get_tag_value, keyblob, km_err, tag, 52 info.try_extend_from_slice(&tag::legacy::serialize(hidden)?)?; in build_derivation_info() 53 info.try_extend_from_slice(&tag::legacy::serialize(&encrypted_keyblob.hw_enforced)?)?; in build_derivation_info() 54 info.try_extend_from_slice(&tag::legacy::serialize(&encrypted_keyblob.sw_enforced)?)?; in build_derivation_info() 174 let mode = match encrypted_keyblob.tag.len() { in convert_key() 185 raw_key_material.try_extend_from_slice(&op.update(&encrypted_keyblob.tag)?)?; in convert_key() 273 if tag::primary_purpose(chars)? != KeyPurpose::AgreeKey { in convert_key() 281 if tag::primary_purpose(chars)? == KeyPurpose::AgreeKey { in convert_key()
|
/trusty/host/common/scripts/metrics_atoms_protoc_plugin/ |
D | metrics_atoms_protoc_plugin.py | 167 tag: VendorAtomValueTag 177 return self.tag in [ 185 match self.tag: 210 match self.tag: 224 match self.tag: 299 tag=VendorAtomValueTag.get_tag(ff.label, ff.type,
|
/trusty/kernel/lib/arm_ffa/include/lib/arm_ffa/ |
D | arm_ffa.h | 97 uint64_t tag,
|
/trusty/user/app/sample/stats-test/include/ |
D | consumer_ctl.h | 42 VendorAtomValue::Tag tag; member
|
/trusty/user/base/tools/ |
D | manifest_compiler.py | 963 (tag,), packed_data = struct.unpack( 966 if tag == TRUSTY_APP_CONFIG_KEY_MIN_HEAP_SIZE: 970 elif tag == TRUSTY_APP_CONFIG_KEY_MIN_STACK_SIZE: 974 elif tag == TRUSTY_APP_CONFIG_KEY_MIN_SHADOW_STACK_SIZE: 978 elif tag == TRUSTY_APP_CONFIG_KEY_MAP_MEM: 1001 elif tag == TRUSTY_APP_CONFIG_KEY_MGMT_FLAGS: 1016 elif tag == TRUSTY_APP_CONFIG_KEY_START_PORT: 1048 elif tag == TRUSTY_APP_CONFIG_KEY_PINNED_CPU: 1053 elif tag == TRUSTY_APP_CONFIG_KEY_PRIORITY: 1058 elif tag == TRUSTY_APP_CONFIG_KEY_VERSION: [all …]
|
/trusty/user/app/keymaster/ |
D | trusty_keymaster_context.cpp | 79 bool UpgradeIntegerTag(keymaster_tag_t tag, in UpgradeIntegerTag() argument 83 int index = set->find(tag); in UpgradeIntegerTag() 86 set->push_back(keymaster_key_param_t{.tag = tag, .integer = value}); in UpgradeIntegerTag() 185 switch (entry.tag) { in SetAuthorizations() 353 root_of_trust.tag = KM_TAG_ROOT_OF_TRUST; in BuildHiddenAuthorizations() 970 switch (entry.tag) { in VerifyAndCopyDeviceIds() 1316 KeymasterBlob tag; in UnwrapKey() local 1319 &tag, wrapped_key_params, wrapped_key_format, in UnwrapKey() 1441 size_t total_key_size = secure_key.key_material_size + tag.data_length; in UnwrapKey() 1454 if (!encrypted_key.write(tag.data, tag.data_length)) { in UnwrapKey()
|
/trusty/kernel/lib/arm_ffa/ |
D | arm_ffa.c | 463 uint64_t tag) { in arm_ffa_populate_receive_req_tx_buffer() argument 472 req->tag = tag; in arm_ffa_populate_receive_req_tx_buffer() 561 uint64_t tag, in arm_ffa_mem_retrieve_start() argument 578 arm_ffa_populate_receive_req_tx_buffer(sender_id, handle, tag); in arm_ffa_mem_retrieve_start()
|
/trusty/user/base/lib/apploader_package/include/apploader/ |
D | cbor.h | 317 void encodeTag(int64_t tag, Fn fn) { in encodeTag() argument 321 countBytes(encodedSizeOf(tag)); in encodeTag() 502 void encodeTag(int64_t tag, Fn fn) { in encodeTag() argument 505 enc.countBytes(encodedSizeOf(tag)); in encodeTag() 513 CborWriteTag(tag, &mOut); in encodeTag()
|
/trusty/user/base/app/hwaes-benchmark/ |
D | hwaes-bench.c | 124 const uint8_t* tag; member 315 _state->args.tag_in.data_ptr = CUR_PARAM.tag; in BENCH_SETUP() 388 memcmp(_state->args.tag_out.data_ptr, CUR_PARAM.tag, in encrypt()
|
D | vectors.h | 5600 .tag = TAG(arg_key_size, arg_input_size), .tag_size = GCM_TAG_LEN, \
|
/trusty/user/base/app/hwaes-unittest/ |
D | hwaes-test.c | 75 struct hwcrypt_arg_in tag; member 231 TV_DATA(name_, tag), \ 258 args->tag_in = vector->tag; in parse_vector() 267 if (encrypt && vector->tag.len > 0) { in parse_vector() 269 args->tag_out.len = vector->tag.len; in parse_vector() 725 if (vector->tag.len > 0) { in TEST_F() 727 vector->tag.data_ptr, vector->tag.len); in TEST_F()
|
/trusty/user/base/interface/arm_ffa/include/interface/arm_ffa/ |
D | arm_ffa.h | 270 uint64_t tag; member
|
/trusty/user/base/lib/scudo/test/srv/ |
D | scudo_app.cpp | 105 uint64_t tag = tagged & 0x0f00000000000000; in retagged() local 107 uint64_t newtag = (tag + 0x0100000000000000) & 0x0f00000000000000; in retagged()
|
/trusty/user/base/app/apploader/package_tool/ |
D | apploader_package_tool.cpp | 479 uint64_t tag; in parse_package() local 485 if (CborReadTag(&in, &tag) != CBOR_READ_RESULT_OK) { in parse_package() 490 if (check_sign_tag && tag == COSE_TAG_SIGN1) { in parse_package() 495 if (tag != APPLOADER_PACKAGE_CBOR_TAG_APP) { in parse_package()
|