| e43ab7a8 | 07-Aug-2019 |
Cedric Neveux <cedric.neveux@nxp.com> |
core: driver: generic resources for crypto cipher driver
Add a generic cryptographic Cipher driver interface connecting TEE Crypto generic APIs to HW driver interface
To make Cipher HW driver gener
core: driver: generic resources for crypto cipher driver
Add a generic cryptographic Cipher driver interface connecting TEE Crypto generic APIs to HW driver interface
To make Cipher HW driver generic and to reduce the amount of function parameters, add structure data for the initialization and update function driver call. Checks the Cipher operation's parameter in the generic part before calling the HW driver.
Signed-off-by: Cedric Neveux <cedric.neveux@nxp.com> Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 956765e2 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in select_va_in_range()
Fixes possible overflow when calculating begin_va and end_va in select_va_in_range().
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerom
core: fix overflow in select_va_in_range()
Fixes possible overflow when calculating begin_va and end_va in select_va_in_range().
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c31a95e6 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in vm_unmap()
Fixes a possible overflow in vm_unmap() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@fo
core: fix overflow in vm_unmap()
Fixes a possible overflow in vm_unmap() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 095b07ce | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: add overflow guard in system_unmap()
Adds an early overflow guard in system_unmap() against large va or sz values.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Foriss
core: add overflow guard in system_unmap()
Adds an early overflow guard in system_unmap() against large va or sz values.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| a8e39e9c | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: wipe user data in system_derive_ta_unique_key()
Before system_derive_ta_unique_key() returns wipe the supplied user data from the heap as a precaution.
Reviewed-by: Joakim Bech <joakim.bech@l
core: wipe user data in system_derive_ta_unique_key()
Before system_derive_ta_unique_key() returns wipe the supplied user data from the heap as a precaution.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 18871ad0 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: add overflow guard in system_set_prot()
Adds an early overflow guard in system_set_prot() against large va or sz values.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome
core: add overflow guard in system_set_prot()
Adds an early overflow guard in system_set_prot() against large va or sz values.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c5560e02 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in merge_vm_range()
Fixes a possible overflow in merge_vm_range() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissie
core: fix overflow in merge_vm_range()
Fixes a possible overflow in merge_vm_range() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 4c666179 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in tee_pager_merge_um_region()
Fixes a possible overflow in tee_pager_merge_um_region() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Review
core: fix overflow in tee_pager_merge_um_region()
Fixes a possible overflow in tee_pager_merge_um_region() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 30dce041 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in split_vm_range()
Fixes a possible overflow in split_vm_range() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissie
core: fix overflow in split_vm_range()
Fixes a possible overflow in split_vm_range() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| f19dd214 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix typo in system_set_prot()
Fixes a typo in system_set_prot() where a "," was used instead of a ";". This fix should not change the behaviour of the function.
Reviewed-by: Joakim Bech <joak
core: fix typo in system_set_prot()
Fixes a typo in system_set_prot() where a "," was used instead of a ";". This fix should not change the behaviour of the function.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 1d61f04b | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in va_range_is_contiguous()
Fixes a possible overflow in va_range_is_contiguous() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by:
core: fix overflow in va_range_is_contiguous()
Fixes a possible overflow in va_range_is_contiguous() where len is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 4047f318 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in binh_copy_to()
Fixes overflows in binh_copy_to() when num_bytes or offs_bytes are very large numbers.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome For
core: fix overflow in binh_copy_to()
Fixes overflows in binh_copy_to() when num_bytes or offs_bytes are very large numbers.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| a5267eb5 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in read_uncompressed()
Fixes overflow in read_uncompressed() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome
core: fix overflow in read_uncompressed()
Fixes overflow in read_uncompressed() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 43937d5b | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in buf_ta_read()
Fixes overflow in buf_ta_read() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <
core: fix overflow in buf_ta_read()
Fixes overflow in buf_ta_read() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 74af6559 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix overflow in ree_fs_ta_read()
Fixes overflow in ree_fs_ta_read() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Foris
core: fix overflow in ree_fs_ta_read()
Fixes overflow in ree_fs_ta_read() where the len parameter is a very large number.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 1e4e976b | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix potential overflow in system_map_ta_binary()
Fixes potential overflows when calculating required sizes for mapping a part of a fobj.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Revi
core: fix potential overflow in system_map_ta_binary()
Fixes potential overflows when calculating required sizes for mapping a part of a fobj.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 908ce2d4 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix handle return in system_open_ta_binary()
Prior to this patch system_open_ta_binary() was not updating the params[0].value.a out parameter used to carry a handle of the opened binary. Fix t
core: fix handle return in system_open_ta_binary()
Prior to this patch system_open_ta_binary() was not updating the params[0].value.a out parameter used to carry a handle of the opened binary. Fix this by assigning the value to the handle to params[0].value.a.
Note that if only one binary is opened at a time the handle will be 0 and ldelf will still work even without this fix.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 787295df | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix potential overflow in system_map_zi()
Fixes a potential overflow when calculating required page size for a fobj allocation. This is fixed by using the new ROUNDUP_DIV() macro instead of ro
core: fix potential overflow in system_map_zi()
Fixes a potential overflow when calculating required page size for a fobj allocation. This is fixed by using the new ROUNDUP_DIV() macro instead of rounding up and the dividing.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c2020b9d | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: parameter check in system_rng_reseed()
Removes confusing comment in system_rng_reseed(). Removes the max limit on input buffer size, that's handled inside crypto_rng_add_event(). Also checks t
core: parameter check in system_rng_reseed()
Removes confusing comment in system_rng_reseed(). Removes the max limit on input buffer size, that's handled inside crypto_rng_add_event(). Also checks that the supplied buffer isn't NULL.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c24b4f8f | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: gprof: check that PC sampling is idle before starting
In gprof_start_pc_sampling() check that PC sampling isn't started yet, or have been stopped before starting again. This avoids memory leak
core: gprof: check that PC sampling is idle before starting
In gprof_start_pc_sampling() check that PC sampling isn't started yet, or have been stopped before starting again. This avoids memory leakage by s->sbuf being overwritten with a pointer to a new buffer.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| b5735546 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
drivers: bnxt: add overflow check in bnxt_copy_crash_dump()
Adds a check that offset + len doesn't overflow when checking that the resulting size is still less than BNXT_CRASH_LEN.
Reviewed-by: Joa
drivers: bnxt: add overflow check in bnxt_copy_crash_dump()
Adds a check that offset + len doesn't overflow when checking that the resulting size is still less than BNXT_CRASH_LEN.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 40bb4a98 | 19-Mar-2020 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: add overflow check in SHDR_GET_SIZE()
Adds overflow check in SHDR_GET_SIZE(), 0 which never can be a correct size is returned in case of overflow.
Reviewed-by: Joakim Bech <joakim.bech@linaro
core: add overflow check in SHDR_GET_SIZE()
Adds overflow check in SHDR_GET_SIZE(), 0 which never can be a correct size is returned in case of overflow.
Reviewed-by: Joakim Bech <joakim.bech@linaro.org> Reviewed-by: Jerome Forissier <jerome@forissier.org> Reported-by: Bastien Simondi <bsimondi@netflix.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c535731b | 09-Mar-2020 |
Jerome Forissier <jerome@forissier.org> |
core: remove #include <elf_common.h>
Since the introduction of ldelf, the TEE kernel does not do any ELF processing anymore. Remove the useless ELF includes.
Signed-off-by: Jerome Forissier <jerome
core: remove #include <elf_common.h>
Since the introduction of ldelf, the TEE kernel does not do any ELF processing anymore. Remove the useless ELF includes.
Signed-off-by: Jerome Forissier <jerome@forissier.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 9a8fe07e | 06-Mar-2020 |
Clement Faure <clement.faure@nxp.com> |
drivers: caam: add descriptive defines for RSA key formats
Add descriptive defines for RSA private key formats for a better readability.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-b
drivers: caam: add descriptive defines for RSA key formats
Add descriptive defines for RSA private key formats for a better readability.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 288fdb8f | 06-Mar-2020 |
Clement Faure <clement.faure@nxp.com> |
core: driver: fix RSA encoded message length computation
Fix the RSA encoded message length computation when verifying the message. This fixes inconsistent xtest 4006.20 and 4006.32 fails.
Signed-o
core: driver: fix RSA encoded message length computation
Fix the RSA encoded message length computation when verifying the message. This fixes inconsistent xtest 4006.20 and 4006.32 fails.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|