History log of /optee_os/ta/trusted_keys/user_ta_header_defines.h (Results 1 – 2 of 2)
Revision Date Author Comments
# c385a722 06-Jan-2025 Etienne Carriere <etienne.carriere@foss.st.com>

ta: trusted_keys: Add TA version and description property values

Add meaningful values for Trusted Keys TA version and description
properties to replace previously embedded default respective values

ta: trusted_keys: Add TA version and description property values

Add meaningful values for Trusted Keys TA version and description
properties to replace previously embedded default respective values
"Undefined version" and "Undefined description".

Signed-off-by: Etienne Carriere <etienne.carriere@foss.st.com>
Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
Acked-by: Jens Wiklander <jens.wiklander@linaro.org>

show more ...


# f86ab8e7 06-May-2020 Sumit Garg <sumit.garg@linaro.org>

ta: add early TA to seal and unseal Linux trusted keys

This patch adds an early TA which acts as Linux TEE bus device to
provide a service of sealing/unsealing of trusted keys in case platform
doesn

ta: add early TA to seal and unseal Linux trusted keys

This patch adds an early TA which acts as Linux TEE bus device to
provide a service of sealing/unsealing of trusted keys in case platform
doesn't posses a TPM device or like.

To do sealing/unsealing we use system pseudo TA service to derive a
hardware unquie key to perform authenticated encryption/decryption
(using TEE_ALG_AES_GCM algo).

Also, this early TA only accepts login with a new private login method
specifically used by REE kernel (TEE_LOGIN_REE_KERNEL).

Signed-off-by: Sumit Garg <sumit.garg@linaro.org>
Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
Reviewed-by: Jerome Forissier <jerome@forissier.org>

show more ...