| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | CONTRIBUTING.md | 7 ----------------------------------- 10 - [Sign-off](#license-and-copyright): all commits must be signed off. 11 - [Tests](#tests): please ensure the PR includes adequate tests. 12 - [Changelog](#documentation): if needed, please provide a changelog entry. 13 - [Backports](#long-term-support-branches): provide a backport if needed (it's fine to wait until t… 16 ---------------- 17 - Contributions should include tests, as mentioned in the [Tests](#tests) and [Continuous Integrati… 18 - The code should be written in a clean and readable style, and must follow [our coding standards](… 19 - The code should be written in a portable generic way, that will benefit the whole community, and … 20 - The code should be secure, and will be reviewed from a security point of view as well. [all …]
|
| H A D | README.md | 6 Mbed TLS includes a reference implementation of the [PSA Cryptography API](#psa-cryptography-api). … 9 ------------- 11 … more programmatic way using the Python 3 script `scripts/config.py` (use `--help` for usage instr… 15 We provide some non-standard configurations focused on specific use cases in the `configs/` directo… 18 ------------- 20 The main Mbed TLS documentation is available via [ReadTheDocs](https://mbed-tls.readthedocs.io/). 22 …or the PSA Cryptography API is available [on GitHub](https://arm-software.github.io/psa-api/crypto… 24 To generate a local copy of the library documentation in HTML format, tailored to your compile-time… 33 --------- 37 - GNU Make [all …]
|
| H A D | ChangeLog | 1 Mbed TLS ChangeLog (Sorted per branch, date) 3 = Mbed TLS 3.6.4 branch released 2025-06-30 8 session, according to the TLS-Exporter specification in RFC 8446 and 5705. 15 CVE-2025-49601 19 CVE-2025-49600 30 CVE-2025-52496 31 * Fix possible use-after-free or double-free in code calling 36 they were free()d, resulting in high risk of use-after-free or double-free, 39 were affected (use-after-free if the san string contains more than one DN). 42 CVE-2025-47917 [all …]
|
| /optee_os/.github/workflows/ |
| H A D | ci.yml | 6 group: ci-${{ github.ref }} # unique per branch 7 cancel-in-progress: true # cancel previous runs on the same branch 11 runs-on: ubuntu-latest 14 - name: Checkout 17 fetch-depth: 0 # full history so checkpatch can check commit IDs in commit messages 18 - nam [all...] |
| /optee_os/core/lib/zlib/ |
| H A D | inffast.c | 1 // SPDX-License-Identifier: Zlib 2 /* inffast.c -- fast decoding 3 * Copyright (C) 1995-2017 Mark Adler 13 # pragma message("Assembler code may have bugs -- use at your own risk") 19 available, an end-of-block is encountered, or a data error is encountered. 26 state->mode == LEN 27 strm->avail_in >= 6 28 strm->avail_out >= 258 29 start >= strm->avail_out 30 state->bits < 8 [all …]
|
| /optee_os/core/lib/qcbor/ |
| H A D | README.md | 3 **QCBOR** is a powerful, commercial-quality CBOR encoder-decoder that 46 both definite and indefinite-length map and array decoding. Decoding 58 code is less than 4KB on 64-bit x86 CPUs. The design is such that 91 QCBOREncode_AddTextToMap(&EncodeCtx, "Manufacturer", pE->Manufacturer); 92 QCBOREncode_AddInt64ToMap(&EncodeCtx, "Displacement", pE->uDisplacement); 93 QCBOREncode_AddInt64ToMap(&EncodeCtx, "Horsepower", pE->uHorsePower); 100 QCBORDecode_GetTextStringInMapSZ(&DecodeCtx, "Manufacturer", &(pE->Manufacturer)); 101 QCBORDecode_GetInt64InMapSZ(&DecodeCtx, "Displacement", &(pE->uDisplacement)); 102 QCBORDecode_GetInt64InMapSZ(&DecodeCtx, "Horsepower", &(pE->uHorsePower)); 114 it is a solid, well-maintained commercial quality implementation. This [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | alignment.h | 8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 33 * https://learn.microsoft.com/en-us/cpp/build/arm64-windows-abi-conventions?view=msvc-170#alignment 34 * specifies that on Windows-on-Arm64, unaligned access is safe (except for uncached 47 * https://www.iar.com/knowledge/support/technical-notes/compiler/accessing-unaligned-data 48 * This results in a single load / store instruction (if unaligned access is supported). 58 * gcc may generate a branch to memcpy for calls like `memcpy(dest, src, 4)` rather than 61 * This is architecture dependent: x86-64 seems fine even with old gcc; 32-bit Arm 65 * For gcc < 6.3.0, this issue happens at -O0 68 * For gcc 4.x, this implementation will generate byte-by-byte loads even if unaligned access is 71 * For performance (and code size, in some cases), we want to avoid the branch and just generate [all …]
|
| H A D | ssl_msg.c | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 77 * extension in order to get constant-flow behaviour. in mbedtls_ct_hmac() 136 * deliberately-crafted input), in case the caller doesn't in mbedtls_ct_hmac() 197 * extension to the MD API in order to get constant-flow behaviour. in mbedtls_ct_hmac() 201 * patterns (see RFC 2104, sec. 2), which are stored in ctx->hmac_ctx. in mbedtls_ct_hmac() 209 const mbedtls_md_type_t md_alg = mbedtls_md_get_type(ctx->md_info); in mbedtls_ct_hmac() 210 /* TLS 1.2 only supports SHA-384, SHA-256, SHA-1, MD-5, in mbedtls_ct_hmac() 211 * all of which have the same block size except SHA-384. */ in mbedtls_ct_hmac() 213 const unsigned char * const ikey = ctx->hmac_ctx; in mbedtls_ct_hmac() 215 const size_t hash_size = mbedtls_md_get_size(ctx->md_info); in mbedtls_ct_hmac() [all …]
|
| H A D | rsa.c | 2 * The RSA public-key cryptosystem 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 12 * [1] A method for obtaining digital signatures and public-key cryptosystems 16 * [2] Handbook of Applied Cryptography - 1997, Chapter 8 57 * - never a valid value for an RSA parameter 58 * - interpreted as "omitted, please reconstruct" by mbedtls_rsa_complete(). 98 * modulus INTEGER, -- n in mbedtls_rsa_parse_key() 99 * publicExponent INTEGER, -- e in mbedtls_rsa_parse_key() 100 * privateExponent INTEGER, -- d in mbedtls_rsa_parse_key() 101 * prime1 INTEGER, -- p in mbedtls_rsa_parse_key() [all …]
|
| H A D | ssl_tls12_server.c | 2 * TLS server-side functions 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 52 if (ssl->conf->endpoint != MBEDTLS_SSL_IS_SERVER) { in mbedtls_ssl_set_client_transport_id() 56 mbedtls_free(ssl->cli_id); in mbedtls_ssl_set_client_transport_id() 58 if ((ssl->cli_id = mbedtls_calloc(1, ilen)) == NULL) { in mbedtls_ssl_set_client_transport_id() 62 memcpy(ssl->cli_id, info, ilen); in mbedtls_ssl_set_client_transport_id() 63 ssl->cli_id_len = ilen; in mbedtls_ssl_set_client_transport_id() 73 conf->f_cookie_write = f_cookie_write; in mbedtls_ssl_conf_dtls_cookies() 74 conf->f_cookie_check = f_cookie_check; in mbedtls_ssl_conf_dtls_cookies() 75 conf->p_cookie = p_cookie; in mbedtls_ssl_conf_dtls_cookies() [all …]
|
| H A D | ecp.c | 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 11 * SEC1 https://www.secg.org/sec1-v2.pdf 12 * GECC = Guide to Elliptic Curve Cryptography - Hankerson, Menezes, Vanstone 13 * FIPS 186-3 http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf 15 * - https://www.rfc-editor.org/rfc/rfc4492 17 * - https://www.rfc-editor.org/rfc/rfc7748 19 * [Curve25519] https://cr.yp.to/ecdh/curve25519-20060209.pdf 21 * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis 23 * Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302. 24 * <http://link.springer.com/chapter/10.1007/3-540-48059-5_25> [all …]
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | entry_a64.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2015-2025, Linaro Limited 4 * Copyright (c) 2021-2023, Arm Limited 12 #include <generated/asm-defines.h> 26 * stack_tmp + (cpu_id + 1) * stack_tmp_stride - STACK_TMP_GUARD 39 /* x0 = stack_tmp - STACK_TMP_GUARD */ 210 ldp x3, x4, [x1, #-16]! 211 stp x3, x4, [x0, #-16]! 228 bic x0, x0, #(SMALL_PAGE_SIZE - 1) 239 ldp x3, x4, [x1, #-16]! [all …]
|
| H A D | entry_a32.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2014-2025, Linaro Limited 4 * Copyright (c) 2021-2023, Arm Limited 10 #include <generated/asm-defines.h> 42 push { r4-r6, lr } 62 1: pop { r4-r6, pc } 139 * Setup required by current implementation of the OP-TEE core: 140 * - Disable data and instruction cache. 141 * - MMU is expected off and exceptions trapped in ARM mode. 142 * - Enable or disable alignment checks upon platform configuration. [all …]
|
| /optee_os/mk/ |
| H A D | config.mk | 1 # Default configuration values for OP-TEE core (all platforms). 3 # Platform-specific overrides are in core/arch/arm32/plat-*/conf.mk. 4 # Some subsystem-specific defaults are not here but rather in */sub.mk. 12 # 4. The platform-specific configuration file: core/arch/arm32/plat-*/conf.mk 14 # 6. Subsystem-specific makefiles (*/sub.mk) 16 # Actual values used during the build are output to $(out-dir)/conf.mk 19 # Cross-compiler prefix and suffix 21 CROSS_COMPILE ?= arm-linux-gnueabihf- 22 # Don't cross-compile if building on aarch64 natively 23 ifneq ($(shell uname -m),aarch64) [all …]
|
| /optee_os/ |
| H A D | CHANGELOG.md | 1 # OP-TEE - version 4.8.0 (2025-10-24) 3 - Links to the release pages, commits and pull requests merged into this release for: 4 …- OP-TEE/optee_os: [release page][OP_TEE_optee_os_release_4_8_0], [commits][OP_TEE_optee_os_commit… 5 …- OP-TEE/optee_client: [release page][OP_TEE_optee_client_release_4_8_0], [commits][OP_TEE_optee_c… 6 …- OP-TEE/optee_test: [release page][OP_TEE_optee_test_release_4_8_0], [commits][OP_TEE_optee_test_… 7 …- OP-TEE/build: [release page][OP_TEE_build_release_4_8_0], [commits][OP_TEE_build_commits_4_8_0] … 8 …- linaro-swg/optee_examples: [release page][linaro_swg_optee_examples_release_4_8_0], [commits][li… 11 [OP_TEE_optee_os_release_4_8_0]: https://github.com/OP-TEE/optee_os/releases/tag/4.8.0 12 [OP_TEE_optee_os_commits_4_8_0]: https://github.com/OP-TEE/optee_os/compare/4.7.0...4.8.0 13 …s_pr_4_8_0]: https://github.com/OP-TEE/optee_os/pulls?q=is%3Apr+is%3Amerged+base%3Amaster+merged%3… [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ssl.h | 8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 47 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000 49 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080 51 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100 53 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180 55 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200 57 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280 59 #define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300 62 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400 64 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480 [all …]
|