Home
last modified time | relevance | path

Searched +full:- +full:- +full:single +full:- +full:branch (Results 1 – 16 of 16) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/
H A DCONTRIBUTING.md7 -----------------------------------
10 - [Sign-off](#license-and-copyright): all commits must be signed off.
11 - [Tests](#tests): please ensure the PR includes adequate tests.
12 - [Changelog](#documentation): if needed, please provide a changelog entry.
13 - [Backports](#long-term-support-branches): provide a backport if needed (it's fine to wait until t…
16 ----------------
17 - Contributions should include tests, as mentioned in the [Tests](#tests) and [Continuous Integrati…
18 - The code should be written in a clean and readable style, and must follow [our coding standards](…
19 - The code should be written in a portable generic way, that will benefit the whole community, and …
20 - The code should be secure, and will be reviewed from a security point of view as well.
[all …]
H A DREADME.md6 Mbed TLS includes a reference implementation of the [PSA Cryptography API](#psa-cryptography-api). …
9 -------------
11 … more programmatic way using the Python 3 script `scripts/config.py` (use `--help` for usage instr…
15 We provide some non-standard configurations focused on specific use cases in the `configs/` directo…
18 -------------
20 The main Mbed TLS documentation is available via [ReadTheDocs](https://mbed-tls.readthedocs.io/).
22 …or the PSA Cryptography API is available [on GitHub](https://arm-software.github.io/psa-api/crypto…
24 To generate a local copy of the library documentation in HTML format, tailored to your compile-time…
33 ---------
37 - GNU Make
[all …]
H A DChangeLog1 Mbed TLS ChangeLog (Sorted per branch, date)
3 = Mbed TLS 3.6.4 branch released 2025-06-30
8 session, according to the TLS-Exporter specification in RFC 8446 and 5705.
15 CVE-2025-49601
19 CVE-2025-49600
30 CVE-2025-52496
31 * Fix possible use-after-free or double-free in code calling
36 they were free()d, resulting in high risk of use-after-free or double-free,
39 were affected (use-after-free if the san string contains more than one DN).
42 CVE-2025-47917
[all …]
/optee_os/.github/workflows/
H A Dci.yml6 group: ci-${{ github.ref }} # unique per branch
7 cancel-in-progress: true # cancel previous runs on the same branch
11 runs-on: ubuntu-latest
14 - name: Checkout
17 fetch-depth: 0 # full history so checkpatch can check commit IDs in commit messages
18 - nam
[all...]
/optee_os/core/lib/zlib/
H A Dinffast.c1 // SPDX-License-Identifier: Zlib
2 /* inffast.c -- fast decoding
3 * Copyright (C) 1995-2017 Mark Adler
13 # pragma message("Assembler code may have bugs -- use at your own risk")
19 available, an end-of-block is encountered, or a data error is encountered.
26 state->mode == LEN
27 strm->avail_in >= 6
28 strm->avail_out >= 258
29 start >= strm->avail_out
30 state->bits < 8
[all …]
/optee_os/core/lib/qcbor/
H A DREADME.md3 **QCBOR** is a powerful, commercial-quality CBOR encoder-decoder that
46 both definite and indefinite-length map and array decoding. Decoding
58 code is less than 4KB on 64-bit x86 CPUs. The design is such that
91 QCBOREncode_AddTextToMap(&EncodeCtx, "Manufacturer", pE->Manufacturer);
92 QCBOREncode_AddInt64ToMap(&EncodeCtx, "Displacement", pE->uDisplacement);
93 QCBOREncode_AddInt64ToMap(&EncodeCtx, "Horsepower", pE->uHorsePower);
100 QCBORDecode_GetTextStringInMapSZ(&DecodeCtx, "Manufacturer", &(pE->Manufacturer));
101 QCBORDecode_GetInt64InMapSZ(&DecodeCtx, "Displacement", &(pE->uDisplacement));
102 QCBORDecode_GetInt64InMapSZ(&DecodeCtx, "Horsepower", &(pE->uHorsePower));
114 it is a solid, well-maintained commercial quality implementation. This
[all …]
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dalignment.h8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
33 * https://learn.microsoft.com/en-us/cpp/build/arm64-windows-abi-conventions?view=msvc-170#alignment
34 * specifies that on Windows-on-Arm64, unaligned access is safe (except for uncached
47 * https://www.iar.com/knowledge/support/technical-notes/compiler/accessing-unaligned-data
48 * This results in a single load / store instruction (if unaligned access is supported).
58 * gcc may generate a branch to memcpy for calls like `memcpy(dest, src, 4)` rather than
61 * This is architecture dependent: x86-64 seems fine even with old gcc; 32-bit Arm
65 * For gcc < 6.3.0, this issue happens at -O0
68 * For gcc 4.x, this implementation will generate byte-by-byte loads even if unaligned access is
71 * For performance (and code size, in some cases), we want to avoid the branch and just generate
[all …]
H A Dssl_msg.c6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
77 * extension in order to get constant-flow behaviour. in mbedtls_ct_hmac()
136 * deliberately-crafted input), in case the caller doesn't in mbedtls_ct_hmac()
197 * extension to the MD API in order to get constant-flow behaviour. in mbedtls_ct_hmac()
201 * patterns (see RFC 2104, sec. 2), which are stored in ctx->hmac_ctx. in mbedtls_ct_hmac()
209 const mbedtls_md_type_t md_alg = mbedtls_md_get_type(ctx->md_info); in mbedtls_ct_hmac()
210 /* TLS 1.2 only supports SHA-384, SHA-256, SHA-1, MD-5, in mbedtls_ct_hmac()
211 * all of which have the same block size except SHA-384. */ in mbedtls_ct_hmac()
213 const unsigned char * const ikey = ctx->hmac_ctx; in mbedtls_ct_hmac()
215 const size_t hash_size = mbedtls_md_get_size(ctx->md_info); in mbedtls_ct_hmac()
[all …]
H A Drsa.c2 * The RSA public-key cryptosystem
5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
12 * [1] A method for obtaining digital signatures and public-key cryptosystems
16 * [2] Handbook of Applied Cryptography - 1997, Chapter 8
57 * - never a valid value for an RSA parameter
58 * - interpreted as "omitted, please reconstruct" by mbedtls_rsa_complete().
98 * modulus INTEGER, -- n in mbedtls_rsa_parse_key()
99 * publicExponent INTEGER, -- e in mbedtls_rsa_parse_key()
100 * privateExponent INTEGER, -- d in mbedtls_rsa_parse_key()
101 * prime1 INTEGER, -- p in mbedtls_rsa_parse_key()
[all …]
H A Dssl_tls12_server.c2 * TLS server-side functions
5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
52 if (ssl->conf->endpoint != MBEDTLS_SSL_IS_SERVER) { in mbedtls_ssl_set_client_transport_id()
56 mbedtls_free(ssl->cli_id); in mbedtls_ssl_set_client_transport_id()
58 if ((ssl->cli_id = mbedtls_calloc(1, ilen)) == NULL) { in mbedtls_ssl_set_client_transport_id()
62 memcpy(ssl->cli_id, info, ilen); in mbedtls_ssl_set_client_transport_id()
63 ssl->cli_id_len = ilen; in mbedtls_ssl_set_client_transport_id()
73 conf->f_cookie_write = f_cookie_write; in mbedtls_ssl_conf_dtls_cookies()
74 conf->f_cookie_check = f_cookie_check; in mbedtls_ssl_conf_dtls_cookies()
75 conf->p_cookie = p_cookie; in mbedtls_ssl_conf_dtls_cookies()
[all …]
H A Decp.c5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
11 * SEC1 https://www.secg.org/sec1-v2.pdf
12 * GECC = Guide to Elliptic Curve Cryptography - Hankerson, Menezes, Vanstone
13 * FIPS 186-3 http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf
15 * - https://www.rfc-editor.org/rfc/rfc4492
17 * - https://www.rfc-editor.org/rfc/rfc7748
19 * [Curve25519] https://cr.yp.to/ecdh/curve25519-20060209.pdf
21 * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis
23 * Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302.
24 * <http://link.springer.com/chapter/10.1007/3-540-48059-5_25>
[all …]
/optee_os/core/arch/arm/kernel/
H A Dentry_a64.S1 /* SPDX-License-Identifier: BSD-2-Clause */
3 * Copyright (c) 2015-2025, Linaro Limited
4 * Copyright (c) 2021-2023, Arm Limited
12 #include <generated/asm-defines.h>
26 * stack_tmp + (cpu_id + 1) * stack_tmp_stride - STACK_TMP_GUARD
39 /* x0 = stack_tmp - STACK_TMP_GUARD */
210 ldp x3, x4, [x1, #-16]!
211 stp x3, x4, [x0, #-16]!
228 bic x0, x0, #(SMALL_PAGE_SIZE - 1)
239 ldp x3, x4, [x1, #-16]!
[all …]
H A Dentry_a32.S1 /* SPDX-License-Identifier: BSD-2-Clause */
3 * Copyright (c) 2014-2025, Linaro Limited
4 * Copyright (c) 2021-2023, Arm Limited
10 #include <generated/asm-defines.h>
42 push { r4-r6, lr }
62 1: pop { r4-r6, pc }
139 * Setup required by current implementation of the OP-TEE core:
140 * - Disable data and instruction cache.
141 * - MMU is expected off and exceptions trapped in ARM mode.
142 * - Enable or disable alignment checks upon platform configuration.
[all …]
/optee_os/mk/
H A Dconfig.mk1 # Default configuration values for OP-TEE core (all platforms).
3 # Platform-specific overrides are in core/arch/arm32/plat-*/conf.mk.
4 # Some subsystem-specific defaults are not here but rather in */sub.mk.
12 # 4. The platform-specific configuration file: core/arch/arm32/plat-*/conf.mk
14 # 6. Subsystem-specific makefiles (*/sub.mk)
16 # Actual values used during the build are output to $(out-dir)/conf.mk
19 # Cross-compiler prefix and suffix
21 CROSS_COMPILE ?= arm-linux-gnueabihf-
22 # Don't cross-compile if building on aarch64 natively
23 ifneq ($(shell uname -m),aarch64)
[all …]
/optee_os/
H A DCHANGELOG.md1 # OP-TEE - version 4.8.0 (2025-10-24)
3 - Links to the release pages, commits and pull requests merged into this release for:
4- OP-TEE/optee_os: [release page][OP_TEE_optee_os_release_4_8_0], [commits][OP_TEE_optee_os_commit…
5- OP-TEE/optee_client: [release page][OP_TEE_optee_client_release_4_8_0], [commits][OP_TEE_optee_c…
6- OP-TEE/optee_test: [release page][OP_TEE_optee_test_release_4_8_0], [commits][OP_TEE_optee_test_…
7- OP-TEE/build: [release page][OP_TEE_build_release_4_8_0], [commits][OP_TEE_build_commits_4_8_0] …
8- linaro-swg/optee_examples: [release page][linaro_swg_optee_examples_release_4_8_0], [commits][li…
11 [OP_TEE_optee_os_release_4_8_0]: https://github.com/OP-TEE/optee_os/releases/tag/4.8.0
12 [OP_TEE_optee_os_commits_4_8_0]: https://github.com/OP-TEE/optee_os/compare/4.7.0...4.8.0
13 …s_pr_4_8_0]: https://github.com/OP-TEE/optee_os/pulls?q=is%3Apr+is%3Amerged+base%3Amaster+merged%3…
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dssl.h8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
47 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
49 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
51 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
53 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
55 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
57 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
59 #define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300
62 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400
64 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
[all …]