| /optee_os/ta/pkcs11/ |
| H A D | user_ta.mk | 3 all: pkcs11-ta-verify-helpers 5 .PHONY: pkcs11-ta-verify-helpers 6 pkcs11-ta-verify-helpers: 8 ${q}ta/pkcs11/scripts/verify-helpers.sh --quiet
|
| H A D | sub.mk | 10 # Defines the number of PKCS11 token implemented by the PKCS11 TA
|
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_helpers.h | 25 /* GPD TEE to PKCS11 status conversion */ 32 * @attribute_id - Target PKCS11 attribute ID 61 /* Convert PKCS11 TA function ID into a TEE crypto operation mode */ 64 /* Load TEE operation attributes from a PKCS11 object, return false on error */ 69 /* Hash and load TEE operation attributes from a PKCS11 object */
|
| H A D | attributes.h | 52 * Header of a serialized memory object inside PKCS11 TA. 70 * Return PKCS11_CKR_OK on success or a PKCS11 return code. 83 * Return PKCS11_CKR_OK on success or a PKCS11 return code. 92 * Return PKCS11_CKR_OK on success or a PKCS11 return code. 130 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return 155 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return 169 * Return PKCS11_CKR_OK on success or a PKCS11 return code. 198 * Return PKCS11_CKR_OK or PKCS11_RV_NOT_FOUND on success, or a PKCS11 return 225 * Return PKCS11_CKR_OK on success, or a PKCS11 return code.
|
| H A D | pkcs11_token.h | 18 #define PKCS11_SLOT_DESCRIPTION "OP-TEE PKCS11 TA" 51 * @label - pkcs11 formatted token label, set by client 52 * @flags - pkcs11 token flags 90 * Runtime state of the token, complies with pkcs11 92 * @state - Pkcs11 login is public, user, SO or custom 93 * @session_count - Counter for opened Pkcs11 sessions 94 * @rw_session_count - Count for opened Pkcs11 read/write sessions 157 * Pkcs11 objects search context 268 * Pkcs11 session support
|
| H A D | pkcs11_attributes.h | 46 * - client provides an attributes list template, PKCS11 TA completes with 49 * - PKCS11 sequence: 59 * - client provides an attributes list template, PKCS11 TA completes with 71 * - PKCS11 checks mechanism and secret comply, if mechanism and token/session 83 * - PKCS11 create a new-key attribute list based on template + default values + 85 * - PKCS11 checks: 216 * Return a PKCS11 return code
|
| H A D | sanitize_object.h | 31 * into a PKCS11 TA internal attribute structure. It generates a serialized 34 * @head points to a blob starting with a pkcs11 attribute header.
|
| H A D | pkcs11_token.c | 37 * @sessions - list of the PKCS11 sessions opened by the client application 435 DMSG("PKCS11 token %"PRIu32": mechanism 0x%04"PRIx32": %s", in dmsg_print_supported_mechanism() 540 DMSG("PKCS11 token %"PRIu32": mechanism 0x%"PRIx32" info", in entry_ck_token_mecha_info() 681 DMSG("Open PKCS11 session %"PRIu32, session->handle); in entry_ck_open_session() 703 DMSG("Close PKCS11 session %"PRIu32, session->handle); in close_ck_session() 768 DMSG("Close all sessions for PKCS11 token %"PRIu32, token_id); in entry_ck_close_all_sessions() 812 DMSG("Get find on PKCS11 session %"PRIu32, session->handle); in entry_ck_session_info() 967 IMSG("PKCS11 token %"PRIu32": initialized", token_id); in entry_ck_token_initialize() 1126 IMSG("PKCS11 session %"PRIu32": init PIN", session->handle); in entry_ck_init_pin() 1304 IMSG("PKCS11 session %"PRIu32": set PIN", session->handle); in entry_ck_set_pin() [all …]
|
| H A D | pkcs11_helpers.c | 99 /* Specific PKCS11 TA internal attribute ID */ 125 /* Convert a PKCS11 ID into its label string */ 375 * Conversion between PKCS11 TA and GPD TEE return codes 405 * Helper functions to analyse PKCS11 identifiers 549 /* Initialize a TEE attribute for a target PKCS11 TA attribute in an object */ 660 * Initialize a TEE attribute with hash of a target PKCS11 TA attribute 701 /* Easy conversion between PKCS11 TA function of TEE crypto mode */
|
| H A D | object.c | 65 /* Currently handle pkcs11 sessions and tokens */ 69 /* Currently supporting only pkcs11 session */ in get_session_objects() 128 * destroy_object - destroy an PKCS11 TA object 131 * @obj - reference to the PKCS11 TA object 202 * create_object - create an PKCS11 TA object from its attributes and value 398 DMSG("PKCS11 session %"PRIu32": import object %#"PRIx32, in entry_create_object() 462 DMSG("PKCS11 session %"PRIu32": destroy object %#"PRIx32, in entry_destroy_object() 704 DMSG("PKCS11 session %"PRIu32": finding objects", session->handle); in entry_find_objects() 917 DMSG("PKCS11 session %"PRIu32": get attributes %#"PRIx32, in entry_get_attribute_value() 1105 DMSG("PKCS11 session %"PRIu32": set attributes %#"PRIx32, in entry_set_attribute_value() [all …]
|
| H A D | processing_rsa.c | 113 * Check or set TEE algorithm identifier upon PKCS11 mechanism parameters 115 * @proc_params: PKCS11 processing parameters 317 * Set TEE RSA OAEP algorithm identifier upon PKCS11 mechanism parameters 320 * @proc_params: PKCS11 processing parameters
|
| H A D | object.h | 59 * Entry function called from the PKCS11 command parser
|
| H A D | processing.c | 335 DMSG("PKCS11 session %"PRIu32": generate secret %#"PRIx32, in entry_generate_secret() 568 DMSG("PKCS11 session %"PRIu32": create key pair %#"PRIx32"/%#"PRIx32, in entry_generate_key_pair() 682 DMSG("PKCS11 session %"PRIu32": init processing %s %s", in entry_processing_init() 780 DMSG("PKCS11 session%"PRIu32": processing %s %s", in entry_processing_step() 1059 DMSG("PKCS11 session %"PRIu32": derive secret %#"PRIx32, in entry_processing_key() 1112 DMSG("PKCS11 session %"PRIu32": release processing", session->handle); in entry_release_active_processing()
|
| H A D | entry.c | 108 * Entry point for PKCS11 TA commands 112 * back to the client a PKCS11 finer status ID than the GPD TEE result codes
|
| H A D | processing.h | 81 * Entry points from PKCS11 TA invocation commands
|
| H A D | persistent_token.c | 606 IMSG("PKCS11 token %u: load db", token_id); in init_persistent_db() 654 IMSG("PKCS11 token %u: init db", token_id); in init_persistent_db()
|
| H A D | processing_aes.c | 22 * decryption is completed and the MAC verified. The pkcs11 TA retains the
|
| H A D | processing_ec.c | 20 * ta/pkcs11/scripts/dump_ec_curve_params.sh 628 /* Create an ECDSA TEE key: will match PKCS11 ECDSA and ECDH */ in generate_ec_keys()
|
| /optee_os/ta/pkcs11/scripts/ |
| H A D | verify-helpers.sh | 12 SYMBOL_LIST="$(grep PKCS11\_$PREFIX\_ ${basepath}/include/pkcs11_ta.h | cut -f2 | cut '-d ' -f1)" 35 …SYMBOL_LIST="$(grep PKCS11\_$PREFIX\_ ${basepath}/include/pkcs11_ta.h | grep ^#define | cut '-d ' …
|
| H A D | dump_ec_curve_params.sh | 8 echo " * ta/pkcs11/scripts/dump_ec_params.sh"
|
| /optee_os/scripts/ |
| H A D | checkpatch_inc.sh | 15 ta/pkcs11/scripts/verify-helpers.sh \
|
| /optee_os/ta/mk/ |
| H A D | build-user-ta.mk | 3 # Set $(sm) as the name of the in tree TA being built, for instance "avb" or "pkcs11"
|
| /optee_os/ta/pkcs11/include/ |
| H A D | pkcs11_ta.h | 15 /* PKCS11 trusted application version information */ 30 * constraint, all the PKCS11 TA invocation commands use a subset of available 1070 * from PKCS11 TA to its client. From client application point of view the 1334 * PKCS11 added IDs for operation not related to a CK mechanism ID
|
| /optee_os/ |
| H A D | MAINTAINERS | 234 F: ta/pkcs11
|
| /optee_os/.github/workflows/ |
| H A D | ci.yml | 411 …oc) check CFG_LOCKDEP=y CFG_LOCKDEP_RECORD_STACK=n CFG_IN_TREE_EARLY_TAS=pkcs11/fd02c9da-306c-48c7…
|