| /optee_os/.github/workflows/ |
| H A D | notify.yml | 2 # for pull requests against the OP-TEE OS main repository in a secure way. 3 # It runs on the pull_request_target event, which grants write permission 4 # (issues: write) using the default short-lived GITHUB_TOKEN. Due to this 10 on: 15 pull-requests: write 17 notify-maintainers: 18 runs-on: ubuntu-latest 20 - name: Checkout base branch 22 - name: Install python3-github 24 sudo apt-get update [all …]
|
| H A D | ci.yml | 2 on: [push, pull_request] 6 group: ci-${{ github.ref }} # unique per branch 7 cancel-in-progress: true # cancel previous runs on the same branch 11 runs-on: ubuntu-lates [all...] |
| H A D | stales.yml | 2 on: 4 - cron: "15 00 * * *" 8 pull-requests: write 12 runs-on: ubuntu-latest 14 - uses: actions/stale@v10.0.0 16 repo-token: ${{ secrets.GITHUB_TOKEN }} 17 …-issue-message: 'This issue has been marked as a stale issue because it has been open (more than) … 18 …-pr-message: 'This pull request has been marked as a stale pull request because it has been open (… 19 stale-issue-label: Stale 20 stale-pr-label: Stale [all …]
|
| /optee_os/core/include/mm/ |
| H A D | tee_mmu_types.h | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 39 * Device-nGnRnE most restrictive (equivalent to Strongly Ordered memory 41 * https://developer.arm.com/documentation/den0024/a/Memory-Ordering/Memory-types/Device-memory 43 * If an ARMv7 architecture operating system runs on a Cortex-A53 processor, 44 * the Device memory type matches the nGnRE encoding and the Strongly-Ordered 46 * https://developer.arm.com/documentation/den0024/a/Memory-Ordering/Memory-types/Device-memory 48 #define TEE_MATTR_MEM_TYPE_DEV U(0) /* Device-nGnRE */ 50 #define TEE_MATTR_MEM_TYPE_STRONGLY_O U(2) /* Device-nGnRnE */ 70 * The mapping should only be mapped read-only, not enforced by the vm_* 140 str[0] = (attr & TEE_MATTR_UR) ? 'r' : '-'; in mattr_perm_to_str() [all …]
|
| /optee_os/core/drivers/ |
| H A D | atmel_tcb.c | 1 // SPDX-License-Identifier: BSD-2-Clause 94 time->seconds = cv0 / tcb_rate; in tee_time_get_sys_time() 95 time->millis = (cv0 % tcb_rate) / (tcb_rate / TEE_TIME_MILLIS_BASE); in tee_time_get_sys_time() 116 * two channels. We use the slow_clk which runs at 32K and is sufficient in atmel_tcb_configure() 120 * Channel 0 is configured to generate a clock on TIOA0 which is cleared in atmel_tcb_configure() 147 panic("Missing TCB base ! Check the device-tree"); in atmel_tcb_check() 195 { .compatible = "atmel,sama5d2-tcb" },
|
| H A D | stm32_gpio.c | 1 // SPDX-License-Identifier: BSD-3-Clause 3 * Copyright (c) 2017-2024, STMicroelectronics 17 #include <dt-bindings/gpio/stm32mp_gpio.h> 18 #include <dt-bindings/pinctrl/stm32-pinfunc.h> 127 * @nsec: Hint on expected secure state of the pin: 0 if secure, 1 otherwise 153 * struct stm32_pinctrl_array - Array of pins in a pin control state 163 * struct stm32_gpio_bank - GPIO bank instance 172 * @seccfgr: non-RIF bank secure configuration data 175 * @is_tdcid: True if OP-TEE runs as Trusted Domain CID 194 * struct stm32_gpio_pm_state - Consumed GPIO for PM purpose [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | README.md | 6 Mbed TLS includes a reference implementation of the [PSA Cryptography API](#psa-cryptography-api). … 9 ------------- 11 …on most systems. Some platform specific options are available in the fully documented configuratio… 15 We provide some non-standard configurations focused on specific use cases in the `configs/` directo… 18 ------------- 20 The main Mbed TLS documentation is available via [ReadTheDocs](https://mbed-tls.readthedocs.io/). 22 …mentation for the PSA Cryptography API is available [on GitHub](https://arm-software.github.io/psa… 24 To generate a local copy of the library documentation in HTML format, tailored to your compile-time… 33 --------- 37 - GNU Make [all …]
|
| H A D | LICENSE | 1 Mbed TLS files are provided under a dual [Apache-2.0](https://spdx.org/licenses/Apache-2.0.html) 2 OR [GPL-2.0-or-later](https://spdx.org/licenses/GPL-2.0-or-later.html) license. 49 form, that is based on (or derived from) the Work and for which the 60 or by an individual or Legal Entity authorized to submit on behalf of 64 communication on electronic mailing lists, source code control systems, 65 and issue tracking systems that are managed by, or on behalf of, the 71 on behalf of whom a Contribution has been received by Licensor and 76 worldwide, non-exclusive, no-charge, royalty-free, irrevocable 83 worldwide, non-exclusive, no-charge, royalty-free, irrevocable 91 cross-claim or counterclaim in a lawsuit) alleging that the Work [all …]
|
| H A D | ChangeLog | 3 = Mbed TLS 3.6.4 branch released 2025-06-30 8 session, according to the TLS-Exporter specification in RFC 8446 and 5705. 15 CVE-2025-49601 19 CVE-2025-49600 20 * On x86/amd64 platforms, with some compilers, when the library is 30 CVE-2025-52496 31 * Fix possible use-after-free or double-free in code calling 33 mbedtls_asn1_free_named_data_list() on its head argument, while the 35 on the documented behaviour to still hold pointers to memory blocks after 36 they were free()d, resulting in high risk of use-after-free or double-free, [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | rsa.h | 4 * \brief This file provides an API for the RSA public-key cryptosystem. 6 * The RSA public-key cryptosystem is defined in <em>Public-Key 8 * and <em>Public-Key Cryptography Standards (PKCS) #1 v2.1: 14 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 33 #define MBEDTLS_ERR_RSA_BAD_INPUT_DATA -0x4080 35 #define MBEDTLS_ERR_RSA_INVALID_PADDING -0x4100 37 #define MBEDTLS_ERR_RSA_KEY_GEN_FAILED -0x4180 39 #define MBEDTLS_ERR_RSA_KEY_CHECK_FAILED -0x4200 41 #define MBEDTLS_ERR_RSA_PUBLIC_FAILED -0x4280 43 #define MBEDTLS_ERR_RSA_PRIVATE_FAILED -0x4300 [all …]
|
| /optee_os/core/arch/arm/plat-hikey/ |
| H A D | spi_test.c | 1 // SPDX-License-Identifier: BSD-2-Clause 32 pd.chip.ops->set_interrupt(NULL, GPIO6_2, in spi_cs_callback() 34 pd.chip.ops->set_direction(NULL, GPIO6_2, GPIO_DIR_OUT); in spi_cs_callback() 39 DMSG("pl022 busy - do NOT set CS!"); in spi_cs_callback() 42 DMSG("pl022 done - set CS!"); in spi_cs_callback() 44 pd.chip.ops->set_value(NULL, GPIO6_2, value); in spi_cs_callback() 93 pd.chip.ops->configure(&pd.chip); in spi_test_with_manual_cs_control() 94 pd.chip.ops->start(&pd.chip); in spi_test_with_manual_cs_control() 105 res = pd.chip.ops->txrx8(&pd.chip, tx, rx, len); in spi_test_with_manual_cs_control() 124 res = pd.chip.ops->txrx8(&pd.chip, tx, rx, len); in spi_test_with_manual_cs_control() [all …]
|
| /optee_os/core/lib/qcbor/src/ |
| H A D | qcbor_encode.c | 1 // SPDX-License-Identifier: BSD-3-Clause 3 Copyright (c) 2016-2018, The Linux Foundation. 4 Copyright (c) 2018-2024, Laurence Lundblade. 24 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT 29 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 56 * stays small enough to fit on the stack. 65 * there is no top-level array or map. It starts out with a string, 66 * integer or other non-aggregate type. It may have an array or map 80 pNesting->pCurrentNesting = &pNesting->pArrays[0]; in Nesting_Init() 84 pNesting->pCurrentNesting->uMajorType = CBOR_MAJOR_TYPE_ARRAY; in Nesting_Init() [all …]
|
| /optee_os/core/arch/riscv/kernel/ |
| H A D | entry.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 4 * Copyright 2022-2023 NXP 8 #include <generated/asm-defines.h> 32 * stack_tmp + (hart_index + 1) * stack_tmp_stride - STACK_TMP_GUARD 89 addi t1, t1, -1 113 * a0 - if non-NULL holds the hart ID 114 * a1 - if non-NULL holds the system DTB address 116 * s0 - saved a0 117 * s1 - saved a1 133 /* Only first hart who wins lottery runs the primary boot sequence. */ [all …]
|
| /optee_os/core/kernel/ |
| H A D | ldelf_loader.c | 1 // SPDX-License-Identifier: BSD-2-Clause 4 * Copyright (c) 2015-2020, 2022 Linaro Limited 5 * Copyright (c) 2020-2023, Arm Limited 50 * This function may leave a few mappings behind on error, but that's taken 63 uctx->is_32bit = is_32bit; in ldelf_load_ldelf() 69 uctx->bbuf = (void *)bb_addr; in ldelf_load_ldelf() 70 uctx->bbuf_size = BOUNCE_BUFFER_SIZE; in ldelf_load_ldelf() 77 uctx->ldelf_stack_ptr = stack_addr + LDELF_STACK_SIZE; in ldelf_load_ldelf() 83 uctx->entry_func = code_addr + ldelf_entry; in ldelf_load_ldelf() 92 vm_set_ctx(uctx->ts_ctx); in ldelf_load_ldelf() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_se_driver.h | 8 * space in which the PSA Crypto implementation runs, typically secure 20 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 45 /** A read-only pointer to the driver's persistent data. 50 * in mind the restrictions on when the persistent data is saved 64 * the persistent data is all-bits-zero. After a driver upgrade, if the 66 * on the right with zeros; if the size has decreased, the original data 69 * This pointer is to read-only data. Only a few driver functions are 72 * - psa_drv_se_t::p_init 73 * - psa_drv_se_key_management_t::p_allocate 74 * - psa_drv_se_key_management_t::p_destroy [all …]
|
| /optee_os/mk/ |
| H A D | config.mk | 1 # Default configuration values for OP-TEE core (all platforms). 3 # Platform-specific overrides are in core/arch/arm32/plat-*/conf.mk. 4 # Some subsystem-specific defaults are not here but rather in */sub.mk. 12 # 4. The platform-specific configuration file: core/arch/arm32/plat-*/conf.mk 14 # 6. Subsystem-specific makefiles (*/sub.mk) 16 # Actual values used during the build are output to $(out-dir)/conf.mk 19 # Cross-compiler prefix and suffix 21 CROSS_COMPILE ?= arm-linux-gnueabihf- 22 # Don't cross-compile if building on aarch64 natively 23 ifneq ($(shell uname -m),aarch64) [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_tls13_keys.c | 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 43 * character too long due to the 0-termination. */ 61 * - desired_length: Length of expanded key material. 68 * - (label, label_len): label + label length, without "tls13 " prefix 74 * - (ctx, ctx_len): context + context length 78 * - dst: Target buffer for HkdfLabel structure, 81 * - dst_len: Pointer at which to store the actual length of 82 * the HkdfLabel structure on success. 251 * - One secret value per sender. 252 * - A purpose value indicating the specific value being generated [all …]
|
| /optee_os/core/lib/zlib/ |
| H A D | zlib.h | 1 /* SPDX-License-Identifier: Zlib */ 2 /* zlib.h -- interface of the 'zlib' general purpose compression library 5 Copyright (C) 1995-2022 Jean-loup Gailly and Mark Adler 7 This software is provided 'as-is', without any express or implied 23 Jean-loup Gailly Mark Adler 49 The 'zlib' compression library provides in-memory compression and 60 The compressed data format used by default by the in-memory functions is 73 and on communications channels. The gzip format was designed for single- 74 file compression on file systems, has a larger header than zlib to maintain 105 uLong adler; /* Adler-32 or CRC-32 value of the uncompressed data */ [all …]
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | boot.c | 1 // SPDX-License-Identifier: BSD-2-Clause 3 * Copyright (c) 2015-2023, Linaro Limited 15 #include <dt-bindings/interrupt-controller/arm-gic.h> 59 * they are received in a single register when OP-TEE is initially entered. 60 * This limits 32-bit systems to only use make use of the lower 32 bits 63 * 64-bit systems on the other hand can use full 64-bit physical pointers. 102 /* May be overridden in plat-$(PLATFORM)/main.c */ 108 /* May be overridden in plat-$(PLATFORM)/main.c */ 113 /* May be overridden in plat-$(PLATFORM)/main.c */ 118 /* May be overridden in plat-$(PLATFORM)/main.c */ [all …]
|