| /optee_os/core/pta/veraison_attestation/ |
| H A D | cbor.c | 36 encode_cbor_evidence(QCBOREncodeContext *context, UsefulBufC ubc_eat_profile, in encode_cbor_evidence() argument 43 QCBOREncode_OpenMap(context); in encode_cbor_evidence() 46 QCBOREncode_AddTextToMapN(context, PSA_PROFILE_DEFINITION, in encode_cbor_evidence() 50 QCBOREncode_AddInt64ToMapN(context, PSA_CLIENT_ID, psa_client_id); in encode_cbor_evidence() 53 QCBOREncode_AddInt64ToMapN(context, PSA_SECURITY_LIFECYCLE, in encode_cbor_evidence() 57 QCBOREncode_AddBytesToMapN(context, PSA_IMPLEMENTATION_ID, in encode_cbor_evidence() 61 QCBOREncode_OpenArrayInMapN(context, PSA_SW_COMPONENTS); /* [ */ in encode_cbor_evidence() 62 QCBOREncode_OpenMap(context); /* { */ in encode_cbor_evidence() 63 QCBOREncode_AddTextToMapN(context, PSA_SW_COMPONENT_MEASUREMENT_TYPE, in encode_cbor_evidence() 65 QCBOREncode_AddBytesToMapN(context, PSA_SW_COMPONENT_MEASUREMENT_VALUE, in encode_cbor_evidence() [all …]
|
| /optee_os/core/drivers/ |
| H A D | plic.c | 38 #define PLIC_ENABLE(base, source, context) \ argument 40 SHIFT_U32(context, PLIC_ENABLE_SHIFT_PER_TARGET) +\ 43 #define PLIC_THRESHOLD(base, context) \ argument 45 SHIFT_U32(context, PLIC_THRESHOLD_SHIFT_PER_TARGET) \ 47 #define PLIC_COMPLETE(base, context) \ argument 49 SHIFT_U32(context, PLIC_CLAIM_SHIFT_PER_TARGET) \ 51 #define PLIC_CLAIM(base, context) PLIC_COMPLETE(base, context) argument 93 uint32_t context = plic_get_context(); in plic_enable_interrupt() local 95 io_setbits32(PLIC_ENABLE(pd->plic_base, source, context), in plic_enable_interrupt() 102 uint32_t context = plic_get_context(); in plic_get_interrupt_enable() local [all …]
|
| /optee_os/core/drivers/crypto/se050/core/ |
| H A D | cipher.c | 38 static void do_final(void *context) in do_final() argument 40 struct crypto_cipher_ctx *ctx = context; in do_final() 45 static void do_free(void *context) in do_free() argument 47 struct crypto_cipher_ctx *ctx = context; in do_free()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_se.c | 49 psa_drv_se_context_t context; member 84 return &driver->u.context; in psa_get_se_driver_context() 96 *p_drv_context = (driver ? &driver->u.context : NULL); in psa_get_se_driver() 210 status = p_validate_slot_number(&driver->u.context, in psa_find_se_slot_for_key() 226 status = p_allocate(&driver->u.context, in psa_find_se_slot_for_key() 252 &driver->u.context, in psa_destroy_se_key() 270 &driver->u.context, in psa_init_all_se_drivers()
|
| H A D | ssl_tls.c | 5559 int mbedtls_ssl_context_load(mbedtls_ssl_context *context, in mbedtls_ssl_context_load() argument 5563 int ret = ssl_context_load(context, buf, len); in mbedtls_ssl_context_load() 5566 mbedtls_ssl_free(context); in mbedtls_ssl_context_load() 10066 const unsigned char *context, in mbedtls_ssl_tls12_export_keying_material() argument 10102 memcpy(prf_input + randbytes_len + sizeof(uint16_t), context, context_len); in mbedtls_ssl_tls12_export_keying_material() 10120 const unsigned char *context, in mbedtls_ssl_tls13_export_keying_material() argument 10139 context, context_len, out, key_len); in mbedtls_ssl_tls13_export_keying_material() 10146 const unsigned char *context, const size_t context_len, in mbedtls_ssl_export_keying_material() argument 10167 context, context_len, use_context); in mbedtls_ssl_export_keying_material() 10177 use_context ? context : NULL, in mbedtls_ssl_export_keying_material()
|
| /optee_os/lib/libutee/include/ |
| H A D | tee_internal_api.h | 518 void TEE_BigIntInitFMMContext(TEE_BigIntFMMContext *context, size_t len, 520 void __GP11_TEE_BigIntInitFMMContext(TEE_BigIntFMMContext *context, 523 TEE_Result TEE_BigIntInitFMMContext1(TEE_BigIntFMMContext *context, 609 const TEE_BigIntFMMContext *context); 626 const TEE_BigIntFMMContext *context); 630 const TEE_BigIntFMMContext *context); 634 const TEE_BigIntFMMContext *context); 638 const TEE_BigIntFMMContext *context);
|
| /optee_os/core/drivers/crypto/caam/include/ |
| H A D | caam_jr.h | 21 void *context; /* caller job context */ member
|
| /optee_os/lib/libutee/ |
| H A D | tee_api_arith_mpi.c | 685 const TEE_BigIntFMMContext *context __unused) in TEE_BigIntExpMod() 926 void TEE_BigIntInitFMMContext(TEE_BigIntFMMContext *context __unused, in TEE_BigIntInitFMMContext() 932 void __GP11_TEE_BigIntInitFMMContext(TEE_BigIntFMMContext *context, in __GP11_TEE_BigIntInitFMMContext() argument 935 TEE_BigIntInitFMMContext(context, len, modulus); in __GP11_TEE_BigIntInitFMMContext() 938 TEE_Result TEE_BigIntInitFMMContext1(TEE_BigIntFMMContext *context __unused, in TEE_BigIntInitFMMContext1() 968 const TEE_BigIntFMMContext *context __unused) in TEE_BigIntConvertToFMM() 975 const TEE_BigIntFMMContext *context __unused) in TEE_BigIntConvertFromFMM() 992 const TEE_BigIntFMMContext *context __unused) in TEE_BigIntComputeFMM()
|
| /optee_os/core/arch/arm/plat-k3/drivers/ |
| H A D | ti_sci.c | 308 const char *context, const char *label, in ti_sci_get_dkek() argument 323 req.kdf_context_len = strlen(context); in ti_sci_get_dkek() 330 memcpy(req.kdf_label_and_context + strlen(label), context, in ti_sci_get_dkek() 331 strlen(context)); in ti_sci_get_dkek()
|
| H A D | ti_sci.h | 124 const char *context, const char *label,
|
| /optee_os/core/arch/arm/dts/ |
| H A D | stm32mp257f-ev1-ca35tdcid-resmem.dtsi | 102 bl31_context: bl31-context@81fc0000 {
|
| H A D | stm32mp235f-dk-ca35tdcid-resmem.dtsi | 106 bl31_context: bl31-context@81fc0000 {
|
| H A D | stm32mp257f-dk-ca35tdcid-resmem.dtsi | 112 bl31_context: bl31-context@81fc0000 {
|
| H A D | fsl-lx2160a.dtsi | 1186 // per context interrupt, 64 interrupts
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_extra.h | 482 mbedtls_psa_external_random_context_t *context,
|
| /optee_os/core/drivers/crypto/caam/ |
| H A D | caam_jr.c | 481 jobctx->context = jobctx; in caam_jr_enqueue()
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 374 * Fixed a regression introduced in 3.6.0 where context-specific certificate 377 upgraded to TLS 1.3. Fixed by adding support for context-specific verify 425 PK context. 509 used as random number generator function (f_rng) and context (p_rng) in 512 mbedtls_pk_copy_public_from_psa() provide ways to set up a PK context 548 when an SSL context is reset with the mbedtls_ssl_session_reset() API. 602 the RSA context. Before, if MBEDTLS_USE_PSA_CRYPTO was enabled and the 603 RSA context was configured for PKCS#1 v2.1 (PSS/OAEP), the sign/verify 614 an opaque RSA context and specifying MBEDTLS_PK_RSASSA_PSS as key type. 1324 * Fix mbedtls_ctr_drbg_free() on an initialized but unseeded context. When [all …]
|
| /optee_os/core/lib/qcbor/ |
| H A D | README.md | 31 context is 176 bytes, decode context is 312 bytes and the
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ssl.h | 5820 const unsigned char *context, const size_t context_len,
|
| /optee_os/ |
| H A D | CHANGELOG.md | 865 * PSCI: pass non-secure context to psci_system_suspend() ([#1916])
|