Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 41) sorted by relevance

12

/optee_os/core/drivers/crypto/se050/adaptors/utils/
H A Dscp_config.c324 struct se050_scp_key *keys) in se050_scp03_prepare_rotate_cmd() argument
332 [0] = keys->enc, in se050_scp03_prepare_rotate_cmd()
333 [1] = keys->mac, in se050_scp03_prepare_rotate_cmd()
334 [2] = keys->dek, in se050_scp03_prepare_rotate_cmd()
369 static sss_status_t get_ofid_key(struct se050_scp_key *keys) in get_ofid_key() argument
380 memcpy(keys, &se050_default_keys[id], sizeof(*keys)); in get_ofid_key()
384 static sss_status_t get_config_key(struct se050_scp_key *keys __maybe_unused) in get_config_key()
393 memcpy(keys, &current_keys, sizeof(*keys)); in get_config_key()
416 sss_status_t se050_scp03_subkey_derive(struct se050_scp_key *keys) in se050_scp03_subkey_derive() argument
422 [0] = { .name = "dek", .data = keys->dek }, in se050_scp03_subkey_derive()
[all …]
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dssl_ticket.c69 mbedtls_ssl_ticket_key *key = ctx->keys + index; in ssl_ticket_gen_key()
123 mbedtls_ssl_ticket_key * const key = ctx->keys + ctx->active; in ssl_ticket_update_keys()
140 if ((status = psa_destroy_key(ctx->keys[ctx->active].key)) != PSA_SUCCESS) { in ssl_ticket_update_keys()
160 mbedtls_ssl_ticket_key * const key = ctx->keys + idx; in mbedtls_ssl_ticket_rotate()
260 ctx->keys[0].alg = alg; in mbedtls_ssl_ticket_setup()
261 ctx->keys[0].key_type = key_type; in mbedtls_ssl_ticket_setup()
262 ctx->keys[0].key_bits = key_bits; in mbedtls_ssl_ticket_setup()
264 ctx->keys[1].alg = alg; in mbedtls_ssl_ticket_setup()
265 ctx->keys[1].key_type = key_type; in mbedtls_ssl_ticket_setup()
266 ctx->keys[1].key_bits = key_bits; in mbedtls_ssl_ticket_setup()
[all …]
H A Daesce.c159 block = vaeseq_u8(block, vld1q_u8(keys)); \
161 keys += 16
167 unsigned char *keys, in aesce_encrypt_block() argument
189 block = vaeseq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block()
190 keys += 16; in aesce_encrypt_block()
195 block = veorq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block()
222 block = vaesdq_u8(block, vld1q_u8(keys)); \
224 keys += 16
230 unsigned char *keys, in aesce_decrypt_block() argument
252 block = vaesdq_u8(block, vld1q_u8(keys)); in aesce_decrypt_block()
[all …]
H A Dpsa_crypto_cipher.c311 uint8_t keys[24]; in psa_cipher_setup() local
312 memcpy(keys, key_buffer, 16); in psa_cipher_setup()
313 memcpy(keys + 16, key_buffer, 8); in psa_cipher_setup()
315 keys, in psa_cipher_setup()
H A Dssl_tls13_keys.c269 mbedtls_ssl_key_set *keys) in mbedtls_ssl_tls13_make_traffic_keys() argument
275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
276 keys->client_write_iv, iv_len); in mbedtls_ssl_tls13_make_traffic_keys()
283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
284 keys->server_write_iv, iv_len); in mbedtls_ssl_tls13_make_traffic_keys()
289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys()
290 keys->iv_len = iv_len; in mbedtls_ssl_tls13_make_traffic_keys()
H A Dssl_tls13_keys.h155 mbedtls_ssl_key_set *keys);
/optee_os/core/drivers/crypto/se050/adaptors/apis/
H A Duser.c34 struct se050_scp_key *keys, in prepare_host_scp() argument
56 len = sizeof(keys->enc); in prepare_host_scp()
58 keys->enc, len, len * 8, NULL, 0); in prepare_host_scp()
66 len = sizeof(keys->mac); in prepare_host_scp()
68 keys->mac, len, len * 8, NULL, 0); in prepare_host_scp()
76 len = sizeof(keys->dek); in prepare_host_scp()
78 keys->dek, len, len * 8, NULL, 0); in prepare_host_scp()
98 struct se050_scp_key *keys) in se050_configure_host() argument
123 keys, host_oid); in se050_configure_host()
H A Dsss.c151 struct se050_scp_key keys = { }; in se050_enable_scp03() local
161 status = se050_scp03_get_keys(&keys, key_src[i]); in se050_enable_scp03()
168 if (!se050_core_early_init(&keys)) { in se050_enable_scp03()
/optee_os/core/drivers/crypto/se050/adaptors/include/
H A Dse050_utils.h53 sss_status_t se050_scp03_get_current_keys(struct se050_scp_key *keys);
54 sss_status_t se050_scp03_get_keys(struct se050_scp_key *keys,
56 sss_status_t se050_scp03_subkey_derive(struct se050_scp_key *keys);
59 struct se050_scp_key *keys);
H A Dse050_user_apis.h21 struct se050_scp_key *keys);
H A Dse050.h39 TEE_Result se050_core_early_init(struct se050_scp_key *keys);
/optee_os/core/drivers/crypto/se050/
H A Dsession.c16 TEE_Result se050_core_early_init(struct se050_scp_key *keys) in se050_core_early_init() argument
20 status = se050_session_open(&se050_ctx, keys); in se050_core_early_init()
/optee_os/ta/
H A Dta.mk192 ta-keys := $(TA_SIGN_KEY)
195 ifeq ($(TA_SIGN_KEY),keys/default_ta.pem)
196 ta-keys += keys/default.pem
199 $(foreach f, $(ta-keys), \
200 $(eval $(call copy-file, $(f), $(out-dir)/export-$(sm)/keys)))
H A Dlink_shlib.mk7 TA_SIGN_KEY ?= $(TA_DEV_KIT_DIR)/keys/default_ta.pem
/optee_os/core/arch/arm/kernel/
H A Dthread.c254 threads[n].regs.apiakey_hi = threads[n].keys.apia_hi; in __thread_alloc_and_run()
255 threads[n].regs.apiakey_lo = threads[n].keys.apia_lo; in __thread_alloc_and_run()
947 struct thread_pauth_keys *keys __maybe_unused) in set_ctx_regs()
973 assert(keys); in set_ctx_regs()
974 regs->apiakey_hi = keys->apia_hi; in set_ctx_regs()
975 regs->apiakey_lo = keys->apia_lo; in set_ctx_regs()
990 return &utc->uctx.keys; in thread_get_pauth_keys()
994 return &spc->uctx.keys; in thread_get_pauth_keys()
1012 struct thread_pauth_keys *keys = NULL; in thread_enter_user_mode() local
1016 keys = thread_get_pauth_keys(); in thread_enter_user_mode()
[all …]
H A Dasm-defines.c87 DEFINE(THREAD_CTX_KEYS, offsetof(struct thread_ctx, keys));
124 offsetof(struct thread_core_local, keys));
/optee_os/core/include/kernel/
H A Duser_mode_ctx_struct.h42 struct thread_pauth_keys keys; member
H A Dthread_private.h46 struct thread_pauth_keys keys; member
/optee_os/core/arch/arm/dts/
H A Dstm32mp15xx-dhcom-pdk2.dtsi34 gpio-keys-polled {
35 compatible = "gpio-keys-polled";
66 gpio-keys {
67 compatible = "gpio-keys";
/optee_os/scripts/
H A Dgen_tee_bin.py89 if symbol_name not in elffile_symbols.keys():
91 if symbol_name not in lsyms_def.keys():
96 if name in lsyms_def.keys() and lsyms_def[name] > 1:
99 if name not in elffile_symbols.keys():
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dssl_ticket.h72 mbedtls_ssl_ticket_key MBEDTLS_PRIVATE(keys)[2]; /*!< ticket protection keys */
/optee_os/core/kernel/
H A Dthread.c675 if (crypto_rng_read(&threads[n].keys, sizeof(threads[n].keys))) in thread_init_thread_pauth_keys()
685 if (crypto_rng_read(&tcl[n].keys, sizeof(tcl[n].keys))) in thread_init_core_local_pauth_keys()
H A Duser_ta.c482 res = crypto_rng_read(&utc->uctx.keys, sizeof(utc->uctx.keys)); in tee_ta_init_user_ta_session()
/optee_os/mk/
H A Dlib.mk49 TA_SIGN_KEY ?= keys/default_ta.pem
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog7 client and server to extract additional shared symmetric keys from an SSL
56 keys, which could be used by an attacker capable of feeding encrypted
57 PEM keys to a user. This could cause a crash or information disclosure.
87 keys with a different LMS or LM-OTS types on some platforms. Specifically,
128 uses static storage for keys, enabling malloc-less use of key slots.
143 if they use certificate authentication (i.e. not pre-shared keys).
193 * Improve performance of PSA key generation with ECC keys: it no longer
278 the number of volatile PSA keys is virtually unlimited, at the expense
332 * Fix interference between PSA volatile keys and built-in keys
336 to persistent keys. Resolves #9253.
[all …]

12