| /optee_os/core/drivers/crypto/se050/adaptors/utils/ |
| H A D | scp_config.c | 324 struct se050_scp_key *keys) in se050_scp03_prepare_rotate_cmd() argument 332 [0] = keys->enc, in se050_scp03_prepare_rotate_cmd() 333 [1] = keys->mac, in se050_scp03_prepare_rotate_cmd() 334 [2] = keys->dek, in se050_scp03_prepare_rotate_cmd() 369 static sss_status_t get_ofid_key(struct se050_scp_key *keys) in get_ofid_key() argument 380 memcpy(keys, &se050_default_keys[id], sizeof(*keys)); in get_ofid_key() 384 static sss_status_t get_config_key(struct se050_scp_key *keys __maybe_unused) in get_config_key() 393 memcpy(keys, ¤t_keys, sizeof(*keys)); in get_config_key() 416 sss_status_t se050_scp03_subkey_derive(struct se050_scp_key *keys) in se050_scp03_subkey_derive() argument 422 [0] = { .name = "dek", .data = keys->dek }, in se050_scp03_subkey_derive() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_ticket.c | 69 mbedtls_ssl_ticket_key *key = ctx->keys + index; in ssl_ticket_gen_key() 123 mbedtls_ssl_ticket_key * const key = ctx->keys + ctx->active; in ssl_ticket_update_keys() 140 if ((status = psa_destroy_key(ctx->keys[ctx->active].key)) != PSA_SUCCESS) { in ssl_ticket_update_keys() 160 mbedtls_ssl_ticket_key * const key = ctx->keys + idx; in mbedtls_ssl_ticket_rotate() 260 ctx->keys[0].alg = alg; in mbedtls_ssl_ticket_setup() 261 ctx->keys[0].key_type = key_type; in mbedtls_ssl_ticket_setup() 262 ctx->keys[0].key_bits = key_bits; in mbedtls_ssl_ticket_setup() 264 ctx->keys[1].alg = alg; in mbedtls_ssl_ticket_setup() 265 ctx->keys[1].key_type = key_type; in mbedtls_ssl_ticket_setup() 266 ctx->keys[1].key_bits = key_bits; in mbedtls_ssl_ticket_setup() [all …]
|
| H A D | aesce.c | 159 block = vaeseq_u8(block, vld1q_u8(keys)); \ 161 keys += 16 167 unsigned char *keys, in aesce_encrypt_block() argument 189 block = vaeseq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block() 190 keys += 16; in aesce_encrypt_block() 195 block = veorq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block() 222 block = vaesdq_u8(block, vld1q_u8(keys)); \ 224 keys += 16 230 unsigned char *keys, in aesce_decrypt_block() argument 252 block = vaesdq_u8(block, vld1q_u8(keys)); in aesce_decrypt_block() [all …]
|
| H A D | psa_crypto_cipher.c | 311 uint8_t keys[24]; in psa_cipher_setup() local 312 memcpy(keys, key_buffer, 16); in psa_cipher_setup() 313 memcpy(keys + 16, key_buffer, 8); in psa_cipher_setup() 315 keys, in psa_cipher_setup()
|
| H A D | ssl_tls13_keys.c | 269 mbedtls_ssl_key_set *keys) in mbedtls_ssl_tls13_make_traffic_keys() argument 275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 276 keys->client_write_iv, iv_len); in mbedtls_ssl_tls13_make_traffic_keys() 283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 284 keys->server_write_iv, iv_len); in mbedtls_ssl_tls13_make_traffic_keys() 289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys() 290 keys->iv_len = iv_len; in mbedtls_ssl_tls13_make_traffic_keys()
|
| H A D | ssl_tls13_keys.h | 155 mbedtls_ssl_key_set *keys);
|
| /optee_os/core/drivers/crypto/se050/adaptors/apis/ |
| H A D | user.c | 34 struct se050_scp_key *keys, in prepare_host_scp() argument 56 len = sizeof(keys->enc); in prepare_host_scp() 58 keys->enc, len, len * 8, NULL, 0); in prepare_host_scp() 66 len = sizeof(keys->mac); in prepare_host_scp() 68 keys->mac, len, len * 8, NULL, 0); in prepare_host_scp() 76 len = sizeof(keys->dek); in prepare_host_scp() 78 keys->dek, len, len * 8, NULL, 0); in prepare_host_scp() 98 struct se050_scp_key *keys) in se050_configure_host() argument 123 keys, host_oid); in se050_configure_host()
|
| H A D | sss.c | 151 struct se050_scp_key keys = { }; in se050_enable_scp03() local 161 status = se050_scp03_get_keys(&keys, key_src[i]); in se050_enable_scp03() 168 if (!se050_core_early_init(&keys)) { in se050_enable_scp03()
|
| /optee_os/core/drivers/crypto/se050/adaptors/include/ |
| H A D | se050_utils.h | 53 sss_status_t se050_scp03_get_current_keys(struct se050_scp_key *keys); 54 sss_status_t se050_scp03_get_keys(struct se050_scp_key *keys, 56 sss_status_t se050_scp03_subkey_derive(struct se050_scp_key *keys); 59 struct se050_scp_key *keys);
|
| H A D | se050_user_apis.h | 21 struct se050_scp_key *keys);
|
| H A D | se050.h | 39 TEE_Result se050_core_early_init(struct se050_scp_key *keys);
|
| /optee_os/core/drivers/crypto/se050/ |
| H A D | session.c | 16 TEE_Result se050_core_early_init(struct se050_scp_key *keys) in se050_core_early_init() argument 20 status = se050_session_open(&se050_ctx, keys); in se050_core_early_init()
|
| /optee_os/ta/ |
| H A D | ta.mk | 192 ta-keys := $(TA_SIGN_KEY) 195 ifeq ($(TA_SIGN_KEY),keys/default_ta.pem) 196 ta-keys += keys/default.pem 199 $(foreach f, $(ta-keys), \ 200 $(eval $(call copy-file, $(f), $(out-dir)/export-$(sm)/keys)))
|
| H A D | link_shlib.mk | 7 TA_SIGN_KEY ?= $(TA_DEV_KIT_DIR)/keys/default_ta.pem
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | thread.c | 254 threads[n].regs.apiakey_hi = threads[n].keys.apia_hi; in __thread_alloc_and_run() 255 threads[n].regs.apiakey_lo = threads[n].keys.apia_lo; in __thread_alloc_and_run() 947 struct thread_pauth_keys *keys __maybe_unused) in set_ctx_regs() 973 assert(keys); in set_ctx_regs() 974 regs->apiakey_hi = keys->apia_hi; in set_ctx_regs() 975 regs->apiakey_lo = keys->apia_lo; in set_ctx_regs() 990 return &utc->uctx.keys; in thread_get_pauth_keys() 994 return &spc->uctx.keys; in thread_get_pauth_keys() 1012 struct thread_pauth_keys *keys = NULL; in thread_enter_user_mode() local 1016 keys = thread_get_pauth_keys(); in thread_enter_user_mode() [all …]
|
| H A D | asm-defines.c | 87 DEFINE(THREAD_CTX_KEYS, offsetof(struct thread_ctx, keys)); 124 offsetof(struct thread_core_local, keys));
|
| /optee_os/core/include/kernel/ |
| H A D | user_mode_ctx_struct.h | 42 struct thread_pauth_keys keys; member
|
| H A D | thread_private.h | 46 struct thread_pauth_keys keys; member
|
| /optee_os/core/arch/arm/dts/ |
| H A D | stm32mp15xx-dhcom-pdk2.dtsi | 34 gpio-keys-polled { 35 compatible = "gpio-keys-polled"; 66 gpio-keys { 67 compatible = "gpio-keys";
|
| /optee_os/scripts/ |
| H A D | gen_tee_bin.py | 89 if symbol_name not in elffile_symbols.keys(): 91 if symbol_name not in lsyms_def.keys(): 96 if name in lsyms_def.keys() and lsyms_def[name] > 1: 99 if name not in elffile_symbols.keys():
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ssl_ticket.h | 72 mbedtls_ssl_ticket_key MBEDTLS_PRIVATE(keys)[2]; /*!< ticket protection keys */
|
| /optee_os/core/kernel/ |
| H A D | thread.c | 675 if (crypto_rng_read(&threads[n].keys, sizeof(threads[n].keys))) in thread_init_thread_pauth_keys() 685 if (crypto_rng_read(&tcl[n].keys, sizeof(tcl[n].keys))) in thread_init_core_local_pauth_keys()
|
| H A D | user_ta.c | 482 res = crypto_rng_read(&utc->uctx.keys, sizeof(utc->uctx.keys)); in tee_ta_init_user_ta_session()
|
| /optee_os/mk/ |
| H A D | lib.mk | 49 TA_SIGN_KEY ?= keys/default_ta.pem
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 7 client and server to extract additional shared symmetric keys from an SSL 56 keys, which could be used by an attacker capable of feeding encrypted 57 PEM keys to a user. This could cause a crash or information disclosure. 87 keys with a different LMS or LM-OTS types on some platforms. Specifically, 128 uses static storage for keys, enabling malloc-less use of key slots. 143 if they use certificate authentication (i.e. not pre-shared keys). 193 * Improve performance of PSA key generation with ECC keys: it no longer 278 the number of volatile PSA keys is virtually unlimited, at the expense 332 * Fix interference between PSA volatile keys and built-in keys 336 to persistent keys. Resolves #9253. [all …]
|