Home
last modified time | relevance | path

Searched refs:private (Results 1 – 3 of 3) sorted by relevance

/optee_os/ta/pkcs11/src/
H A Dpkcs11_attributes.c1560 bool private = true; in check_access_attrs_against_token() local
1568 private = object_is_private(head); in check_access_attrs_against_token()
1574 if (private && (pkcs11_session_is_public(session) || in check_access_attrs_against_token()
1756 struct obj_attrs *private = NULL; in check_created_attrs() local
1770 private = key1; in check_created_attrs()
1780 if (private == key1) in check_created_attrs()
1785 private = key2; in check_created_attrs()
1794 if (get_key_type(private) != get_key_type(public)) in check_created_attrs()
1836 if (private) { in check_created_attrs()
1837 switch (get_key_type(private)) { in check_created_attrs()
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog24 private key. This can be exploited on some Arm-v9 CPUs by an unprivileged
512 gaps made by making its fields private: mbedtls_ecp_set_public_key(),
543 * Add new accessor to expose the private group id member of
557 * Add new accessors to expose the private session-id,
665 * Use heap memory to allocate DER encoded public/private key.
666 This reduces stack usage significantly for writing a public/private
697 * Fix a timing side channel in private key RSA operations. This side channel
789 public and private keys in RFC 8410 format using the existing PK APIs.
992 * Use heap memory to allocate DER encoded RSA private key.
1281 * Add support for opaque keys as the private keys associated to certificates
[all …]
/optee_os/
H A DCHANGELOG.md1414 * Do not consider TA memref parameters as TA private memory