| /optee_os/ta/pkcs11/src/ |
| H A D | processing.c | 22 static enum pkcs11_rc get_ready_session(struct pkcs11_session *session) in get_ready_session() argument 24 if (session_is_active(session)) in get_ready_session() 90 static enum pkcs11_rc get_active_session(struct pkcs11_session *session, in get_active_session() argument 95 if (session->processing && in get_active_session() 96 func_matches_state(function, session->processing->state)) in get_active_session() 102 void release_active_processing(struct pkcs11_session *session) in release_active_processing() argument 104 if (!session->processing) in release_active_processing() 107 switch (session->processing->mecha_type) { in release_active_processing() 109 tee_release_gcm_operation(session); in release_active_processing() 115 if (session->processing->tee_op_handle != TEE_HANDLE_NULL) { in release_active_processing() [all …]
|
| H A D | object.c | 31 static struct ck_token *get_session_token(void *session); 34 struct pkcs11_session *session) in pkcs11_handle2object() argument 38 object = handle_lookup(get_object_handle_db(session), handle); in pkcs11_handle2object() 53 if (object->token != get_session_token(session)) in pkcs11_handle2object() 60 struct pkcs11_session *session) in pkcs11_object2handle() argument 62 return handle_lookup_handle(get_object_handle_db(session), obj); in pkcs11_object2handle() 67 static struct object_list *get_session_objects(void *session) in get_session_objects() argument 70 struct pkcs11_session *ck_session = session; in get_session_objects() 75 static struct ck_token *get_session_token(void *session) in get_session_token() argument 77 struct pkcs11_session *ck_session = session; in get_session_token() [all …]
|
| H A D | pkcs11_token.c | 53 static void close_ck_session(struct pkcs11_session *session); 71 struct handle_db *get_object_handle_db(struct pkcs11_session *session) in get_object_handle_db() argument 73 return &session->client->object_handle_db; in get_object_handle_db() 76 struct session_list *get_session_list(struct pkcs11_session *session) in get_session_list() argument 78 return &session->client->session_list; in get_session_list() 128 struct pkcs11_session *session = NULL; in unregister_client() local 136 TAILQ_FOREACH_SAFE(session, &client->session_list, link, next) in unregister_client() 137 close_ck_session(session); in unregister_client() 187 enum pkcs11_rc set_processing_state(struct pkcs11_session *session, in set_processing_state() argument 195 if (session->processing) in set_processing_state() [all …]
|
| H A D | pkcs11_token.h | 205 struct handle_db *get_object_handle_db(struct pkcs11_session *session); 270 struct session_list *get_session_list(struct pkcs11_session *session); 278 static inline bool session_is_active(struct pkcs11_session *session) in session_is_active() argument 280 return session->processing; in session_is_active() 283 enum pkcs11_rc set_processing_state(struct pkcs11_session *session, 288 static inline bool pkcs11_session_is_read_write(struct pkcs11_session *session) in pkcs11_session_is_read_write() argument 290 return session->state == PKCS11_CKS_RW_PUBLIC_SESSION || in pkcs11_session_is_read_write() 291 session->state == PKCS11_CKS_RW_USER_FUNCTIONS || in pkcs11_session_is_read_write() 292 session->state == PKCS11_CKS_RW_SO_FUNCTIONS; in pkcs11_session_is_read_write() 295 static inline bool pkcs11_session_is_public(struct pkcs11_session *session) in pkcs11_session_is_public() argument [all …]
|
| H A D | processing.h | 115 void release_active_processing(struct pkcs11_session *session); 129 enum pkcs11_rc init_asymm_operation(struct pkcs11_session *session, 134 enum pkcs11_rc step_asymm_operation(struct pkcs11_session *session, 139 enum pkcs11_rc wrap_data_by_asymm_enc(struct pkcs11_session *session, 143 enum pkcs11_rc unwrap_key_by_asymm(struct pkcs11_session *session, void *data, 152 enum pkcs11_rc init_symm_operation(struct pkcs11_session *session, 157 enum pkcs11_rc step_symm_operation(struct pkcs11_session *session, 165 enum pkcs11_rc derive_key_by_symm_enc(struct pkcs11_session *session, 168 enum pkcs11_rc wrap_data_by_symm_enc(struct pkcs11_session *session, 172 enum pkcs11_rc unwrap_key_by_symm(struct pkcs11_session *session, void *data, [all …]
|
| H A D | processing_aes.c | 115 enum pkcs11_rc tee_ae_decrypt_update(struct pkcs11_session *session, in tee_ae_decrypt_update() argument 118 struct ae_aes_context *ctx = session->processing->extra_ctx; in tee_ae_decrypt_update() 158 res = TEE_AEUpdate(session->processing->tee_op_handle, in tee_ae_decrypt_update() 177 res = TEE_AEUpdate(session->processing->tee_op_handle, in tee_ae_decrypt_update() 198 res = TEE_AEUpdate(session->processing->tee_op_handle, in tee_ae_decrypt_update() 215 res = TEE_AEUpdate(session->processing->tee_op_handle, in tee_ae_decrypt_update() 295 enum pkcs11_rc tee_ae_decrypt_final(struct pkcs11_session *session, in tee_ae_decrypt_final() argument 298 struct ae_aes_context *ctx = session->processing->extra_ctx; in tee_ae_decrypt_final() 321 res = TEE_AEDecryptFinal(session->processing->tee_op_handle, in tee_ae_decrypt_final() 332 res = TEE_AEDecryptFinal(session->processing->tee_op_handle, in tee_ae_decrypt_final() [all …]
|
| H A D | processing_digest.c | 66 allocate_tee_operation(struct pkcs11_session *session, in allocate_tee_operation() argument 72 assert(session->processing->tee_op_handle == TEE_HANDLE_NULL); in allocate_tee_operation() 77 res = TEE_AllocateOperation(&session->processing->tee_op_handle, in allocate_tee_operation() 88 enum pkcs11_rc init_digest_operation(struct pkcs11_session *session, in init_digest_operation() argument 95 rc = allocate_tee_operation(session, proc_params); in init_digest_operation() 97 session->processing->mecha_type = proc_params->id; in init_digest_operation() 111 enum pkcs11_rc step_digest_operation(struct pkcs11_session *session, in step_digest_operation() argument 125 struct active_processing *proc = session->processing; in step_digest_operation()
|
| H A D | processing_symm.c | 199 allocate_tee_operation(struct pkcs11_session *session, in allocate_tee_operation() argument 212 assert(session->processing->tee_op_handle == TEE_HANDLE_NULL && in allocate_tee_operation() 213 session->processing->tee_op_handle2 == TEE_HANDLE_NULL); in allocate_tee_operation() 260 res = TEE_AllocateOperation(&session->processing->tee_op_handle, in allocate_tee_operation() 278 TEE_OperationHandle *hdl = &session->processing->tee_op_handle2; in allocate_tee_operation() 322 static enum pkcs11_rc load_tee_key(struct pkcs11_session *session, in load_tee_key() argument 378 &session->processing->extra_ctx, in load_tee_key() 420 res = TEE_SetOperationKey(session->processing->tee_op_handle, in load_tee_key() 546 init_tee_operation(struct pkcs11_session *session, in init_tee_operation() argument 563 TEE_MACInit(session->processing->tee_op_handle, NULL, 0); in init_tee_operation() [all …]
|
| H A D | object.h | 40 struct pkcs11_session *session); 43 struct pkcs11_session *session); 49 enum pkcs11_rc create_object(void *session, struct obj_attrs *attributes, 55 void destroy_object(struct pkcs11_session *session, 88 void release_session_find_obj_context(struct pkcs11_session *session);
|
| H A D | pkcs11_attributes.h | 138 enum pkcs11_rc check_created_attrs_against_token(struct pkcs11_session *session, 160 enum pkcs11_rc check_access_attrs_against_token(struct pkcs11_session *session, 164 check_mechanism_against_processing(struct pkcs11_session *session, 193 enum pkcs11_rc check_attrs_against_modification(struct pkcs11_session *session,
|
| H A D | processing_asymm.c | 214 allocate_tee_operation(struct pkcs11_session *session, in allocate_tee_operation() argument 225 struct active_processing *processing = session->processing; in allocate_tee_operation() 283 TEE_FreeOperation(session->processing->tee_op_handle2); in allocate_tee_operation() 291 static enum pkcs11_rc load_tee_key(struct pkcs11_session *session, in load_tee_key() argument 387 res = TEE_SetOperationKey(session->processing->tee_op_handle, in load_tee_key() 404 init_tee_operation(struct pkcs11_session *session, in init_tee_operation() argument 409 struct active_processing *proc = session->processing; in init_tee_operation() 443 enum pkcs11_rc init_asymm_operation(struct pkcs11_session *session, in init_asymm_operation() argument 452 rc = allocate_tee_operation(session, function, proc_params, obj); in init_asymm_operation() 456 rc = load_tee_key(session, obj, function); in init_asymm_operation() [all …]
|
| H A D | serializer.c | 161 struct pkcs11_session *session = NULL; in serialargs_get_session_from_handle() local 167 session = pkcs11_handle2session(session_handle, client); in serialargs_get_session_from_handle() 168 if (!session) in serialargs_get_session_from_handle() 171 *sess = session; in serialargs_get_session_from_handle()
|
| /optee_os/core/drivers/crypto/se050/adaptors/apis/ |
| H A D | sss.c | 60 sss_se05x_session_t *session = NULL; in se050_rotate_scp03_keys() local 104 session = &ctx->session; in se050_rotate_scp03_keys() 111 sss_se05x_session_close(session); in se050_rotate_scp03_keys() 115 status = sss_se05x_session_open(session, kType_SSS_SE_SE05x, 0, in se050_rotate_scp03_keys() 124 status = se050_scp03_send_rotate_cmd(&session->s_ctx, &cmd); in se050_rotate_scp03_keys() 149 sss_status_t se050_enable_scp03(sss_se05x_session_t *session) in se050_enable_scp03() argument 165 if (session->subsystem) in se050_enable_scp03() 166 sss_se05x_session_close(session); in se050_enable_scp03() 189 sss_se05x_session_t *session = NULL; in se050_session_open() local 195 session = &ctx->session; in se050_session_open() [all …]
|
| H A D | apdu.c | 446 if (!store || !store->session || !k_object) in se050_key_store_set_rsa_key_bin() 449 if (se050_key_exists(k_object->keyId, &store->session->s_ctx)) in se050_key_store_set_rsa_key_bin() 454 return set_rsa_public(&store->session->s_ctx, in se050_key_store_set_rsa_key_bin() 459 return set_rsa_private_rsa(&store->session->s_ctx, in se050_key_store_set_rsa_key_bin() 464 return set_rsa_private_rsa_crt(&store->session->s_ctx, in se050_key_store_set_rsa_key_bin() 470 return set_rsa_keypair_rsa(&store->session->s_ctx, in se050_key_store_set_rsa_key_bin() 475 return set_rsa_keypair_rsa_crt(&store->session->s_ctx, in se050_key_store_set_rsa_key_bin() 666 if (!store || !store->session || !k_object) in se050_key_store_set_ecc_key_bin() 677 return set_ecc_public(&store->session->s_ctx, in se050_key_store_set_ecc_key_bin() 683 return set_ecc_private(&store->session->s_ctx, in se050_key_store_set_ecc_key_bin() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_tls.c | 456 static int ssl_tls12_session_load(mbedtls_ssl_session *session, 500 static void ssl_clear_peer_cert(mbedtls_ssl_session *session) in ssl_clear_peer_cert() argument 503 if (session->peer_cert != NULL) { in ssl_clear_peer_cert() 504 mbedtls_x509_crt_free(session->peer_cert); in ssl_clear_peer_cert() 505 mbedtls_free(session->peer_cert); in ssl_clear_peer_cert() 506 session->peer_cert = NULL; in ssl_clear_peer_cert() 509 if (session->peer_cert_digest != NULL) { in ssl_clear_peer_cert() 511 mbedtls_free(session->peer_cert_digest); in ssl_clear_peer_cert() 512 session->peer_cert_digest = NULL; in ssl_clear_peer_cert() 513 session->peer_cert_digest_type = MBEDTLS_MD_NONE; in ssl_clear_peer_cert() [all …]
|
| H A D | ssl_tls13_client.c | 685 mbedtls_ssl_session *session = ssl->session_negotiate; in ssl_tls13_has_configured_ticket() local 687 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket() 690 session, MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL)); in ssl_tls13_has_configured_ticket() 696 mbedtls_ssl_session *session = ssl->session_negotiate; in ssl_tls13_early_data_has_valid_ticket() local 698 session->tls_version == MBEDTLS_SSL_VERSION_TLS1_3 && in ssl_tls13_early_data_has_valid_ticket() 699 mbedtls_ssl_tls13_session_ticket_allow_early_data(session) && in ssl_tls13_early_data_has_valid_ticket() 700 mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket() 710 mbedtls_ssl_session *session = ssl->session_negotiate; in ssl_tls13_ticket_get_identity() local 716 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity() 717 *identity = session->ticket; in ssl_tls13_ticket_get_identity() [all …]
|
| H A D | ssl_cache.c | 77 mbedtls_ssl_session *session) in mbedtls_ssl_cache_get() argument 94 ret = mbedtls_ssl_session_load(session, in mbedtls_ssl_cache_get() 95 entry->session, in mbedtls_ssl_cache_get() 121 if (entry->session != NULL) { in ssl_cache_entry_zeroize() 122 mbedtls_zeroize_and_free(entry->session, entry->session_len); in ssl_cache_entry_zeroize() 230 if (cur->session != NULL) { in ssl_cache_pick_writing_slot() 249 const mbedtls_ssl_session *session) in mbedtls_ssl_cache_set() argument 273 ret = mbedtls_ssl_session_save(session, NULL, 0, &session_serialized_len); in mbedtls_ssl_cache_set() 285 ret = mbedtls_ssl_session_save(session, in mbedtls_ssl_cache_set() 300 cur->session = session_serialized; in mbedtls_ssl_cache_set()
|
| H A D | ssl_tls13_server.c | 188 mbedtls_ssl_session *session) in ssl_tls13_offered_psks_check_identity_match_ticket() argument 220 session, in ssl_tls13_offered_psks_check_identity_match_ticket() 255 if (session->tls_version != MBEDTLS_SSL_VERSION_TLS1_3) { in ssl_tls13_offered_psks_check_identity_match_ticket() 263 if (now < session->ticket_creation_time) { in ssl_tls13_offered_psks_check_identity_match_ticket() 267 now, session->ticket_creation_time)); in ssl_tls13_offered_psks_check_identity_match_ticket() 271 server_age = now - session->ticket_creation_time; in ssl_tls13_offered_psks_check_identity_match_ticket() 302 client_age = obfuscated_ticket_age - session->ticket_age_add; in ssl_tls13_offered_psks_check_identity_match_ticket() 321 mbedtls_ssl_session_free(session); in ssl_tls13_offered_psks_check_identity_match_ticket() 336 mbedtls_ssl_session *session) in ssl_tls13_offered_psks_check_identity_match() argument 340 ((void) session); in ssl_tls13_offered_psks_check_identity_match() [all …]
|
| /optee_os/core/drivers/crypto/se050/adaptors/utils/ |
| H A D | info.c | 154 static sss_status_t applet_get_id(sss_se05x_session_t *session, bool display) in applet_get_id() argument 163 ret = Se05x_API_CheckObjectExists(&session->s_ctx, in applet_get_id() 169 ret = Se05x_API_ReadObject(&session->s_ctx, in applet_get_id() 184 ret = Se05x_API_GetVersion(&session->s_ctx, applet_version, in applet_get_id() 207 sss_status_t se050_get_se_info(sss_se05x_session_t *session, bool display) in se050_get_se_info() argument 212 if (session) { in se050_get_se_info() 213 ret = applet_get_id(session, display); in se050_get_se_info() 219 ret = jcop4_get_id(session->s_ctx.conn_ctx, display); in se050_get_se_info()
|
| /optee_os/core/drivers/crypto/se050/ |
| H A D | session.c | 25 status = se050_factory_reset(&se050_ctx.session.s_ctx); in se050_core_early_init() 30 if (se050_ctx.session.subsystem == kType_SSS_SubSystem_NONE) in se050_core_early_init() 37 se050_session = (sss_se05x_session_t *)((void *)&se050_ctx.session); in se050_core_early_init() 96 se050_session = (sss_se05x_session_t *)((void *)&se050_ctx.session); in se050_early_init_scp03()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ssl_cache.h | 58 unsigned char *MBEDTLS_PRIVATE(session); /*!< serialized session */ 102 mbedtls_ssl_session *session); 120 const mbedtls_ssl_session *session);
|
| H A D | ssl.h | 967 mbedtls_ssl_session *session); 989 const mbedtls_ssl_session *session); 1806 … mbedtls_ssl_session *MBEDTLS_PRIVATE(session); /*!< negotiated session data */ 2713 const mbedtls_ssl_session *session, 2743 mbedtls_ssl_session *session, 2782 mbedtls_ssl_session *session, mbedtls_ms_time_t *ticket_creation_time) in mbedtls_ssl_session_get_ticket_creation_time() argument 2784 if (session == NULL || ticket_creation_time == NULL || in mbedtls_ssl_session_get_ticket_creation_time() 2785 session->MBEDTLS_PRIVATE(endpoint) != MBEDTLS_SSL_IS_SERVER) { in mbedtls_ssl_session_get_ticket_creation_time() 2789 *ticket_creation_time = session->MBEDTLS_PRIVATE(ticket_creation_time); in mbedtls_ssl_session_get_ticket_creation_time() 2804 session))[32] in mbedtls_ssl_session_get_id() argument [all …]
|
| /optee_os/lib/libutee/ |
| H A D | user_ta_entry.c | 342 struct ta_session *session; in entry_open_session() local 350 session = ta_header_get_session(session_id); in entry_open_session() 351 if (!session) in entry_open_session() 358 &session->session_ctx); in entry_open_session() 369 struct ta_session *session = ta_header_get_session(session_id); in entry_close_session() local 371 if (!session) in entry_close_session() 374 TA_CloseSessionEntryPoint(session->session_ctx); in entry_close_session() 386 struct ta_session *session = ta_header_get_session(session_id); in entry_invoke_command() local 388 if (!session) in entry_invoke_command() 394 res = TA_InvokeCommandEntryPoint(session->session_ctx, cmd_id, in entry_invoke_command()
|
| H A D | tee_api.c | 321 TEE_TASessionHandle *session, in TEE_OpenTASession() argument 337 __utee_check_out_annotation(session, sizeof(*session)); in TEE_OpenTASession() 362 *session = (TEE_TASessionHandle)(uintptr_t)s; in TEE_OpenTASession() 370 TEE_TASessionHandle *session, in __GP11_TEE_OpenTASession() argument 384 __utee_check_out_annotation(session, sizeof(*session)); in __GP11_TEE_OpenTASession() 409 *session = (TEE_TASessionHandle)(uintptr_t)s; in __GP11_TEE_OpenTASession() 413 void TEE_CloseTASession(TEE_TASessionHandle session) in TEE_CloseTASession() argument 415 if (session != TEE_HANDLE_NULL) { in TEE_CloseTASession() 416 TEE_Result res = _utee_close_ta_session((uintptr_t)session); in TEE_CloseTASession() 423 TEE_Result TEE_InvokeTACommand(TEE_TASessionHandle session, in TEE_InvokeTACommand() argument [all …]
|
| /optee_os/core/drivers/crypto/se050/adaptors/include/ |
| H A D | se050_sss_apis.h | 18 sss_se05x_session_t session; member 36 sss_status_t se050_enable_scp03(sss_se05x_session_t *session);
|