| /optee_os/core/kernel/ |
| H A D | huk_subkey.c | 13 static TEE_Result mac_usage(void *ctx, uint32_t usage) in mac_usage() argument 15 return crypto_mac_update(ctx, (const void *)&usage, sizeof(usage)); in mac_usage() 37 static TEE_Result huk_compat(void *ctx, enum huk_subkey_usage usage) in huk_compat() argument 43 switch (usage) { in huk_compat() 55 return mac_usage(ctx, usage); in huk_compat() 61 TEE_Result __huk_subkey_derive(enum huk_subkey_usage usage, in __huk_subkey_derive() argument 87 res = huk_compat(ctx, usage); in __huk_subkey_derive() 89 res = mac_usage(ctx, usage); in __huk_subkey_derive() 109 TEE_Result huk_subkey_derive(enum huk_subkey_usage usage,
|
| /optee_os/core/include/kernel/ |
| H A D | huk_subkey.h | 58 TEE_Result huk_subkey_derive(enum huk_subkey_usage usage, 61 TEE_Result __huk_subkey_derive(enum huk_subkey_usage usage,
|
| /optee_os/scripts/ |
| H A D | gen_ld_sects.py | 11 def usage(): function 19 usage()
|
| H A D | ftrace_format.py | 24 def usage(): function 65 usage()
|
| H A D | gen_compile_commands.py | 43 usage = 'Creates a compile_commands.json database from OP-TEE .cmd files' 44 parser = argparse.ArgumentParser(description=usage)
|
| H A D | sign_rproc_fw.py | 300 usage='\n %(prog)s [ arguments ]\n\n'
|
| /optee_os/core/tee/ |
| H A D | tee_pobj.c | 80 uint32_t flags, enum tee_pobj_usage usage, in tee_pobj_get() argument 101 if (usage == TEE_POBJ_USAGE_ENUM) { in tee_pobj_get() 105 if ((*obj)->creating || (usage == TEE_POBJ_USAGE_CREATE && in tee_pobj_get() 128 if (usage == TEE_POBJ_USAGE_CREATE) { in tee_pobj_get()
|
| H A D | tee_svc_storage.c | 820 TEE_Result tee_svc_storage_write_usage(struct tee_obj *o, uint32_t usage) in tee_svc_storage_write_usage() argument 824 return o->pobj->fops->write(o->fh, pos, &usage, NULL, sizeof(usage)); in tee_svc_storage_write_usage()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | pk.c | 244 psa_key_usage_t usage) in mbedtls_pk_can_do_ext() argument 265 if (usage == 0 || in mbedtls_pk_can_do_ext() 266 (usage & ~(PSA_KEY_USAGE_SIGN_HASH | in mbedtls_pk_can_do_ext() 311 return (key_usage & usage) == usage; in mbedtls_pk_can_do_ext() 334 if ((key_usage & usage) != usage) { in mbedtls_pk_can_do_ext() 401 psa_key_usage_t usage, in mbedtls_pk_get_psa_attributes() argument 406 psa_key_usage_t more_usage = usage; in mbedtls_pk_get_psa_attributes() 407 if (usage == PSA_KEY_USAGE_SIGN_MESSAGE) { in mbedtls_pk_get_psa_attributes() 409 } else if (usage == PSA_KEY_USAGE_SIGN_HASH) { in mbedtls_pk_get_psa_attributes() 411 } else if (usage == PSA_KEY_USAGE_DECRYPT) { in mbedtls_pk_get_psa_attributes() [all …]
|
| H A D | psa_crypto_storage.c | 250 MBEDTLS_PUT_UINT32_LE(attr->policy.usage, storage_format->policy, 0); in psa_format_key_data_for_storage() 310 attr->policy.usage = MBEDTLS_GET_UINT32_LE(storage_format->policy, 0); in psa_parse_key_data_from_storage()
|
| H A D | psa_crypto.c | 1072 policy->usage &= constraint->usage; in psa_restrict_key_policy() 1100 psa_key_usage_t usage, in psa_get_and_lock_key_slot_with_policy() argument 1117 usage &= ~PSA_KEY_USAGE_EXPORT; in psa_get_and_lock_key_slot_with_policy() 1120 if ((slot->attr.policy.usage & usage) != usage) { in psa_get_and_lock_key_slot_with_policy() 1166 psa_key_usage_t usage, in psa_get_and_lock_transparent_key_slot_with_policy() argument 1170 usage, alg); in psa_get_and_lock_transparent_key_slot_with_policy() 1675 if ((policy->usage & ~(PSA_KEY_USAGE_EXPORT | in psa_validate_key_policy() 4448 psa_key_usage_t usage = (cipher_operation == MBEDTLS_ENCRYPT ? in psa_cipher_setup() local 4463 status = psa_get_and_lock_key_slot_with_policy(key, &slot, usage, alg); in psa_cipher_setup()
|
| /optee_os/ta/pkcs11/scripts/ |
| H A D | verify-helpers.sh | 56 usage() { function 77 usage
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_struct.h | 269 psa_key_usage_t MBEDTLS_PRIVATE(usage); 398 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(usage) = usage_flags; in psa_set_key_usage_flags() 404 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(usage); in psa_get_key_usage_flags()
|
| /optee_os/core/include/tee/ |
| H A D | tee_pobj.h | 36 uint32_t flags, enum tee_pobj_usage usage,
|
| H A D | tee_svc_storage.h | 63 TEE_Result tee_svc_storage_write_usage(struct tee_obj *o, uint32_t usage);
|
| H A D | tee_svc_cryp.h | 17 unsigned long usage);
|
| /optee_os/core/arch/arm/dts/ |
| H A D | stm32mp15xx-dhcom-pdk2.dtsi | 155 /* spare dmas for other usage */ 166 /* spare dmas for other usage */ 266 /* spare dmas for other usage (un-delete to enable pwm capture) */
|
| H A D | stm32mp157c-ed1.dts | 189 /* spare dmas for other usage */ 411 /* spare dmas for other usage */
|
| H A D | stm32mp15xx-dkx.dtsi | 253 /* spare dmas for other usage */ 433 /* spare dmas for other usage */ 584 /* spare dmas for other usage */
|
| H A D | stm32mp157c-ev1.dts | 297 /* spare dmas for other usage (un-delete to enable pwm capture) */
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | pk.h | 487 psa_key_usage_t usage); 601 psa_key_usage_t usage,
|
| H A D | x509_crt.h | 843 unsigned int usage);
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | stm32_saes.c | 1286 TEE_Result huk_subkey_derive(enum huk_subkey_usage usage, in huk_subkey_derive() argument 1299 return __huk_subkey_derive(usage, const_data, const_data_len, in huk_subkey_derive() 1303 input = malloc(const_data_len + sizeof(separator) + sizeof(usage) + in huk_subkey_derive() 1317 memcpy(input + input_index, &usage, sizeof(usage)); in huk_subkey_derive() 1318 input_index += sizeof(usage); in huk_subkey_derive()
|
| /optee_os/lib/libutee/include/ |
| H A D | utee_syscalls.h | 108 unsigned long usage);
|
| /optee_os/core/lib/libfdt/ |
| H A D | README.license | 25 encourage widespread and correct usage of flattened device trees,
|