| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | .uncrustify.cfg | 7 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 21 # Spaces-only indentation 29 # Line-up strings broken by '\' 32 # Braces on the same line (Egyptian-style braces) 43 # Braces on same line as keywords that follow them - 'else' and the 'while' in 'do {} while ()'; 47 sp_brace_else = add 52 nl_fcall_brace = add 53 nl_fdef_brace = add 59 sp_assign = add 61 # Remove spaces around the preprocessor '##' token-concatenate [all …]
|
| H A D | ChangeLog | 3 = Mbed TLS 3.6.4 branch released 2025-06-30 6 * Add the function mbedtls_ssl_export_keying_material() which allows the 8 session, according to the TLS-Exporter specification in RFC 8446 and 5705. 15 CVE-2025-49601 19 CVE-2025-49600 30 CVE-2025-52496 31 * Fix possible use-after-free or double-free in code calling 36 they were free()d, resulting in high risk of use-after-free or double-free, 39 were affected (use-after-free if the san string contains more than one DN). 42 CVE-2025-47917 [all …]
|
| /optee_os/core/arch/riscv/kernel/ |
| H A D | entry.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 4 * Copyright 2022-2023 NXP 8 #include <generated/asm-defines.h> 32 * stack_tmp + (hart_index + 1) * stack_tmp_stride - STACK_TMP_GUARD 44 add t0, t0, t2 45 add sp, t1, t0 53 add t1, t1, t0 66 add tp, tp, t2 89 addi t1, t1, -1 113 * a0 - if non-NULL holds the hart ID [all …]
|
| /optee_os/core/arch/arm/sm/ |
| H A D | sm_a32.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2016-2020, Linaro Limited 10 #include <generated/asm-defines.h> 99 push {r0-r7} 103 /* Find out if we're doing an secure or non-secure entry */ 116 add r0, sp, #SM_CTX_SEC 120 * On FIQ exit we're restoring the non-secure context unchanged, on 121 * all other exits we're shifting r1-r4 from secure context into 122 * r0-r3 in non-secure context. 124 add r8, sp, #(SM_CTX_SEC + SM_SEC_CTX_R0) [all …]
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | entry_a32.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2014-2025, Linaro Limited 4 * Copyright (c) 2021-2023, Arm Limited 10 #include <generated/asm-defines.h> 42 push { r4-r6, lr } 62 1: pop { r4-r6, pc } 125 add r0, r0, #4 139 * Setup required by current implementation of the OP-TEE core: 140 * - Disable data and instruction cache. 141 * - MMU is expected off and exceptions trapped in ARM mode. [all …]
|
| H A D | entry_a64.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2015-2025, Linaro Limited 4 * Copyright (c) 2021-2023, Arm Limited 12 #include <generated/asm-defines.h> 26 * stack_tmp + (cpu_id + 1) * stack_tmp_stride - STACK_TMP_GUARD 34 add x0, x0, #1 39 /* x0 = stack_tmp - STACK_TMP_GUARD */ 42 add x0, x0, x2 45 add sp, x1, x0 202 add x2, x2, x4 /* length of init and hashes etc */ [all …]
|
| H A D | cache_helpers_a64.S | 3 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved. 5 * SPDX-License-Identifier: BSD-3-Clause 30 add x1, x0, x1 35 add x0, x0, x2 41 /* ------------------------------------------ 44 * ------------------------------------------ 50 /* ------------------------------------------ 53 * ------------------------------------------ 59 /* ------------------------------------------ 62 * ------------------------------------------ [all …]
|
| H A D | misc_a64.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 37 * as follows AFF2 -> cluster, AFF1 -> core, AFF0 -> thread 43 add x0, x0, x1, LSL #(CFG_CORE_CLUSTER_SHIFT) 52 add x1, x1, x2, LSL #(CFG_CORE_CLUSTER_SHIFT) 53 add x0, x0, x1, LSL #(CFG_CORE_THREAD_SHIFT)
|
| H A D | cache_helpers_a32.S | 5 * SPDX-License-Identifier: BSD-3-Clause 35 add r1, r0, r1 40 add r0, r0, r2 47 /* ------------------------------------------ 50 * ------------------------------------------ 56 /* ------------------------------------------ 59 * ------------------------------------------ 65 /* ------------------------------------------ 68 * ------------------------------------------ 75 /* ------------------------------------------ [all …]
|
| /optee_os/ldelf/ |
| H A D | start_rv64.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 10 * _ldelf_start() - Entry of ldelf 20 * read/write memory, leaving read-only and executable memory 27 add a2, a2, a1 28 add a3, a3, a1 44 add t1, a1, t1 46 add t4, t4, t3 47 add t4, t4, a1 58 .word __reloc_begin - reloc_begin_rel 60 .word __reloc_end - reloc_end_rel
|
| H A D | start_a32.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 11 * _start() - Entry of ldelf 21 * read/write memory, leaving read-only and executeble memory 27 add r5, r5, r4 28 add r6, r6, r4 35 1: ldmia r5!, {r7-r8} /* r7 == r_offset, r8 = r_info */ 42 add r7, r7, r4 44 add r8, r8, r4 56 .word __reloc_begin - reloc_begin_rel 58 .word __reloc_end - reloc_end_rel
|
| H A D | start_a64.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 11 * _start() - Entry of ldelf 21 * in read/write memory, leaving read-only and executeble memory 27 add x5, x5, x4 28 add x6, x6, x4 46 add x7, x7, x4 47 add x9, x9, x4 59 .word __reloc_begin - reloc_begin_rel 61 .word __reloc_end - reloc_end_rel
|
| /optee_os/core/lib/qcbor/inc/qcbor/ |
| H A D | qcbor_encode.h | 1 // SPDX-License-Identifier: BSD-3-Clause 3 * Copyright (c) 2016-2018, The Linux Foundation. 4 * Copyright (c) 2018-2024, Laurence Lundblade. 24 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT 60 * This implements CBOR -- Concise Binary Object Representation as 62 * information is at http://cbor.io. This is a near-complete implementation of 68 * and @ref SpiffyDecode for general discussion on the easier-to-use 85 * Decoding of indefinite-length strings is a special case that requires 88 * indefinite-length string is encountered (indefinite-length maps and 90 * allocator called MemPool is built-in and will work if supplied with a [all …]
|
| /optee_os/scripts/ |
| H A D | sign_rproc_fw.py | 2 # SPDX-License-Identifier: BSD-2-Clause 42 # -----+-------------+ 43 # / | Magic | 32-bit word, magic value equal to 44 # / +-------------+ 0x3543A468 45 # / +-------------+ 46 # / | version | 32-bit word, version of the format 47 # / +-------------+ 48 # +-----------+ +-------------+ 49 # | Header | | TLV size | 32-bit word, size of the TLV 50 # +-----------+ +-------------+ (aligned on 64-bit), in bytes. [all …]
|
| /optee_os/core/lib/libtomcrypt/src/encauth/eax/ |
| H A D | eax_addheader.c | 1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */ 2 /* SPDX-License-Identifier: Unlicense */ 5 EAX implementation, add meta-data, by Tom St Denis 12 add header (metadata) to the stream 14 @param header The header (meta-data) data you wish to add to the state 23 return omac_process(&eax->headeromac, header, length); in eax_addheader()
|
| /optee_os/core/arch/riscv/ |
| H A D | riscv.mk | 3 arch-bits-core := 64 5 arch-bits-core := 32 7 CROSS_COMPILE_core := $(CROSS_COMPILE$(arch-bits-core)) 12 # Defines the cc-option macro using the compiler set for the core module 13 include mk/cc-option.mk 21 CFG_KERN_LINKER_FORMAT ?= elf64-littleriscv 25 CFG_KERN_LINKER_FORMAT ?= elf32-littleriscv 40 # CFG_WITH_LPAE is ARM-related flag, however, it is used by core code. 47 # Paged virtual-memory schemes (SvXX) 52 $(call cfg-check-value,RISCV_MMU_MODE,39 48 57) [all …]
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ltc_ecc_mulmod.c | 1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */ 2 /* SPDX-License-Identifier: Unlicense */ 50 /* for curves with a == -3 keep ma == NULL */ in ltc_ecc_mulmod() 78 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 79 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 80 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 93 if ((err = ltc_mp.ecc_ptadd(M[j-9], tG, M[j-8], ma, modulus, mp)) != CRYPT_OK) { goto done; } in ltc_ecc_mulmod() 100 digidx = mp_get_digit_count(k) - 1; in ltc_ecc_mulmod() 107 if (--bitcnt == 0) { in ltc_ecc_mulmod() 108 if (digidx == -1) { in ltc_ecc_mulmod() [all …]
|
| /optee_os/core/arch/arm/crypto/ |
| H A D | sha1_armv8a_ce_a64.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2014-2020, Linaro Limited 7 /* SHA-1 secure hash using ARMv8 Crypto Extensions */ 11 .arch armv8-a+crypto 35 add t1.4s, v\s0\().4s, \rc\().4s 44 add t0.4s, v\s0\().4s, \rc\().4s 73 0: ld1 {v8.16b-v11.16b}, [x1], #64 81 1: add t0.4s, v8.4s, k0.4s 109 add dgbv.2s, dgbv.2s, dg1v.2s 110 add dgav.4s, dgav.4s, dg0v.4s
|
| H A D | sha256_armv8a_ce_a64.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2015-2020, Linaro Limited 7 /* Core SHA-224/SHA-256 transform using v8 Crypto Extensions */ 11 .arch armv8-a+crypto 31 add t1.4s, v\s0\().4s, \rc\().4s 36 add t0.4s, v\s0\().4s, \rc\().4s 57 ld1 { v0.4s- v3.4s}, [x8], #64 58 ld1 { v4.4s- v7.4s}, [x8], #64 59 ld1 { v8.4s-v11.4s}, [x8], #64 60 ld1 {v12.4s-v15.4s}, [x8] [all …]
|
| /optee_os/core/arch/arm/plat-d06/ |
| H A D | core_pos_a64.S | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 34 add x5, x5, x4 41 add x5, x5, x3 43 add x5, x5, x2
|
| /optee_os/core/lib/libtomcrypt/src/encauth/ccm/ |
| H A D | ccm_add_aad.c | 1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */ 2 /* SPDX-License-Identifier: Unlicense */ 8 Add AAD to the CCM state 10 @param adata The additional authentication data to add to the CCM state 23 if (ccm->aadlen < ccm->current_aadlen + adatalen) { in ccm_add_aad() 26 ccm->current_aadlen += adatalen; in ccm_add_aad() 28 /* now add the data */ in ccm_add_aad() 30 if (ccm->x == 16) { in ccm_add_aad() 32 …if ((err = cipher_descriptor[ccm->cipher]->ecb_encrypt(ccm->PAD, ccm->PAD, &ccm->K)) != CRYPT_OK) { in ccm_add_aad() 35 ccm->x = 0; in ccm_add_aad() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ccm.c | 2 * NIST SP800-38C compliant CCM implementation 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 10 * http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf 11 * RFC 3610 "Counter with CBC-MAC (CCM)" 60 mbedtls_block_cipher_free(&ctx->block_cipher_ctx); in mbedtls_ccm_setkey() 62 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_ccm_setkey() 66 if ((ret = mbedtls_block_cipher_setkey(&ctx->block_cipher_ctx, key, keybits)) != 0) { in mbedtls_ccm_setkey() 82 mbedtls_cipher_free(&ctx->cipher_ctx); in mbedtls_ccm_setkey() 84 if ((ret = mbedtls_cipher_setup(&ctx->cipher_ctx, cipher_info)) != 0) { in mbedtls_ccm_setkey() 88 if ((ret = mbedtls_cipher_setkey(&ctx->cipher_ctx, key, keybits, in mbedtls_ccm_setkey() [all …]
|
| H A D | psa_crypto_driver_wrappers.h | 4 * Warning: This file is now auto-generated. 7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 11 /* BEGIN-common headers */ 24 /* END-common headers */ 28 /* BEGIN-driver headers */ 41 #include "../3rdparty/p256-m/p256-m_driver_entrypoints.h" 45 /* END-driver headers */ 47 /* Auto-generated values depending on which drivers are registered. 50 /* BEGIN-driver id definition */ 56 /* END-driver id */ [all …]
|
| /optee_os/core/pta/veraison_attestation/ |
| H A D | cbor.c | 1 // SPDX-License-Identifier: BSD-2-Clause 140 * Format of to-be-signed bytes. This is defined in COSE (RFC 8152) 171 encode_tbs_structure(context, tbs_args->protected_header, tbs_args->aad, in encode_tbs_structure_wrapper() 172 tbs_args->payload); in encode_tbs_structure_wrapper() 201 /* Add top level array for COSE_Sign1 */ in encode_cose_evidence() 212 /* Add protected header */ in encode_cose_evidence() 215 /* Add unprotected header (empty map) */ in encode_cose_evidence() 219 /* Add the payload (evidence CBOR) */ in encode_cose_evidence() 226 DMSG("Failed to encode to-be-signed payload"); in encode_cose_evidence() 231 /* Calculate a signature and add the signature to payload */ in encode_cose_evidence() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/encauth/gcm/ |
| H A D | gcm_add_iv.c | 1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */ 2 /* SPDX-License-Identifier: Unlicense */ 6 GCM implementation, add IV data to the state, by Tom St Denis 13 Add IV data to the GCM state 15 @param IV The initial value data to add 31 if (gcm->mode != LTC_GCM_MODE_IV) { in gcm_add_iv() 35 if (gcm->buflen >= 16 || gcm->buflen < 0) { in gcm_add_iv() 39 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { in gcm_add_iv() 45 if (IVlen + gcm->buflen > 12) { in gcm_add_iv() 46 gcm->ivmode |= 1; in gcm_add_iv() [all …]
|