Searched hist:"5 dfe86d0d6c2ec8c4ffbd7df238998a9adae0f0b" (Results 1 – 3 of 3) sorted by relevance
| /optee_os/core/include/crypto/ |
| H A D | crypto.h | 5dfe86d0d6c2ec8c4ffbd7df238998a9adae0f0b Tue Aug 25 06:53:14 UTC 2020 Jorge Ramirez-Ortiz <jorge@foundries.io> core: svc store: delete keys from secure elements
The cryptographic API provides an interface for the creation of cryptographic keys.
These keys can be stored in secure elements and handlers to these keys (since the keys themselves can not be read from the secure elements) given back to the caller.
When the object holding a key is being deleted, the cryptographic API must be informed in order to proceed with the deletion of the real key from the secure element.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
|
| /optee_os/core/crypto/ |
| H A D | crypto.c | 5dfe86d0d6c2ec8c4ffbd7df238998a9adae0f0b Tue Aug 25 06:53:14 UTC 2020 Jorge Ramirez-Ortiz <jorge@foundries.io> core: svc store: delete keys from secure elements
The cryptographic API provides an interface for the creation of cryptographic keys.
These keys can be stored in secure elements and handlers to these keys (since the keys themselves can not be read from the secure elements) given back to the caller.
When the object holding a key is being deleted, the cryptographic API must be informed in order to proceed with the deletion of the real key from the secure element.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
|
| /optee_os/core/tee/ |
| H A D | tee_svc_storage.c | 5dfe86d0d6c2ec8c4ffbd7df238998a9adae0f0b Tue Aug 25 06:53:14 UTC 2020 Jorge Ramirez-Ortiz <jorge@foundries.io> core: svc store: delete keys from secure elements
The cryptographic API provides an interface for the creation of cryptographic keys.
These keys can be stored in secure elements and handlers to these keys (since the keys themselves can not be read from the secure elements) given back to the caller.
When the object holding a key is being deleted, the cryptographic API must be informed in order to proceed with the deletion of the real key from the secure element.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
|