| /optee_os/ta/pkcs11/src/ |
| H A D | entry.c | 32 struct pkcs11_client *client = register_client(); in TA_OpenSessionEntryPoint() local 34 if (!client) in TA_OpenSessionEntryPoint() 37 *tee_session = client; in TA_OpenSessionEntryPoint() 44 struct pkcs11_client *client = tee_session2client(tee_session); in TA_CloseSessionEntryPoint() local 46 unregister_client(client); in TA_CloseSessionEntryPoint() 120 struct pkcs11_client *client = tee_session2client(tee_session); in TA_InvokeCommandEntryPoint() local 123 if (!client) in TA_InvokeCommandEntryPoint() 177 rc = entry_ck_open_session(client, ptypes, params); in TA_InvokeCommandEntryPoint() 180 rc = entry_ck_close_session(client, ptypes, params); in TA_InvokeCommandEntryPoint() 183 rc = entry_ck_close_all_sessions(client, ptypes, params); in TA_InvokeCommandEntryPoint() [all …]
|
| H A D | object.h | 61 enum pkcs11_rc entry_create_object(struct pkcs11_client *client, 64 enum pkcs11_rc entry_destroy_object(struct pkcs11_client *client, 67 enum pkcs11_rc entry_find_objects_init(struct pkcs11_client *client, 70 enum pkcs11_rc entry_find_objects(struct pkcs11_client *client, 73 enum pkcs11_rc entry_find_objects_final(struct pkcs11_client *client, 76 enum pkcs11_rc entry_get_attribute_value(struct pkcs11_client *client, 79 enum pkcs11_rc entry_get_object_size(struct pkcs11_client *client, 82 enum pkcs11_rc entry_set_attribute_value(struct pkcs11_client *client, 85 enum pkcs11_rc entry_copy_object(struct pkcs11_client *client, uint32_t ptypes,
|
| H A D | pkcs11_token.c | 73 return &session->client->object_handle_db; in get_object_handle_db() 78 return &session->client->session_list; in get_session_list() 83 struct pkcs11_client *client = NULL; in tee_session2client() local 85 TAILQ_FOREACH(client, &pkcs11_client_list, link) in tee_session2client() 86 if (client == tee_session) in tee_session2client() 89 return client; in tee_session2client() 93 struct pkcs11_client *client) in pkcs11_handle2session() argument 95 return handle_lookup(&client->session_handle_db, handle); in pkcs11_handle2session() 100 struct pkcs11_client *client = NULL; in token_invalidate_object_handles() local 103 TAILQ_FOREACH(client, &pkcs11_client_list, link) { in token_invalidate_object_handles() [all …]
|
| H A D | pkcs11_token.h | 185 struct pkcs11_client *client; member 273 void unregister_client(struct pkcs11_client *client); 276 struct pkcs11_client *client); 333 enum pkcs11_rc entry_ck_open_session(struct pkcs11_client *client, 335 enum pkcs11_rc entry_ck_close_session(struct pkcs11_client *client, 337 enum pkcs11_rc entry_ck_close_all_sessions(struct pkcs11_client *client, 339 enum pkcs11_rc entry_ck_session_info(struct pkcs11_client *client, 342 enum pkcs11_rc entry_ck_init_pin(struct pkcs11_client *client, 344 enum pkcs11_rc entry_ck_set_pin(struct pkcs11_client *client, 346 enum pkcs11_rc entry_ck_login(struct pkcs11_client *client, [all …]
|
| H A D | object.c | 300 enum pkcs11_rc entry_create_object(struct pkcs11_client *client, in entry_create_object() argument 321 if (!client || ptypes != exp_pt || in entry_create_object() 327 rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); in entry_create_object() 408 enum pkcs11_rc entry_destroy_object(struct pkcs11_client *client, in entry_destroy_object() argument 422 if (!client || ptypes != exp_pt) in entry_destroy_object() 427 rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); in entry_destroy_object() 495 enum pkcs11_rc entry_find_objects_init(struct pkcs11_client *client, in entry_find_objects_init() argument 513 if (!client || ptypes != exp_pt) in entry_find_objects_init() 518 rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); in entry_find_objects_init() 659 enum pkcs11_rc entry_find_objects(struct pkcs11_client *client, in entry_find_objects() argument [all …]
|
| H A D | processing.h | 84 enum pkcs11_rc entry_generate_secret(struct pkcs11_client *client, 87 enum pkcs11_rc entry_generate_key_pair(struct pkcs11_client *client, 90 enum pkcs11_rc entry_processing_init(struct pkcs11_client *client, 94 enum pkcs11_rc entry_processing_step(struct pkcs11_client *client, 99 enum pkcs11_rc entry_processing_key(struct pkcs11_client *client, 103 enum pkcs11_rc entry_release_active_processing(struct pkcs11_client *client, 107 enum pkcs11_rc entry_wrap_key(struct pkcs11_client *client,
|
| H A D | processing.c | 214 enum pkcs11_rc entry_generate_secret(struct pkcs11_client *client, in entry_generate_secret() argument 232 if (!client || ptypes != exp_pt || in entry_generate_secret() 238 rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); in entry_generate_secret() 397 enum pkcs11_rc entry_generate_key_pair(struct pkcs11_client *client, in entry_generate_key_pair() argument 422 if (!client || ptypes != exp_pt || out->memref.size != out_ref_size) in entry_generate_key_pair() 427 rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); in entry_generate_key_pair() 597 enum pkcs11_rc entry_processing_init(struct pkcs11_client *client, in entry_processing_init() argument 613 if (!client || ptypes != exp_pt) in entry_processing_init() 618 rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); in entry_processing_init() 705 enum pkcs11_rc entry_processing_step(struct pkcs11_client *client, in entry_processing_step() argument [all …]
|
| H A D | serializer.h | 124 struct pkcs11_client *client,
|
| H A D | serializer.c | 156 struct pkcs11_client *client, in serialargs_get_session_from_handle() argument 167 session = pkcs11_handle2session(session_handle, client); in serialargs_get_session_from_handle()
|
| /optee_os/scripts/ |
| H A D | sign_helper_kms.py | 31 self.client = boto3.client('kms') 32 response = self.client.get_public_key(KeyId=self.arn) 73 response = self.client.sign(
|
| /optee_os/.devcontainer/ |
| H A D | Dockerfile.vscode | 42 openssh-client \
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 7 client and server to extract additional shared symmetric keys from an SSL 137 * implements `psa_can_do_hash()` on the client interface 217 * In a PSA-client-only build (i.e. MBEDTLS_PSA_CRYPTO_CLIENT && 224 * By default, the handling of TLS 1.3 tickets by the Mbed TLS client is now 294 client, if the client-provided certificate does not have appropriate values 299 than TLS client authentication could be able to use it for TLS client 306 * Fix TLS 1.3 client build and runtime when support for session tickets is 354 * Fix TLS connection failure in applications using an Mbed TLS client in 533 malicious client could cause information disclosure or a denial of service. 556 client could put the TLS 1.3-only server in an infinite loop processing [all …]
|
| /optee_os/ |
| H A D | CHANGELOG.md | 1954 * Storage is implemented, but not "Secure storage", meaning that a client
|