/optee_os-3.20.0/core/drivers/crypto/se050/adaptors/utils/ |
A D | scp_config.c | 312 struct se050_scp_key *keys) in se050_scp03_prepare_rotate_cmd() argument 320 [0] = keys->enc, in se050_scp03_prepare_rotate_cmd() 321 [1] = keys->mac, in se050_scp03_prepare_rotate_cmd() 322 [2] = keys->dek, in se050_scp03_prepare_rotate_cmd() 368 memcpy(keys, &se050_default_keys[id], sizeof(*keys)); in get_ofid_key() 381 memcpy(keys, ¤t_keys, sizeof(*keys)); in get_config_key() 410 [0] = { .name = "dek", .data = keys->dek }, in se050_scp03_subkey_derive() 411 [1] = { .name = "mac", .data = keys->mac }, in se050_scp03_subkey_derive() 458 return get_config_key(keys); in se050_scp03_get_keys() 460 return se050_scp03_subkey_derive(keys); in se050_scp03_get_keys() [all …]
|
/optee_os-3.20.0/core/drivers/crypto/se050/adaptors/apis/ |
A D | user.c | 34 struct se050_scp_key *keys, in prepare_host_scp() argument 56 len = sizeof(keys->enc); in prepare_host_scp() 58 keys->enc, len, len * 8, NULL, 0); in prepare_host_scp() 66 len = sizeof(keys->mac); in prepare_host_scp() 68 keys->mac, len, len * 8, NULL, 0); in prepare_host_scp() 76 len = sizeof(keys->dek); in prepare_host_scp() 78 keys->dek, len, len * 8, NULL, 0); in prepare_host_scp() 98 struct se050_scp_key *keys) in se050_configure_host() argument 123 keys, host_oid); in se050_configure_host()
|
A D | sss.c | 150 struct se050_scp_key keys = { }; in se050_enable_scp03() local 160 status = se050_scp03_get_keys(&keys, key_src[i]); in se050_enable_scp03() 167 if (!se050_core_early_init(&keys)) { in se050_enable_scp03()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | ssl_ticket.c | 75 mbedtls_ssl_ticket_key *key = ctx->keys + index; in ssl_ticket_gen_key() 109 uint32_t key_time = ctx->keys[ctx->active].generation_time; in ssl_ticket_update_keys() 156 ret = mbedtls_cipher_setup_psa( &ctx->keys[0].ctx, in mbedtls_ssl_ticket_setup() 164 if( ( ret = mbedtls_cipher_setup( &ctx->keys[0].ctx, cipher_info ) ) != 0 ) in mbedtls_ssl_ticket_setup() 168 ret = mbedtls_cipher_setup_psa( &ctx->keys[1].ctx, in mbedtls_ssl_ticket_setup() 233 key = &ctx->keys[ctx->active]; in mbedtls_ssl_ticket_write() 289 for( i = 0; i < sizeof( ctx->keys ) / sizeof( *ctx->keys ); i++ ) in ssl_ticket_select_key() 290 if( memcmp( name, ctx->keys[i].name, 4 ) == 0 ) in ssl_ticket_select_key() 291 return( &ctx->keys[i] ); in ssl_ticket_select_key() 396 mbedtls_cipher_free( &ctx->keys[0].ctx ); in mbedtls_ssl_ticket_free() [all …]
|
A D | ssl_tls13_keys.c | 201 mbedtls_ssl_key_set *keys ) in mbedtls_ssl_tls1_3_make_traffic_keys() argument 209 keys->client_write_key, key_len ); in mbedtls_ssl_tls1_3_make_traffic_keys() 217 keys->server_write_key, key_len ); in mbedtls_ssl_tls1_3_make_traffic_keys() 225 keys->client_write_iv, iv_len ); in mbedtls_ssl_tls1_3_make_traffic_keys() 233 keys->server_write_iv, iv_len ); in mbedtls_ssl_tls1_3_make_traffic_keys() 237 keys->key_len = key_len; in mbedtls_ssl_tls1_3_make_traffic_keys() 238 keys->iv_len = iv_len; in mbedtls_ssl_tls1_3_make_traffic_keys()
|
A D | ssl_tls13_keys.h | 150 mbedtls_ssl_key_set *keys );
|
/optee_os-3.20.0/core/drivers/crypto/se050/adaptors/include/ |
A D | se050_utils.h | 53 sss_status_t se050_scp03_get_current_keys(struct se050_scp_key *keys); 54 sss_status_t se050_scp03_get_keys(struct se050_scp_key *keys, 56 sss_status_t se050_scp03_subkey_derive(struct se050_scp_key *keys); 59 struct se050_scp_key *keys);
|
A D | se050_user_apis.h | 21 struct se050_scp_key *keys);
|
A D | se050.h | 38 TEE_Result se050_core_early_init(struct se050_scp_key *keys);
|
/optee_os-3.20.0/core/drivers/crypto/se050/ |
A D | session.c | 16 TEE_Result se050_core_early_init(struct se050_scp_key *keys) in se050_core_early_init() argument 20 status = se050_session_open(&se050_ctx, keys); in se050_core_early_init()
|
/optee_os-3.20.0/core/include/kernel/ |
A D | user_mode_ctx_struct.h | 40 struct thread_pauth_keys keys; member
|
A D | thread_private.h | 46 struct thread_pauth_keys keys; member
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | ssl_ticket.h | 64 mbedtls_ssl_ticket_key keys[2]; /*!< ticket protection keys */ member
|
/optee_os-3.20.0/core/arch/arm/kernel/ |
A D | thread.c | 253 threads[n].regs.apiakey_hi = threads[n].keys.apia_hi; in __thread_alloc_and_run() 254 threads[n].regs.apiakey_lo = threads[n].keys.apia_lo; in __thread_alloc_and_run() 947 struct thread_pauth_keys *keys __maybe_unused) in set_ctx_regs() 974 assert(keys); in set_ctx_regs() 975 regs->apiakey_hi = keys->apia_hi; in set_ctx_regs() 976 regs->apiakey_lo = keys->apia_lo; in set_ctx_regs() 990 return &utc->uctx.keys; in thread_get_pauth_keys() 1005 struct thread_pauth_keys *keys = NULL; in thread_enter_user_mode() local 1009 keys = thread_get_pauth_keys(); in thread_enter_user_mode() 1026 set_ctx_regs(regs, a0, a1, a2, a3, user_sp, entry_func, spsr, keys); in thread_enter_user_mode()
|
A D | asm-defines.c | 83 DEFINE(THREAD_CTX_KEYS, offsetof(struct thread_ctx, keys)); 120 offsetof(struct thread_core_local, keys));
|
A D | abort.c | 371 ai->regs->apiakey_hi = tc->keys.apia_hi; in handle_user_mode_panic() 372 ai->regs->apiakey_lo = tc->keys.apia_lo; in handle_user_mode_panic()
|
/optee_os-3.20.0/core/arch/arm/dts/ |
A D | stm32mp15xx-dhcom-pdk2.dtsi | 34 gpio-keys-polled { 35 compatible = "gpio-keys-polled"; 66 gpio-keys { 67 compatible = "gpio-keys";
|
/optee_os-3.20.0/scripts/ |
A D | gen_tee_bin.py | 89 if symbol_name not in elffile_symbols.keys(): 91 if symbol_name not in lsyms_def.keys(): 96 if name in lsyms_def.keys() and lsyms_def[name] > 1: 99 if name not in elffile_symbols.keys():
|
/optee_os-3.20.0/ta/ |
A D | ta.mk | 186 ta-keys = keys/default_ta.pem 187 $(foreach f, $(ta-keys), \ 188 $(eval $(call copy-file, $(f), $(out-dir)/export-$(sm)/keys)))
|
/optee_os-3.20.0/core/kernel/ |
A D | thread.c | 487 if (crypto_rng_read(&threads[n].keys, sizeof(threads[n].keys))) in thread_init_thread_pauth_keys() 497 if (crypto_rng_read(&tcl[n].keys, sizeof(tcl[n].keys))) in thread_init_core_local_pauth_keys()
|
A D | user_ta.c | 453 crypto_rng_read(&utc->uctx.keys, sizeof(utc->uctx.keys)); in tee_ta_init_user_ta_session()
|
/optee_os-3.20.0/ta/arch/arm/ |
A D | link_shlib.mk | 7 TA_SIGN_KEY ?= $(TA_DEV_KIT_DIR)/keys/default_ta.pem
|
/optee_os-3.20.0/mk/ |
A D | lib.mk | 47 TA_SIGN_KEY ?= keys/default_ta.pem
|
/optee_os-3.20.0/core/include/drivers/ |
A D | versal_nvm.h | 235 TEE_Result versal_efuse_write_aes_keys(struct versal_efuse_aes_keys *keys);
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 1024 keys. Found by Catena cyber using oss-fuzz (issue 20467). 1575 * Add support for 128-bit keys in CTR_DRBG. Note that using keys shorter 1602 invalidated keys of a lifetime of less than a 1s. Fixes #1968. 2043 * Add support for public keys encoded in PKCS#1 format. #1122 3253 RSA keys. 3590 * Parsing Elliptic Curve keys 4244 * Parsing PEM private keys encrypted with DES and AES 4280 * Detection for DES weak keys and parity bits added 4321 * rsa_check_private() now supports PKCS1v2 keys as well 4502 * Modified the HMAC functions to handle keys larger [all …]
|