/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/pki/ec_wrst/ |
D | ec_wrst_dsa_verify.c | 41 const CCEcpkiDomain_t *domain = &pSignPublKey->domain; in EcWrstDsaVerify() local 42 EcWrstDomain_t *llfBuff = (EcWrstDomain_t*)&pSignPublKey->domain.llfBuff; in EcWrstDsaVerify() 48 modSizeInBits = domain->modSizeInBits; in EcWrstDsaVerify() 50 ordSizeInBits = domain->ordSizeInBits; in EcWrstDsaVerify() 65 PkaCopyDataIntoPkaReg(ECC_REG_N/*dest_reg*/, 1, domain->ecR/*src_ptr*/, ordSizeInWords); in EcWrstDsaVerify() 73 PkaCopyDataIntoPkaReg(EC_VERIFY_REG_TMP_N, 1, domain->ecP, modSizeInWords); in EcWrstDsaVerify() 76 PkaCopyDataIntoPkaReg(EC_VERIFY_REG_P_GX, 1, domain->ecGx, modSizeInWords); in EcWrstDsaVerify() 77 PkaCopyDataIntoPkaReg(EC_VERIFY_REG_P_GY, 1, domain->ecGy, modSizeInWords); in EcWrstDsaVerify() 81 PkaCopyDataIntoPkaReg(ECC_REG_EC_A, 1, domain->ecA, modSizeInWords); in EcWrstDsaVerify()
|
D | ec_wrst.c | 47 pDomain = &pPublKey->domain; in EcWrstInitPubKey() 140 modSizeInWords = CALC_FULL_32BIT_WORDS(pPublKey->domain.modSizeInBits); in EcWrstFullCheckPublKey() 141 ordSizeInWords = CALC_FULL_32BIT_WORDS(pPublKey->domain.ordSizeInBits); in EcWrstFullCheckPublKey() 151 &pPublKey->domain, in EcWrstFullCheckPublKey() 152 pPublKey->domain.ecR, /*in*/ in EcWrstFullCheckPublKey() 200 modSizeInWords = CALC_FULL_32BIT_WORDS(pPublKey->domain.modSizeInBits); in EcWrstDhDeriveSharedSecret() 201 ordSizeInWords = CALC_FULL_32BIT_WORDS(pPublKey->domain.ordSizeInBits); in EcWrstDhDeriveSharedSecret() 202 modSizeInBytes = CALC_FULL_BYTES(pPublKey->domain.modSizeInBits); in EcWrstDhDeriveSharedSecret() 211 &pPublKey->domain, in EcWrstDhDeriveSharedSecret()
|
D | ec_wrst_dsa.c | 200 const CCEcpkiDomain_t *pDomain = &pSignPrivKey->domain; in EcWrstDsaSign() 296 const CCEcpkiDomain_t *domain = &pSignPublKey->domain; in EcWrstDsaVerify() local 297 EcWrstDomain_t *llfBuff = (EcWrstDomain_t*)&pSignPublKey->domain.llfBuff; in EcWrstDsaVerify() 303 modSizeInBits = domain->modSizeInBits; in EcWrstDsaVerify() 305 ordSizeInBits = domain->ordSizeInBits; in EcWrstDsaVerify() 324 PkaCopyDataIntoPkaReg(ECC_REG_N/*dest_reg*/, 1, domain->ecR/*src_ptr*/, ordSizeInWords); in EcWrstDsaVerify() 332 PkaCopyDataIntoPkaReg(EC_VERIFY_REG_TMP_N, 1, domain->ecP, modSizeInWords); in EcWrstDsaVerify() 335 PkaCopyDataIntoPkaReg(EC_VERIFY_REG_P_GX, 1, domain->ecGx, modSizeInWords); in EcWrstDsaVerify() 336 PkaCopyDataIntoPkaReg(EC_VERIFY_REG_P_GY, 1, domain->ecGy, modSizeInWords); in EcWrstDsaVerify() 340 PkaCopyDataIntoPkaReg(ECC_REG_EC_A, 1, domain->ecA, modSizeInWords); in EcWrstDsaVerify()
|
D | ec_wrst_genkey.c | 76 CC_PalMemCopy((uint8_t*)&pPrivKey->domain, (uint8_t*)pDomain, sizeof(pPrivKey->domain)); in EcWrstGenKeyPairBase() 79 CC_PalMemCopy((uint8_t*)&pPublKey->domain, (uint8_t*)pDomain, sizeof(pPublKey->domain)); in EcWrstGenKeyPairBase()
|
D | pka_ec_wrst_smul_no_scap.c | 225 … const CCEcpkiDomain_t *domain, /*!< [in] Pointer to EC domain. */ in ScalarMultAff() argument 247 modSizeInBits = domain->modSizeInBits; in ScalarMultAff() 249 ordSizeInWords = CALC_FULL_32BIT_WORDS(domain->ordSizeInBits); in ScalarMultAff() 277 PkaCopyDataIntoPkaReg(ECC_REG_N, 1, domain->ecP/*src_ptr*/, modSizeInWords); in ScalarMultAff() 278 PkaCopyDataIntoPkaReg(ECC_REG_NP, 1, ((EcWrstDomain_t*)&domain->llfBuff)->modTag, in ScalarMultAff() 280 PkaCopyDataIntoPkaReg(ECC_REG_EC_A, 1, domain->ecA, modSizeInWords); in ScalarMultAff()
|
D | pka_ec_wrst_smul_scap.c | 313 static CCError_t ScalarMultSca(const CCEcpkiDomain_t *domain, /*!< [in] Pointer to EC domain. */ in ScalarMultSca() argument 328 modSizeInBits = domain->modSizeInBits; in ScalarMultSca() 333 err = PkaInitAndMutexLock(CC_MAX(modSizeInBits, domain->ordSizeInBits), &pkaReqRegs); in ScalarMultSca() 342 PkaCopyDataIntoPkaReg(ECC_REG_N, 1, domain->ecP/*src_ptr*/, modSizeInWords); in ScalarMultSca() 343 PkaCopyDataIntoPkaReg(ECC_REG_NP, 1, ((EcWrstDomain_t*)&domain->llfBuff)->modTag, in ScalarMultSca() 345 PkaCopyDataIntoPkaReg(ECC_REG_EC_A, 1, domain->ecA, modSizeInWords); in ScalarMultSca() 346 PkaCopyDataIntoPkaReg(ord, 1, domain->ecR, CALC_FULL_32BIT_WORDS(domain->ordSizeInBits)); in ScalarMultSca()
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/src/ |
D | cc3xx_internal_ecc_util.c | 211 (pPrivKey->domain.ordSizeInBits + CC_BITS_IN_32BIT_WORD - 1) / in cc3xx_ecc_cc_priv_to_cc_publ() 215 &pPrivKey->domain, /*!< [in] Pointer to EC domain. */ in cc3xx_ecc_cc_priv_to_cc_publ() 218 pPrivKey->domain.ecGx, /*!< [in] Pointer to input point X coordinate. */ in cc3xx_ecc_cc_priv_to_cc_publ() 219 pPrivKey->domain.ecGy, /*!< [in] Pointer to input point Y coordinate. */ in cc3xx_ecc_cc_priv_to_cc_publ() 235 pPublKey->domain = pPrivKey->domain; in cc3xx_ecc_cc_priv_to_cc_publ()
|
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/ |
D | ff_isolation.rst | 42 - L3.3 PSA Root of Trust (RoT) domain needs protection from NSPE and all Secure 62 The essence of isolation is to protect the assets of one protection domain from 86 - I3. If domain A needs protection from domain B, then Private data in domain A 87 cannot be accessed by domain B. 88 - I4. (Optional) If domain A needs protection from domain B, then Code and 89 Constant data in domain A is not readable or executable by domain B. 90 - I5. (Optional) Code in a domain is not executable by any other domain. 91 - I6. (Optional) All assets in a domain are private to that domain and cannot be 92 accessed by any other domain, with the following exception: 93 The domain containing the SPM can only access Private data and Constant data [all …]
|
D | hardware_abstraction_layer.rst | 293 - Boundaries between ARoT domain and PRoT domain. 338 an example, assigning PRoT and ARoT domain boundaries to respective partitions 340 same domain does not need to change the activated boundary.
|
/trusted-firmware-m-3.4.0/interface/ |
D | dir_interface.dox | 13 \brief Source code defining secure domain entry points for the non-secure 14 domain.
|
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/include/mcuboot_config/ |
D | mcuboot_logging.h | 42 #define MCUBOOT_LOG_MODULE_DECLARE(domain) /* Ignore */ argument 43 #define MCUBOOT_LOG_MODULE_REGISTER(domain) /* Ignore */ argument
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/crypto_api/ec_wrst/ |
D | cc_ecdh.c | 91 pDomain = &PrivKey_ptr->domain; in CC_EcdhSvdpDh() 92 pPublDomain = &PublKey_ptr->domain; in CC_EcdhSvdpDh()
|
D | cc_ecpki_build_publ.c | 144 CC_PalMemCopy(&pPublKey->domain, pDomain, sizeof(CCEcpkiDomain_t)); in CC_EcpkiPublKeyBuildAndCheck() 258 modSizeInBytes = CALC_FULL_BYTES(publKey->domain.modSizeInBits); in CC_EcpkiPubKeyExport() 259 modSizeInWords = CALC_FULL_32BIT_WORDS(publKey->domain.modSizeInBits); in CC_EcpkiPubKeyExport()
|
D | cc_ecpki_build_priv.c | 127 CC_PalMemCopy(&pPrivKey->domain, pDomain, sizeof(CCEcpkiDomain_t)); in CC_EcpkiPrivKeyBuild()
|
D | cc_ecies.c | 213 pDomain = &pRecipPublKey->domain; in EciesKemEncrypt() 433 pDomain = &pRecipPrivKey->domain; in CC_EciesKemDecrypt()
|
D | cc_ecdsa_verify.c | 363 pDomain = &PublKey_ptr->domain; in EcdsaVerifyFinish()
|
D | cc_ecdsa_sign.c | 412 pDomain = &pPrivKey->domain; in EcdsaSignFinishInt()
|
/trusted-firmware-m-3.4.0/docs/ |
D | glossary.rst | 9 `PSA term`_. The security domain in which additional security services 30 `PSA term`_. In TF-M this means non secure domain typically running an 43 `PSA term`_. This defines the most trusted security domain within a PSA 57 `PSA term`_. In TF-M this means the secure domain protected by TF-M.
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/shared/include/crypto_api/ |
D | cc_ecpki_types.h | 240 CCEcpkiDomain_t domain; member 271 CCEcpkiDomain_t domain; member
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/host/src/tests/TestAL/pal/linux/ |
D | test_pal_socket.c | 27 uint32_t Test_PalSocket(tp_socket *s, enum tp_sock_domain domain, in Test_PalSocket() argument 41 xDomain = (domain == TP_AF_INET) ? AF_INET : 0; in Test_PalSocket()
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/host/src/tests/TestAL/pal/no_os/ |
D | test_pal_socket.c | 22 uint32_t Test_PalSocket(tp_socket *s, enum tp_sock_domain domain, in Test_PalSocket() argument
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/host/src/tests/TestAL/pal/freertos/ |
D | test_pal_socket.c | 25 uint32_t Test_PalSocket(tp_socket *s, enum tp_sock_domain domain, in Test_PalSocket() argument 42 xDomain = (domain == TP_AF_INET) ? FREERTOS_AF_INET : 0; in Test_PalSocket()
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/host/src/tests/TestAL/pal/include/ |
D | test_pal_socket.h | 72 uint32_t Test_PalSocket(tp_socket *s, enum tp_sock_domain domain,
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/shared/include/ |
D | cc_regs.h | 44 #error Execution domain is not CC_REE/CC_TEE/CC_IOT
|
/trusted-firmware-m-3.4.0/docs/contributing/ |
D | coding_guide.rst | 11 but there are updates for domain specific conventions as listed below.
|