• Home
  • History
  • Annotate
  • only in /hardware/ti/omap4-aah/security/
History log of /hardware/ti/omap4-aah/security/
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
54aee15585631778bc269bc0ad0f050fd959a6f5 16-Dec-2014 Ying Wang <wangying@google.com> Cleanup Obsolete LOCAL_PRELINK_MODULE.

Bug: 18675947
Change-Id: I07a35782fa2f021574c4ec937920448288594288
mc_pa_ctrl/Android.mk
ee_client_api/Android.mk
f_crypto_sst/Android.mk
f_daemon/Android.mk
7f74ff6e8dba9760023a07590f0fa73edb763c7b 17-Oct-2012 Mike J. Chen <mjchen@google.com> TI mainline's security

Change-Id: I0cf5da4d3b5653244b8ffe9178d45c3582b48897
Signed-off-by: Mike J. Chen <mjchen@google.com>
mc_pa_ctrl/Android.mk
mc_pa_ctrl/s_version.h
ee_client_api/Android.mk
ee_client_api/s_version.h
ee_client_api/tee_client_api_linux_driver.c
f_crypto_sst/Android.mk
f_crypto_sst/pkcs11_object.c
f_crypto_sst/sst_stub.c
f_daemon/Android.mk
f_daemon/lib_uuid.h
f_daemon/s_version.h
f_sdk/include/OEMCrypto.h
f_sdk/include/common_secure_driver_protocol.h
f_sdk/include/sddi.h
f_sdk/include/smapi.h
f_sdk/include/smapi_ex.h
f_sdk/include/ssdi.h
f_sdk/include/ssdi_smc_ext.h
f_sdk/include/ssdi_v2_compat.h
f_sdk/include/wvdrm_protocol.h
67d3f03c7fae4ef7b42f71c6a1421748c2606b74 13-Feb-2012 Bryan Buckley <bryan.buckley@ti.com> Security: fix llog build error for tf_daemon, tee_client_api

Choose correct llog by changing LOCAL_LDFLAGS to LOCAL_LDLIBS
for llog.

(cherry picked from commit ead6372c32dd20ee4de99ee3a2d6673e3274a861)

Change-Id: I86164615edf114d2fdc6a633561c6ce6641afb2e
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
ee_client_api/Android.mk
f_daemon/Android.mk
3bccc910cc26c5d776411c8be892d4922bb674b1 02-Feb-2012 Trusted Logic <smc_support@trusted-logic.com> Security: tf_sdk: Update to 1.06

Remove sdrv_crypto.h

(cherry picked from commit d45edb436df2990e792f4ce375e197143de3e201)

Change-Id: I85ba6afccf55afd3a5e5c68a5329a09cbfef98d7
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
f_sdk/include/sddi.h
f_sdk/include/sdrv_crypto.h
2b21213aa3b76058eb807b8698c24d635db4b4ea 02-Feb-2012 Bryan Buckley <bryan.buckley@ti.com> Security: Update tee_client_api, tf_daemon, smc_pa_ctrl to 1.06

These three components have not changed with this release.
Only changing version header for clarity.

(cherry picked from commit 54cc5c655243e9bb73763040c8a04cdc366aa25e)

Change-Id: Ife51d93403429513bc6a99adccb2f2c88184b0e4
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
mc_pa_ctrl/s_version.h
ee_client_api/s_version.h
f_daemon/s_version.h
2359fe0a36452d2f29087fa0284d9fc777fafb37 27-Jan-2012 Trusted Logic <smc_support@trusted-logic.com> Security: tee_client_api: Update to 1.06e1

The TEE Client API defines a communications API for connecting
Client Applications running in a rich operating environment with
the Secure Services running inside the Trusted Foundations execution
environment.

The TEE Client API is a static library that must be linked with the
calling application or library.

The TEE Client API is used to implement higher-level APIs, such as
cryptography or secure storage.

(cherry picked from commit ccc83471b660f62b65fbc8f566e8a7e404c64540)

Change-Id: I4f1d40ddf8fb9eec0b62e2982fc0e25db36ce6a0
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
Signed-off-by: Yong Zhi <y-zhi@ti.com>
Signed-off-by: Jorge E. Solano <x0062302@ti.com>
ee_client_api/Android.mk
ee_client_api/s_version.h
ee_client_api/schannel6_protocol.h
ee_client_api/tee_client_api_linux_driver.c
6367979fd27d4861f58bcc4d792a2d3eeb875c2c 27-Jan-2012 Trusted Logic <smc_support@trusted-logic.com> Security: tf_sdk: Update to 1.06e1

This contains the C header files for compiling both the normal-world and
secure-world software. The rest of the SDK is available in the mshield
package.

Some of these headers are:
cryptoki.h - definitions for the External Cry ptographic API
sst.h - definitions for the External Secure Storage API
mtc.h - definitions for the External Monotonic Counter API
ssdi.h - definitions for SSDI
tee_client_api.h - definitions for the TF Client API

(cherry picked from commit 41ab3216ed1b54184d0575ef9601394e7ba53f0d)

Change-Id: I24828f423456ac12f014a406acee42b60b40ae17
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
f_sdk/include/s_type.h
f_sdk/include/sddi.h
f_sdk/include/sdrv_crypto.h
f_sdk/include/smapi.h
f_sdk/include/smapi_ex.h
f_sdk/include/ssdi.h
f_sdk/include/ssdi_smc_ext.h
f_sdk/include/ssdi_v2_compat.h
d96c0c949b8ecc4e1570106243d21c8fd5ed72ef 27-Jan-2012 Trusted Logic <smc_support@trusted-logic.com> Security: tf_daemon: Update to 1.06e1

The user-space SMC Daemon is takes care in particular of the effective
storage of the SMC secure storage within the device file system. The files
in which the SMC persistent data are stored are defined in the
Normal-World Configuration File.

All the security properties such as confidentiality, integrity, atomicity,
anti-rollback and bounding to the device are managed at the SMC PA level.

(cherry picked from commit c08b0dc330e67f33fa0a8fb9c62f38b07a9103c9)

Change-Id: I62714c8bb3b43ef2897a4b0efd49f88700a1ce55
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
f_daemon/Android.mk
f_daemon/delegation_client.c
f_daemon/lib_uuid.h
f_daemon/s_version.h
f_daemon/service_delegation_protocol.h
f_daemon/smc_properties.c
f_daemon/smc_properties_parser.c
0258161a41f8931108581ccab1c5d36a769b6656 27-Jan-2012 Trusted Logic <smc_support@trusted-logic.com> Security: smc_pa_ctrl: Update to 1.06e1

A user-land tool application used to install the signed SMC PA in the
Secure Environment. This application is just needed for the startup of the
SMC PA then it is no longer running.

(cherry picked from commit b6f0610ea54d990c121761a11e543e716a63c7ec)

Change-Id: I01c02f192b843bf8b8f1b12055c828d9b8e5ff12
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
mc_pa_ctrl/s_version.h
08f4da4b7ac801a691376dd94aa2af35b31e7998 13-Mar-2012 Trusted Logic <smc_support@trusted-logic.com> SMC: Initial release of libtf_crypto_sst.so

libtf_crypto_sst.so is a single shared object where the Normal
World APIs are implemented for Secure Storage, Cryptographic, and
Monotonic Counter Facility. These are the "Core Secure Services"

The crypto core secure service exposing crypto functionality
for client applications supports exactly the same mechanisms as the
ones exposed by the Internal PKCS#11 SSDI Crypto API.

In order to optimize some cryptographic operations from the External
cryptoki API, the SMC makes use of the Cryptographic HW Accelerators
in public mode (in the SMC driver), through the Cryptoki Update
Shortcut (CUS) and the aggressive mode.

Change-Id: I3ebf83a0c84fb33f0f779a6224032b7aad06ef45
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
Signed-off-by: Trusted Logic <smc_support@trusted-logic.com>
f_crypto_sst/Android.mk
f_crypto_sst/lib_mutex.h
f_crypto_sst/lib_mutex_linux.c
f_crypto_sst/lib_object.c
f_crypto_sst/lib_object.h
f_crypto_sst/mtc.c
f_crypto_sst/pkcs11_global.c
f_crypto_sst/pkcs11_internal.h
f_crypto_sst/pkcs11_object.c
f_crypto_sst/pkcs11_session.c
f_crypto_sst/service_system_protocol.h
f_crypto_sst/sst_stub.c
c25c2c845f76085658583189c982e34fd6707ef3 07-Jan-2012 Kenny Root <kroot@google.com> Add a MODULE_LICENSE for the security subdir

Change-Id: I6ff0478e34b0782265474bc2d0ddc0b80cf185dd
ODULE_LICENSE_BSD_LIKE
81ee12f68f1a45cf09a98aa4c2cc8e2bbbab7f5c 20-Oct-2011 Bryan Buckley <bryan.buckley@ti.com> SMC: Add Android.mk with BOARD_USES_SECURE_SERVICES flag to build

Enable the build of the SMC userspace components if a device has the
BOARD_USES_SECURE_SERVICES flag enabled in a configuration file.

Change-Id: Iadbd38bbf7d7d0495541c995f38919b3a8dee055
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
ndroid.mk
2e9e9eca83c3dee85b7815573a8cf1e6d1780741 20-Oct-2011 Bryan Buckley <bryan.buckley@ti.com> SMC: Initial release of smc_pa_strl, tf_daemon

These userspace components are used to load secure services in the normal
(non-secure) world. The SMC kernel driver is required to use these binaries.

Secure services enable certain security features such as
hardware-accelerated crypto, secure storage, drm, and much more.

Author: "Trusted Logic <smc_support@trusted-logic.com>." Gerrit refuses to
accept.

Change-Id: Ie81604d3fee31abc319643401c3cc66888f9f848
Signed-off-by: Bryan Buckley <bryan.buckley@ti.com>
Signed-off-by: Trusted Logic <smc_support@trusted-logic.com>
OTICE
mc_pa_ctrl/Android.mk
mc_pa_ctrl/s_version.h
mc_pa_ctrl/smc_pa_ctrl.c
mc_pa_ctrl/smc_pa_ctrl_linux.c
mc_pa_ctrl/smc_pa_ctrl_os.h
ee_client_api/Android.mk
ee_client_api/s_version.h
ee_client_api/schannel6_logins.h
ee_client_api/schannel6_protocol.h
ee_client_api/tee_client_api_linux_driver.c
f_daemon/Android.mk
f_daemon/delegation_client.c
f_daemon/delegation_client_extension.c
f_daemon/delegation_client_extension.h
f_daemon/lib_manifest2.c
f_daemon/lib_manifest2.h
f_daemon/s_version.h
f_daemon/service_delegation_protocol.h
f_daemon/smc_properties.c
f_daemon/smc_properties.h
f_daemon/smc_properties_parser.c
f_daemon/smc_properties_parser.h
f_sdk/include/cryptoki.h
f_sdk/include/mtc.h
f_sdk/include/pkcs11.h
f_sdk/include/s_error.h
f_sdk/include/s_type.h
f_sdk/include/sst.h
f_sdk/include/tee_client_api.h
f_sdk/include/tee_client_api_ex.h
f_sdk/include/tee_client_api_imp.h