| commit | c5b3920f58080fda3423235d2620106456bd5b50 | [log] [tgz] |
|---|---|---|
| author | Etienne Carriere <etienne.carriere@foss.st.com> | Mon Feb 12 06:19:59 2024 +0100 |
| committer | Jérôme Forissier <jerome@forissier.org> | Wed Feb 14 09:57:10 2024 +0100 |
| tree | 61e9c226bfd8329ccb828ea65dbe7cd8f9c94077 | |
| parent | afbd31d9592e8919cf2b6883e33d80fcc32ccdc2 [diff] |
libckteec: one shot encryption/decryption may have no input data
Change the one shot encryption and decryption handler function to
allow input buffer reference to be NULL. This may happen for example
with AES GCM operation where encryption of a NULL buffer is expected to
produce an AES GCM authentication tag. Before this change, providing a
NULL buffer to C_Encrypt() made ckteec_register_shm() to fail and
ckteec_register_shm() to return CKR_HOST_MEMORY error code.
Fixes: aa3dd58d605e ("libckteec: Allow 0 length input buffer for update operations.")
Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
Signed-off-by: Etienne Carriere <etienne.carriere@foss.st.com>
This git contains source code for the non-secure side implementation of the OP-TEE project making up the client library and tee-supplicant.
All official OP-TEE documentation has moved to http://optee.readthedocs.io. The information that used to be here in this git can be found under optee_client.
// OP-TEE core maintainers