-
Notifications
You must be signed in to change notification settings - Fork 163
ecdh: new example demonstrating ECDH shared secret derivation #135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Akshay-Belsare
commented
Aug 25, 2025
- Introduced a new example utilizing the TEE_ALG_ECDH_DERIVE_SHARED_SECRET algorithm.
- This example demonstrates how to establish a shared secret using Elliptic Curve Diffie-Hellman (ECDH).
- Provides a reference for secure key exchange and cryptographic operations with ECDH in OP-TEE.
- Introduced a new example utilizing the TEE_ALG_ECDH_DERIVE_SHARED_SECRET algorithm. - This example demonstrates how to establish a shared secret using Elliptic Curve Diffie-Hellman (ECDH). - Provides a reference for secure key exchange and cryptographic operations with ECDH in OP-TEE. Signed-off-by: Amey Avinash Raghatate <[email protected]>
Update ecdh TA as per the review comments. Signed-off-by: Amey Avinash Raghatate <[email protected]>
Update ecdh TA as per the review comments Signed-off-by: Amey Avinash Raghatate <[email protected]>
- Introduced a new example utilizing the TEE_ALG_ECDH_DERIVE_SHARED_SECRET algorithm. - This example demonstrates how to establish a shared secret using Elliptic Curve Diffie-Hellman (ECDH). - Provides a reference for secure key exchange and cryptographic operations with ECDH in OP-TEE. Signed-off-by: Amey Avinash Raghatate <[email protected]> State: waiting Link: linaro-swg#135
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry for the late feedback.
Update param type for the function cmd_ecdh_selftest. Update ecdh TA and Host as per review comments. Signed-off-by: Amey Avinash Raghatate <[email protected]>
@etienne-lms could you please have a look at this. Thanks! |
#define ECDH_MAX_BITS 521 | ||
#define ECDH_MAX_BYTES ((ECDH_MAX_BITS + 7) / 8) | ||
#define ECDH_BUF_BYTES (ECDH_MAX_BYTES + 14) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think these 3 macros should not be part of the TA interface, to move to ecdh_ta.c.
They could but maybe specifying param[3].memref.buf
recommended size is ECDH_BUF_BYTES
but the TA API already allows CA to query the required size.
Why + 14
?