Home
last modified time | relevance | path

Searched hist:e24659df354c31626f78f4d46d453e14959a9953 (Results 1 – 6 of 6) sorted by relevance

/rk3399_ARM-atf/tools/cert_create/include/tbbr/
H A Dtbb_ext.he24659df354c31626f78f4d46d453e14959a9953 Tue Nov 07 16:50:31 UTC 2017 Soby Mathew <soby.mathew@arm.com> Dynamic cfg: Update the tools

This patch updates the `fiptool` and `cert_create` for the
`hw_config` and `tb_fw_config` dynamic configuration files.
The necessary UUIDs and OIDs are assigned to these files and
the `cert_create` is updated to generate appropriate hashes
and include them in the "Trusted Boot FW Certificate". The
`fiptool` is updated to allow the configs to be specified
via cmdline and included in the generated FIP.

Change-Id: I940e751a49621ae681d14e162aa1f5697eb0cb15
Signed-off-by: Soby Mathew <soby.mathew@arm.com>
/rk3399_ARM-atf/tools/cert_create/src/tbbr/
H A Dtbb_cert.ce24659df354c31626f78f4d46d453e14959a9953 Tue Nov 07 16:50:31 UTC 2017 Soby Mathew <soby.mathew@arm.com> Dynamic cfg: Update the tools

This patch updates the `fiptool` and `cert_create` for the
`hw_config` and `tb_fw_config` dynamic configuration files.
The necessary UUIDs and OIDs are assigned to these files and
the `cert_create` is updated to generate appropriate hashes
and include them in the "Trusted Boot FW Certificate". The
`fiptool` is updated to allow the configs to be specified
via cmdline and included in the generated FIP.

Change-Id: I940e751a49621ae681d14e162aa1f5697eb0cb15
Signed-off-by: Soby Mathew <soby.mathew@arm.com>
H A Dtbb_ext.ce24659df354c31626f78f4d46d453e14959a9953 Tue Nov 07 16:50:31 UTC 2017 Soby Mathew <soby.mathew@arm.com> Dynamic cfg: Update the tools

This patch updates the `fiptool` and `cert_create` for the
`hw_config` and `tb_fw_config` dynamic configuration files.
The necessary UUIDs and OIDs are assigned to these files and
the `cert_create` is updated to generate appropriate hashes
and include them in the "Trusted Boot FW Certificate". The
`fiptool` is updated to allow the configs to be specified
via cmdline and included in the generated FIP.

Change-Id: I940e751a49621ae681d14e162aa1f5697eb0cb15
Signed-off-by: Soby Mathew <soby.mathew@arm.com>
/rk3399_ARM-atf/include/tools_share/
H A Dtbbr_oid.he24659df354c31626f78f4d46d453e14959a9953 Tue Nov 07 16:50:31 UTC 2017 Soby Mathew <soby.mathew@arm.com> Dynamic cfg: Update the tools

This patch updates the `fiptool` and `cert_create` for the
`hw_config` and `tb_fw_config` dynamic configuration files.
The necessary UUIDs and OIDs are assigned to these files and
the `cert_create` is updated to generate appropriate hashes
and include them in the "Trusted Boot FW Certificate". The
`fiptool` is updated to allow the configs to be specified
via cmdline and included in the generated FIP.

Change-Id: I940e751a49621ae681d14e162aa1f5697eb0cb15
Signed-off-by: Soby Mathew <soby.mathew@arm.com>
H A Dfirmware_image_package.he24659df354c31626f78f4d46d453e14959a9953 Tue Nov 07 16:50:31 UTC 2017 Soby Mathew <soby.mathew@arm.com> Dynamic cfg: Update the tools

This patch updates the `fiptool` and `cert_create` for the
`hw_config` and `tb_fw_config` dynamic configuration files.
The necessary UUIDs and OIDs are assigned to these files and
the `cert_create` is updated to generate appropriate hashes
and include them in the "Trusted Boot FW Certificate". The
`fiptool` is updated to allow the configs to be specified
via cmdline and included in the generated FIP.

Change-Id: I940e751a49621ae681d14e162aa1f5697eb0cb15
Signed-off-by: Soby Mathew <soby.mathew@arm.com>
/rk3399_ARM-atf/tools/fiptool/
H A Dtbbr_config.ce24659df354c31626f78f4d46d453e14959a9953 Tue Nov 07 16:50:31 UTC 2017 Soby Mathew <soby.mathew@arm.com> Dynamic cfg: Update the tools

This patch updates the `fiptool` and `cert_create` for the
`hw_config` and `tb_fw_config` dynamic configuration files.
The necessary UUIDs and OIDs are assigned to these files and
the `cert_create` is updated to generate appropriate hashes
and include them in the "Trusted Boot FW Certificate". The
`fiptool` is updated to allow the configs to be specified
via cmdline and included in the generated FIP.

Change-Id: I940e751a49621ae681d14e162aa1f5697eb0cb15
Signed-off-by: Soby Mathew <soby.mathew@arm.com>