Home
last modified time | relevance | path

Searched hist:e4a0a8526b0a3a07792ea21af60cf740e246439a (Results 1 – 4 of 4) sorted by relevance

/optee_os/core/include/drivers/
H A Dzynqmp_csu_puf.he4a0a8526b0a3a07792ea21af60cf740e246439a Mon Oct 04 14:11:59 UTC 2021 Jorge Ramirez-Ortiz <jorge@foundries.io> zynqmp: drivers: Physically Unclonable Function (PUF)

This block is used to generate black keys via the AES-GCM module.
The PUF KEK - feeding the AES-GCM block - is also unique for each
device.

The KEK is only available once the board has been secured via
programmable eFUSES (RSA_EN authentication via the PPK fuses).

Registering the PUF should be done using the Xilinx tools so the
adequate eFUSES are written.

Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
/optee_os/core/drivers/
H A Dzynqmp_csu_puf.ce4a0a8526b0a3a07792ea21af60cf740e246439a Mon Oct 04 14:11:59 UTC 2021 Jorge Ramirez-Ortiz <jorge@foundries.io> zynqmp: drivers: Physically Unclonable Function (PUF)

This block is used to generate black keys via the AES-GCM module.
The PUF KEK - feeding the AES-GCM block - is also unique for each
device.

The KEK is only available once the board has been secured via
programmable eFUSES (RSA_EN authentication via the PPK fuses).

Registering the PUF should be done using the Xilinx tools so the
adequate eFUSES are written.

Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
H A Dsub.mke4a0a8526b0a3a07792ea21af60cf740e246439a Mon Oct 04 14:11:59 UTC 2021 Jorge Ramirez-Ortiz <jorge@foundries.io> zynqmp: drivers: Physically Unclonable Function (PUF)

This block is used to generate black keys via the AES-GCM module.
The PUF KEK - feeding the AES-GCM block - is also unique for each
device.

The KEK is only available once the board has been secured via
programmable eFUSES (RSA_EN authentication via the PPK fuses).

Registering the PUF should be done using the Xilinx tools so the
adequate eFUSES are written.

Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
/optee_os/core/arch/arm/plat-zynqmp/
H A Dconf.mke4a0a8526b0a3a07792ea21af60cf740e246439a Mon Oct 04 14:11:59 UTC 2021 Jorge Ramirez-Ortiz <jorge@foundries.io> zynqmp: drivers: Physically Unclonable Function (PUF)

This block is used to generate black keys via the AES-GCM module.
The PUF KEK - feeding the AES-GCM block - is also unique for each
device.

The KEK is only available once the board has been secured via
programmable eFUSES (RSA_EN authentication via the PPK fuses).

Registering the PUF should be done using the Xilinx tools so the
adequate eFUSES are written.

Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
Acked-by: Etienne Carriere <etienne.carriere@linaro.org>