Home
last modified time | relevance | path

Searched refs:RSA (Results 1 – 19 of 19) sorted by relevance

/rk3399_ARM-atf/tools/marvell/doimage/secure/
H A Dcsk_priv_pem1.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
H A Dcsk_priv_pem2.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
H A Dcsk_priv_pem0.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
H A Dcsk_priv_pem3.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
H A Dkak_priv_pem.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
/rk3399_ARM-atf/plat/arm/board/common/swd_rotpk/
H A Darm_swd_rotprivk_rsa.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
H A DREADME4 * swd_rotprivk_rsa.pem is a 2K RSA private key in PEM format. It has been
/rk3399_ARM-atf/plat/arm/board/common/protpk/
H A Darm_protprivk_rsa.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
H A DREADME4 * arm_protprivk_rsa.pem is a 2K RSA private key in PEM format. It has been
/rk3399_ARM-atf/include/drivers/nxp/crypto/caam/
H A Dcaam.h26 RSA, enumerator
/rk3399_ARM-atf/docs/design/
H A Dtrusted-board-boot-build.rst58 RSA public key corresponding to the private key specified by
61 There are also 3k and 4k RSA development keys in ``plat/arm/board/common/rotpk/``.
74 RSA public key corresponding to the private key specified by ``ROT_KEY``.
77 3k and 4k RSA development keys in ``plat/arm/board/common/rotpk/``.
80 RSA public key corresponding to the private key specified by ``ROT_KEY``.
86 Example of command line using RSA development keys:
110 targets using RSA development:
H A Dauth-framework.rst779 are hashes and public keys. In DER format, an RSA-4096 public key requires 550
1051 - ``TF_MBEDTLS_KEY_SIZE`` sets the supported RSA key size for TFA. Valid values
/rk3399_ARM-atf/drivers/nxp/crypto/caam/src/auth/
H A Dnxp_crypto.c51 case RSA: in verify_signature()
/rk3399_ARM-atf/docs/plat/arm/
H A Darm-build-options.rst77 ``HASH_ALG`` is not specified. A different RSA key can be specified by setting
78 ``ROT_KEY``, there are 3k and 4k RSA keys in ``plat/arm/board/common/rotpk/``.
86 the BL1 and BL2 binaries. This key corresponds to the RSA private
88 be changed by setting ``ROT_KEY``, there are 3k and 4k RSA keys in
/rk3399_ARM-atf/docs/plat/nxp/
H A Dnxp-ls-tbbr.rst26 -- NXP CST tool gives an option to generate the RSA key pair and its hash.
98 - Default input file requires user to generate RSA key pair named
/rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/
H A Dcsf_hdr_parser.c221 *key_type = RSA; in get_key()
/rk3399_ARM-atf/tools/cert_create/src/
H A Dkey.c61 RSA *rsa = NULL; in key_create_rsa()
/rk3399_ARM-atf/docs/getting_started/
H A Dbuild-options.rst791 RSA 1.5 algorithm which is not TBBR compliant and is retained only for
793 compliant PKCS#1 RSA 2.1 scheme.
/rk3399_ARM-atf/docs/
H A Dchange-log.md1829 …- increase mbedtls heap for PSA RSA ([2ffc28c](https://review.trustedfirmware.org/plugins/gitiles/…
2000 …- resolve BL2 RAM overflow with RSA+ECDSA in GCC(14.2.1) ([dd566a9](https://review.trustedfirmware…
4516 …- use a salt length equal to digest length for RSA-PSS ([e639ad2](https://review.trustedfirmware.o…
10338 - The default value of `KEY_SIZE` has been changed to to 2048 when RSA is in
10638 CryptoCell-713 and CryptoCell-712 RSA 3K
11096 - cert_create: Add support for bigger RSA key sizes (3KB and 4KB), previously
11187 - cert_create: Remove RSA PKCS#1 v1.5 support
12082 - Added support to cert_create tool for RSA PKCS1# v1.5 and SHA384, SHA512 and
12085 - Enhanced the mbed TLS wrapper layer to include support for both RSA and
12086 ECDSA to enable runtime selection between RSA and ECDSA keys.