| /rk3399_ARM-atf/docs/components/ |
| H A D | cot-binding.rst | 44 In other words, certificates which are validated 59 This property is required for all non-root certificates. 61 This property is not required for root-certificates 62 as root-certificates are validated using root of trust 70 For non-root certificates, this property is used to refer 72 required property for all non-root certificates which are 75 This property is not required for all root-certificates. If 86 This property is used by all certificates which are 332 Description: Contains root-of-trust keys for the root certificates. 337 Root of trust key information present in the root certificates [all …]
|
| H A D | firmware-update.rst | 177 authentication). Secure world certificates and non-AP images are examples
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | trusted-board-boot.rst | 51 The remaining components in the CoT are either certificates or boot loader 52 images. The certificates follow the `X.509 v3`_ standard. This standard 53 enables adding custom extensions to the certificates, which are used to store 56 All certificates are self-signed. There is no need for a Certificate Authority 59 the certificates, different signature schemes are available, please refer to the 62 The certificates are categorised as "Key" and "Content" certificates. Key 63 certificates are used to verify public keys which have been used to sign content 64 certificates. Content certificates are used to store the hash of a boot loader 69 extension fields in the `X.509 v3`_ certificates. 79 In the TBBR CoT, all firmware binaries and certificates are (directly or [all …]
|
| H A D | trusted-board-boot-build.rst | 98 FIP will include the certificates corresponding to the selected Chain of 99 Trust. These certificates can also be found in the output build directory. 134 Both the FIP and FWU_FIP will include the certificates corresponding to the 135 selected Chain of Trust. These certificates can also be found in the output
|
| H A D | auth-framework.rst | 15 X.509v3 certificates to ferry Subject Public Keys, hashes and non-volatile 288 The ``_verify_signature`` function is used to verify certificates, 330 x509v3 certificates, signed ELF files or any other platform specific format). 445 PKI certificates (authentication images). It is expected that open source 710 The TBBR specifies the additional certificates that must accompany these images 715 identifiers for all the images and certificates that will be loaded during the 741 (i.e. the BL2 and Trusted Key certificates are signed with the ROT private 778 extracted from the certificates. In the case of the TBBR CoT, these parameters
|
| /rk3399_ARM-atf/plat/nxp/common/fip_handler/fuse_fip/ |
| H A D | fuse.mk | 60 …$(error Error: Trusted Board Boot with X509 certificates not supported with FUSE_PROG build option)
|
| /rk3399_ARM-atf/docs/plat/nxp/ |
| H A D | nxp-ls-tbbr.rst | 42 Option 1: CoT using X 509 certificates 57 - SAVE_KEYS=1 saves the keys and certificates, if GENERATE_COT=1. 63 - ROTPK for x.509 certificates is generated and embedded in bl2.bin and
|
| /rk3399_ARM-atf/plat/nxp/common/tbbr/ |
| H A D | tbbr.mk | 132 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/plat/imx/imx7/common/ |
| H A D | imx7.mk | 78 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/plat/socionext/uniphier/ |
| H A D | platform.mk | 108 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/plat/socionext/synquacer/ |
| H A D | platform.mk | 83 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/plat/hisilicon/hikey/ |
| H A D | platform.mk | 155 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/plat/imx/imx8m/imx8mp/ |
| H A D | platform.mk | 131 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/docs/tools/ |
| H A D | cot-dt2c.rst | 91 the certificates and the image of a CoT DT file.
|
| /rk3399_ARM-atf/plat/hisilicon/hikey960/ |
| H A D | platform.mk | 148 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/docs/components/fconf/ |
| H A D | tb_fw_bindings.rst | 141 node containing ``manifests`` and ``images`` sub-nodes, with certificates,
|
| /rk3399_ARM-atf/plat/imx/imx8m/imx8mm/ |
| H A D | platform.mk | 134 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/plat/qemu/qemu/ |
| H A D | platform.mk | 77 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/plat/rpi/rpi3/ |
| H A D | platform.mk | 265 certificates: $(ROT_KEY)
|
| /rk3399_ARM-atf/ |
| H A D | Makefile | 443 FIP_DEPS += certificates 1169 certificates: ${CRT_DEPS} ${CRTTOOL} ${DTBS} target
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-10.rst | 41 parse boot certificates in TF-A trusted boot: it is possible for a crafted
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | warp7.rst | 78 BL33=fiptool_images/u-boot.bin certificates all
|
| /rk3399_ARM-atf/docs/plat/arm/ |
| H A D | arm-build-options.rst | 68 to sign the BL2 and Trusted Key certificates. Available options for
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | build-options.rst | 717 tool to create certificates as per the Chain of Trust described in 719 include the certificates in the FIP and FWU_FIP. Default value is '0'. 723 the corresponding certificates, and to include those certificates in the 728 include the corresponding certificates. This FIP can be used to verify the 733 will not include the corresponding certificates, causing a boot failure. 1115 and verify the certificates and images in a FIP, and BL1 includes support 1117 of certificates in the FIP and FWU_FIP depends upon the value of the
|
| /rk3399_ARM-atf/docs/threat_model/ |
| H A D | supply_chain_threat_model.rst | 59 - *cert_create*: This tool is used to generate certificates for binary images.
|