| /rk3399_ARM-atf/plat/rpi/rpi3/ |
| H A D | rpi3_common_mboot.c | 33 tpmt_ha *digest __unused; in plat_mboot_measure_image() 79 digest = ((tpml_digest_values *)digest_buf)->digests; in plat_mboot_measure_image() 81 rc = tpm_pcr_extend(&tpm_chip_data, PCR_0, digest->algorithm_id, in plat_mboot_measure_image() 82 digest->digest, TCG_DIGEST_SIZE); in plat_mboot_measure_image()
|
| /rk3399_ARM-atf/include/drivers/st/ |
| H A D | stm32_hash.h | 26 int stm32_hash_final(uint8_t *digest); 28 uint8_t *digest);
|
| /rk3399_ARM-atf/drivers/nxp/crypto/caam/src/auth/ |
| H A D | rsa.c | 113 uint8_t *padding, *digest; in construct_img_encoded_hash_second() local 129 digest = &representative[1] + len - 32; in construct_img_encoded_hash_second() 130 hash_id = digest - sizeof(hash_identifier); in construct_img_encoded_hash_second() 144 digest[i] = hash[i]; in construct_img_encoded_hash_second()
|
| /rk3399_ARM-atf/drivers/st/crypto/ |
| H A D | stm32_hash.c | 180 static int hash_get_digest(uint8_t *digest) in hash_get_digest() argument 194 (void)(memcpy(&digest[i * sizeof(uint32_t)], (uint8_t *)&dsg, sizeof(uint32_t))); in hash_get_digest() 266 int stm32_hash_final(uint8_t *digest) in stm32_hash_final() argument 291 ret = hash_get_digest(digest); in stm32_hash_final() 299 uint8_t *digest) in stm32_hash_final_update() argument 308 return stm32_hash_final(digest); in stm32_hash_final_update()
|
| /rk3399_ARM-atf/drivers/auth/ |
| H A D | crypto_mod.c | 146 uint8_t *digest) in crypto_mod_tcg_hash() argument 152 assert(digest != NULL); in crypto_mod_tcg_hash() 169 return crypto_mod_calc_hash(crypto_alg_id, data_ptr, data_len, digest); in crypto_mod_tcg_hash()
|
| /rk3399_ARM-atf/include/drivers/measured_boot/event_log/ |
| H A D | tcg.h | 123 uint8_t digest[SHA1_DIGEST_SIZE]; member 245 uint8_t digest[]; /* Digest[] */ member
|
| /rk3399_ARM-atf/include/drivers/amlogic/crypto/ |
| H A D | sha_dma.h | 19 uint8_t digest[SHA256_HASHSZ]; member
|
| /rk3399_ARM-atf/plat/intel/soc/common/lib/sha/ |
| H A D | sha.c | 63 void sha384_finish(sha512_context *ctx, uint8_t digest[SHA384_SUM_LEN]) in sha384_finish() 69 PUT_UINT64_BE(ctx->state[i], digest, i * 8); in sha384_finish() 117 void sha512_finish(sha512_context *ctx, uint8_t digest[SHA512_SUM_LEN]) in sha512_finish() 123 PUT_UINT64_BE(ctx->state[i], digest, i * 8); in sha512_finish()
|
| H A D | sha.h | 151 void sha384_finish(sha512_context *ctx, uint8_t digest[SHA384_SUM_LEN]); 157 void sha512_finish(sha512_context *ctx, uint8_t digest[SHA512_SUM_LEN]);
|
| /rk3399_ARM-atf/drivers/amlogic/crypto/ |
| H A D | sha_dma.c | 118 .dst = (uint32_t)(uintptr_t)ctx->digest, in asd_compute_sha() 123 assert((uintptr_t)ctx->digest == (uintptr_t)desc.dst); in asd_compute_sha() 150 flush_dcache_range((uintptr_t)ctx->digest, SHA256_HASHSZ); in asd_compute_sha()
|
| /rk3399_ARM-atf/include/drivers/nxp/crypto/caam/ |
| H A D | jobdesc.h | 51 uint8_t *digest);
|
| /rk3399_ARM-atf/plat/amlogic/common/ |
| H A D | aml_scpi.c | 233 aml_scpi_send_fw_hash(ctx.digest, sizeof(ctx.digest)); in aml_scpi_upload_scp_fw()
|
| /rk3399_ARM-atf/drivers/nxp/crypto/caam/src/ |
| H A D | jobdesc.c | 211 uint8_t *digest) in cnstr_hash_jobdesc() argument 217 ptr_addr_out = (void *)vtop(digest); in cnstr_hash_jobdesc()
|
| /rk3399_ARM-atf/include/drivers/auth/ |
| H A D | crypto_mod.h | 125 uint8_t *digest);
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | measured_boot.rst | 243 unsigned int len, uint8_t *digest); 247 Event Log measurements use the same digest implementation as the platform 250 algorithm requested by ``tpm_alg_id`` and writes the resulting digest to 251 ``digest``. The buffer is sized according to the Event Log SpecID header, 261 digest. Platforms with special hardware requirements may still provide a
|
| /rk3399_ARM-atf/tools/marvell/doimage/ |
| H A D | doimage.c | 422 unsigned char digest[32]; in image_encrypt() local 437 memset(digest, 0, 32); in image_encrypt() 456 mbedtls_sha256_ret(IV, AES_BLOCK_SZ, digest, 0); in image_encrypt() 457 memcpy(IV, digest, AES_BLOCK_SZ); in image_encrypt()
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model.rst | 907 - Image measurement: the digest value of a component produced by a hash 909 - Signer-id: the digest value of the image verification publiy key. The 948 Beyond the measurements (image digest and signer-id) there are no other assets
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | auth-framework.rst | 370 digest Digest
|
| /rk3399_ARM-atf/docs/ |
| H A D | porting-guide.rst | 816 digest OCTET STRING
|
| H A D | change-log.md | 4516 …- use a salt length equal to digest length for RSA-PSS ([e639ad2](https://review.trustedfirmware.o… 7324 …- clear the entire digest array of Startup Locality event ([70b1c02](https://review.trustedfirmwar… 7553 …- support SHA-2 hash digest generation on a blob ([7e8249a](https://review.trustedfirmware.org/plu… 8190 …- extending to support large file size for SHA2/HMAC get digest and verifying ([70a7e6a](https://r… 12556 - Enabled printing the SHA256 digest with info command, allowing quick
|