Searched hist:e4a0a8526b0a3a07792ea21af60cf740e246439a (Results 1 – 4 of 4) sorted by relevance
| /optee_os/core/include/drivers/ |
| H A D | zynqmp_csu_puf.h | e4a0a8526b0a3a07792ea21af60cf740e246439a Mon Oct 04 14:11:59 UTC 2021 Jorge Ramirez-Ortiz <jorge@foundries.io> zynqmp: drivers: Physically Unclonable Function (PUF)
This block is used to generate black keys via the AES-GCM module. The PUF KEK - feeding the AES-GCM block - is also unique for each device.
The KEK is only available once the board has been secured via programmable eFUSES (RSA_EN authentication via the PPK fuses).
Registering the PUF should be done using the Xilinx tools so the adequate eFUSES are written.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
|
| /optee_os/core/drivers/ |
| H A D | zynqmp_csu_puf.c | e4a0a8526b0a3a07792ea21af60cf740e246439a Mon Oct 04 14:11:59 UTC 2021 Jorge Ramirez-Ortiz <jorge@foundries.io> zynqmp: drivers: Physically Unclonable Function (PUF)
This block is used to generate black keys via the AES-GCM module. The PUF KEK - feeding the AES-GCM block - is also unique for each device.
The KEK is only available once the board has been secured via programmable eFUSES (RSA_EN authentication via the PPK fuses).
Registering the PUF should be done using the Xilinx tools so the adequate eFUSES are written.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
|
| H A D | sub.mk | e4a0a8526b0a3a07792ea21af60cf740e246439a Mon Oct 04 14:11:59 UTC 2021 Jorge Ramirez-Ortiz <jorge@foundries.io> zynqmp: drivers: Physically Unclonable Function (PUF)
This block is used to generate black keys via the AES-GCM module. The PUF KEK - feeding the AES-GCM block - is also unique for each device.
The KEK is only available once the board has been secured via programmable eFUSES (RSA_EN authentication via the PPK fuses).
Registering the PUF should be done using the Xilinx tools so the adequate eFUSES are written.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
|
| /optee_os/core/arch/arm/plat-zynqmp/ |
| H A D | conf.mk | e4a0a8526b0a3a07792ea21af60cf740e246439a Mon Oct 04 14:11:59 UTC 2021 Jorge Ramirez-Ortiz <jorge@foundries.io> zynqmp: drivers: Physically Unclonable Function (PUF)
This block is used to generate black keys via the AES-GCM module. The PUF KEK - feeding the AES-GCM block - is also unique for each device.
The KEK is only available once the board has been secured via programmable eFUSES (RSA_EN authentication via the PPK fuses).
Registering the PUF should be done using the Xilinx tools so the adequate eFUSES are written.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
|