| /rk3399_ARM-atf/tools/cert_create/src/ |
| H A D | key.c | 30 cert_key_t *keys; variable 315 keys = malloc((num_def_keys * sizeof(def_keys[0])) in key_init() 321 if (keys == NULL) { in key_init() 326 memcpy(&keys[0], &def_keys[0], (num_def_keys * sizeof(def_keys[0]))); in key_init() 328 memcpy(&keys[num_def_keys], &pdef_keys[0], in key_init() 338 key = &keys[i]; in key_init() 360 key = &keys[i]; in key_get_by_opt() 374 EVP_PKEY_free(keys[i].key); in key_cleanup() 375 if (keys[i].fn != NULL) { in key_cleanup() 376 void *ptr = keys[i].fn; in key_cleanup() [all …]
|
| H A D | main.c | 227 key = &keys[ext->attr.key]; in check_cmd_params() 433 if (!key_new(&keys[i])) { in main() 440 err_code = key_load(&keys[i]); in main() 450 ERROR("Error loading '%s'\n", keys[i].fn); in main() 458 NOTICE("Creating new key for '%s'\n", keys[i].desc); in main() 459 if (!key_create(&keys[i], key_alg, key_size)) { in main() 460 ERROR("Error creating key '%s'\n", keys[i].desc); in main() 465 ERROR("Error opening '%s'\n", keys[i].fn); in main() 467 ERROR("Key '%s' not specified\n", keys[i].desc); in main() 536 EXT_CRIT, keys[ext->attr.key].key)); in main() [all …]
|
| H A D | cert.c | 102 EVP_PKEY *pkey = keys[cert->key].key; in cert_new() 104 EVP_PKEY *ikey = keys[issuer_cert->key].key; in cert_new()
|
| /rk3399_ARM-atf/lib/extensions/pauth/ |
| H A D | pauth.c | 28 uint128_t keys = plat_init_apkey(); in pauth_init() local 29 uint64_t key_lo = LO_64(keys); in pauth_init() 30 uint64_t key_hi = HI_64(keys); in pauth_init()
|
| /rk3399_ARM-atf/tools/sptool/ |
| H A D | sp_mk_generator.py | 71 if "sp_gen_mk" not in args.keys(): 75 if "out_dir" not in args.keys() or not os.path.isdir(args["out_dir"]): 79 if "sp_layout_dir" not in args.keys() or not os.path.isdir(args["sp_layout_dir"]): 119 if type(node) is dict and "file" in node.keys(): 125 if type(node) is dict and "offset" in node.keys(): 170 if len(sp_layout.keys()) > MAX_SP: 279 args["sip_max_count"] = len(sp_layout.keys()) - args["plat_max_count"] 305 sp_pkg_idx = [k for k in sp_layout.keys()].index(sp) + 1 323 if "physical-load-address" in sp_layout[sp].keys():
|
| H A D | spactions.py | 104 for sp in sp_layout.keys():
|
| /rk3399_ARM-atf/plat/arm/board/common/ |
| H A D | board_common.mk | 29 $(warning Development keys support for FVP is deprecated. Use `regs` \ 35 $(warning Development keys support for FVP is deprecated. Use `regs` \ 42 $(warning Development keys support for FVP is deprecated. Use `regs` \ 49 $(warning Development keys support for FVP is deprecated. Use `regs` \
|
| /rk3399_ARM-atf/tools/cert_create/include/ |
| H A D | key.h | 97 extern cert_key_t *keys;
|
| /rk3399_ARM-atf/docs/plat/nxp/ |
| H A D | nxp-ls-tbbr.rst | 25 -- It is the 256 bit hash of the list of the public keys of the SRK key pair. 34 Refer fuse frovisioning readme 'nxp-ls-fuse-prov.rst' for steps to blow these keys. 57 - SAVE_KEYS=1 saves the keys and certificates, if GENERATE_COT=1. 58 …-- For this to work, file name for cert and keys are provided as part of compilation or build com… 101 -- These keys can be generated using gen_keys tool of CST.
|
| /rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/ |
| H A D | input_blx_ch2 | 15 # Specify the file name of the keys separated by comma.
|
| H A D | input_bl2_ch2 | 20 # Specify the file name of the keys separated by comma.
|
| /rk3399_ARM-atf/plat/arm/board/common/protpk/ |
| H A D | README | 1 This directory contains some development keys to be used as the platform
|
| /rk3399_ARM-atf/tools/marvell/doimage/secure/ |
| H A D | sec_img_8K.cfg | 5 # CSK keys array - 16 entries total.
|
| H A D | sec_img_7K.cfg | 5 # CSK keys array - 16 entries total.
|
| /rk3399_ARM-atf/plat/arm/board/common/swd_rotpk/ |
| H A D | README | 1 This directory contains some development keys to be used as the secure world
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | trusted-board-boot.rst | 27 - The key provisioning scheme: which keys need to programmed into the device 63 certificates are used to verify public keys which have been used to sign content 68 for more details. The public keys and hashes are included as non-standard 84 The keys used to establish this CoT are: 103 - **BL3X keys** 186 do not wish to share any keys or have any dependency between each other when it 232 non-trusted world public keys from the verified certificate. 292 and keys as inputs and generates the certificates (in DER format) required to 293 establish the CoT. The input keys must either be a file in PEM format or a 294 PKCS11 URI in case a HSM is used. New keys can be generated by the tool in
|
| H A D | trusted-board-boot-build.rst | 61 There are also 3k and 4k RSA development keys in ``plat/arm/board/common/rotpk/``. 77 3k and 4k RSA development keys in ``plat/arm/board/common/rotpk/``. 86 Example of command line using RSA development keys:
|
| /rk3399_ARM-atf/tools/memory/src/memory/ |
| H A D | memmap.py | 142 obj.printer.print_mem_tree(mtree, list(mtree.keys()), depth=depth) 191 obj.printer.print_symbol_table(symbols, list(images.keys()))
|
| H A D | summary.py | 211 commonprefix([o for o in self._modules.keys() if is_obj(o)])
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | warp7.rst | 180 cp ${CST_PATH}/keys/* ${TEMP} 199 3. Generate keys 207 To get a good over-view of generating keys and programming the fuses on the
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | dtpm_drivers.rst | 6 a dedicated, hardware-based solution for storing cryptographic keys and 11 sensitive information, such as encryption keys and platform credentials, from
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_rse_interface.rst | 37 | | verification keys. At runtime, BL31 obtains the |
|
| /rk3399_ARM-atf/lib/romlib/ |
| H A D | romlib_generator.py | 279 print("usage: romlib_generator.py [%s] [args]" % "|".join(APPS.keys()), file=sys.stderr)
|
| /rk3399_ARM-atf/docs/plat/arm/ |
| H A D | arm-build-options.rst | 78 ``ROT_KEY``, there are 3k and 4k RSA keys in ``plat/arm/board/common/rotpk/``. 88 be changed by setting ``ROT_KEY``, there are 3k and 4k RSA keys in
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | cot-binding.rst | 332 Description: Contains root-of-trust keys for the root certificates.
|