| /rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/ |
| H A D | cot.c | 41 .pk = &non_trusted_world_pk, 57 .pk = &non_trusted_world_pk, 73 .pk = &non_trusted_world_pk, 89 .pk = &non_trusted_world_pk, 106 .pk = &non_trusted_world_pk, 122 .pk = &non_trusted_world_pk, 140 .pk = &non_trusted_world_pk, 156 .pk = &non_trusted_world_pk, 172 .pk = &non_trusted_world_pk, 188 .pk = &non_trusted_world_pk, [all …]
|
| /rk3399_ARM-atf/drivers/auth/mbedtls/ |
| H A D | mbedtls_psa_crypto.c | 218 static void initialize_pk_context(mbedtls_pk_context *pk, bool *pk_initialized) in initialize_pk_context() argument 220 mbedtls_pk_init(pk); in initialize_pk_context() 224 static void cleanup_pk_context(mbedtls_pk_context *pk, bool *pk_initialized) in cleanup_pk_context() argument 227 mbedtls_pk_free(pk); in cleanup_pk_context() 244 mbedtls_pk_context pk; in verify_signature() local 260 initialize_pk_context(&pk, &pk_initialized); in verify_signature() 264 rc = mbedtls_pk_parse_subpubkey(&p, end, &pk); in verify_signature() 270 rc = mbedtls_pk_get_psa_attributes(&pk, PSA_KEY_USAGE_VERIFY_MESSAGE, in verify_signature() 283 rc = mbedtls_pk_import_into_psa(&pk, &psa_key_attr, &psa_key_id); in verify_signature() 296 cleanup_pk_context(&pk, &pk_initialized); in verify_signature() [all …]
|
| H A D | mbedtls_x509_parser.c | 41 static mbedtls_asn1_buf pk; variable 58 ZERO_AND_CLEAN(pk); in clear_temp_vars() 308 pk.p = p; in cert_parse() 315 pk.len = pk_end - pk.p; in cert_parse() 485 *param = (void *)pk.p; in get_auth_param() 486 *param_len = (unsigned int)pk.len; in get_auth_param()
|
| H A D | mbedtls_crypto.c | 95 mbedtls_pk_context pk = {0}; in verify_signature() local 117 mbedtls_pk_init(&pk); in verify_signature() 120 rc = mbedtls_pk_parse_subpubkey(&p, end, &pk); in verify_signature() 151 rc = mbedtls_pk_verify_ext(pk_alg, sig_opts, &pk, md_alg, hash, in verify_signature() 163 mbedtls_pk_free(&pk); in verify_signature()
|
| H A D | mbedtls_common.mk | 52 pk.c \
|
| /rk3399_ARM-atf/plat/arm/board/juno/ |
| H A D | juno_tbbr_cot_bl2.c | 108 .pk = &subject_pk, 150 .pk = &trusted_world_pk, 182 .pk = &scp_fw_content_pk, 231 .pk = &trusted_world_pk, 263 .pk = &soc_fw_content_pk, 334 .pk = &trusted_world_pk, 366 .pk = &tos_fw_content_pk, 479 .pk = &non_trusted_world_pk, 511 .pk = &nt_fw_content_pk, 581 .pk = &trusted_world_pk, [all …]
|
| /rk3399_ARM-atf/drivers/auth/tbbr/ |
| H A D | tbbr_cot_bl2.c | 114 .pk = &subject_pk, 156 .pk = &trusted_world_pk, 188 .pk = &scp_fw_content_pk, 237 .pk = &trusted_world_pk, 269 .pk = &soc_fw_content_pk, 340 .pk = &trusted_world_pk, 372 .pk = &tos_fw_content_pk, 485 .pk = &non_trusted_world_pk, 517 .pk = &nt_fw_content_pk, 587 .pk = &trusted_world_pk,
|
| H A D | tbbr_cot_common.c | 67 .pk = &subject_pk,
|
| H A D | tbbr_cot_bl1.c | 55 .pk = &subject_pk,
|
| /rk3399_ARM-atf/drivers/nxp/auth/tbbr/ |
| H A D | tbbr_cot.c | 143 .pk = &subject_pk, 186 .pk = &trusted_world_pk, 218 .pk = &soc_fw_content_pk, 289 .pk = &trusted_world_pk, 321 .pk = &tos_fw_content_pk, 434 .pk = &non_trusted_world_pk, 466 .pk = &nt_fw_content_pk, 538 .pk = &trusted_world_pk, 570 .pk = &ddr_fw_content_pk, 681 .pk = &ddr_fw_content_pk,
|
| /rk3399_ARM-atf/tools/cot_dt2c/cot_dt2c/ |
| H A D | cot_parser.py | 107 pk = self.get_rot_keys() 112 if pk: 113 pks = pk.children 139 if pk: 140 G.add_vertex(pk.name) 142 G.add_edge(root_name, pk.name) 143 name_idx[pk.name] = len(lay) 145 parent_set[root_name].append(pk.name) 158 G.add_edge(pk.name, p.name) 160 parent_set[pk.name].append(p.name) [all …]
|
| /rk3399_ARM-atf/drivers/auth/ |
| H A D | auth_mod.c | 196 if (param->pk->cookie != NULL) { in auth_signature() 197 pk_oid = param->pk->cookie; in auth_signature() 208 rc = auth_get_param(param->pk, img_desc->parent, in auth_signature() 220 rc = plat_get_rotpk_info(param->pk->cookie, &pk_plat_ptr, in auth_signature() 232 param->pk, img, img_len, in auth_signature()
|
| /rk3399_ARM-atf/include/drivers/auth/ |
| H A D | auth_common.h | 76 auth_param_type_desc_t *pk; /* Public key */ member
|
| /rk3399_ARM-atf/drivers/auth/dualroot/ |
| H A D | bl1_cot.c | 61 .pk = &subject_pk, 155 .pk = &subject_pk,
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | cot-binding.rst | 143 trusted-world-pk: trusted-world-pk { 146 non-trusted-world-pk: non-trusted-world-pk {
|
| /rk3399_ARM-atf/drivers/auth/cca/ |
| H A D | bl1_cot.c | 54 .pk = &subject_pk,
|
| /rk3399_ARM-atf/lib/fconf/ |
| H A D | fconf_cot_getter.c | 130 *type_desc = img_auth_method->param.sig.pk; in get_auth_param_type_desc() 167 auth_method->param.sig.pk = auth_param_type_desc; in set_auth_method()
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | auth-framework.rst | 583 auth_param_type_desc_t *pk; /* Public key */ 766 - ``pk``: the public key (obtained from parent image) 801 .pk = &subject_pk, 840 .pk = &trusted_world_pk, 872 .pk = &soc_fw_content_pk, 1026 …- Use mbedTLS to parse the ASN1 inputs, and then use the mbedTLS pk module to verify the signature. 1027 - Use mbedTLS to parse the ASN1 inputs, use the mbedTLS pk module to parse the key,
|
| /rk3399_ARM-atf/docs/tools/ |
| H A D | memory-layout-tool.rst | 346 | lib/libmbedtls.a/pk.o | 872(+872) | 0(+0) | 0(+0) |
|
| /rk3399_ARM-atf/docs/ |
| H A D | change-log.md | 5385 …- don't overwrite pk with converted pk when rotpk is hash ([1046b41](https://review.trustedfirmwar…
|