Home
last modified time | relevance | path

Searched refs:hash (Results 1 – 25 of 58) sorted by relevance

123

/arm-trusted-firmware-2.8.0/drivers/auth/tbbr/
A Dtbbr_cot_bl1.c34 .param.hash = {
36 .hash = &tb_fw_hash
94 .param.hash = {
96 .hash = &scp_bl2u_hash
111 .param.hash = {
113 .hash = &bl2u_hash
128 .param.hash = {
130 .hash = &ns_bl2u_hash
145 .param.hash = {
160 .param.hash = {
[all …]
A Dtbbr_cot_bl2.c201 .param.hash = {
203 .hash = &scp_fw_hash
289 .param.hash = {
291 .hash = &soc_fw_hash
304 .param.hash = {
406 .param.hash = {
420 .param.hash = {
434 .param.hash = {
449 .param.hash = {
537 .param.hash = {
[all …]
A Dtbbr_cot_common.c120 .param.hash = {
122 .hash = &hw_config_hash
/arm-trusted-firmware-2.8.0/fdts/
A Dcot_descriptors.dtsi202 hash = <&scp_fw_hash>;
208 hash = <&soc_fw_hash>;
220 hash = <&tos_fw_hash>;
257 hash = <&sp_pkg1_hash>;
263 hash = <&sp_pkg2_hash>;
269 hash = <&sp_pkg3_hash>;
275 hash = <&sp_pkg4_hash>;
281 hash = <&sp_pkg5_hash>;
287 hash = <&sp_pkg6_hash>;
293 hash = <&sp_pkg7_hash>;
[all …]
A Dstm32mp1-cot-descriptors.dtsi102 hash = <&hw_config_hash>;
108 hash = <&fw_config_hash>;
114 hash = <&tos_fw_hash>;
120 hash = <&tos_fw_extra1_hash>;
126 hash = <&tos_fw_extra2_hash>;
132 hash = <&tos_fw_config_hash>;
138 hash = <&nt_world_bl_hash>;
/arm-trusted-firmware-2.8.0/drivers/nxp/auth/tbbr/
A Dtbbr_cot.c255 .param.hash = {
270 .param.hash = {
372 .param.hash = {
386 .param.hash = {
400 .param.hash = {
415 .param.hash = {
503 .param.hash = {
518 .param.hash = {
622 .param.hash = {
636 .param.hash = {
[all …]
/arm-trusted-firmware-2.8.0/tools/cert_create/src/
A Dext.c185 HASH *hash; in ext_new_hash() local
191 hash = HASH_new(); in ext_new_hash()
192 if (hash == NULL) { in ext_new_hash()
199 HASH_free(hash); in ext_new_hash()
204 hash->hashAlgorithm->algorithm = algorithm; in ext_new_hash()
205 hash->hashAlgorithm->parameter = ASN1_TYPE_new(); in ext_new_hash()
206 ASN1_TYPE_set(hash->hashAlgorithm->parameter, V_ASN1_NULL, NULL); in ext_new_hash()
209 ASN1_OCTET_STRING_set(hash->dataHash, buf, len); in ext_new_hash()
212 sz = i2d_HASH(hash, &p); in ext_new_hash()
214 HASH_free(hash); in ext_new_hash()
[all …]
/arm-trusted-firmware-2.8.0/drivers/auth/dualroot/
A Dcot.c190 .param.hash = {
207 .param.hash = {
224 .param.hash = {
239 .param.hash = {
358 .param.hash = {
447 .param.hash = {
463 .param.hash = {
566 .param.hash = {
581 .param.hash = {
596 .param.hash = {
[all …]
/arm-trusted-firmware-2.8.0/drivers/auth/cca/
A Dcot.c194 .param.hash = {
209 .param.hash = {
224 .param.hash = {
242 .param.hash = {
258 .param.hash = {
274 .param.hash = {
290 .param.hash = {
381 .param.hash = {
397 .param.hash = {
487 .param.hash = {
[all …]
/arm-trusted-firmware-2.8.0/drivers/nxp/crypto/caam/src/auth/
A Dnxp_crypto.c83 uint8_t hash[SHA256_BYTES] __aligned(CACHE_WRITEBACK_GRANULE) = {0}; in verify_hash() local
100 ret = hash_final(algo, ctx, hash, digest_size); in verify_hash()
107 VERBOSE("%x\n", *((uint32_t *)hash + i)); in verify_hash()
111 if (memcmp(hash, (hash_tbl + (i * digest_size)), in verify_hash()
/arm-trusted-firmware-2.8.0/plat/arm/board/fvp/
A Dfvp_plat_attest_token.c98 uintptr_t hash, size_t hash_size) in plat_rmmd_get_cca_attest_token() argument
100 (void)hash; in plat_rmmd_get_cca_attest_token()
/arm-trusted-firmware-2.8.0/plat/st/common/
A Dstm32mp_trusted_boot.c30 static int copy_hash_from_otp(const char *otp_name, uint8_t *hash, size_t len) in copy_hash_from_otp() argument
59 memcpy(hash + i * sizeof(uint32_t), &tmp, sizeof(tmp)); in copy_hash_from_otp()
84 static int get_rotpk_hash(void *cookie, uint8_t *hash, size_t len) in get_rotpk_hash() argument
90 return copy_hash_from_otp(PKH_OTP, hash, len); in get_rotpk_hash()
93 static int get_rotpk_hash(void *cookie, uint8_t *hash, size_t len) in get_rotpk_hash() argument
140 memcpy(hash, param->pk_hashes[pk_idx], sizeof(otp_hash)); in get_rotpk_hash()
/arm-trusted-firmware-2.8.0/docs/design/
A Dtrusted-board-boot.rst21 - A SHA-256 hash of the Root of Trust Public Key (ROTPK). It is stored in the
23 be used and its hash embedded into the BL1 and BL2 images (only for
43 image. An image can be authenticated by calculating its hash and matching it
44 with the hash extracted from the content certificate. Various hash algorithms
143 read from the verified certificate. A hash of that key is calculated and
145 registers. If they match, the BL2 hash is read from the certificate.
151 - BL1 loads the BL2 image. Its hash is calculated and compared with the hash
156 read from the verified certificate. A hash of that key is calculated and
172 BL2 reads and saves the BL3x image hash from the certificate.
181 verification succeeds, BL2 reads and saves the BL33 image hash from the
[all …]
A Dtrusted-board-boot-build.rst45 In the case of Arm platforms, the location of the ROTPK hash must also be
49 - ``ARM_ROTPK_LOCATION=regs``: the ROTPK hash is obtained from the Trusted
55 key hash, whose private part is not currently available.
57 - ``ARM_ROTPK_LOCATION=devel_rsa``: use the default hash located in
59 generation of the new hash if ``ROT_KEY`` is specified.
61 - ``ARM_ROTPK_LOCATION=devel_ecdsa``: use the default hash located in
63 generation of the new hash if ``ROT_KEY`` is specified.
/arm-trusted-firmware-2.8.0/include/drivers/auth/
A Dauth_common.h69 auth_param_type_desc_t *hash; /* Hash to match with */ member
96 auth_method_param_hash_t hash; member
A Dauth_mod.h82 .param.hash = { \
84 .hash = &sp_pkg##n##_hash \
/arm-trusted-firmware-2.8.0/services/std_svc/rmmd/
A Drmmd_attest.c23 static void print_challenge(uint8_t *hash, size_t hash_size) in print_challenge() argument
40 hex_chars[hash[i] >> 4]; in print_challenge()
42 hex_chars[hash[i] & 0x0f]; in print_challenge()
/arm-trusted-firmware-2.8.0/bl32/tsp/
A Dtsp.ld.S113 *(.dynsym .dynstr .hash .gnu.hash)
/arm-trusted-firmware-2.8.0/drivers/auth/mbedtls/
A Dmbedtls_crypto.c87 unsigned char hash[MBEDTLS_MD_MAX_SIZE]; in verify_signature() local
131 rc = mbedtls_md(md_info, p, data_len, hash); in verify_signature()
138 rc = mbedtls_pk_verify_ext(pk_alg, sig_opts, &pk, md_alg, hash, in verify_signature()
168 unsigned char *p, *end, *hash; in verify_hash() local
208 hash = p; in verify_hash()
218 rc = memcmp(data_hash, hash, mbedtls_md_get_size(md_info)); in verify_hash()
/arm-trusted-firmware-2.8.0/docs/components/
A Dcot-binding.rst114 - hash node
115 Description: Provide the hash information in the certificate.
122 This property provides the Object ID of hash provided in
123 the certificate which the help of which hash information
206 - hash
210 hash method. This property is used to refer hash
217 Currently, all images are validated using 'hash'
232 hash = <&scp_fw_hash>;
/arm-trusted-firmware-2.8.0/bl32/sp_min/
A Dsp_min.ld.S146 *(.dynsym .dynstr .hash .gnu.hash)
/arm-trusted-firmware-2.8.0/tools/conventional-changelog-tf-a/templates/
A Dcommit.hbs11 {{~#if hash }} {{#if @root.linkReferences ~}}
/arm-trusted-firmware-2.8.0/drivers/nxp/auth/csf_hdr_parser/
A Dcsf_hdr_parser.c57 uint8_t hash[SHA256_BYTES]; in deploy_rotpk_hash_table() local
81 ret = hash_final(algo, ctx, hash, digest_size); in deploy_rotpk_hash_table()
94 VERBOSE("%x\n", *((uint32_t *)hash + i)); in deploy_rotpk_hash_table()
97 if (memcmp(hash, srk_hash, SHA256_BYTES) != 0) { in deploy_rotpk_hash_table()
/arm-trusted-firmware-2.8.0/include/drivers/st/
A Dstm32_pka.h39 int stm32_pka_ecdsa_verif(void *hash, unsigned int hash_size,
/arm-trusted-firmware-2.8.0/bl31/
A Dbl31.ld.S197 *(.dynsym .dynstr .hash .gnu.hash)

Completed in 27 milliseconds

123