Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 79) sorted by relevance

1234

/arm-trusted-firmware-2.8.0/tools/cert_create/src/
A Dkey.c34 key->key = EVP_PKEY_new(); in key_new()
35 if (key->key == NULL) { in key_new()
51 key->key = rsa; in key_create_rsa()
79 if (!EVP_PKEY_assign_RSA(key->key, rsa)) { in key_create_rsa()
105 key->key = ec; in key_create_ecdsa()
139 if (!EVP_PKEY_assign_EC_KEY(key->key, ec)) { in key_create_ecdsa()
201 k = PEM_read_PrivateKey(fp, &key->key, NULL, NULL); in key_load()
229 PEM_write_PrivateKey(fp, key->key, in key_store()
246 key_t *key; in key_init() local
288 key_t *key; in key_get_by_opt() local
[all …]
A Dmain.c181 key_t *key; in check_cmd_params() local
235 key = &keys[ext->attr.key]; in check_cmd_params()
236 if (!new_keys && key->fn == NULL) { in check_cmd_params()
238 "specified\n", key->desc, in check_cmd_params()
302 key_t *key; in main() local
398 key = key_get_by_opt(cur_opt); in main()
399 key->fn = strdup(optarg); in main()
539 EXT_CRIT, keys[ext->attr.key].key)); in main()
/arm-trusted-firmware-2.8.0/plat/rockchip/rk3399/drivers/dp/
A Dcdn_dp.c28 static struct cdn_dp_hdcp_key_1x key; variable
30 int hdcp_handler(struct cdn_dp_hdcp_key_1x *key);
36 memset(&key, 0x00, sizeof(key)); in dp_hdcp_ctrl()
37 hdcp_key_pdata = (uint64_t *)&key; in dp_hdcp_ctrl()
40 if (hdcp_key_pdata == (uint64_t *)(&key + 1)) in dp_hdcp_ctrl()
41 return hdcp_handler(&key); in dp_hdcp_ctrl()
57 if (hdcp_key_pdata < (uint64_t *)&key || in dp_hdcp_store_key()
58 hdcp_key_pdata + 6 > (uint64_t *)(&key + 1)) in dp_hdcp_store_key()
/arm-trusted-firmware-2.8.0/make_helpers/tbbr/
A Dtbbr_tools.mk53 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert))
57 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat-key.crt,--plat-key-cert))
68 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg)))
69 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,FWU_)))
70 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size)))
71 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,FWU_)))
74 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key)))
75 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,FWU_)))
76 $(if ${PROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PROT_KEY},--prot-key)))
77 $(if ${PLAT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PLAT_KEY},--plat-key)))
[all …]
/arm-trusted-firmware-2.8.0/tools/marvell/doimage/secure/
A Dsec_img_7K.cfg3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
6 # Only a key with csk_key_index will be used for signing the image
7 # use "*" string instead of file name for specifying an empty key
8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
9 "tools/doimage/secure/csk_priv_pem1.key",
10 "tools/doimage/secure/csk_priv_pem2.key",
11 "tools/doimage/secure/csk_priv_pem3.key",
14 # index of CSK key in the array. Valid range is 0 to 15
17 # AES-256 symmetric key for image encryption
A Dsec_img_8K.cfg3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
6 # Only a key with csk_key_index will be used for signing the image
7 # use "*" string instead of file name for specifying an empty key
8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
9 "tools/doimage/secure/csk_priv_pem1.key",
10 "tools/doimage/secure/csk_priv_pem2.key",
11 "tools/doimage/secure/csk_priv_pem3.key",
14 # index of CSK key in the array. Valid range is 0 to 15
17 # AES-256 symmetric key for image encryption
/arm-trusted-firmware-2.8.0/tools/cert_create/src/tbbr/
A Dtbb_cert.c25 .key = ROT_KEY,
42 .key = ROT_KEY,
57 .key = TRUSTED_WORLD_KEY,
71 .key = SCP_FW_CONTENT_CERT_KEY,
85 .key = TRUSTED_WORLD_KEY,
99 .key = SOC_FW_CONTENT_CERT_KEY,
114 .key = TRUSTED_WORLD_KEY,
128 .key = TRUSTED_OS_FW_CONTENT_CERT_KEY,
145 .key = NON_TRUSTED_WORLD_KEY,
174 .key = TRUSTED_WORLD_KEY,
[all …]
/arm-trusted-firmware-2.8.0/plat/nxp/soc-lx2160a/
A Dddr_tbbr.mk49 $(info Generating: Trusted key certificate as part of DDR cert creation)
51 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,))
52 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,,DDR_))
54 $(info Using: Trusted key certificate as part of DDR cert creation)
55 DDR_FIP_ARGS += --trusted-key-cert ${TRUSTED_KEY_CERT}
61 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,DDR_)))
62 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,DDR_)))
64 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,DDR_)))
65 $(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key,D…
69 $(if ${DDR_KEY},$(eval $(call CERT_ADD_CMD_OPT,${DDR_KEY},--ddr-fw-key,DDR_)))
[all …]
/arm-trusted-firmware-2.8.0/tools/cert_create/include/
A Dkey.h67 EVP_PKEY *key; /* Key container */ member
74 int key_new(key_t *key);
76 int key_create(key_t *key, int type, int key_bits);
77 int key_load(key_t *key, unsigned int *err_code);
78 int key_store(key_t *key);
/arm-trusted-firmware-2.8.0/docs/design/
A Dtrusted-board-boot.rst51 - **Root of trust key**
56 - **Trusted world key**
94 world key.
99 the SCP_BL2 key.
106 - **BL31 key certificate**
109 the BL31 key.
115 - **BL32 key certificate**
118 the BL32 key.
124 - **BL33 key certificate**
127 part of the BL33 key.
[all …]
/arm-trusted-firmware-2.8.0/tools/cert_create/src/dualroot/
A Dcot.c27 .key = ROT_KEY,
44 .key = ROT_KEY,
58 .key = TRUSTED_WORLD_KEY,
72 .key = SCP_FW_CONTENT_CERT_KEY,
86 .key = TRUSTED_WORLD_KEY,
115 .key = TRUSTED_WORLD_KEY,
147 .key = TRUSTED_WORLD_KEY,
165 .key = PROT_KEY,
183 .key = ROT_KEY,
198 .key = PROT_KEY,
[all …]
/arm-trusted-firmware-2.8.0/plat/arm/board/common/protpk/
A DREADME2 root-of-trust key.
4 * arm_protprivk_rsa.pem is a 2K RSA private key in PEM format. It has been
9 * arm_protpk_rsa_sha256.bin is the SHA-256 hash of the DER-encoded public key
10 associated with the above private key. It has been generated using the openssl
/arm-trusted-firmware-2.8.0/plat/arm/board/common/swd_rotpk/
A DREADME2 root-of-trust key used in the CCA chain of trust.
4 * swd_rotprivk_rsa.pem is a 2K RSA private key in PEM format. It has been
9 * swd_rotpk_rsa_sha256.bin is the SHA-256 hash of the DER-encoded public key
10 associated with the above private key. It has been generated using the openssl
/arm-trusted-firmware-2.8.0/drivers/nxp/auth/csf_hdr_parser/
A Dinput_bl2_ch221 # The number of files and key select should lie between 1 and 4 for 1040 and C290.
22 # For rest of the platforms only one key is required and key select should not be provided.
27 # PRI_KEY (Default private key :srk.pri) - [Optional]
29 # PUB_KEY (Default public key :srk.pub) - [Optional]
67 # Specify the signature size.It is mandatory when neither public key nor private key is specified.
68 # Signature size would be [0x80 for 1k key, 0x100 for 2k key, and 0x200 for 4k key].
A Dcsf_hdr_parser.c209 static int32_t get_key(struct csf_hdr *hdr, uint8_t **key, uint32_t *len, in get_key() argument
282 *key = (uint8_t *)&(srktbl[key_num - 1].pkey); in get_key()
305 uint8_t *key; in validate_esbc_header() local
314 ret = get_key(hdr, &key, &klen, algo); in validate_esbc_header()
335 if ((key[0] & 0x80) == 0U) { in validate_esbc_header()
341 if ((key[klen / 2 - 1] & 0x1) == 0U) { in validate_esbc_header()
349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header()
360 *img_key = (uint8_t *)key; in validate_esbc_header()
/arm-trusted-firmware-2.8.0/drivers/auth/cryptocell/713/
A Dcryptocell_plat_helpers.c28 uint32_t *key = (uint32_t *)dst; in cc_get_rotpk_hash() local
45 key, HASH_RESULT_SIZE_IN_WORDS); in cc_get_rotpk_hash()
56 key[i] = le32toh(key[i]); in cc_get_rotpk_hash()
/arm-trusted-firmware-2.8.0/tools/nxp/cert_create_helper/src/
A Dpdef_tbb_cert.c18 .key = TRUSTED_WORLD_KEY,
32 .key = DDR_FW_CONTENT_KEY,
49 .key = DDR_FW_CONTENT_KEY,
/arm-trusted-firmware-2.8.0/tools/cert_create/src/cca/
A Dcot.c27 .key = ROT_KEY,
47 .key = SWD_ROT_KEY,
62 .key = CORE_SWD_KEY,
77 .key = CORE_SWD_KEY,
94 .key = PROT_KEY,
109 .key = PLAT_KEY,
126 .key = PLAT_KEY,
202 .attr.key = SWD_ROT_KEY
211 .attr.key = CORE_SWD_KEY
313 .attr.key = PROT_KEY
[all …]
/arm-trusted-firmware-2.8.0/fdts/
A Dcot_descriptors.dtsi50 signing-key = <&trusted_world_pk>;
61 signing-key = <&scp_fw_content_pk>;
72 signing-key = <&trusted_world_pk>;
82 signing-key = <&soc_fw_content_pk>;
96 signing-key = <&trusted_world_pk>;
107 signing-key = <&tos_fw_content_pk>;
127 signing-key = <&non_trusted_world_pk>;
138 signing-key = <&nt_fw_content_pk>;
153 signing-key = <&trusted_world_pk>;
A Dstm32mp1-cot-descriptors.dtsi45 signing-key = <&trusted_world_pk>;
56 signing-key = <&tos_fw_content_pk>;
76 signing-key = <&non_trusted_world_pk>;
87 signing-key = <&nt_fw_content_pk>;
/arm-trusted-firmware-2.8.0/docs/components/
A Dcot-binding.rst45 using root of trust public key.
63 public key provided by platform.
67 - signing-key
70 This property is used to refer public key node present in
77 public key provided by platform.
100 - public key node
108 This property provides the Object ID of public key
110 public key information can be extracted.
136 trusted-key-cert: trusted-key-cert {
151 parent = <&trusted-key-cert>;
[all …]
/arm-trusted-firmware-2.8.0/docs/plat/
A Dwarp7.rst90 tools/cert_create/cert_create -n --rot-key "build/warp7/debug/rot_key.pem" \
93 --trusted-key-cert fiptool_images/trusted-key-cert.key-crt \
95 --tb-fw-cert fiptool_images/trusted-boot-fw.key-crt\
98 --tos-fw-key-cert fiptool_images/tee-header_v2.bin.key-crt \
103 --nt-fw-key-cert fiptool_images/u-boot.bin.key-crt \
112 --tos-fw-key-cert fiptool_images/tee-header_v2.bin.key-crt \
114 --nt-fw-key-cert fiptool_images/u-boot.bin.key-crt \
115 --trusted-key-cert fiptool_images/trusted-key-cert.key-crt \
116 --tb-fw-cert fiptool_images/trusted-boot-fw.key-crt warp7.fip
/arm-trusted-firmware-2.8.0/drivers/renesas/common/rom/
A Drom_api.c14 typedef uint32_t(*rom_secure_boot_api_f) (uint32_t *key, uint32_t *cert,
71 uint32_t rcar_rom_secure_boot_api(uint32_t *key, uint32_t *cert, in rcar_rom_secure_boot_api() argument
87 return secure_boot(key, cert, read_flash); in rcar_rom_secure_boot_api()
/arm-trusted-firmware-2.8.0/tools/encrypt_fw/src/
A Dmain.c138 char *key = NULL; in main() local
178 key = optarg; in main()
199 if (!key) { in main()
219 ret = encrypt_file(fw_enc_status, key_alg, key, nonce, in_fn, out_fn); in main()
/arm-trusted-firmware-2.8.0/drivers/io/
A Dio_encrypted.c160 uint8_t key[ENC_MAX_KEY_SIZE]; in enc_file_read() local
161 size_t key_len = sizeof(key); in enc_file_read()
197 result = plat_get_enc_key_info(fw_enc_status, key, &key_len, &key_flags, in enc_file_read()
206 (void *)buffer, *length_read, key, in enc_file_read()
210 memset(key, 0, key_len); in enc_file_read()

Completed in 32 milliseconds

1234