/arm-trusted-firmware-2.8.0/tools/cert_create/src/ |
A D | key.c | 34 key->key = EVP_PKEY_new(); in key_new() 35 if (key->key == NULL) { in key_new() 51 key->key = rsa; in key_create_rsa() 79 if (!EVP_PKEY_assign_RSA(key->key, rsa)) { in key_create_rsa() 105 key->key = ec; in key_create_ecdsa() 139 if (!EVP_PKEY_assign_EC_KEY(key->key, ec)) { in key_create_ecdsa() 201 k = PEM_read_PrivateKey(fp, &key->key, NULL, NULL); in key_load() 229 PEM_write_PrivateKey(fp, key->key, in key_store() 246 key_t *key; in key_init() local 288 key_t *key; in key_get_by_opt() local [all …]
|
A D | main.c | 181 key_t *key; in check_cmd_params() local 235 key = &keys[ext->attr.key]; in check_cmd_params() 236 if (!new_keys && key->fn == NULL) { in check_cmd_params() 238 "specified\n", key->desc, in check_cmd_params() 302 key_t *key; in main() local 398 key = key_get_by_opt(cur_opt); in main() 399 key->fn = strdup(optarg); in main() 539 EXT_CRIT, keys[ext->attr.key].key)); in main()
|
/arm-trusted-firmware-2.8.0/plat/rockchip/rk3399/drivers/dp/ |
A D | cdn_dp.c | 28 static struct cdn_dp_hdcp_key_1x key; variable 30 int hdcp_handler(struct cdn_dp_hdcp_key_1x *key); 36 memset(&key, 0x00, sizeof(key)); in dp_hdcp_ctrl() 37 hdcp_key_pdata = (uint64_t *)&key; in dp_hdcp_ctrl() 40 if (hdcp_key_pdata == (uint64_t *)(&key + 1)) in dp_hdcp_ctrl() 41 return hdcp_handler(&key); in dp_hdcp_ctrl() 57 if (hdcp_key_pdata < (uint64_t *)&key || in dp_hdcp_store_key() 58 hdcp_key_pdata + 6 > (uint64_t *)(&key + 1)) in dp_hdcp_store_key()
|
/arm-trusted-firmware-2.8.0/make_helpers/tbbr/ |
A D | tbbr_tools.mk | 53 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert)) 57 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat-key.crt,--plat-key-cert)) 68 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg))) 69 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,FWU_))) 70 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size))) 71 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,FWU_))) 74 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key))) 75 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,FWU_))) 76 $(if ${PROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PROT_KEY},--prot-key))) 77 $(if ${PLAT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PLAT_KEY},--plat-key))) [all …]
|
/arm-trusted-firmware-2.8.0/tools/marvell/doimage/secure/ |
A D | sec_img_7K.cfg | 3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key"; 6 # Only a key with csk_key_index will be used for signing the image 7 # use "*" string instead of file name for specifying an empty key 8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key", 9 "tools/doimage/secure/csk_priv_pem1.key", 10 "tools/doimage/secure/csk_priv_pem2.key", 11 "tools/doimage/secure/csk_priv_pem3.key", 14 # index of CSK key in the array. Valid range is 0 to 15 17 # AES-256 symmetric key for image encryption
|
A D | sec_img_8K.cfg | 3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key"; 6 # Only a key with csk_key_index will be used for signing the image 7 # use "*" string instead of file name for specifying an empty key 8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key", 9 "tools/doimage/secure/csk_priv_pem1.key", 10 "tools/doimage/secure/csk_priv_pem2.key", 11 "tools/doimage/secure/csk_priv_pem3.key", 14 # index of CSK key in the array. Valid range is 0 to 15 17 # AES-256 symmetric key for image encryption
|
/arm-trusted-firmware-2.8.0/tools/cert_create/src/tbbr/ |
A D | tbb_cert.c | 25 .key = ROT_KEY, 42 .key = ROT_KEY, 57 .key = TRUSTED_WORLD_KEY, 71 .key = SCP_FW_CONTENT_CERT_KEY, 85 .key = TRUSTED_WORLD_KEY, 99 .key = SOC_FW_CONTENT_CERT_KEY, 114 .key = TRUSTED_WORLD_KEY, 128 .key = TRUSTED_OS_FW_CONTENT_CERT_KEY, 145 .key = NON_TRUSTED_WORLD_KEY, 174 .key = TRUSTED_WORLD_KEY, [all …]
|
/arm-trusted-firmware-2.8.0/plat/nxp/soc-lx2160a/ |
A D | ddr_tbbr.mk | 49 $(info Generating: Trusted key certificate as part of DDR cert creation) 51 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,)) 52 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,,DDR_)) 54 $(info Using: Trusted key certificate as part of DDR cert creation) 55 DDR_FIP_ARGS += --trusted-key-cert ${TRUSTED_KEY_CERT} 61 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,DDR_))) 62 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,DDR_))) 64 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,DDR_))) 65 $(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key,D… 69 $(if ${DDR_KEY},$(eval $(call CERT_ADD_CMD_OPT,${DDR_KEY},--ddr-fw-key,DDR_))) [all …]
|
/arm-trusted-firmware-2.8.0/tools/cert_create/include/ |
A D | key.h | 67 EVP_PKEY *key; /* Key container */ member 74 int key_new(key_t *key); 76 int key_create(key_t *key, int type, int key_bits); 77 int key_load(key_t *key, unsigned int *err_code); 78 int key_store(key_t *key);
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | trusted-board-boot.rst | 51 - **Root of trust key** 56 - **Trusted world key** 94 world key. 99 the SCP_BL2 key. 106 - **BL31 key certificate** 109 the BL31 key. 115 - **BL32 key certificate** 118 the BL32 key. 124 - **BL33 key certificate** 127 part of the BL33 key. [all …]
|
/arm-trusted-firmware-2.8.0/tools/cert_create/src/dualroot/ |
A D | cot.c | 27 .key = ROT_KEY, 44 .key = ROT_KEY, 58 .key = TRUSTED_WORLD_KEY, 72 .key = SCP_FW_CONTENT_CERT_KEY, 86 .key = TRUSTED_WORLD_KEY, 115 .key = TRUSTED_WORLD_KEY, 147 .key = TRUSTED_WORLD_KEY, 165 .key = PROT_KEY, 183 .key = ROT_KEY, 198 .key = PROT_KEY, [all …]
|
/arm-trusted-firmware-2.8.0/plat/arm/board/common/protpk/ |
A D | README | 2 root-of-trust key. 4 * arm_protprivk_rsa.pem is a 2K RSA private key in PEM format. It has been 9 * arm_protpk_rsa_sha256.bin is the SHA-256 hash of the DER-encoded public key 10 associated with the above private key. It has been generated using the openssl
|
/arm-trusted-firmware-2.8.0/plat/arm/board/common/swd_rotpk/ |
A D | README | 2 root-of-trust key used in the CCA chain of trust. 4 * swd_rotprivk_rsa.pem is a 2K RSA private key in PEM format. It has been 9 * swd_rotpk_rsa_sha256.bin is the SHA-256 hash of the DER-encoded public key 10 associated with the above private key. It has been generated using the openssl
|
/arm-trusted-firmware-2.8.0/drivers/nxp/auth/csf_hdr_parser/ |
A D | input_bl2_ch2 | 21 # The number of files and key select should lie between 1 and 4 for 1040 and C290. 22 # For rest of the platforms only one key is required and key select should not be provided. 27 # PRI_KEY (Default private key :srk.pri) - [Optional] 29 # PUB_KEY (Default public key :srk.pub) - [Optional] 67 # Specify the signature size.It is mandatory when neither public key nor private key is specified. 68 # Signature size would be [0x80 for 1k key, 0x100 for 2k key, and 0x200 for 4k key].
|
A D | csf_hdr_parser.c | 209 static int32_t get_key(struct csf_hdr *hdr, uint8_t **key, uint32_t *len, in get_key() argument 282 *key = (uint8_t *)&(srktbl[key_num - 1].pkey); in get_key() 305 uint8_t *key; in validate_esbc_header() local 314 ret = get_key(hdr, &key, &klen, algo); in validate_esbc_header() 335 if ((key[0] & 0x80) == 0U) { in validate_esbc_header() 341 if ((key[klen / 2 - 1] & 0x1) == 0U) { in validate_esbc_header() 349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header() 360 *img_key = (uint8_t *)key; in validate_esbc_header()
|
/arm-trusted-firmware-2.8.0/drivers/auth/cryptocell/713/ |
A D | cryptocell_plat_helpers.c | 28 uint32_t *key = (uint32_t *)dst; in cc_get_rotpk_hash() local 45 key, HASH_RESULT_SIZE_IN_WORDS); in cc_get_rotpk_hash() 56 key[i] = le32toh(key[i]); in cc_get_rotpk_hash()
|
/arm-trusted-firmware-2.8.0/tools/nxp/cert_create_helper/src/ |
A D | pdef_tbb_cert.c | 18 .key = TRUSTED_WORLD_KEY, 32 .key = DDR_FW_CONTENT_KEY, 49 .key = DDR_FW_CONTENT_KEY,
|
/arm-trusted-firmware-2.8.0/tools/cert_create/src/cca/ |
A D | cot.c | 27 .key = ROT_KEY, 47 .key = SWD_ROT_KEY, 62 .key = CORE_SWD_KEY, 77 .key = CORE_SWD_KEY, 94 .key = PROT_KEY, 109 .key = PLAT_KEY, 126 .key = PLAT_KEY, 202 .attr.key = SWD_ROT_KEY 211 .attr.key = CORE_SWD_KEY 313 .attr.key = PROT_KEY [all …]
|
/arm-trusted-firmware-2.8.0/fdts/ |
A D | cot_descriptors.dtsi | 50 signing-key = <&trusted_world_pk>; 61 signing-key = <&scp_fw_content_pk>; 72 signing-key = <&trusted_world_pk>; 82 signing-key = <&soc_fw_content_pk>; 96 signing-key = <&trusted_world_pk>; 107 signing-key = <&tos_fw_content_pk>; 127 signing-key = <&non_trusted_world_pk>; 138 signing-key = <&nt_fw_content_pk>; 153 signing-key = <&trusted_world_pk>;
|
A D | stm32mp1-cot-descriptors.dtsi | 45 signing-key = <&trusted_world_pk>; 56 signing-key = <&tos_fw_content_pk>; 76 signing-key = <&non_trusted_world_pk>; 87 signing-key = <&nt_fw_content_pk>;
|
/arm-trusted-firmware-2.8.0/docs/components/ |
A D | cot-binding.rst | 45 using root of trust public key. 63 public key provided by platform. 67 - signing-key 70 This property is used to refer public key node present in 77 public key provided by platform. 100 - public key node 108 This property provides the Object ID of public key 110 public key information can be extracted. 136 trusted-key-cert: trusted-key-cert { 151 parent = <&trusted-key-cert>; [all …]
|
/arm-trusted-firmware-2.8.0/docs/plat/ |
A D | warp7.rst | 90 tools/cert_create/cert_create -n --rot-key "build/warp7/debug/rot_key.pem" \ 93 --trusted-key-cert fiptool_images/trusted-key-cert.key-crt \ 95 --tb-fw-cert fiptool_images/trusted-boot-fw.key-crt\ 98 --tos-fw-key-cert fiptool_images/tee-header_v2.bin.key-crt \ 103 --nt-fw-key-cert fiptool_images/u-boot.bin.key-crt \ 112 --tos-fw-key-cert fiptool_images/tee-header_v2.bin.key-crt \ 114 --nt-fw-key-cert fiptool_images/u-boot.bin.key-crt \ 115 --trusted-key-cert fiptool_images/trusted-key-cert.key-crt \ 116 --tb-fw-cert fiptool_images/trusted-boot-fw.key-crt warp7.fip
|
/arm-trusted-firmware-2.8.0/drivers/renesas/common/rom/ |
A D | rom_api.c | 14 typedef uint32_t(*rom_secure_boot_api_f) (uint32_t *key, uint32_t *cert, 71 uint32_t rcar_rom_secure_boot_api(uint32_t *key, uint32_t *cert, in rcar_rom_secure_boot_api() argument 87 return secure_boot(key, cert, read_flash); in rcar_rom_secure_boot_api()
|
/arm-trusted-firmware-2.8.0/tools/encrypt_fw/src/ |
A D | main.c | 138 char *key = NULL; in main() local 178 key = optarg; in main() 199 if (!key) { in main() 219 ret = encrypt_file(fw_enc_status, key_alg, key, nonce, in_fn, out_fn); in main()
|
/arm-trusted-firmware-2.8.0/drivers/io/ |
A D | io_encrypted.c | 160 uint8_t key[ENC_MAX_KEY_SIZE]; in enc_file_read() local 161 size_t key_len = sizeof(key); in enc_file_read() 197 result = plat_get_enc_key_info(fw_enc_status, key, &key_len, &key_flags, in enc_file_read() 206 (void *)buffer, *length_read, key, in enc_file_read() 210 memset(key, 0, key_len); in enc_file_read()
|