Home
last modified time | relevance | path

Searched refs:sign (Results 1 – 14 of 14) sorted by relevance

/arm-trusted-firmware-2.8.0/drivers/nxp/auth/csf_hdr_parser/
A Dinput_blx_ch212 # ESBC Flag. Specify ESBC=0 to sign u-boot and ESBC=1 to sign ESBC images.(default is 0)
A Dinput_bl2_ch213 # ESBC Flag. Specify ESBC=0 to sign u-boot and ESBC=1 to sign ESBC images.(default is 0)
63 # Specify the file names of hash file and sign file.
65 INPUT_SIGN_FILENAME=sign.out
/arm-trusted-firmware-2.8.0/drivers/nxp/crypto/caam/src/auth/
A Drsa.c37 static int rsa_public_verif_sec(uint8_t *sign, uint8_t *to, in rsa_public_verif_sec() argument
49 ctx.pkin.a = sign; in rsa_public_verif_sec()
59 flush_dcache_range((uintptr_t)sign, klen); in rsa_public_verif_sec()
/arm-trusted-firmware-2.8.0/docs/design/
A Dtrusted-board-boot.rst37 extensions. To sign the certificates, different signature schemes are available,
41 certificates are used to verify public keys which have been used to sign content
53 The private part of this key is used to sign the BL2 content certificate and
58 The private part is used to sign the key certificates corresponding to the
64 The private part is used to sign the key certificate corresponding to the
71 sign the content certificate for the BL3X image. The public part is stored
A Dauth-framework.rst313 #. A pointer to data to sign
/arm-trusted-firmware-2.8.0/
A Ddco.txt35 personal information I submit with it, including my sign-off) is
A DMakefile390 WARNINGS += -Wshift-overflow -Wshift-sign-overflow \
/arm-trusted-firmware-2.8.0/lib/compiler-rt/builtins/
A Dint_div_impl.inc79 s_a ^= s_b; // sign of quotient
/arm-trusted-firmware-2.8.0/docs/
A Dlicense.rst5 this project are accepted under the same license with developer sign-off as
A Dchange-log.md801 …- correct sign-compare warning ([ed38366](https://review.trustedfirmware.org/plugins/gitiles/TF-A/…
1223 …- add sign-compare warning ([c10f3a4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trus…
/arm-trusted-firmware-2.8.0/docs/plat/
A Dqti-msm8916.rst70 case you can simply sign the ELF image using a randomly generated key. You can
A Dwarp7.rst149 A further step is to sign BL2.
/arm-trusted-firmware-2.8.0/docs/plat/arm/
A Darm-build-options.rst56 to sign the BL2 and Trusted Key certificates. Available options for
/arm-trusted-firmware-2.8.0/docs/getting_started/
A Dporting-guide.rst2315 sign Realm attestation token. The API currently only supports P-384 ECC curve

Completed in 27 milliseconds