/arm-trusted-firmware-2.8.0/drivers/auth/tbbr/ |
A D | tbbr_cot_bl1.c | 34 .param.hash = { 36 .hash = &tb_fw_hash 94 .param.hash = { 96 .hash = &scp_bl2u_hash 111 .param.hash = { 113 .hash = &bl2u_hash 128 .param.hash = { 130 .hash = &ns_bl2u_hash 145 .param.hash = { 160 .param.hash = { [all …]
|
A D | tbbr_cot_bl2.c | 201 .param.hash = { 203 .hash = &scp_fw_hash 289 .param.hash = { 291 .hash = &soc_fw_hash 304 .param.hash = { 406 .param.hash = { 420 .param.hash = { 434 .param.hash = { 449 .param.hash = { 537 .param.hash = { [all …]
|
A D | tbbr_cot_common.c | 120 .param.hash = { 122 .hash = &hw_config_hash
|
/arm-trusted-firmware-2.8.0/fdts/ |
A D | cot_descriptors.dtsi | 202 hash = <&scp_fw_hash>; 208 hash = <&soc_fw_hash>; 220 hash = <&tos_fw_hash>; 257 hash = <&sp_pkg1_hash>; 263 hash = <&sp_pkg2_hash>; 269 hash = <&sp_pkg3_hash>; 275 hash = <&sp_pkg4_hash>; 281 hash = <&sp_pkg5_hash>; 287 hash = <&sp_pkg6_hash>; 293 hash = <&sp_pkg7_hash>; [all …]
|
A D | stm32mp1-cot-descriptors.dtsi | 102 hash = <&hw_config_hash>; 108 hash = <&fw_config_hash>; 114 hash = <&tos_fw_hash>; 120 hash = <&tos_fw_extra1_hash>; 126 hash = <&tos_fw_extra2_hash>; 132 hash = <&tos_fw_config_hash>; 138 hash = <&nt_world_bl_hash>;
|
/arm-trusted-firmware-2.8.0/drivers/nxp/auth/tbbr/ |
A D | tbbr_cot.c | 255 .param.hash = { 270 .param.hash = { 372 .param.hash = { 386 .param.hash = { 400 .param.hash = { 415 .param.hash = { 503 .param.hash = { 518 .param.hash = { 622 .param.hash = { 636 .param.hash = { [all …]
|
/arm-trusted-firmware-2.8.0/tools/cert_create/src/ |
A D | ext.c | 185 HASH *hash; in ext_new_hash() local 191 hash = HASH_new(); in ext_new_hash() 192 if (hash == NULL) { in ext_new_hash() 199 HASH_free(hash); in ext_new_hash() 204 hash->hashAlgorithm->algorithm = algorithm; in ext_new_hash() 205 hash->hashAlgorithm->parameter = ASN1_TYPE_new(); in ext_new_hash() 206 ASN1_TYPE_set(hash->hashAlgorithm->parameter, V_ASN1_NULL, NULL); in ext_new_hash() 209 ASN1_OCTET_STRING_set(hash->dataHash, buf, len); in ext_new_hash() 212 sz = i2d_HASH(hash, &p); in ext_new_hash() 214 HASH_free(hash); in ext_new_hash() [all …]
|
/arm-trusted-firmware-2.8.0/drivers/auth/dualroot/ |
A D | cot.c | 190 .param.hash = { 207 .param.hash = { 224 .param.hash = { 239 .param.hash = { 358 .param.hash = { 447 .param.hash = { 463 .param.hash = { 566 .param.hash = { 581 .param.hash = { 596 .param.hash = { [all …]
|
/arm-trusted-firmware-2.8.0/drivers/auth/cca/ |
A D | cot.c | 194 .param.hash = { 209 .param.hash = { 224 .param.hash = { 242 .param.hash = { 258 .param.hash = { 274 .param.hash = { 290 .param.hash = { 381 .param.hash = { 397 .param.hash = { 487 .param.hash = { [all …]
|
/arm-trusted-firmware-2.8.0/drivers/nxp/crypto/caam/src/auth/ |
A D | nxp_crypto.c | 83 uint8_t hash[SHA256_BYTES] __aligned(CACHE_WRITEBACK_GRANULE) = {0}; in verify_hash() local 100 ret = hash_final(algo, ctx, hash, digest_size); in verify_hash() 107 VERBOSE("%x\n", *((uint32_t *)hash + i)); in verify_hash() 111 if (memcmp(hash, (hash_tbl + (i * digest_size)), in verify_hash()
|
/arm-trusted-firmware-2.8.0/plat/arm/board/fvp/ |
A D | fvp_plat_attest_token.c | 98 uintptr_t hash, size_t hash_size) in plat_rmmd_get_cca_attest_token() argument 100 (void)hash; in plat_rmmd_get_cca_attest_token()
|
/arm-trusted-firmware-2.8.0/plat/st/common/ |
A D | stm32mp_trusted_boot.c | 30 static int copy_hash_from_otp(const char *otp_name, uint8_t *hash, size_t len) in copy_hash_from_otp() argument 59 memcpy(hash + i * sizeof(uint32_t), &tmp, sizeof(tmp)); in copy_hash_from_otp() 84 static int get_rotpk_hash(void *cookie, uint8_t *hash, size_t len) in get_rotpk_hash() argument 90 return copy_hash_from_otp(PKH_OTP, hash, len); in get_rotpk_hash() 93 static int get_rotpk_hash(void *cookie, uint8_t *hash, size_t len) in get_rotpk_hash() argument 140 memcpy(hash, param->pk_hashes[pk_idx], sizeof(otp_hash)); in get_rotpk_hash()
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | trusted-board-boot.rst | 21 - A SHA-256 hash of the Root of Trust Public Key (ROTPK). It is stored in the 23 be used and its hash embedded into the BL1 and BL2 images (only for 43 image. An image can be authenticated by calculating its hash and matching it 44 with the hash extracted from the content certificate. Various hash algorithms 143 read from the verified certificate. A hash of that key is calculated and 145 registers. If they match, the BL2 hash is read from the certificate. 151 - BL1 loads the BL2 image. Its hash is calculated and compared with the hash 156 read from the verified certificate. A hash of that key is calculated and 172 BL2 reads and saves the BL3x image hash from the certificate. 181 verification succeeds, BL2 reads and saves the BL33 image hash from the [all …]
|
A D | trusted-board-boot-build.rst | 45 In the case of Arm platforms, the location of the ROTPK hash must also be 49 - ``ARM_ROTPK_LOCATION=regs``: the ROTPK hash is obtained from the Trusted 55 key hash, whose private part is not currently available. 57 - ``ARM_ROTPK_LOCATION=devel_rsa``: use the default hash located in 59 generation of the new hash if ``ROT_KEY`` is specified. 61 - ``ARM_ROTPK_LOCATION=devel_ecdsa``: use the default hash located in 63 generation of the new hash if ``ROT_KEY`` is specified.
|
/arm-trusted-firmware-2.8.0/include/drivers/auth/ |
A D | auth_common.h | 69 auth_param_type_desc_t *hash; /* Hash to match with */ member 96 auth_method_param_hash_t hash; member
|
A D | auth_mod.h | 82 .param.hash = { \ 84 .hash = &sp_pkg##n##_hash \
|
/arm-trusted-firmware-2.8.0/services/std_svc/rmmd/ |
A D | rmmd_attest.c | 23 static void print_challenge(uint8_t *hash, size_t hash_size) in print_challenge() argument 40 hex_chars[hash[i] >> 4]; in print_challenge() 42 hex_chars[hash[i] & 0x0f]; in print_challenge()
|
/arm-trusted-firmware-2.8.0/bl32/tsp/ |
A D | tsp.ld.S | 113 *(.dynsym .dynstr .hash .gnu.hash)
|
/arm-trusted-firmware-2.8.0/drivers/auth/mbedtls/ |
A D | mbedtls_crypto.c | 87 unsigned char hash[MBEDTLS_MD_MAX_SIZE]; in verify_signature() local 131 rc = mbedtls_md(md_info, p, data_len, hash); in verify_signature() 138 rc = mbedtls_pk_verify_ext(pk_alg, sig_opts, &pk, md_alg, hash, in verify_signature() 168 unsigned char *p, *end, *hash; in verify_hash() local 208 hash = p; in verify_hash() 218 rc = memcmp(data_hash, hash, mbedtls_md_get_size(md_info)); in verify_hash()
|
/arm-trusted-firmware-2.8.0/docs/components/ |
A D | cot-binding.rst | 114 - hash node 115 Description: Provide the hash information in the certificate. 122 This property provides the Object ID of hash provided in 123 the certificate which the help of which hash information 206 - hash 210 hash method. This property is used to refer hash 217 Currently, all images are validated using 'hash' 232 hash = <&scp_fw_hash>;
|
/arm-trusted-firmware-2.8.0/bl32/sp_min/ |
A D | sp_min.ld.S | 146 *(.dynsym .dynstr .hash .gnu.hash)
|
/arm-trusted-firmware-2.8.0/tools/conventional-changelog-tf-a/templates/ |
A D | commit.hbs | 11 {{~#if hash }} {{#if @root.linkReferences ~}}
|
/arm-trusted-firmware-2.8.0/drivers/nxp/auth/csf_hdr_parser/ |
A D | csf_hdr_parser.c | 57 uint8_t hash[SHA256_BYTES]; in deploy_rotpk_hash_table() local 81 ret = hash_final(algo, ctx, hash, digest_size); in deploy_rotpk_hash_table() 94 VERBOSE("%x\n", *((uint32_t *)hash + i)); in deploy_rotpk_hash_table() 97 if (memcmp(hash, srk_hash, SHA256_BYTES) != 0) { in deploy_rotpk_hash_table()
|
/arm-trusted-firmware-2.8.0/include/drivers/st/ |
A D | stm32_pka.h | 39 int stm32_pka_ecdsa_verif(void *hash, unsigned int hash_size,
|
/arm-trusted-firmware-2.8.0/bl31/ |
A D | bl31.ld.S | 197 *(.dynsym .dynstr .hash .gnu.hash)
|