/trusted-firmware-a-3.7.0/tools/cert_create/src/ |
D | key.c | 36 int key_new(key_t *key) in key_new() argument 39 key->key = EVP_PKEY_new(); in key_new() 40 if (key->key == NULL) { in key_new() 48 static int key_create_rsa(key_t *key, int key_bits) in key_create_rsa() argument 56 key->key = rsa; in key_create_rsa() 84 if (!EVP_PKEY_assign_RSA(key->key, rsa)) { in key_create_rsa() 102 static int key_create_ecdsa(key_t *key, int key_bits, const char *curve) in key_create_ecdsa() argument 110 key->key = ec; in key_create_ecdsa() 114 static int key_create_ecdsa_nist(key_t *key, int key_bits) in key_create_ecdsa_nist() argument 117 return key_create_ecdsa(key, key_bits, "secp384r1"); in key_create_ecdsa_nist() [all …]
|
D | main.c | 181 key_t *key; in check_cmd_params() local 235 key = &keys[ext->attr.key]; in check_cmd_params() 236 if (!new_keys && key->fn == NULL) { in check_cmd_params() 238 "specified\n", key->desc, in check_cmd_params() 302 key_t *key; in main() local 398 key = key_get_by_opt(cur_opt); in main() 399 key->fn = strdup(optarg); in main() 540 EXT_CRIT, keys[ext->attr.key].key)); in main()
|
/trusted-firmware-a-3.7.0/plat/rockchip/rk3399/drivers/dp/ |
D | cdn_dp.c | 28 static struct cdn_dp_hdcp_key_1x key; variable 30 int hdcp_handler(struct cdn_dp_hdcp_key_1x *key); 36 memset(&key, 0x00, sizeof(key)); in dp_hdcp_ctrl() 37 hdcp_key_pdata = (uint64_t *)&key; in dp_hdcp_ctrl() 40 if (hdcp_key_pdata == (uint64_t *)(&key + 1)) in dp_hdcp_ctrl() 41 return hdcp_handler(&key); in dp_hdcp_ctrl() 57 if (hdcp_key_pdata < (uint64_t *)&key || in dp_hdcp_store_key() 58 hdcp_key_pdata + 6 > (uint64_t *)(&key + 1)) in dp_hdcp_store_key()
|
/trusted-firmware-a-3.7.0/make_helpers/tbbr/ |
D | tbbr_tools.mk | 57 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert)) 61 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat-key.crt,--plat-key-cert)) 72 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg))) 73 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,FWU_))) 74 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size))) 75 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,FWU_))) 78 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key))) 79 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,FWU_))) 80 $(if ${PROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PROT_KEY},--prot-key))) 81 $(if ${PLAT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PLAT_KEY},--plat-key))) [all …]
|
/trusted-firmware-a-3.7.0/tools/marvell/doimage/secure/ |
D | sec_img_7K.cfg | 3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key"; 6 # Only a key with csk_key_index will be used for signing the image 7 # use "*" string instead of file name for specifying an empty key 8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key", 9 "tools/doimage/secure/csk_priv_pem1.key", 10 "tools/doimage/secure/csk_priv_pem2.key", 11 "tools/doimage/secure/csk_priv_pem3.key", 14 # index of CSK key in the array. Valid range is 0 to 15 17 # AES-256 symmetric key for image encryption
|
D | sec_img_8K.cfg | 3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key"; 6 # Only a key with csk_key_index will be used for signing the image 7 # use "*" string instead of file name for specifying an empty key 8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key", 9 "tools/doimage/secure/csk_priv_pem1.key", 10 "tools/doimage/secure/csk_priv_pem2.key", 11 "tools/doimage/secure/csk_priv_pem3.key", 14 # index of CSK key in the array. Valid range is 0 to 15 17 # AES-256 symmetric key for image encryption
|
/trusted-firmware-a-3.7.0/tools/cert_create/src/tbbr/ |
D | tbb_cert.c | 25 .key = ROT_KEY, 42 .key = ROT_KEY, 57 .key = TRUSTED_WORLD_KEY, 71 .key = SCP_FW_CONTENT_CERT_KEY, 85 .key = TRUSTED_WORLD_KEY, 99 .key = SOC_FW_CONTENT_CERT_KEY, 114 .key = TRUSTED_WORLD_KEY, 128 .key = TRUSTED_OS_FW_CONTENT_CERT_KEY, 145 .key = NON_TRUSTED_WORLD_KEY, 159 .key = NON_TRUSTED_FW_CONTENT_CERT_KEY, [all …]
|
/trusted-firmware-a-3.7.0/plat/nxp/soc-lx2160a/ |
D | ddr_tbbr.mk | 49 $(info Generating: Trusted key certificate as part of DDR cert creation) 51 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,)) 52 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,,DDR_)) 54 $(info Using: Trusted key certificate as part of DDR cert creation) 55 DDR_FIP_ARGS += --trusted-key-cert ${TRUSTED_KEY_CERT} 61 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,DDR_))) 62 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,DDR_))) 64 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,DDR_))) 65 $(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key,D… 66 …WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted-world-key, DDR_))) [all …]
|
/trusted-firmware-a-3.7.0/tools/cert_create/include/ |
D | key.h | 67 EVP_PKEY *key; /* Key container */ member 74 int key_new(key_t *key); 76 int key_create(key_t *key, int type, int key_bits); 77 unsigned int key_load(key_t *key); 78 int key_store(key_t *key);
|
/trusted-firmware-a-3.7.0/docs/design/ |
D | trusted-board-boot.rst | 22 trusted root-key storage registers. Alternatively, a development ROTPK might 51 - **Root of trust key** 53 The private part of this key is used to sign the BL2 content certificate and 54 the trusted key certificate. The public part is the ROTPK. 56 - **Trusted world key** 58 The private part is used to sign the key certificates corresponding to the 62 - **Non-trusted world key** 64 The private part is used to sign the key certificate corresponding to the 72 in one of the extension fields in the corresponding key certificate. 87 It is self-signed with the private part of the ROT key. It contains a hash [all …]
|
/trusted-firmware-a-3.7.0/tools/cert_create/src/dualroot/ |
D | cot.c | 27 .key = ROT_KEY, 44 .key = ROT_KEY, 58 .key = TRUSTED_WORLD_KEY, 72 .key = SCP_FW_CONTENT_CERT_KEY, 86 .key = TRUSTED_WORLD_KEY, 100 .key = SOC_FW_CONTENT_CERT_KEY, 115 .key = TRUSTED_WORLD_KEY, 129 .key = TRUSTED_OS_FW_CONTENT_CERT_KEY, 147 .key = TRUSTED_WORLD_KEY, 165 .key = PROT_KEY, [all …]
|
/trusted-firmware-a-3.7.0/plat/arm/board/common/protpk/ |
D | README | 2 root-of-trust key. 4 * arm_protprivk_rsa.pem is a 2K RSA private key in PEM format. It has been 9 * arm_protpk_rsa_sha256.bin is the SHA-256 hash of the DER-encoded public key 10 associated with the above private key. It has been generated using the openssl
|
/trusted-firmware-a-3.7.0/plat/arm/board/common/swd_rotpk/ |
D | README | 2 root-of-trust key used in the CCA chain of trust. 4 * swd_rotprivk_rsa.pem is a 2K RSA private key in PEM format. It has been 9 * swd_rotpk_rsa_sha256.bin is the SHA-256 hash of the DER-encoded public key 10 associated with the above private key. It has been generated using the openssl
|
/trusted-firmware-a-3.7.0/docs/resources/diagrams/plantuml/ |
D | rss_attestation_flow.puml | 20 Rnote over DelegAttest: Compute input\n\ for key derivation\n\ (hash of measurements) 22 Rnote over DelegAttest: Compute public key\n\ hash with **hash_algo**. 26 Rnote over RMM: Only private key\n\ is returned. Public\n\ key and its hash\n\ must be computed.\n\ 27 Public key is included\n\ in the realm token.\n\ Its hash is the input\n\ for get_platform_token 30 Rnote over DelegAttest: Check **pub_key_hash**\n\ against derived key.
|
/trusted-firmware-a-3.7.0/drivers/nxp/auth/csf_hdr_parser/ |
D | input_bl2_ch2 | 21 # The number of files and key select should lie between 1 and 4 for 1040 and C290. 22 # For rest of the platforms only one key is required and key select should not be provided. 27 # PRI_KEY (Default private key :srk.pri) - [Optional] 29 # PUB_KEY (Default public key :srk.pub) - [Optional] 67 # Specify the signature size.It is mandatory when neither public key nor private key is specified. 68 # Signature size would be [0x80 for 1k key, 0x100 for 2k key, and 0x200 for 4k key].
|
D | csf_hdr_parser.c | 209 static int32_t get_key(struct csf_hdr *hdr, uint8_t **key, uint32_t *len, in get_key() argument 282 *key = (uint8_t *)&(srktbl[key_num - 1].pkey); in get_key() 305 uint8_t *key; in validate_esbc_header() local 314 ret = get_key(hdr, &key, &klen, algo); in validate_esbc_header() 335 if ((key[0] & 0x80) == 0U) { in validate_esbc_header() 341 if ((key[klen / 2 - 1] & 0x1) == 0U) { in validate_esbc_header() 349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header() 360 *img_key = (uint8_t *)key; in validate_esbc_header()
|
/trusted-firmware-a-3.7.0/tools/cert_create/src/cca/ |
D | cot.c | 27 .key = ROT_KEY, 47 .key = SWD_ROT_KEY, 62 .key = CORE_SWD_KEY, 77 .key = CORE_SWD_KEY, 94 .key = PROT_KEY, 109 .key = PLAT_KEY, 126 .key = PLAT_KEY, 213 .attr.key = SWD_ROT_KEY 222 .attr.key = CORE_SWD_KEY 324 .attr.key = PROT_KEY [all …]
|
/trusted-firmware-a-3.7.0/tools/nxp/cert_create_helper/src/ |
D | pdef_tbb_cert.c | 18 .key = TRUSTED_WORLD_KEY, 32 .key = DDR_FW_CONTENT_KEY, 49 .key = DDR_FW_CONTENT_KEY,
|
/trusted-firmware-a-3.7.0/include/drivers/arm/ |
D | ethosn_cert.h | 21 .key = NON_TRUSTED_WORLD_KEY, \ 36 .key = ETHOSN_NPU_FW_CONTENT_CERT_KEY, \ 53 .attr.key = ETHOSN_NPU_FW_CONTENT_CERT_KEY \
|
/trusted-firmware-a-3.7.0/fdts/ |
D | cot_descriptors.dtsi | 50 signing-key = <&trusted_world_pk>; 61 signing-key = <&scp_fw_content_pk>; 72 signing-key = <&trusted_world_pk>; 82 signing-key = <&soc_fw_content_pk>; 96 signing-key = <&trusted_world_pk>; 107 signing-key = <&tos_fw_content_pk>; 127 signing-key = <&non_trusted_world_pk>; 138 signing-key = <&nt_fw_content_pk>; 153 signing-key = <&trusted_world_pk>;
|
/trusted-firmware-a-3.7.0/docs/components/ |
D | cot-binding.rst | 45 using root of trust public key. 63 public key provided by platform. 67 - signing-key 70 This property is used to refer public key node present in 72 non-root certificates which are authenticated using public-key 77 public key provided by platform. 97 Hash and public key information present in the certificate 100 - public key node 101 Description: Provide public key information in the certificate. 108 This property provides the Object ID of public key [all …]
|
/trusted-firmware-a-3.7.0/docs/plat/ |
D | warp7.rst | 90 tools/cert_create/cert_create -n --rot-key "build/warp7/debug/rot_key.pem" \ 93 --trusted-key-cert fiptool_images/trusted-key-cert.key-crt \ 95 --tb-fw-cert fiptool_images/trusted-boot-fw.key-crt\ 98 --tos-fw-key-cert fiptool_images/tee-header_v2.bin.key-crt \ 103 --nt-fw-key-cert fiptool_images/u-boot.bin.key-crt \ 112 --tos-fw-key-cert fiptool_images/tee-header_v2.bin.key-crt \ 114 --nt-fw-key-cert fiptool_images/u-boot.bin.key-crt \ 115 --trusted-key-cert fiptool_images/trusted-key-cert.key-crt \ 116 --tb-fw-cert fiptool_images/trusted-boot-fw.key-crt warp7.fip
|
/trusted-firmware-a-3.7.0/drivers/renesas/common/rom/ |
D | rom_api.c | 14 typedef uint32_t(*rom_secure_boot_api_f) (uint32_t key, uint32_t cert, 71 uint32_t rcar_rom_secure_boot_api(uint32_t key, uint32_t cert, in rcar_rom_secure_boot_api() argument 87 return secure_boot(key, cert, read_flash); in rcar_rom_secure_boot_api()
|
/trusted-firmware-a-3.7.0/tools/encrypt_fw/src/ |
D | main.c | 138 char *key = NULL; in main() local 178 key = optarg; in main() 199 if (!key) { in main() 219 ret = encrypt_file(fw_enc_status, key_alg, key, nonce, in_fn, out_fn); in main()
|
/trusted-firmware-a-3.7.0/drivers/io/ |
D | io_encrypted.c | 160 uint8_t key[ENC_MAX_KEY_SIZE]; in enc_file_read() local 161 size_t key_len = sizeof(key); in enc_file_read() 197 result = plat_get_enc_key_info(fw_enc_status, key, &key_len, &key_flags, in enc_file_read() 206 (void *)buffer, *length_read, key, in enc_file_read() 210 memset(key, 0, key_len); in enc_file_read()
|