Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 85) sorted by relevance

1234

/trusted-firmware-a-3.7.0/tools/cert_create/src/
Dkey.c36 int key_new(key_t *key) in key_new() argument
39 key->key = EVP_PKEY_new(); in key_new()
40 if (key->key == NULL) { in key_new()
48 static int key_create_rsa(key_t *key, int key_bits) in key_create_rsa() argument
56 key->key = rsa; in key_create_rsa()
84 if (!EVP_PKEY_assign_RSA(key->key, rsa)) { in key_create_rsa()
102 static int key_create_ecdsa(key_t *key, int key_bits, const char *curve) in key_create_ecdsa() argument
110 key->key = ec; in key_create_ecdsa()
114 static int key_create_ecdsa_nist(key_t *key, int key_bits) in key_create_ecdsa_nist() argument
117 return key_create_ecdsa(key, key_bits, "secp384r1"); in key_create_ecdsa_nist()
[all …]
Dmain.c181 key_t *key; in check_cmd_params() local
235 key = &keys[ext->attr.key]; in check_cmd_params()
236 if (!new_keys && key->fn == NULL) { in check_cmd_params()
238 "specified\n", key->desc, in check_cmd_params()
302 key_t *key; in main() local
398 key = key_get_by_opt(cur_opt); in main()
399 key->fn = strdup(optarg); in main()
540 EXT_CRIT, keys[ext->attr.key].key)); in main()
/trusted-firmware-a-3.7.0/plat/rockchip/rk3399/drivers/dp/
Dcdn_dp.c28 static struct cdn_dp_hdcp_key_1x key; variable
30 int hdcp_handler(struct cdn_dp_hdcp_key_1x *key);
36 memset(&key, 0x00, sizeof(key)); in dp_hdcp_ctrl()
37 hdcp_key_pdata = (uint64_t *)&key; in dp_hdcp_ctrl()
40 if (hdcp_key_pdata == (uint64_t *)(&key + 1)) in dp_hdcp_ctrl()
41 return hdcp_handler(&key); in dp_hdcp_ctrl()
57 if (hdcp_key_pdata < (uint64_t *)&key || in dp_hdcp_store_key()
58 hdcp_key_pdata + 6 > (uint64_t *)(&key + 1)) in dp_hdcp_store_key()
/trusted-firmware-a-3.7.0/make_helpers/tbbr/
Dtbbr_tools.mk57 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert))
61 $(eval $(call TOOL_ADD_PAYLOAD,${BUILD_PLAT}/plat-key.crt,--plat-key-cert))
72 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg)))
73 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,FWU_)))
74 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size)))
75 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,FWU_)))
78 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key)))
79 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,FWU_)))
80 $(if ${PROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PROT_KEY},--prot-key)))
81 $(if ${PLAT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${PLAT_KEY},--plat-key)))
[all …]
/trusted-firmware-a-3.7.0/tools/marvell/doimage/secure/
Dsec_img_7K.cfg3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
6 # Only a key with csk_key_index will be used for signing the image
7 # use "*" string instead of file name for specifying an empty key
8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
9 "tools/doimage/secure/csk_priv_pem1.key",
10 "tools/doimage/secure/csk_priv_pem2.key",
11 "tools/doimage/secure/csk_priv_pem3.key",
14 # index of CSK key in the array. Valid range is 0 to 15
17 # AES-256 symmetric key for image encryption
Dsec_img_8K.cfg3 kak_key_file = "tools/doimage/secure/kak_priv_pem.key";
6 # Only a key with csk_key_index will be used for signing the image
7 # use "*" string instead of file name for specifying an empty key
8 csk_key_file = ["tools/doimage/secure/csk_priv_pem0.key",
9 "tools/doimage/secure/csk_priv_pem1.key",
10 "tools/doimage/secure/csk_priv_pem2.key",
11 "tools/doimage/secure/csk_priv_pem3.key",
14 # index of CSK key in the array. Valid range is 0 to 15
17 # AES-256 symmetric key for image encryption
/trusted-firmware-a-3.7.0/tools/cert_create/src/tbbr/
Dtbb_cert.c25 .key = ROT_KEY,
42 .key = ROT_KEY,
57 .key = TRUSTED_WORLD_KEY,
71 .key = SCP_FW_CONTENT_CERT_KEY,
85 .key = TRUSTED_WORLD_KEY,
99 .key = SOC_FW_CONTENT_CERT_KEY,
114 .key = TRUSTED_WORLD_KEY,
128 .key = TRUSTED_OS_FW_CONTENT_CERT_KEY,
145 .key = NON_TRUSTED_WORLD_KEY,
159 .key = NON_TRUSTED_FW_CONTENT_CERT_KEY,
[all …]
/trusted-firmware-a-3.7.0/plat/nxp/soc-lx2160a/
Dddr_tbbr.mk49 $(info Generating: Trusted key certificate as part of DDR cert creation)
51 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,))
52 $(eval $(call TOOL_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert,,DDR_))
54 $(info Using: Trusted key certificate as part of DDR cert creation)
55 DDR_FIP_ARGS += --trusted-key-cert ${TRUSTED_KEY_CERT}
61 $(if ${KEY_ALG},$(eval $(call CERT_ADD_CMD_OPT,${KEY_ALG},--key-alg,DDR_)))
62 $(if ${KEY_SIZE},$(eval $(call CERT_ADD_CMD_OPT,${KEY_SIZE},--key-size,DDR_)))
64 $(if ${ROT_KEY},$(eval $(call CERT_ADD_CMD_OPT,${ROT_KEY},--rot-key,DDR_)))
65 $(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key,D…
66 …WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted-world-key, DDR_)))
[all …]
/trusted-firmware-a-3.7.0/tools/cert_create/include/
Dkey.h67 EVP_PKEY *key; /* Key container */ member
74 int key_new(key_t *key);
76 int key_create(key_t *key, int type, int key_bits);
77 unsigned int key_load(key_t *key);
78 int key_store(key_t *key);
/trusted-firmware-a-3.7.0/docs/design/
Dtrusted-board-boot.rst22 trusted root-key storage registers. Alternatively, a development ROTPK might
51 - **Root of trust key**
53 The private part of this key is used to sign the BL2 content certificate and
54 the trusted key certificate. The public part is the ROTPK.
56 - **Trusted world key**
58 The private part is used to sign the key certificates corresponding to the
62 - **Non-trusted world key**
64 The private part is used to sign the key certificate corresponding to the
72 in one of the extension fields in the corresponding key certificate.
87 It is self-signed with the private part of the ROT key. It contains a hash
[all …]
/trusted-firmware-a-3.7.0/tools/cert_create/src/dualroot/
Dcot.c27 .key = ROT_KEY,
44 .key = ROT_KEY,
58 .key = TRUSTED_WORLD_KEY,
72 .key = SCP_FW_CONTENT_CERT_KEY,
86 .key = TRUSTED_WORLD_KEY,
100 .key = SOC_FW_CONTENT_CERT_KEY,
115 .key = TRUSTED_WORLD_KEY,
129 .key = TRUSTED_OS_FW_CONTENT_CERT_KEY,
147 .key = TRUSTED_WORLD_KEY,
165 .key = PROT_KEY,
[all …]
/trusted-firmware-a-3.7.0/plat/arm/board/common/protpk/
DREADME2 root-of-trust key.
4 * arm_protprivk_rsa.pem is a 2K RSA private key in PEM format. It has been
9 * arm_protpk_rsa_sha256.bin is the SHA-256 hash of the DER-encoded public key
10 associated with the above private key. It has been generated using the openssl
/trusted-firmware-a-3.7.0/plat/arm/board/common/swd_rotpk/
DREADME2 root-of-trust key used in the CCA chain of trust.
4 * swd_rotprivk_rsa.pem is a 2K RSA private key in PEM format. It has been
9 * swd_rotpk_rsa_sha256.bin is the SHA-256 hash of the DER-encoded public key
10 associated with the above private key. It has been generated using the openssl
/trusted-firmware-a-3.7.0/docs/resources/diagrams/plantuml/
Drss_attestation_flow.puml20 Rnote over DelegAttest: Compute input\n\ for key derivation\n\ (hash of measurements)
22 Rnote over DelegAttest: Compute public key\n\ hash with **hash_algo**.
26 Rnote over RMM: Only private key\n\ is returned. Public\n\ key and its hash\n\ must be computed.\n\
27 Public key is included\n\ in the realm token.\n\ Its hash is the input\n\ for get_platform_token
30 Rnote over DelegAttest: Check **pub_key_hash**\n\ against derived key.
/trusted-firmware-a-3.7.0/drivers/nxp/auth/csf_hdr_parser/
Dinput_bl2_ch221 # The number of files and key select should lie between 1 and 4 for 1040 and C290.
22 # For rest of the platforms only one key is required and key select should not be provided.
27 # PRI_KEY (Default private key :srk.pri) - [Optional]
29 # PUB_KEY (Default public key :srk.pub) - [Optional]
67 # Specify the signature size.It is mandatory when neither public key nor private key is specified.
68 # Signature size would be [0x80 for 1k key, 0x100 for 2k key, and 0x200 for 4k key].
Dcsf_hdr_parser.c209 static int32_t get_key(struct csf_hdr *hdr, uint8_t **key, uint32_t *len, in get_key() argument
282 *key = (uint8_t *)&(srktbl[key_num - 1].pkey); in get_key()
305 uint8_t *key; in validate_esbc_header() local
314 ret = get_key(hdr, &key, &klen, algo); in validate_esbc_header()
335 if ((key[0] & 0x80) == 0U) { in validate_esbc_header()
341 if ((key[klen / 2 - 1] & 0x1) == 0U) { in validate_esbc_header()
349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header()
360 *img_key = (uint8_t *)key; in validate_esbc_header()
/trusted-firmware-a-3.7.0/tools/cert_create/src/cca/
Dcot.c27 .key = ROT_KEY,
47 .key = SWD_ROT_KEY,
62 .key = CORE_SWD_KEY,
77 .key = CORE_SWD_KEY,
94 .key = PROT_KEY,
109 .key = PLAT_KEY,
126 .key = PLAT_KEY,
213 .attr.key = SWD_ROT_KEY
222 .attr.key = CORE_SWD_KEY
324 .attr.key = PROT_KEY
[all …]
/trusted-firmware-a-3.7.0/tools/nxp/cert_create_helper/src/
Dpdef_tbb_cert.c18 .key = TRUSTED_WORLD_KEY,
32 .key = DDR_FW_CONTENT_KEY,
49 .key = DDR_FW_CONTENT_KEY,
/trusted-firmware-a-3.7.0/include/drivers/arm/
Dethosn_cert.h21 .key = NON_TRUSTED_WORLD_KEY, \
36 .key = ETHOSN_NPU_FW_CONTENT_CERT_KEY, \
53 .attr.key = ETHOSN_NPU_FW_CONTENT_CERT_KEY \
/trusted-firmware-a-3.7.0/fdts/
Dcot_descriptors.dtsi50 signing-key = <&trusted_world_pk>;
61 signing-key = <&scp_fw_content_pk>;
72 signing-key = <&trusted_world_pk>;
82 signing-key = <&soc_fw_content_pk>;
96 signing-key = <&trusted_world_pk>;
107 signing-key = <&tos_fw_content_pk>;
127 signing-key = <&non_trusted_world_pk>;
138 signing-key = <&nt_fw_content_pk>;
153 signing-key = <&trusted_world_pk>;
/trusted-firmware-a-3.7.0/docs/components/
Dcot-binding.rst45 using root of trust public key.
63 public key provided by platform.
67 - signing-key
70 This property is used to refer public key node present in
72 non-root certificates which are authenticated using public-key
77 public key provided by platform.
97 Hash and public key information present in the certificate
100 - public key node
101 Description: Provide public key information in the certificate.
108 This property provides the Object ID of public key
[all …]
/trusted-firmware-a-3.7.0/docs/plat/
Dwarp7.rst90 tools/cert_create/cert_create -n --rot-key "build/warp7/debug/rot_key.pem" \
93 --trusted-key-cert fiptool_images/trusted-key-cert.key-crt \
95 --tb-fw-cert fiptool_images/trusted-boot-fw.key-crt\
98 --tos-fw-key-cert fiptool_images/tee-header_v2.bin.key-crt \
103 --nt-fw-key-cert fiptool_images/u-boot.bin.key-crt \
112 --tos-fw-key-cert fiptool_images/tee-header_v2.bin.key-crt \
114 --nt-fw-key-cert fiptool_images/u-boot.bin.key-crt \
115 --trusted-key-cert fiptool_images/trusted-key-cert.key-crt \
116 --tb-fw-cert fiptool_images/trusted-boot-fw.key-crt warp7.fip
/trusted-firmware-a-3.7.0/drivers/renesas/common/rom/
Drom_api.c14 typedef uint32_t(*rom_secure_boot_api_f) (uint32_t key, uint32_t cert,
71 uint32_t rcar_rom_secure_boot_api(uint32_t key, uint32_t cert, in rcar_rom_secure_boot_api() argument
87 return secure_boot(key, cert, read_flash); in rcar_rom_secure_boot_api()
/trusted-firmware-a-3.7.0/tools/encrypt_fw/src/
Dmain.c138 char *key = NULL; in main() local
178 key = optarg; in main()
199 if (!key) { in main()
219 ret = encrypt_file(fw_enc_status, key_alg, key, nonce, in_fn, out_fn); in main()
/trusted-firmware-a-3.7.0/drivers/io/
Dio_encrypted.c160 uint8_t key[ENC_MAX_KEY_SIZE]; in enc_file_read() local
161 size_t key_len = sizeof(key); in enc_file_read()
197 result = plat_get_enc_key_info(fw_enc_status, key, &key_len, &key_flags, in enc_file_read()
206 (void *)buffer, *length_read, key, in enc_file_read()
210 memset(key, 0, key_len); in enc_file_read()

1234