Home
last modified time | relevance | path

Searched refs:hash (Results 1 – 25 of 63) sorted by relevance

123

/trusted-firmware-a-latest/
Dpoetry.lock10 …{file = "alabaster-0.7.13-py3-none-any.whl", hash = "sha256:1ee19aca801bbabb5ba3f5f258e4422dfa86f8…
11 …{file = "alabaster-0.7.13.tar.gz", hash = "sha256:a27a4a084d5e690e16e01e03ad2b2e552c61a65469419b90…
21 …{file = "anytree-2.8.0-py2.py3-none-any.whl", hash = "sha256:14c55ac77492b11532395049a03b773d14c7e…
22 …{file = "anytree-2.8.0.tar.gz", hash = "sha256:3f0f93f355a91bc3e6245319bf4c1d50e3416cc7a35cc1133c1…
39 …{file = "Babel-2.12.1-py3-none-any.whl", hash = "sha256:b4246fb7677d3b98f501a39d43396d3cafdc8eadb0…
40 …{file = "Babel-2.12.1.tar.gz", hash = "sha256:cc2d99999cd01d44420ae725a21c9e3711b3aadc7976d6147f62…
53 …{file = "build-0.10.0-py3-none-any.whl", hash = "sha256:af266720050a66c893a6096a2f410989eeac74ff9a…
54 …{file = "build-0.10.0.tar.gz", hash = "sha256:d5b71264afdb5951d6704482aac78de887c80691c52b88a9ad19…
76 …{file = "certifi-2023.7.22-py3-none-any.whl", hash = "sha256:92d6037539857d8206b8f6ae472e8b77db805…
77 …{file = "certifi-2023.7.22.tar.gz", hash = "sha256:539cc1d13202e33ca466e88b2807e29f4c13049d6d87031…
[all …]
/trusted-firmware-a-latest/drivers/auth/tbbr/
Dtbbr_cot_bl1.c36 .param.hash = {
38 .hash = &tb_fw_hash
96 .param.hash = {
98 .hash = &scp_bl2u_hash
113 .param.hash = {
115 .hash = &bl2u_hash
130 .param.hash = {
132 .hash = &ns_bl2u_hash
147 .param.hash = {
149 .hash = &tb_fw_config_hash
[all …]
Dtbbr_cot_bl2.c203 .param.hash = {
205 .hash = &scp_fw_hash
291 .param.hash = {
293 .hash = &soc_fw_hash
306 .param.hash = {
308 .hash = &soc_fw_config_hash
408 .param.hash = {
410 .hash = &tos_fw_hash
422 .param.hash = {
424 .hash = &tos_fw_extra1_hash
[all …]
Dtbbr_cot_common.c121 .param.hash = {
123 .hash = &hw_config_hash
/trusted-firmware-a-latest/fdts/
Dcot_descriptors.dtsi190 hash = <&hw_config_hash>;
196 hash = <&tb_fw_config_hash>;
202 hash = <&scp_fw_hash>;
208 hash = <&soc_fw_hash>;
214 hash = <&soc_fw_config_hash>;
220 hash = <&tos_fw_hash>;
226 hash = <&tos_fw_extra1_hash>;
232 hash = <&tos_fw_extra2_hash>;
238 hash = <&tos_fw_config_hash>;
244 hash = <&nt_world_bl_hash>;
[all …]
Dstm32mp1-cot-descriptors.dtsi102 hash = <&hw_config_hash>;
108 hash = <&fw_config_hash>;
114 hash = <&tos_fw_hash>;
120 hash = <&tos_fw_extra1_hash>;
126 hash = <&tos_fw_extra2_hash>;
132 hash = <&tos_fw_config_hash>;
138 hash = <&nt_world_bl_hash>;
/trusted-firmware-a-latest/drivers/nxp/auth/tbbr/
Dtbbr_cot.c256 .param.hash = {
258 .hash = &soc_fw_hash
271 .param.hash = {
273 .hash = &soc_fw_config_hash
373 .param.hash = {
375 .hash = &tos_fw_hash
387 .param.hash = {
389 .hash = &tos_fw_extra1_hash
401 .param.hash = {
403 .hash = &tos_fw_extra2_hash
[all …]
/trusted-firmware-a-latest/tools/cert_create/src/
Dext.c185 HASH *hash; in ext_new_hash() local
191 hash = HASH_new(); in ext_new_hash()
192 if (hash == NULL) { in ext_new_hash()
199 HASH_free(hash); in ext_new_hash()
204 hash->hashAlgorithm->algorithm = algorithm; in ext_new_hash()
205 hash->hashAlgorithm->parameter = ASN1_TYPE_new(); in ext_new_hash()
206 ASN1_TYPE_set(hash->hashAlgorithm->parameter, V_ASN1_NULL, NULL); in ext_new_hash()
209 ASN1_OCTET_STRING_set(hash->dataHash, buf, len); in ext_new_hash()
212 sz = i2d_HASH(hash, &p); in ext_new_hash()
214 HASH_free(hash); in ext_new_hash()
[all …]
/trusted-firmware-a-latest/drivers/auth/dualroot/
Dcot.c193 .param.hash = {
195 .hash = &tb_fw_hash
210 .param.hash = {
212 .hash = &hw_config_hash
227 .param.hash = {
229 .hash = &tb_fw_config_hash
242 .param.hash = {
244 .hash = &fw_config_hash
361 .param.hash = {
363 .hash = &scp_fw_hash
[all …]
/trusted-firmware-a-latest/drivers/auth/cca/
Dcot.c198 .param.hash = {
200 .hash = &tb_fw_hash
213 .param.hash = {
215 .hash = &tb_fw_config_hash
228 .param.hash = {
230 .hash = &fw_config_hash
246 .param.hash = {
248 .hash = &hw_config_hash
262 .param.hash = {
264 .hash = &soc_fw_hash
[all …]
/trusted-firmware-a-latest/drivers/nxp/crypto/caam/src/auth/
Dnxp_crypto.c83 uint8_t hash[SHA256_BYTES] __aligned(CACHE_WRITEBACK_GRANULE) = {0}; in verify_hash() local
100 ret = hash_final(algo, ctx, hash, digest_size); in verify_hash()
107 VERBOSE("%x\n", *((uint32_t *)hash + i)); in verify_hash()
111 if (memcmp(hash, (hash_tbl + (i * digest_size)), in verify_hash()
/trusted-firmware-a-latest/plat/arm/board/fvp/
Dfvp_plat_attest_token.c104 uintptr_t hash, size_t hash_size) in plat_rmmd_get_cca_attest_token() argument
106 (void)hash; in plat_rmmd_get_cca_attest_token()
/trusted-firmware-a-latest/plat/arm/board/juno/
Djuno_tbbr_cot_bl2.c213 .param.hash = {
215 .hash = &scp_fw_hash
301 .param.hash = {
303 .hash = &soc_fw_hash
316 .param.hash = {
318 .hash = &soc_fw_config_hash
418 .param.hash = {
420 .hash = &tos_fw_hash
432 .param.hash = {
434 .hash = &tos_fw_extra1_hash
[all …]
/trusted-firmware-a-latest/plat/st/common/
Dstm32mp_trusted_boot.c31 static int copy_hash_from_otp(const char *otp_name, uint8_t *hash, size_t len) in copy_hash_from_otp() argument
60 memcpy(hash + i * sizeof(uint32_t), &tmp, sizeof(tmp)); in copy_hash_from_otp()
85 static int get_rotpk_hash(void *cookie, uint8_t *hash, size_t len) in get_rotpk_hash() argument
91 return copy_hash_from_otp(PKH_OTP, hash, len); in get_rotpk_hash()
94 static int get_rotpk_hash(void *cookie, uint8_t *hash, size_t len) in get_rotpk_hash() argument
141 memcpy(hash, param->pk_hashes[pk_idx], sizeof(otp_hash)); in get_rotpk_hash()
/trusted-firmware-a-latest/docs/resources/diagrams/plantuml/
Drss_attestation_flow.puml20 Rnote over DelegAttest: Compute input\n\ for key derivation\n\ (hash of measurements)
22 Rnote over DelegAttest: Compute public key\n\ hash with **hash_algo**.
26 Rnote over RMM: Only private key\n\ is returned. Public\n\ key and its hash\n\ must be computed.\n\
27 Public key is included\n\ in the realm token.\n\ Its hash is the input\n\ for get_platform_token
/trusted-firmware-a-latest/docs/design/
Dtrusted-board-boot.rst21 - A SHA-256 hash of the Root of Trust Public Key (ROTPK). It is stored in the
23 be used and its hash embedded into the BL1 and BL2 images (only for
42 certificates. Content certificates are used to store the hash of a boot loader
43 image. An image can be authenticated by calculating its hash and matching it
44 with the hash extracted from the content certificate. Various hash algorithms
87 It is self-signed with the private part of the ROT key. It contains a hash
103 It is self-signed with the SCP_BL2 key. It contains a hash of the SCP_BL2
113 It is self-signed with the BL31 key. It contains a hash of the BL31 image.
122 It is self-signed with the BL32 key. It contains a hash of the BL32 image.
131 It is self-signed with the BL33 key. It contains a hash of the BL33 image.
[all …]
/trusted-firmware-a-latest/include/drivers/auth/
Dauth_common.h69 auth_param_type_desc_t *hash; /* Hash to match with */ member
96 auth_method_param_hash_t hash; member
Dauth_mod.h81 .param.hash = { \
83 .hash = &sp_pkg##n##_hash \
/trusted-firmware-a-latest/services/std_svc/rmmd/
Drmmd_attest.c23 static void print_challenge(uint8_t *hash, size_t hash_size) in print_challenge() argument
40 hex_chars[hash[i] >> 4]; in print_challenge()
42 hex_chars[hash[i] & 0x0f]; in print_challenge()
/trusted-firmware-a-latest/drivers/auth/mbedtls/
Dmbedtls_crypto.c88 unsigned char hash[MBEDTLS_MD_MAX_SIZE]; in verify_signature() local
132 rc = mbedtls_md(md_info, p, data_len, hash); in verify_signature()
139 rc = mbedtls_pk_verify_ext(pk_alg, sig_opts, &pk, md_alg, hash, in verify_signature()
169 unsigned char *p, *end, *hash; in verify_hash() local
215 hash = p; in verify_hash()
225 rc = memcmp(data_hash, hash, mbedtls_md_get_size(md_info)); in verify_hash()
/trusted-firmware-a-latest/bl32/tsp/
Dtsp.ld.S117 *(.dynsym .dynstr .hash .gnu.hash)
/trusted-firmware-a-latest/docs/components/
Dcot-binding.rst114 - hash node
115 Description: Provide the hash information in the certificate.
122 This property provides the Object ID of hash provided in
123 the certificate which the help of which hash information
206 - hash
210 hash method. This property is used to refer hash
217 Currently, all images are validated using 'hash'
232 hash = <&scp_fw_hash>;
/trusted-firmware-a-latest/bl32/sp_min/
Dsp_min.ld.S152 *(.dynsym .dynstr .hash .gnu.hash)
/trusted-firmware-a-latest/tools/conventional-changelog-tf-a/templates/
Dcommit.hbs11 {{~#if hash }} {{#if @root.linkReferences ~}}
/trusted-firmware-a-latest/include/drivers/st/
Dstm32_pka.h26 int stm32_pka_ecdsa_verif(void *hash, unsigned int hash_size,

123