/trusted-firmware-a-latest/ |
D | poetry.lock | 10 …{file = "alabaster-0.7.13-py3-none-any.whl", hash = "sha256:1ee19aca801bbabb5ba3f5f258e4422dfa86f8… 11 …{file = "alabaster-0.7.13.tar.gz", hash = "sha256:a27a4a084d5e690e16e01e03ad2b2e552c61a65469419b90… 21 …{file = "anytree-2.8.0-py2.py3-none-any.whl", hash = "sha256:14c55ac77492b11532395049a03b773d14c7e… 22 …{file = "anytree-2.8.0.tar.gz", hash = "sha256:3f0f93f355a91bc3e6245319bf4c1d50e3416cc7a35cc1133c1… 39 …{file = "Babel-2.12.1-py3-none-any.whl", hash = "sha256:b4246fb7677d3b98f501a39d43396d3cafdc8eadb0… 40 …{file = "Babel-2.12.1.tar.gz", hash = "sha256:cc2d99999cd01d44420ae725a21c9e3711b3aadc7976d6147f62… 53 …{file = "build-0.10.0-py3-none-any.whl", hash = "sha256:af266720050a66c893a6096a2f410989eeac74ff9a… 54 …{file = "build-0.10.0.tar.gz", hash = "sha256:d5b71264afdb5951d6704482aac78de887c80691c52b88a9ad19… 76 …{file = "certifi-2023.7.22-py3-none-any.whl", hash = "sha256:92d6037539857d8206b8f6ae472e8b77db805… 77 …{file = "certifi-2023.7.22.tar.gz", hash = "sha256:539cc1d13202e33ca466e88b2807e29f4c13049d6d87031… [all …]
|
/trusted-firmware-a-latest/drivers/auth/tbbr/ |
D | tbbr_cot_bl1.c | 36 .param.hash = { 38 .hash = &tb_fw_hash 96 .param.hash = { 98 .hash = &scp_bl2u_hash 113 .param.hash = { 115 .hash = &bl2u_hash 130 .param.hash = { 132 .hash = &ns_bl2u_hash 147 .param.hash = { 149 .hash = &tb_fw_config_hash [all …]
|
D | tbbr_cot_bl2.c | 203 .param.hash = { 205 .hash = &scp_fw_hash 291 .param.hash = { 293 .hash = &soc_fw_hash 306 .param.hash = { 308 .hash = &soc_fw_config_hash 408 .param.hash = { 410 .hash = &tos_fw_hash 422 .param.hash = { 424 .hash = &tos_fw_extra1_hash [all …]
|
D | tbbr_cot_common.c | 121 .param.hash = { 123 .hash = &hw_config_hash
|
/trusted-firmware-a-latest/fdts/ |
D | cot_descriptors.dtsi | 190 hash = <&hw_config_hash>; 196 hash = <&tb_fw_config_hash>; 202 hash = <&scp_fw_hash>; 208 hash = <&soc_fw_hash>; 214 hash = <&soc_fw_config_hash>; 220 hash = <&tos_fw_hash>; 226 hash = <&tos_fw_extra1_hash>; 232 hash = <&tos_fw_extra2_hash>; 238 hash = <&tos_fw_config_hash>; 244 hash = <&nt_world_bl_hash>; [all …]
|
D | stm32mp1-cot-descriptors.dtsi | 102 hash = <&hw_config_hash>; 108 hash = <&fw_config_hash>; 114 hash = <&tos_fw_hash>; 120 hash = <&tos_fw_extra1_hash>; 126 hash = <&tos_fw_extra2_hash>; 132 hash = <&tos_fw_config_hash>; 138 hash = <&nt_world_bl_hash>;
|
/trusted-firmware-a-latest/drivers/nxp/auth/tbbr/ |
D | tbbr_cot.c | 256 .param.hash = { 258 .hash = &soc_fw_hash 271 .param.hash = { 273 .hash = &soc_fw_config_hash 373 .param.hash = { 375 .hash = &tos_fw_hash 387 .param.hash = { 389 .hash = &tos_fw_extra1_hash 401 .param.hash = { 403 .hash = &tos_fw_extra2_hash [all …]
|
/trusted-firmware-a-latest/tools/cert_create/src/ |
D | ext.c | 185 HASH *hash; in ext_new_hash() local 191 hash = HASH_new(); in ext_new_hash() 192 if (hash == NULL) { in ext_new_hash() 199 HASH_free(hash); in ext_new_hash() 204 hash->hashAlgorithm->algorithm = algorithm; in ext_new_hash() 205 hash->hashAlgorithm->parameter = ASN1_TYPE_new(); in ext_new_hash() 206 ASN1_TYPE_set(hash->hashAlgorithm->parameter, V_ASN1_NULL, NULL); in ext_new_hash() 209 ASN1_OCTET_STRING_set(hash->dataHash, buf, len); in ext_new_hash() 212 sz = i2d_HASH(hash, &p); in ext_new_hash() 214 HASH_free(hash); in ext_new_hash() [all …]
|
/trusted-firmware-a-latest/drivers/auth/dualroot/ |
D | cot.c | 193 .param.hash = { 195 .hash = &tb_fw_hash 210 .param.hash = { 212 .hash = &hw_config_hash 227 .param.hash = { 229 .hash = &tb_fw_config_hash 242 .param.hash = { 244 .hash = &fw_config_hash 361 .param.hash = { 363 .hash = &scp_fw_hash [all …]
|
/trusted-firmware-a-latest/drivers/auth/cca/ |
D | cot.c | 198 .param.hash = { 200 .hash = &tb_fw_hash 213 .param.hash = { 215 .hash = &tb_fw_config_hash 228 .param.hash = { 230 .hash = &fw_config_hash 246 .param.hash = { 248 .hash = &hw_config_hash 262 .param.hash = { 264 .hash = &soc_fw_hash [all …]
|
/trusted-firmware-a-latest/drivers/nxp/crypto/caam/src/auth/ |
D | nxp_crypto.c | 83 uint8_t hash[SHA256_BYTES] __aligned(CACHE_WRITEBACK_GRANULE) = {0}; in verify_hash() local 100 ret = hash_final(algo, ctx, hash, digest_size); in verify_hash() 107 VERBOSE("%x\n", *((uint32_t *)hash + i)); in verify_hash() 111 if (memcmp(hash, (hash_tbl + (i * digest_size)), in verify_hash()
|
/trusted-firmware-a-latest/plat/arm/board/fvp/ |
D | fvp_plat_attest_token.c | 104 uintptr_t hash, size_t hash_size) in plat_rmmd_get_cca_attest_token() argument 106 (void)hash; in plat_rmmd_get_cca_attest_token()
|
/trusted-firmware-a-latest/plat/arm/board/juno/ |
D | juno_tbbr_cot_bl2.c | 213 .param.hash = { 215 .hash = &scp_fw_hash 301 .param.hash = { 303 .hash = &soc_fw_hash 316 .param.hash = { 318 .hash = &soc_fw_config_hash 418 .param.hash = { 420 .hash = &tos_fw_hash 432 .param.hash = { 434 .hash = &tos_fw_extra1_hash [all …]
|
/trusted-firmware-a-latest/plat/st/common/ |
D | stm32mp_trusted_boot.c | 31 static int copy_hash_from_otp(const char *otp_name, uint8_t *hash, size_t len) in copy_hash_from_otp() argument 60 memcpy(hash + i * sizeof(uint32_t), &tmp, sizeof(tmp)); in copy_hash_from_otp() 85 static int get_rotpk_hash(void *cookie, uint8_t *hash, size_t len) in get_rotpk_hash() argument 91 return copy_hash_from_otp(PKH_OTP, hash, len); in get_rotpk_hash() 94 static int get_rotpk_hash(void *cookie, uint8_t *hash, size_t len) in get_rotpk_hash() argument 141 memcpy(hash, param->pk_hashes[pk_idx], sizeof(otp_hash)); in get_rotpk_hash()
|
/trusted-firmware-a-latest/docs/resources/diagrams/plantuml/ |
D | rss_attestation_flow.puml | 20 Rnote over DelegAttest: Compute input\n\ for key derivation\n\ (hash of measurements) 22 Rnote over DelegAttest: Compute public key\n\ hash with **hash_algo**. 26 Rnote over RMM: Only private key\n\ is returned. Public\n\ key and its hash\n\ must be computed.\n\ 27 Public key is included\n\ in the realm token.\n\ Its hash is the input\n\ for get_platform_token
|
/trusted-firmware-a-latest/docs/design/ |
D | trusted-board-boot.rst | 21 - A SHA-256 hash of the Root of Trust Public Key (ROTPK). It is stored in the 23 be used and its hash embedded into the BL1 and BL2 images (only for 42 certificates. Content certificates are used to store the hash of a boot loader 43 image. An image can be authenticated by calculating its hash and matching it 44 with the hash extracted from the content certificate. Various hash algorithms 87 It is self-signed with the private part of the ROT key. It contains a hash 103 It is self-signed with the SCP_BL2 key. It contains a hash of the SCP_BL2 113 It is self-signed with the BL31 key. It contains a hash of the BL31 image. 122 It is self-signed with the BL32 key. It contains a hash of the BL32 image. 131 It is self-signed with the BL33 key. It contains a hash of the BL33 image. [all …]
|
/trusted-firmware-a-latest/include/drivers/auth/ |
D | auth_common.h | 69 auth_param_type_desc_t *hash; /* Hash to match with */ member 96 auth_method_param_hash_t hash; member
|
D | auth_mod.h | 81 .param.hash = { \ 83 .hash = &sp_pkg##n##_hash \
|
/trusted-firmware-a-latest/services/std_svc/rmmd/ |
D | rmmd_attest.c | 23 static void print_challenge(uint8_t *hash, size_t hash_size) in print_challenge() argument 40 hex_chars[hash[i] >> 4]; in print_challenge() 42 hex_chars[hash[i] & 0x0f]; in print_challenge()
|
/trusted-firmware-a-latest/drivers/auth/mbedtls/ |
D | mbedtls_crypto.c | 88 unsigned char hash[MBEDTLS_MD_MAX_SIZE]; in verify_signature() local 132 rc = mbedtls_md(md_info, p, data_len, hash); in verify_signature() 139 rc = mbedtls_pk_verify_ext(pk_alg, sig_opts, &pk, md_alg, hash, in verify_signature() 169 unsigned char *p, *end, *hash; in verify_hash() local 215 hash = p; in verify_hash() 225 rc = memcmp(data_hash, hash, mbedtls_md_get_size(md_info)); in verify_hash()
|
/trusted-firmware-a-latest/bl32/tsp/ |
D | tsp.ld.S | 117 *(.dynsym .dynstr .hash .gnu.hash)
|
/trusted-firmware-a-latest/docs/components/ |
D | cot-binding.rst | 114 - hash node 115 Description: Provide the hash information in the certificate. 122 This property provides the Object ID of hash provided in 123 the certificate which the help of which hash information 206 - hash 210 hash method. This property is used to refer hash 217 Currently, all images are validated using 'hash' 232 hash = <&scp_fw_hash>;
|
/trusted-firmware-a-latest/bl32/sp_min/ |
D | sp_min.ld.S | 152 *(.dynsym .dynstr .hash .gnu.hash)
|
/trusted-firmware-a-latest/tools/conventional-changelog-tf-a/templates/ |
D | commit.hbs | 11 {{~#if hash }} {{#if @root.linkReferences ~}}
|
/trusted-firmware-a-latest/include/drivers/st/ |
D | stm32_pka.h | 26 int stm32_pka_ecdsa_verif(void *hash, unsigned int hash_size,
|