Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 37) sorted by relevance

12

/trusted-firmware-a/docs/build/TF-A_2.5/_static/
A Dunderscore-1.13.1.js264 keys = emulatedSet(keys);
271 if (has$1(obj, prop) && !keys.contains(prop)) keys.push(prop);
286 var keys = [];
290 return keys;
483 var keys = [];
487 return keys;
1060 keys = flatten$1(keys, false, false);
1636 keys = flatten$1(keys, false, false);
1652 if (keys.length > 1) context = keys[1];
1654 keys = map(flatten$1(keys, false, false), String);
[all …]
A Dunderscore.js6keys,v=Object.create,h=c&&ArrayBuffer.isView,y=isNaN,d=isFinite,g=!{toString:null}.propertyIsEnume…
/trusted-firmware-a/tools/cert_create/src/
A Dmain.c233 key = &keys[ext->attr.key]; in check_cmd_params()
433 if (!key_new(&keys[i])) { in main()
439 if (key_load(&keys[i], &err_code)) { in main()
448 ERROR("Error loading '%s'\n", keys[i].fn); in main()
534 EXT_CRIT, keys[ext->attr.key].key)); in main()
588 if (!key_store(&keys[i])) { in main()
589 ERROR("Cannot save %s\n", keys[i].desc); in main()
598 EVP_PKEY_free(keys[i].key); in main()
609 if (keys[i].fn != NULL) { in main()
610 void *ptr = keys[i].fn; in main()
[all …]
A Dkey.c24 key_t *keys; variable
188 keys = malloc((num_def_keys * sizeof(def_keys[0])) in key_init()
194 if (keys == NULL) { in key_init()
199 memcpy(&keys[0], &def_keys[0], (num_def_keys * sizeof(def_keys[0]))); in key_init()
201 memcpy(&keys[num_def_keys], &pdef_keys[0], in key_init()
211 key = &keys[i]; in key_init()
233 key = &keys[i]; in key_get_by_opt()
A Dcert.c99 EVP_PKEY *pkey = keys[cert->key].key; in cert_new()
101 EVP_PKEY *ikey = keys[issuer_cert->key].key; in cert_new()
/trusted-firmware-a/plat/arm/board/common/
A Dboard_common.mk25 $(warning Development keys support for FVP is deprecated. Use `regs` \
33 $(warning Development keys support for FVP is deprecated. Use `regs` \
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/nxp/
A Dnxp-ls-tbbr.rst.txt25 -- It is the 256 bit hash of the list of the public keys of the SRK key pair.
34 Refer fuse frovisioning readme 'nxp-ls-fuse-prov.rst' for steps to blow these keys.
57 - SAVE_KEYS=1 saves the keys and certificates, if GENERATE_COT=1.
58 …-- For this to work, file name for cert and keys are provided as part of compilation or build com…
101 -- These keys can be generated using gen_keys tool of CST.
/trusted-firmware-a/docs/plat/nxp/
A Dnxp-ls-tbbr.rst25 -- It is the 256 bit hash of the list of the public keys of the SRK key pair.
34 Refer fuse frovisioning readme 'nxp-ls-fuse-prov.rst' for steps to blow these keys.
57 - SAVE_KEYS=1 saves the keys and certificates, if GENERATE_COT=1.
58 …-- For this to work, file name for cert and keys are provided as part of compilation or build com…
101 -- These keys can be generated using gen_keys tool of CST.
/trusted-firmware-a/docs/design/
A Dtrusted-board-boot.rst41 certificates are used to verify public keys which have been used to sign content
46 for more details.. The public keys and hashes are included as non-standard
49 The keys used to establish the CoT are:
68 - **BL3X keys**
159 non-trusted world public keys from the verified certificate.
219 and keys as inputs (keys must be in PEM format) and generates the
220 certificates (in DER format) required to establish the CoT. New keys can be
A Dtrusted-board-boot-build.rst58 Example of command line using RSA development keys:
A Dauth-framework.rst171 used for verifying the CoT, e.g. memory for public keys, hashes etc.
709 are hashes and public keys. In DER format, an RSA-4096 public key requires 550
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/design/
A Dtrusted-board-boot.rst.txt41 certificates are used to verify public keys which have been used to sign content
46 for more details.. The public keys and hashes are included as non-standard
49 The keys used to establish the CoT are:
68 - **BL3X keys**
159 non-trusted world public keys from the verified certificate.
219 and keys as inputs (keys must be in PEM format) and generates the
220 certificates (in DER format) required to establish the CoT. New keys can be
A Dtrusted-board-boot-build.rst.txt58 Example of command line using RSA development keys:
/trusted-firmware-a/tools/cert_create/include/
A Dkey.h90 extern key_t *keys;
/trusted-firmware-a/plat/arm/board/common/protpk/
A DREADME1 This directory contains some development keys to be used as the platform
/trusted-firmware-a/drivers/nxp/auth/csf_hdr_parser/
A Dinput_blx_ch215 # Specify the file name of the keys separated by comma.
A Dinput_bl2_ch220 # Specify the file name of the keys separated by comma.
/trusted-firmware-a/tools/marvell/doimage/secure/
A Dsec_img_7K.cfg5 # CSK keys array - 16 entries total.
A Dsec_img_8K.cfg5 # CSK keys array - 16 entries total.
/trusted-firmware-a/tools/sptool/
A Dsp_mk_generator.py70 for idx, key in enumerate(data.keys()):
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/
A Dwarp7.rst.txt180 cp ${CST_PATH}/keys/* ${TEMP}
199 3. Generate keys
207 To get a good over-view of generating keys and programming the fuses on the
/trusted-firmware-a/docs/plat/
A Dwarp7.rst180 cp ${CST_PATH}/keys/* ${TEMP}
199 3. Generate keys
207 To get a good over-view of generating keys and programming the fuses on the
/trusted-firmware-a/lib/romlib/
A Dromlib_generator.py264 print("usage: romlib_generator.py [%s] [args]" % "|".join(APPS.keys()), file=sys.stderr)
/trusted-firmware-a/docs/getting_started/
A Dbuild-options.rst158 certificate generation tool to create new keys in case no valid keys are
470 used for generating the PKCS keys and subsequent signing of the certificate.
598 certificate generation tool to save the keys used to establish the Chain of
684 This option depends on ``CREATE_KEYS`` to be enabled. If the keys
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/getting_started/
A Dbuild-options.rst.txt158 certificate generation tool to create new keys in case no valid keys are
470 used for generating the PKCS keys and subsequent signing of the certificate.
598 certificate generation tool to save the keys used to establish the Chain of
684 This option depends on ``CREATE_KEYS`` to be enabled. If the keys

Completed in 32 milliseconds

12