Searched refs:keys (Results 1 – 21 of 21) sorted by relevance
/tf-a-ffa_el3_spmc/tools/cert_create/src/ |
A D | main.c | 233 key = &keys[ext->attr.key]; in check_cmd_params() 433 if (!key_new(&keys[i])) { in main() 439 if (key_load(&keys[i], &err_code)) { in main() 448 ERROR("Error loading '%s'\n", keys[i].fn); in main() 534 EXT_CRIT, keys[ext->attr.key].key)); in main() 588 if (!key_store(&keys[i])) { in main() 589 ERROR("Cannot save %s\n", keys[i].desc); in main() 598 EVP_PKEY_free(keys[i].key); in main() 609 if (keys[i].fn != NULL) { in main() 610 void *ptr = keys[i].fn; in main() [all …]
|
A D | key.c | 24 key_t *keys; variable 188 keys = malloc((num_def_keys * sizeof(def_keys[0])) in key_init() 194 if (keys == NULL) { in key_init() 199 memcpy(&keys[0], &def_keys[0], (num_def_keys * sizeof(def_keys[0]))); in key_init() 201 memcpy(&keys[num_def_keys], &pdef_keys[0], in key_init() 211 key = &keys[i]; in key_init() 233 key = &keys[i]; in key_get_by_opt()
|
A D | cert.c | 99 EVP_PKEY *pkey = keys[cert->key].key; in cert_new() 101 EVP_PKEY *ikey = keys[issuer_cert->key].key; in cert_new()
|
/tf-a-ffa_el3_spmc/plat/arm/board/common/ |
A D | board_common.mk | 25 $(warning Development keys support for FVP is deprecated. Use `regs` \ 33 $(warning Development keys support for FVP is deprecated. Use `regs` \
|
/tf-a-ffa_el3_spmc/tools/cert_create/include/ |
A D | key.h | 90 extern key_t *keys;
|
/tf-a-ffa_el3_spmc/plat/arm/board/common/protpk/ |
A D | README | 1 This directory contains some development keys to be used as the platform
|
/tf-a-ffa_el3_spmc/drivers/nxp/auth/csf_hdr_parser/ |
A D | input_blx_ch2 | 15 # Specify the file name of the keys separated by comma.
|
A D | input_bl2_ch2 | 20 # Specify the file name of the keys separated by comma.
|
/tf-a-ffa_el3_spmc/tools/marvell/doimage/secure/ |
A D | sec_img_7K.cfg | 5 # CSK keys array - 16 entries total.
|
A D | sec_img_8K.cfg | 5 # CSK keys array - 16 entries total.
|
/tf-a-ffa_el3_spmc/docs/design/ |
A D | trusted-board-boot.rst | 41 certificates are used to verify public keys which have been used to sign content 46 for more details.. The public keys and hashes are included as non-standard 49 The keys used to establish the CoT are: 68 - **BL3X keys** 159 non-trusted world public keys from the verified certificate. 219 and keys as inputs (keys must be in PEM format) and generates the 220 certificates (in DER format) required to establish the CoT. New keys can be
|
A D | trusted-board-boot-build.rst | 58 Example of command line using RSA development keys:
|
A D | auth-framework.rst | 171 used for verifying the CoT, e.g. memory for public keys, hashes etc. 709 are hashes and public keys. In DER format, an RSA-4096 public key requires 550
|
/tf-a-ffa_el3_spmc/tools/sptool/ |
A D | sp_mk_generator.py | 70 for idx, key in enumerate(data.keys()):
|
/tf-a-ffa_el3_spmc/docs/plat/ |
A D | warp7.rst | 180 cp ${CST_PATH}/keys/* ${TEMP} 199 3. Generate keys 207 To get a good over-view of generating keys and programming the fuses on the
|
/tf-a-ffa_el3_spmc/lib/romlib/ |
A D | romlib_generator.py | 264 print("usage: romlib_generator.py [%s] [args]" % "|".join(APPS.keys()), file=sys.stderr)
|
/tf-a-ffa_el3_spmc/docs/getting_started/ |
A D | build-options.rst | 155 certificate generation tool to create new keys in case no valid keys are 428 used for generating the PKCS keys and subsequent signing of the certificate. 557 certificate generation tool to save the keys used to establish the Chain of 643 This option depends on ``CREATE_KEYS`` to be enabled. If the keys
|
A D | porting-guide.rst | 1930 pointer authentication keys.
|
/tf-a-ffa_el3_spmc/docs/threat_model/ |
A D | threat_model_spm.rst | 125 - SP secrets (e.g. application keys).
|
/tf-a-ffa_el3_spmc/docs/ |
A D | change-log.rst | 262 - Added support for platform-defined certificates, keys, and extensions using 545 - Updated tool for platform defined certs, keys & extensions 671 - Free keys after use 3125 - For Arm platforms added support to use ECDSA keys. 3128 ECDSA to enable runtime selection between RSA and ECDSA keys.
|
/tf-a-ffa_el3_spmc/docs/components/ |
A D | secure-partition-manager.rst | 445 the use of two root keys namely S-ROTPK and NS-ROTPK:
|
Completed in 33 milliseconds