Home
last modified time | relevance | path

Searched refs:RSA (Results 1 – 16 of 16) sorted by relevance

/tf-a-ffa_el3_spmc/tools/marvell/doimage/secure/
A Dcsk_priv_pem1.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
A Dcsk_priv_pem0.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
A Dcsk_priv_pem2.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
A Dcsk_priv_pem3.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
A Dkak_priv_pem.key1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
/tf-a-ffa_el3_spmc/plat/arm/board/common/protpk/
A Darm_protprivk_rsa.pem1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
A DREADME4 * arm_protprivk_rsa.pem is a 2K RSA private key in PEM format. It has been
/tf-a-ffa_el3_spmc/include/drivers/nxp/crypto/caam/
A Dcaam.h26 RSA, enumerator
/tf-a-ffa_el3_spmc/drivers/nxp/crypto/caam/src/auth/
A Dnxp_crypto.c51 case RSA: in verify_signature()
/tf-a-ffa_el3_spmc/tools/cert_create/src/
A Dkey.c44 RSA *rsa = NULL; in key_create_rsa()
/tf-a-ffa_el3_spmc/docs/design/
A Dtrusted-board-boot-build.rst58 Example of command line using RSA development keys:
82 targets using RSA development:
A Dauth-framework.rst709 are hashes and public keys. In DER format, an RSA-4096 public key requires 550
964 - ``TF_MBEDTLS_KEY_SIZE`` sets the supported RSA key size for TFA. Valid values
/tf-a-ffa_el3_spmc/drivers/nxp/auth/csf_hdr_parser/
A Dcsf_hdr_parser.c221 *key_type = RSA; in get_key()
/tf-a-ffa_el3_spmc/docs/plat/arm/
A Darm-build-options.rst62 and BL2 binaries. This hash has been obtained from the RSA public key
/tf-a-ffa_el3_spmc/docs/getting_started/
A Dbuild-options.rst430 ``rsa_1_5`` is the legacy PKCS#1 RSA 1.5 algorithm which is not TBBR
432 flag is ``rsa`` which is the TBBR compliant PKCS#1 RSA 2.1 scheme.
/tf-a-ffa_el3_spmc/docs/
A Dchange-log.rst893 - The default value of ``KEY_SIZE`` has been changed to to 2048 when RSA is
1294 for CryptoCell-713 and CryptoCell-712 RSA 3K
1930 - cert_create: Add support for bigger RSA key sizes (3KB and 4KB),
2055 - cert_create: Remove RSA PKCS#1 v1.5 support
3122 - Added support to cert_create tool for RSA PKCS1# v1.5 and SHA384, SHA512
3127 - Enhanced the mbed TLS wrapper layer to include support for both RSA and
3128 ECDSA to enable runtime selection between RSA and ECDSA keys.

Completed in 21 milliseconds