Searched hist:f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea (Results 1 – 7 of 7) sorted by relevance
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | signature.txt | diff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11
Add support for signing with the pkcs11 engine. This allows FIT images to be signed with keys securely stored on a smartcard, hardware security module, etc without exposing the keys.
Support for other engines can be added in the future by modifying rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct correct key_id strings.
Signed-off-by: George McCollister <george.mccollister@gmail.com>
|
/openbmc/u-boot/lib/rsa/ |
H A D | rsa-sign.c | diff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11
Add support for signing with the pkcs11 engine. This allows FIT images to be signed with keys securely stored on a smartcard, hardware security module, etc without exposing the keys.
Support for other engines can be added in the future by modifying rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct correct key_id strings.
Signed-off-by: George McCollister <george.mccollister@gmail.com>
|
/openbmc/u-boot/tools/ |
H A D | image-host.c | diff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11
Add support for signing with the pkcs11 engine. This allows FIT images to be signed with keys securely stored on a smartcard, hardware security module, etc without exposing the keys.
Support for other engines can be added in the future by modifying rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct correct key_id strings.
Signed-off-by: George McCollister <george.mccollister@gmail.com>
|
H A D | imagetool.h | diff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11
Add support for signing with the pkcs11 engine. This allows FIT images to be signed with keys securely stored on a smartcard, hardware security module, etc without exposing the keys.
Support for other engines can be added in the future by modifying rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct correct key_id strings.
Signed-off-by: George McCollister <george.mccollister@gmail.com>
|
H A D | fit_image.c | diff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11
Add support for signing with the pkcs11 engine. This allows FIT images to be signed with keys securely stored on a smartcard, hardware security module, etc without exposing the keys.
Support for other engines can be added in the future by modifying rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct correct key_id strings.
Signed-off-by: George McCollister <george.mccollister@gmail.com>
|
H A D | mkimage.c | diff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11
Add support for signing with the pkcs11 engine. This allows FIT images to be signed with keys securely stored on a smartcard, hardware security module, etc without exposing the keys.
Support for other engines can be added in the future by modifying rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct correct key_id strings.
Signed-off-by: George McCollister <george.mccollister@gmail.com>
|
/openbmc/u-boot/include/ |
H A D | image.h | diff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11
Add support for signing with the pkcs11 engine. This allows FIT images to be signed with keys securely stored on a smartcard, hardware security module, etc without exposing the keys.
Support for other engines can be added in the future by modifying rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct correct key_id strings.
Signed-off-by: George McCollister <george.mccollister@gmail.com>
|