Home
last modified time | relevance | path

Searched hist:f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea (Results 1 – 7 of 7) sorted by relevance

/openbmc/u-boot/doc/uImage.FIT/
H A Dsignature.txtdiff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11

Add support for signing with the pkcs11 engine. This allows FIT images
to be signed with keys securely stored on a smartcard, hardware security
module, etc without exposing the keys.

Support for other engines can be added in the future by modifying
rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct
correct key_id strings.

Signed-off-by: George McCollister <george.mccollister@gmail.com>
/openbmc/u-boot/lib/rsa/
H A Drsa-sign.cdiff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11

Add support for signing with the pkcs11 engine. This allows FIT images
to be signed with keys securely stored on a smartcard, hardware security
module, etc without exposing the keys.

Support for other engines can be added in the future by modifying
rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct
correct key_id strings.

Signed-off-by: George McCollister <george.mccollister@gmail.com>
/openbmc/u-boot/tools/
H A Dimage-host.cdiff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11

Add support for signing with the pkcs11 engine. This allows FIT images
to be signed with keys securely stored on a smartcard, hardware security
module, etc without exposing the keys.

Support for other engines can be added in the future by modifying
rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct
correct key_id strings.

Signed-off-by: George McCollister <george.mccollister@gmail.com>
H A Dimagetool.hdiff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11

Add support for signing with the pkcs11 engine. This allows FIT images
to be signed with keys securely stored on a smartcard, hardware security
module, etc without exposing the keys.

Support for other engines can be added in the future by modifying
rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct
correct key_id strings.

Signed-off-by: George McCollister <george.mccollister@gmail.com>
H A Dfit_image.cdiff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11

Add support for signing with the pkcs11 engine. This allows FIT images
to be signed with keys securely stored on a smartcard, hardware security
module, etc without exposing the keys.

Support for other engines can be added in the future by modifying
rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct
correct key_id strings.

Signed-off-by: George McCollister <george.mccollister@gmail.com>
H A Dmkimage.cdiff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11

Add support for signing with the pkcs11 engine. This allows FIT images
to be signed with keys securely stored on a smartcard, hardware security
module, etc without exposing the keys.

Support for other engines can be added in the future by modifying
rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct
correct key_id strings.

Signed-off-by: George McCollister <george.mccollister@gmail.com>
/openbmc/u-boot/include/
H A Dimage.hdiff f1ca1fdebf1cde1c37c91b3d85f8b7af111112ea Fri Jan 06 13:14:17 CST 2017 George McCollister <george.mccollister@gmail.com> mkimage: Add support for signing with pkcs11

Add support for signing with the pkcs11 engine. This allows FIT images
to be signed with keys securely stored on a smartcard, hardware security
module, etc without exposing the keys.

Support for other engines can be added in the future by modifying
rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct
correct key_id strings.

Signed-off-by: George McCollister <george.mccollister@gmail.com>