Difference between revisions of "Thread:Talk:R-Car/Boards/Yocto-Gen3/How to execute OP-TEE cryptographic algorithms directly from ARM Trusted Firmware"
(New thread: How to execute OP-TEE cryptographic algorithms directly from ARM Trusted Firmware) |
m |
||
Line 1: | Line 1: | ||
− | I want to evaluate cryptographic algorithms on the boot loader before Linux starts up. | + | I want to evaluate cryptographic algorithms on the boot loader before Linux starts up.<br /> |
− | We plan to include evaluation software in ARM Trusted Firmware (bl31-h3ulcb). | + | |
− | ARM Trusted Firmware has no encryption algorithm, so we are considering using a library in OP-TEE (tee-h3ulcb). | + | We plan to include evaluation software in ARM Trusted Firmware (bl31-h3ulcb).<br /> |
− | For example, in evaluating signature verification using RSA, the following processing is considered necessary. | + | |
− | ・ Register the public key and secret key. | + | ARM Trusted Firmware has no encryption algorithm, so we are considering using a library in OP-TEE (tee-h3ulcb).<br /> |
− | ・ And generates a hash value of the evaluation target data. (For example SHA 256) | + | |
− | ・ Generate a signature by encrypting the hash value with the secret key. | + | For example, in evaluating signature verification using RSA, the following processing is considered necessary.<br /> |
− | ・ Generate a hash value by decrypting the signature with the public key. | + | |
− | Among these processes, I do not know how to register the public key and secret key to OP-TEE. | + | ・ Register the public key and secret key.<br /> |
− | Please tell me what kind of processing can be realized from ARM Trusted Firmware. | + | |
+ | ・ And generates a hash value of the evaluation target data. (For example SHA 256)<br /> | ||
+ | |||
+ | ・ Generate a signature by encrypting the hash value with the secret key.<br /> | ||
+ | |||
+ | ・ Generate a hash value by decrypting the signature with the public key.<br /> | ||
+ | |||
+ | Among these processes, I do not know how to register the public key and secret key to OP-TEE.<br /> | ||
+ | |||
+ | Please tell me what kind of processing can be realized from ARM Trusted Firmware.<br /> |
Latest revision as of 18:29, 7 December 2017
I want to evaluate cryptographic algorithms on the boot loader before Linux starts up.
We plan to include evaluation software in ARM Trusted Firmware (bl31-h3ulcb).
ARM Trusted Firmware has no encryption algorithm, so we are considering using a library in OP-TEE (tee-h3ulcb).
For example, in evaluating signature verification using RSA, the following processing is considered necessary.
・ Register the public key and secret key.
・ And generates a hash value of the evaluation target data. (For example SHA 256)
・ Generate a signature by encrypting the hash value with the secret key.
・ Generate a hash value by decrypting the signature with the public key.
Among these processes, I do not know how to register the public key and secret key to OP-TEE.
Please tell me what kind of processing can be realized from ARM Trusted Firmware.