mirror-linux/include/soc/fsl
Meenakshi Aggarwal a703a4c2a3 KEYS: trusted: caam based protected key
- CAAM supports two types of protected keys:
  -- Plain key encrypted with ECB
  -- Plain key encrypted with CCM
  Due to robustness, default encryption used for protected key is CCM.

- Generate protected key blob and add it to trusted key payload.
  This is done as part of sealing operation, which is triggered
  when below two operations are requested:
  -- new key generation
  -- load key,

Signed-off-by: Pankaj Gupta <pankaj.gupta@nxp.com>
Signed-off-by: Meenakshi Aggarwal <meenakshi.aggarwal@nxp.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2025-10-20 12:10:28 +08:00
..
qe soc: fsl: qe: Add missing PUSHSCHED command 2024-09-03 07:49:20 +02:00
bman.h soc: fsl: qbman_portals: add APIs to retrieve the probing status 2019-05-20 14:28:16 -05:00
caam-blob.h KEYS: trusted: caam based protected key 2025-10-20 12:10:28 +08:00
cpm.h soc: fsl: move cpm.h from powerpc/include/asm to include/soc/fsl 2019-12-09 13:54:34 -06:00
dcp.h crypto: mxs-dcp: Add support for hardware-bound keys 2024-05-09 18:29:03 +03:00
dpaa2-fd.h soc: fsl: Replace kernel.h with the necessary inclusions 2022-02-18 17:11:17 -06:00
dpaa2-global.h soc: fsl: dpio: add congestion notification support 2018-09-21 13:24:50 +08:00
dpaa2-io.h soc: fsl: dpio: add Net DIM integration 2021-10-15 14:32:41 +01:00
qman.h soc: fsl_qbman: use be16_to_cpu() in qm_sg_entry_get_off() 2024-11-04 18:44:43 -08:00