/u-boot/lib/aes/ |
H A D | aes-encrypt.c | 50 NULL, info->key, info->iv) != 1) { 103 /* Either create or overwrite the named key node */ 105 snprintf(name, sizeof(name), "key-%s-%s-%s", 108 snprintf(name, sizeof(name), "key-%s-%s", 118 "Could not create key subnode: %s\n", 141 ret = fdt_setprop(keydest, node, "key", 142 info->key, info->cipher->key_len); 145 ret = fdt_setprop_u32(keydest, node, "key-len",
|
/u-boot/tools/ |
H A D | iot2050-sign-fw.sh | 42 openssl req -new -x509 -key $1 -nodes -outform DER -out $CERT_X509 -config $TEMP_X509 -sha512
|
H A D | kwbimage.c | 469 snprintf(path, sizeof(path), "%s/%s.key", keydir, name); 472 fprintf(stderr, "Couldn't open RSA private key: '%s': %s\n", 479 openssl_err("Failure reading private key"); 494 RSA *key; local 505 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key); 511 *p_key = key; 534 if (!pk || !hash || pk->key[0] != 0x30 || pk->key[1] != 0x82) 537 key_size = (pk->key[2] << 8) + pk->key[ 566 kwb_import_pubkey(RSA **key, struct pubkey_der_v1 *src, char *keyname) argument 587 kwb_export_pubkey(RSA *key, struct pubkey_der_v1 *dst, FILE *hashf, char *keyname) argument 674 kwb_sign(RSA *key, void *data, int datasz, struct sig_v1 *sig, char *signame) argument 735 kwb_verify(RSA *key, void *data, int datasz, struct sig_v1 *sig, char *signame) argument 795 kwb_sign_and_verify(RSA *key, void *data, int datasz, struct sig_v1 *sig, char *signame) argument [all...] |
H A D | image-host.c | 275 * Write the public key into the supplied FDT file; this might fail 354 fprintf(stderr, "Can't format the key or IV filename when setting up the cipher: insufficient buffer space\n"); 358 fprintf(stderr, "Can't format the key or IV filename when setting up the cipher: snprintf error\n"); 413 /* Read the key name */ 416 fprintf(stderr, "Can't get key name for cipher in image '%s'\n", 439 info->key = malloc(info->cipher->key_len); 440 if (!info->key) { 441 fprintf(stderr, "Can't allocate memory for key\n"); 446 /* Read the key in the file */ 448 (unsigned char *)info->key, 1169 EVP_PKEY *key = NULL; local 1370 fit_check_sign(const void *fit, const void *key, const char *fit_uname_config) argument [all...] |
/u-boot/drivers/mtd/ |
H A D | stm32_flash.c | 29 writel(STM32_FLASH_KEY1, &STM32_FLASH->key); 30 writel(STM32_FLASH_KEY2, &STM32_FLASH->key);
|
/u-boot/boot/ |
H A D | cedit.c | 163 int ichar, key; local 182 key = 0; 184 key = bootmenu_conv_key(ichar); 185 if (key == BKEY_NONE || key >= BKEY_FIRST_EXTRA) 186 key = ichar; 188 if (!key) 191 ret = expo_send_key(exp, key);
|
H A D | image-cipher.c | 94 printf("Can't get key name\n"); 124 * the path should be: /cipher/key-<algo>-<key>-<iv> 127 snprintf(node_path, sizeof(node_path), "/%s/key-%s-%s-%s", 130 snprintf(node_path, sizeof(node_path), "/%s/key-%s-%s", 139 /* read key */ 140 info->key = fdt_getprop(fdt, noffset, "key", NULL); 141 if (!info->key) { 142 printf("Can't get key i [all...] |
/u-boot/disk/ |
H A D | part_iso.h | 119 unsigned char key[2]; /* key[0]=55, key[1]=0xAA */ member in struct:iso_val_entry
|
H A D | part_iso.c | 122 if((pve->key[0]!=0x55)||(pve->key[1]!=0xAA)) {
|
/u-boot/fs/ubifs/ |
H A D | scan.c | 211 * The key is in the same place in all keyed 214 key_read(c, &ino->key, &snod->key); 217 invalid_key_init(c, &snod->key);
|
H A D | recovery.c | 1351 * @key: node key 1373 int ubifs_recover_size_accum(struct ubifs_info *c, union ubifs_key *key, argument 1376 ino_t inum = key_inum(c, key); 1380 switch (key_type(c, key)) { 1426 union ubifs_key key; local 1432 ino_key_init(c, &key, e->inum); 1433 err = ubifs_tnc_locate(c, &key, ino, &lnum, &offs); 1493 union ubifs_key key; local 1495 ino_key_init(c, &key, [all...] |
/u-boot/fs/btrfs/ |
H A D | conv-funcs.h | 131 DEFINE_CONV(btrfs_tree_block_info, key) 172 DEFINE_CONV(btrfs_item, key, offset, size) 173 DEFINE_CONV(btrfs_key_ptr, key, blockptr, generation)
|
H A D | volumes.c | 515 static int read_one_chunk(struct btrfs_fs_info *fs_info, struct btrfs_key *key, argument 530 logical = key->offset; 662 struct btrfs_key key; local 687 btrfs_disk_key_to_cpu(&key, disk_key); 693 if (key.type == BTRFS_CHUNK_ITEM_KEY) { 716 ret = read_one_chunk(fs_info, &key, sb, chunk, -1); 722 (u32)key.type, cur_offset); 744 struct btrfs_key key; local 760 key.objectid = BTRFS_DEV_ITEMS_OBJECTID; 761 key [all...] |
/u-boot/test/py/tests/ |
H A D | test_fit_auto_signed.py | 83 Each image must have a signature with: key-name-hint matching key_name 88 hint = self.__fdt_get_string(f'{node}/signature', 'key-name-hint') 89 assert hint == key_name + "\n", "Missing expected key name hint!" 102 signature with key-name-hint matching key_name argument and algo 115 hint = self.__fdt_get_string(f'{node}/signature', 'key-name-hint') 116 assert hint == key_name + "\n", "Missing expected key name hint!" 143 key_name = 'sign-key' 145 key_file = f'{tempdir}/{key_name}.key' 158 # Create 4096 RSA key and write to file to be read by mkimage 159 key [all...] |
H A D | test_trace.py | 44 vals = {key: val.replace(',', '') for val, key in lines}
|
/u-boot/cmd/ |
H A D | efi.c | 198 printf("\nAttributes key:\n"); 225 uint version, key; local 232 ret = efi_get_mmap(&orig, &size, &key, &desc_size, &version); 253 printf("EFI table at %lx, memory map %p, size %x, key %x, version %x, descr. size %#x\n", 254 gd->arch.table, orig, size, key, version, desc_size);
|
H A D | nvedit.c | 66 e.key = name; 71 len = printf("%s=%s\n", ep->key, ep->data); 305 printf("\t%-20s %p\n", entry->key, entry->callback); 307 printf("\t%-20s %-20s\n", entry->key, clbkp->name); 374 printf("\t%-20s %-20s %-20s\n", entry->key, 1047 e.key = argv[1];
|
H A D | tpm-v1.c | 407 void *key; local 418 key = (void *)simple_strtoul(argv[2], NULL, 0); 426 printf("Could not find matching parent key (err = %d)\n", err); 430 printf("Found parent key %08x\n", parent_handle); 432 err = tpm1_load_key2_oiap(dev, parent_handle, key, key_len, usage_auth, 448 void *key; local 460 key = (void *)simple_strtoul(argv[2], NULL, 0); 466 err = tpm1_load_key2_oiap(dev, parent_handle, key, key_len, usage_auth, 499 printf("dump of received pub key structure:\n"); 524 if (!strcasecmp(argv[1], "key")) [all...] |
/u-boot/arch/mips/mach-octeon/include/mach/ |
H A D | cvmx-ciu-defs.h | 389 u64 key : 1; member in struct:cvmx_ciu_block_int::cvmx_ciu_block_int_s 425 u64 key : 1; member in struct:cvmx_ciu_block_int::cvmx_ciu_block_int_cn61xx 464 u64 key : 1; member in struct:cvmx_ciu_block_int::cvmx_ciu_block_int_cn63xx 507 u64 key : 1; member in struct:cvmx_ciu_block_int::cvmx_ciu_block_int_cn66xx 538 u64 key : 1; member in struct:cvmx_ciu_block_int::cvmx_ciu_block_int_cnf71xx 2315 u64 key : 1; member in struct:cvmx_ciu_intx_en1::cvmx_ciu_intx_en1_s 2389 u64 key : 1; member in struct:cvmx_ciu_intx_en1::cvmx_ciu_intx_en1_cn61xx 2424 u64 key : 1; member in struct:cvmx_ciu_intx_en1::cvmx_ciu_intx_en1_cn63xx 2464 u64 key : 1; member in struct:cvmx_ciu_intx_en1::cvmx_ciu_intx_en1_cn66xx 2500 u64 key member in struct:cvmx_ciu_intx_en1::cvmx_ciu_intx_en1_cn70xx 2535 u64 key : 1; member in struct:cvmx_ciu_intx_en1::cvmx_ciu_intx_en1_cnf71xx 2588 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1c::cvmx_ciu_intx_en1_w1c_s 2641 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1c::cvmx_ciu_intx_en1_w1c_cn61xx 2676 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1c::cvmx_ciu_intx_en1_w1c_cn63xx 2716 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1c::cvmx_ciu_intx_en1_w1c_cn66xx 2752 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1c::cvmx_ciu_intx_en1_w1c_cn70xx 2787 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1c::cvmx_ciu_intx_en1_w1c_cnf71xx 2840 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1s::cvmx_ciu_intx_en1_w1s_s 2893 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1s::cvmx_ciu_intx_en1_w1s_cn61xx 2928 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1s::cvmx_ciu_intx_en1_w1s_cn63xx 2968 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1s::cvmx_ciu_intx_en1_w1s_cn66xx 3004 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1s::cvmx_ciu_intx_en1_w1s_cn70xx 3039 u64 key : 1; member in struct:cvmx_ciu_intx_en1_w1s::cvmx_ciu_intx_en1_w1s_cnf71xx 3714 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1::cvmx_ciu_intx_en4_1_s 3781 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1::cvmx_ciu_intx_en4_1_cn61xx 3816 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1::cvmx_ciu_intx_en4_1_cn63xx 3856 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1::cvmx_ciu_intx_en4_1_cn66xx 3892 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1::cvmx_ciu_intx_en4_1_cn70xx 3927 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1::cvmx_ciu_intx_en4_1_cnf71xx 3979 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1c::cvmx_ciu_intx_en4_1_w1c_s 4032 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1c::cvmx_ciu_intx_en4_1_w1c_cn61xx 4067 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1c::cvmx_ciu_intx_en4_1_w1c_cn63xx 4107 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1c::cvmx_ciu_intx_en4_1_w1c_cn66xx 4143 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1c::cvmx_ciu_intx_en4_1_w1c_cn70xx 4178 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1c::cvmx_ciu_intx_en4_1_w1c_cnf71xx 4230 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1s::cvmx_ciu_intx_en4_1_w1s_s 4283 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1s::cvmx_ciu_intx_en4_1_w1s_cn61xx 4318 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1s::cvmx_ciu_intx_en4_1_w1s_cn63xx 4358 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1s::cvmx_ciu_intx_en4_1_w1s_cn66xx 4394 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1s::cvmx_ciu_intx_en4_1_w1s_cn70xx 4429 u64 key : 1; member in struct:cvmx_ciu_intx_en4_1_w1s::cvmx_ciu_intx_en4_1_w1s_cnf71xx 5134 u64 key : 1; member in struct:cvmx_ciu_int_sum1::cvmx_ciu_int_sum1_s 5206 u64 key : 1; member in struct:cvmx_ciu_int_sum1::cvmx_ciu_int_sum1_cn61xx 5241 u64 key : 1; member in struct:cvmx_ciu_int_sum1::cvmx_ciu_int_sum1_cn63xx 5281 u64 key : 1; member in struct:cvmx_ciu_int_sum1::cvmx_ciu_int_sum1_cn66xx 5315 u64 key : 1; member in struct:cvmx_ciu_int_sum1::cvmx_ciu_int_sum1_cn70xx 5348 u64 key : 1; member in struct:cvmx_ciu_int_sum1::cvmx_ciu_int_sum1_cnf71xx 6279 u64 key : 1; member in struct:cvmx_ciu_sum1_iox_int::cvmx_ciu_sum1_iox_int_s 6315 u64 key : 1; member in struct:cvmx_ciu_sum1_iox_int::cvmx_ciu_sum1_iox_int_cn61xx 6354 u64 key : 1; member in struct:cvmx_ciu_sum1_iox_int::cvmx_ciu_sum1_iox_int_cn66xx 6390 u64 key : 1; member in struct:cvmx_ciu_sum1_iox_int::cvmx_ciu_sum1_iox_int_cn70xx 6425 u64 key : 1; member in struct:cvmx_ciu_sum1_iox_int::cvmx_ciu_sum1_iox_int_cnf71xx 6479 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip2::cvmx_ciu_sum1_ppx_ip2_s 6515 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip2::cvmx_ciu_sum1_ppx_ip2_cn61xx 6554 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip2::cvmx_ciu_sum1_ppx_ip2_cn66xx 6590 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip2::cvmx_ciu_sum1_ppx_ip2_cn70xx 6625 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip2::cvmx_ciu_sum1_ppx_ip2_cnf71xx 6680 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip3::cvmx_ciu_sum1_ppx_ip3_s 6716 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip3::cvmx_ciu_sum1_ppx_ip3_cn61xx 6755 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip3::cvmx_ciu_sum1_ppx_ip3_cn66xx 6791 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip3::cvmx_ciu_sum1_ppx_ip3_cn70xx 6826 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip3::cvmx_ciu_sum1_ppx_ip3_cnf71xx 6881 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip4::cvmx_ciu_sum1_ppx_ip4_s 6917 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip4::cvmx_ciu_sum1_ppx_ip4_cn61xx 6956 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip4::cvmx_ciu_sum1_ppx_ip4_cn66xx 6992 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip4::cvmx_ciu_sum1_ppx_ip4_cn70xx 7027 u64 key : 1; member in struct:cvmx_ciu_sum1_ppx_ip4::cvmx_ciu_sum1_ppx_ip4_cnf71xx [all...] |
H A D | cvmx-error.h | 279 * @param key INTSN value to search for 282 * Return: Negative, 0 or positive when respectively key is less than, 285 int cvmx_error_intsn_cmp(const void *key, const void *data);
|
/u-boot/lib/crypto/ |
H A D | x509_cert_parser.c | 35 const void *key; /* Key data */ member in struct:x509_parse_context 36 size_t key_size; /* Size of key data */ 38 size_t params_size; /* Size of key parameters */ 39 enum OID key_algo; /* Public key algorithm */ 117 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); 118 if (!cert->pub->key) 135 /* Generate cert issuer + serial number key ID */ 202 * Record the public key algorithm 436 * Extract the parameters for the public key [all...] |
/u-boot/common/ |
H A D | autoboot.c | 61 * passwd_abort_crypt() - check for a crypt-style hashed key sequence to abort booting 72 * this function never times out if the user presses the <Enter> key 146 * passwd_abort_sha256() - check for a hashed key sequence to abort booting 226 * passwd_abort_key() - check for a key sequence to aborted booting 269 debug_bootkeys("%s key:<%s>\n", 342 * returns: 0 - no key string, allow autoboot 1 - got key string, abort 368 debug_bootkeys("key timeout\n"); 378 printf("Hit any key to stop autoboot: %2d ", bootdelay); 381 * Check if key alread 395 int key; local [all...] |
/u-boot/env/ |
H A D | flags.c | 447 const char *var_name = var_entry->key; 485 e.key = name; 534 name = item->key;
|
H A D | common.c | 124 e.key = name; 226 e.key = name; 594 int vallen = strlen(match->key) + 1; 609 memcpy(buf, match->key, vallen);
|
/u-boot/board/xilinx/zynq/ |
H A D | cmds.c | 61 * Extract the primary public key components from already autheticated FSBL 148 * Verify and extract the hash value from signature using the public key 151 static int zynq_rsa_verify_key(const struct zynq_rsa_public_key *key, argument 157 if (!key || !sig || !hash) 160 if (sig_len != (key->len * sizeof(u32))) { 178 status = zynq_pow_mod((u32 *)key, (u32 *)buf);
|