/u-boot/drivers/net/octeontx/ |
H A D | nic.h | 124 #define RSS_HASH_KEY_SIZE 5 /* 320 bit key */ 142 u64 key[RSS_HASH_KEY_SIZE]; member in struct:nicvf_rss_info
|
/u-boot/arch/mips/mach-octeon/include/mach/ |
H A D | cvmx-npi-defs.h | 1790 u64 key : 1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_s 1825 u64 key : 1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn30xx 1861 u64 key : 1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn38xx 1893 u64 key : 1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn50xx
|
H A D | cvmx-lmcx-defs.h | 3176 * Running hard PPR may require LMC to issue security key as four consecutive 3178 * key in the general purpose CSRs as follows: 3180 * _ Security key 0 = LMC()_GENERAL_PURPOSE0[DATA]<17:0>. 3181 * _ Security key 1 = LMC()_GENERAL_PURPOSE0[DATA]<35:18>. 3182 * _ Security key 2 = LMC()_GENERAL_PURPOSE1[DATA]<17:0>. 3183 * _ Security key 3 = LMC()_GENERAL_PURPOSE1[DATA]<35:18>. 3696 uint64_t key:64; member in struct:cvmx_lmcx_scramble_cfg0::cvmx_lmcx_scramble_cfg0_s 3718 uint64_t key:64; member in struct:cvmx_lmcx_scramble_cfg1::cvmx_lmcx_scramble_cfg1_s 3737 uint64_t key:64; member in struct:cvmx_lmcx_scramble_cfg2::cvmx_lmcx_scramble_cfg2_s
|
H A D | cvmx-npei-defs.h | 3294 u64 key : 1; member in struct:cvmx_npei_rsl_int_blocks::cvmx_npei_rsl_int_blocks_s
|
/u-boot/tools/ |
H A D | mxsimage.c | 345 sb_aes_crypt(ictx, ictx->image_key, ictx->sb_dict_key.key, 346 sizeof(ictx->sb_dict_key.key)); 355 sb_aes_crypt(ictx, ictx->sb_dict_key.key, ictx->image_key, 356 sizeof(ictx->sb_dict_key.key)); 1348 /* FIXME -- We support only default key */ 1364 /* Size of the key dictionary, which has single zero entry. */ 1972 fprintf(stderr, "ERR: SB key dictionary too short!\n"); 2032 fprintf(stderr, "ERR: SB key dictionary too short!\n");
|
/u-boot/tools/patman/ |
H A D | status.py | 159 key: Commit number (0...n-1) 162 key: Patch number (0...n-1) 263 patches = sorted(patches, key=lambda x: x.seq) 275 key: Response tag (e.g. 'Reviewed-by') 328 key: Response tag (e.g. 'Reviewed-by') 355 key: Response tag (e.g. 'Reviewed-by')
|
/u-boot/lib/ |
H A D | aes.c | 498 * encrypt/decrypt columns of the key 501 static void add_round_key(u32 *state, u32 *key) argument 506 state[idx] ^= key[idx]; 538 void aes_expand_key(u8 *key, u32 key_len, u8 *expkey) argument 546 memcpy(expkey, key, key_len);
|
H A D | tpm-v1.c | 498 0x00, 0x00, 0x00, 0x00, /* key handle */ 532 * @param auth authentication data (HMAC key) 595 * @param auth authentication data (HMAC key) 712 u32 tpm1_load_key2_oiap(struct udevice *dev, u32 parent_handle, const void *key, argument 743 req_key_offset, key, key_length 786 0x00, 0x00, 0x00, 0x00, /* key handle */ 866 /* now search a(/ the) key which we can access with the given auth */
|
/u-boot/lib/rsa/ |
H A D | rsa-verify.c | 200 * @info: Specifies key and FIT information 316 * @info: Specifies key and FIT information 317 * @prop: Specifies key 321 * @key_len: Number of bytes in rsa key 384 * only modulus and exponent as RSA key properties. 385 * @info: Specifies key information 390 * Parse a RSA public key blob in DER format pointed to in @info and fill 391 * a key_prop structure with properties of the key. Then verify a RSA PKCS1.5 405 /* Public key is self-described to fill key_prop */ 406 ret = rsa_gen_key_prop(info->key, inf [all...] |
/u-boot/fs/ubifs/ |
H A D | lprops.c | 1137 key_read(c, ubifs_idx_key(c, idx), &snod->key); 1141 found = ubifs_tnc_has_node(c, &snod->key, level, lnum,
|
H A D | super.c | 246 union ubifs_key key; local 293 ino_key_init(c, &key, inode->i_ino); 295 err = ubifs_tnc_lookup(c, &key, ino); 779 * read and the key length is known. 1654 dbg_gen("key hash type: %d", c->key_hash_type);
|
/u-boot/tools/dtoc/ |
H A D | dtb_platdata.py | 56 # key: property name 164 key (str): Node name, as a C identifier 166 key (str): Field name 391 key=lambda x: conv_name_to_c(x.name)) 402 key: Position in child list (-1=head, 0=first, 1=second, ... 998 key=lambda uc: uc.uclass_id) 1121 # key: Command used to generate this file
|
H A D | fdt.py | 709 key=lambda prop: prop._offset or 1 << 31,
|
/u-boot/tools/binman/ |
H A D | fip_util.py | 126 FipType('rot-cert', 'Root Of Trust key certificate', 129 FipType('trusted-key-cert', 'Trusted key certificate', 132 FipType('scp-fw-key-cert', 'SCP Firmware key certificate', 135 FipType('soc-fw-key-cert', 'SoC Firmware key certificate', 138 FipType('tos-fw-key-cert', 'Trusted OS Firmware key certificate', 141 FipType('nt-fw-key [all...] |
H A D | control.py | 39 # key: Value of the entry's 'missing-msg' or entry name 88 key: Message tag (str) 475 privatekey_fname: Private key filename 549 key: Image name (str) 774 SignEntries(args.image, args.file, args.key, args.algo, args.paths)
|
H A D | ftest.py | 253 TestFunctional._MakeInputFile('encrypted-file.key', ENCRYPTED_KEY_DATA) 386 key: arg name 527 key: arg name 751 def _CheckSign(self, fit, key): 753 tools.run('fit_check_sign', '-k', key, '-f', fit) 1508 key: arg name 2137 key = '%d.dat' % i 2138 start = entries[key].image_pos 2139 len = entries[key].size 3565 key [all...] |
/u-boot/include/ |
H A D | efi_api.h | 77 efi_uintn_t *key, 874 struct efi_input_key key; member in struct:efi_key_data 909 struct efi_input_key *key); 1176 u32 key; member in struct:efi_key_descriptor
|
H A D | efi_loader.h | 1173 typedef efi_status_t (*efi_console_filter_func)(struct efi_input_key *key);
|
/u-boot/drivers/block/ |
H A D | rkmtd.c | 976 u8 key[16] = { 124, 78, 3, 4, 85, 5, 9, 7, 45, 44, 123, 56, 23, 13, 23, 17}; local 982 K[i] = key[j];
|
/u-boot/test/dm/ |
H A D | core.c | 570 * @key: Key value to put in first child. Subsequence children 577 int count, int key, struct udevice *child[]) 588 pdata->ping_add = key + i; 576 create_children(struct unit_test_state *uts, struct udevice *parent, int count, int key, struct udevice *child[]) argument
|
/u-boot/tools/binman/etype/ |
H A D | section.py | 471 entries = sorted(self._entries.values(), key=lambda entry: entry.offset) 570 key: entry name 999 key: entry path 1002 key: entry name
|
/u-boot/cmd/ |
H A D | mmc.c | 193 puts("Warning: Programming authentication key can be done only once !\n" 195 "Really perform the key programming? <y/N> "); 199 puts("Authentication key programming aborted\n"); 291 U_BOOT_CMD_MKENT(key, 2, 0, do_mmcrpmb_key, "", ""), 1311 "mmc rpmb read addr blk# cnt [address of auth-key] - block size is 256 bytes\n" 1312 "mmc rpmb write addr blk# cnt <address of auth-key> - block size is 256 bytes\n" 1313 "mmc rpmb key <address of auth-key> - program the RPMB authentication key.\n"
|
/u-boot/lib/efi_loader/ |
H A D | efi_boottime.c | 466 * @map_key: key for the memory map 1470 * @registration: key for retrieving the registration information 1538 * efi_check_register_notify_event() - check if registration key is valid 1540 * Check that a pointer is a valid registration key as returned by 1543 * @key: registration key 1544 * Return: valid registration key or NULL 1547 (void *key) 1552 if (event == (struct efi_register_notify_event *)key) 1563 * @search_key: registration key 1546 efi_check_register_notify_event(void *key) argument [all...] |
/u-boot/drivers/video/ |
H A D | stb_truetype.h | 1231 static stbtt__buf stbtt__dict_get(stbtt__buf *b, int key) argument 1241 if (op == key) return stbtt__buf_range(b, start, end-start); 1246 static void stbtt__dict_get_ints(stbtt__buf *b, int key, int outcount, stbtt_uint32 *out) argument 1249 stbtt__buf operands = stbtt__dict_get(b, key);
|
/u-boot/arch/arm/include/asm/arch-octeontx2/csrs/ |
H A D | csrs-nix.h | 5225 * NIX AF Receive Flow Key Algorithm Field Registers A flow key algorithm 10042 u64 key : 64; member in struct:nixx_lf_rx_secretx::nixx_lf_rx_secretx_s
|