Searched refs:key (Results 176 - 200 of 201) sorted by relevance

123456789

/u-boot/drivers/net/octeontx/
H A Dnic.h124 #define RSS_HASH_KEY_SIZE 5 /* 320 bit key */
142 u64 key[RSS_HASH_KEY_SIZE]; member in struct:nicvf_rss_info
/u-boot/arch/mips/mach-octeon/include/mach/
H A Dcvmx-npi-defs.h1790 u64 key : 1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_s
1825 u64 key : 1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn30xx
1861 u64 key : 1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn38xx
1893 u64 key : 1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn50xx
H A Dcvmx-lmcx-defs.h3176 * Running hard PPR may require LMC to issue security key as four consecutive
3178 * key in the general purpose CSRs as follows:
3180 * _ Security key 0 = LMC()_GENERAL_PURPOSE0[DATA]<17:0>.
3181 * _ Security key 1 = LMC()_GENERAL_PURPOSE0[DATA]<35:18>.
3182 * _ Security key 2 = LMC()_GENERAL_PURPOSE1[DATA]<17:0>.
3183 * _ Security key 3 = LMC()_GENERAL_PURPOSE1[DATA]<35:18>.
3696 uint64_t key:64; member in struct:cvmx_lmcx_scramble_cfg0::cvmx_lmcx_scramble_cfg0_s
3718 uint64_t key:64; member in struct:cvmx_lmcx_scramble_cfg1::cvmx_lmcx_scramble_cfg1_s
3737 uint64_t key:64; member in struct:cvmx_lmcx_scramble_cfg2::cvmx_lmcx_scramble_cfg2_s
H A Dcvmx-npei-defs.h3294 u64 key : 1; member in struct:cvmx_npei_rsl_int_blocks::cvmx_npei_rsl_int_blocks_s
/u-boot/tools/
H A Dmxsimage.c345 sb_aes_crypt(ictx, ictx->image_key, ictx->sb_dict_key.key,
346 sizeof(ictx->sb_dict_key.key));
355 sb_aes_crypt(ictx, ictx->sb_dict_key.key, ictx->image_key,
356 sizeof(ictx->sb_dict_key.key));
1348 /* FIXME -- We support only default key */
1364 /* Size of the key dictionary, which has single zero entry. */
1972 fprintf(stderr, "ERR: SB key dictionary too short!\n");
2032 fprintf(stderr, "ERR: SB key dictionary too short!\n");
/u-boot/tools/patman/
H A Dstatus.py159 key: Commit number (0...n-1)
162 key: Patch number (0...n-1)
263 patches = sorted(patches, key=lambda x: x.seq)
275 key: Response tag (e.g. 'Reviewed-by')
328 key: Response tag (e.g. 'Reviewed-by')
355 key: Response tag (e.g. 'Reviewed-by')
/u-boot/lib/
H A Daes.c498 * encrypt/decrypt columns of the key
501 static void add_round_key(u32 *state, u32 *key) argument
506 state[idx] ^= key[idx];
538 void aes_expand_key(u8 *key, u32 key_len, u8 *expkey) argument
546 memcpy(expkey, key, key_len);
H A Dtpm-v1.c498 0x00, 0x00, 0x00, 0x00, /* key handle */
532 * @param auth authentication data (HMAC key)
595 * @param auth authentication data (HMAC key)
712 u32 tpm1_load_key2_oiap(struct udevice *dev, u32 parent_handle, const void *key, argument
743 req_key_offset, key, key_length
786 0x00, 0x00, 0x00, 0x00, /* key handle */
866 /* now search a(/ the) key which we can access with the given auth */
/u-boot/lib/rsa/
H A Drsa-verify.c200 * @info: Specifies key and FIT information
316 * @info: Specifies key and FIT information
317 * @prop: Specifies key
321 * @key_len: Number of bytes in rsa key
384 * only modulus and exponent as RSA key properties.
385 * @info: Specifies key information
390 * Parse a RSA public key blob in DER format pointed to in @info and fill
391 * a key_prop structure with properties of the key. Then verify a RSA PKCS1.5
405 /* Public key is self-described to fill key_prop */
406 ret = rsa_gen_key_prop(info->key, inf
[all...]
/u-boot/fs/ubifs/
H A Dlprops.c1137 key_read(c, ubifs_idx_key(c, idx), &snod->key);
1141 found = ubifs_tnc_has_node(c, &snod->key, level, lnum,
H A Dsuper.c246 union ubifs_key key; local
293 ino_key_init(c, &key, inode->i_ino);
295 err = ubifs_tnc_lookup(c, &key, ino);
779 * read and the key length is known.
1654 dbg_gen("key hash type: %d", c->key_hash_type);
/u-boot/tools/dtoc/
H A Ddtb_platdata.py56 # key: property name
164 key (str): Node name, as a C identifier
166 key (str): Field name
391 key=lambda x: conv_name_to_c(x.name))
402 key: Position in child list (-1=head, 0=first, 1=second, ...
998 key=lambda uc: uc.uclass_id)
1121 # key: Command used to generate this file
H A Dfdt.py709 key=lambda prop: prop._offset or 1 << 31,
/u-boot/tools/binman/
H A Dfip_util.py126 FipType('rot-cert', 'Root Of Trust key certificate',
129 FipType('trusted-key-cert', 'Trusted key certificate',
132 FipType('scp-fw-key-cert', 'SCP Firmware key certificate',
135 FipType('soc-fw-key-cert', 'SoC Firmware key certificate',
138 FipType('tos-fw-key-cert', 'Trusted OS Firmware key certificate',
141 FipType('nt-fw-key
[all...]
H A Dcontrol.py39 # key: Value of the entry's 'missing-msg' or entry name
88 key: Message tag (str)
475 privatekey_fname: Private key filename
549 key: Image name (str)
774 SignEntries(args.image, args.file, args.key, args.algo, args.paths)
H A Dftest.py253 TestFunctional._MakeInputFile('encrypted-file.key', ENCRYPTED_KEY_DATA)
386 key: arg name
527 key: arg name
751 def _CheckSign(self, fit, key):
753 tools.run('fit_check_sign', '-k', key, '-f', fit)
1508 key: arg name
2137 key = '%d.dat' % i
2138 start = entries[key].image_pos
2139 len = entries[key].size
3565 key
[all...]
/u-boot/include/
H A Defi_api.h77 efi_uintn_t *key,
874 struct efi_input_key key; member in struct:efi_key_data
909 struct efi_input_key *key);
1176 u32 key; member in struct:efi_key_descriptor
H A Defi_loader.h1173 typedef efi_status_t (*efi_console_filter_func)(struct efi_input_key *key);
/u-boot/drivers/block/
H A Drkmtd.c976 u8 key[16] = { 124, 78, 3, 4, 85, 5, 9, 7, 45, 44, 123, 56, 23, 13, 23, 17}; local
982 K[i] = key[j];
/u-boot/test/dm/
H A Dcore.c570 * @key: Key value to put in first child. Subsequence children
577 int count, int key, struct udevice *child[])
588 pdata->ping_add = key + i;
576 create_children(struct unit_test_state *uts, struct udevice *parent, int count, int key, struct udevice *child[]) argument
/u-boot/tools/binman/etype/
H A Dsection.py471 entries = sorted(self._entries.values(), key=lambda entry: entry.offset)
570 key: entry name
999 key: entry path
1002 key: entry name
/u-boot/cmd/
H A Dmmc.c193 puts("Warning: Programming authentication key can be done only once !\n"
195 "Really perform the key programming? <y/N> ");
199 puts("Authentication key programming aborted\n");
291 U_BOOT_CMD_MKENT(key, 2, 0, do_mmcrpmb_key, "", ""),
1311 "mmc rpmb read addr blk# cnt [address of auth-key] - block size is 256 bytes\n"
1312 "mmc rpmb write addr blk# cnt <address of auth-key> - block size is 256 bytes\n"
1313 "mmc rpmb key <address of auth-key> - program the RPMB authentication key.\n"
/u-boot/lib/efi_loader/
H A Defi_boottime.c466 * @map_key: key for the memory map
1470 * @registration: key for retrieving the registration information
1538 * efi_check_register_notify_event() - check if registration key is valid
1540 * Check that a pointer is a valid registration key as returned by
1543 * @key: registration key
1544 * Return: valid registration key or NULL
1547 (void *key)
1552 if (event == (struct efi_register_notify_event *)key)
1563 * @search_key: registration key
1546 efi_check_register_notify_event(void *key) argument
[all...]
/u-boot/drivers/video/
H A Dstb_truetype.h1231 static stbtt__buf stbtt__dict_get(stbtt__buf *b, int key) argument
1241 if (op == key) return stbtt__buf_range(b, start, end-start);
1246 static void stbtt__dict_get_ints(stbtt__buf *b, int key, int outcount, stbtt_uint32 *out) argument
1249 stbtt__buf operands = stbtt__dict_get(b, key);
/u-boot/arch/arm/include/asm/arch-octeontx2/csrs/
H A Dcsrs-nix.h5225 * NIX AF Receive Flow Key Algorithm Field Registers A flow key algorithm
10042 u64 key : 64; member in struct:nixx_lf_rx_secretx::nixx_lf_rx_secretx_s

Completed in 320 milliseconds

123456789