Searched refs:key (Results 51 - 75 of 201) sorted by relevance

123456789

/u-boot/lib/efi_loader/
H A Dinitrddump.c143 struct efi_input_key key = {0}; local
151 ret = cin->read_key_stroke(cin, &key);
154 switch (key.scan_code) {
161 switch (key.unicode_char | 0x20) {
181 struct efi_input_key key = {0}; local
192 ret = cin->read_key_stroke(cin, &key);
195 switch (key.scan_code) {
202 switch (key.unicode_char) {
217 if (key.unicode_char >= 0xD800 && key
[all...]
H A Ddtbdump.c68 struct efi_input_key key = {0}; local
78 ret = cin->read_key_stroke(cin, &key);
81 switch (key.scan_code) {
88 switch (key.unicode_char | 0x20) {
108 struct efi_input_key key = {0}; local
121 ret = cin->read_key_stroke(cin, &key);
124 switch (key.scan_code) {
131 switch (key.unicode_char) {
146 if (key.unicode_char >= 0xD800 && key
[all...]
H A Dsmbiosdump.c89 struct efi_input_key key = {0}; local
99 ret = cin->read_key_stroke(cin, &key);
102 switch (key.scan_code) {
109 switch (key.unicode_char | 0x20) {
129 struct efi_input_key key = {0}; local
142 ret = cin->read_key_stroke(cin, &key);
145 switch (key.scan_code) {
152 switch (key.unicode_char) {
167 if (key.unicode_char >= 0xD800 && key
[all...]
/u-boot/test/lib/
H A Dtest_aes.c53 /* corrupt the expanded key */
73 /* corrupt the expanded key */
86 u8 *key, *key_exp, *iv; local
91 key = malloc(key_len);
98 if (!key || !key_exp || !iv || !nocipher || !ciphered || !uncipher) {
105 rand_buf(key, key_len);
111 /* Expand the key */
112 aes_expand_key(key, key_len, key_exp);
133 free(key);
/u-boot/fs/ubifs/
H A Ddebug.h162 #define ubifs_dbg_msg_key(type, key, fmt, ...) do { \
166 dbg_snprintf_key(c, key, __tmp_key_buf, DBG_KEY_BUF_LEN)); \
179 #define ubifs_dbg_msg_key(type, key, fmt, ...) do { \
183 dbg_snprintf_key(c, key, __tmp_key_buf, DBG_KEY_BUF_LEN)); \
192 #define dbg_jnlk(key, fmt, ...) \
193 ubifs_dbg_msg_key("jnl", key, fmt, ##__VA_ARGS__)
196 #define dbg_tnck(key, fmt, ...) \
197 ubifs_dbg_msg_key("tnc", key, fmt, ##__VA_ARGS__)
204 #define dbg_mntk(key, fmt, ...) \
205 ubifs_dbg_msg_key("mnt", key, fm
[all...]
H A Ddebug.c76 return "unknown/invalid key";
105 const union ubifs_key *key, char *buffer, int len)
108 int type = key_type(c, key);
114 (unsigned long)key_inum(c, key),
120 (unsigned long)key_inum(c, key),
121 get_key_type(type), key_hash(c, key));
125 (unsigned long)key_inum(c, key),
126 get_key_type(type), key_block(c, key));
130 (unsigned long)key_inum(c, key),
134 len -= snprintf(p, len, "(bad key typ
104 dbg_snprintf_key(const struct ubifs_info *c, const union ubifs_key *key, char *buffer, int len) argument
242 union ubifs_key key; local
311 union ubifs_key key; local
1147 union ubifs_key key; local
1218 union ubifs_key key; local
1986 union ubifs_key key; local
2221 union ubifs_key key; local
[all...]
H A Dreplay.c41 * @key: node key
57 union ubifs_key key; member in struct:replay_entry
199 ino = key_inum(c, &r->key);
218 dbg_mntk(&r->key, "LEB %d:%d len %d deletion %d sqnum %llu key ",
224 if (is_hash_key(c, &r->key)) {
226 err = ubifs_tnc_remove_nm(c, &r->key, &r->nm);
228 err = ubifs_tnc_add_nm(c, &r->key, r->lnum, r->offs,
232 switch (key_type(c, &r->key)) {
351 insert_node(struct ubifs_info *c, int lnum, int offs, int len, union ubifs_key *key, unsigned long long sqnum, int deletion, int *used, loff_t old_size, loff_t new_size) argument
399 insert_dent(struct ubifs_info *c, int lnum, int offs, int len, union ubifs_key *key, const char *name, int nlen, unsigned long long sqnum, int deletion, int *used) argument
639 union ubifs_key key; local
[all...]
H A Dmisc.h212 * ubifs_idx_key - return pointer to an index key.
220 return (void *)((struct ubifs_branch *)idx->branches)->key;
225 return (void *)tmp->key;
242 * @key: node key to lookup
245 * This function look up and reads node with key @key. The caller has to make
251 const union ubifs_key *key, void *node)
253 return ubifs_tnc_locate(c, key, node, NULL, NULL);
250 ubifs_tnc_lookup(struct ubifs_info *c, const union ubifs_key *key, void *node) argument
/u-boot/doc/
H A Dconf.py157 key, val = [x.strip() for x in line.split('=', 2)]
158 if key == 'VERSION':
160 elif key == 'PATCHLEVEL':
/u-boot/arch/sh/lib/
H A Dbootm.c32 static unsigned long sh_check_cmd_arg(char *cmdline, char *key, int base) argument
35 char *p = strstr(cmdline, key);
37 p += strlen(key);
/u-boot/include/u-boot/
H A Dsha1.h85 * \brief Output = HMAC-SHA-1( input buffer, hmac key )
87 * \param key HMAC secret key
88 * \param keylen length of the HMAC key
93 void sha1_hmac(const unsigned char *key, int keylen,
H A Drsa-mod-exp.h15 * struct key_prop - holder for a public key properties
32 * rsa_gen_key_prop() - Generate key properties of RSA public key
33 * @key: Specifies key data in DER format
34 * @keylen: Length of @key
35 * @prop: Generated key property
37 * This function takes a blob of encoded RSA public key data in DER
44 int rsa_gen_key_prop(const void *key, uint32_t keylen, struct key_prop **proc);
47 * rsa_free_key_prop() - Free key propertie
[all...]
/u-boot/fs/btrfs/common/
H A Drbtree-utils.c46 struct rb_node *rb_search(struct rb_root *root, void *key, rb_compare_keys comp, argument
56 ret = comp(n, key);
/u-boot/fs/btrfs/
H A Droot-tree.c6 struct btrfs_root_item *item, struct btrfs_key *key)
42 memcpy(key, &found_key, sizeof(found_key));
5 btrfs_find_last_root(struct btrfs_root *root, u64 objectid, struct btrfs_root_item *item, struct btrfs_key *key) argument
/u-boot/include/
H A Dsearch.h30 const char *key; member in struct:env_entry
68 * Search for entry matching item.key in internal hash table. If
86 * @key: Name of entry to delete
93 int hdelete_r(const char *key, struct hsearch_data *htab, int flag);
115 #define H_MATCH_KEY (1 << 4) /* search/grep key = variable names */
/u-boot/tools/binman/etype/
H A Dencrypted.py24 The key that must be used to decrypt the binary is either directly embedded
25 in the device tree or indirectly by specifying a key source. The key source
26 can be used as an id of a key that is stored in an external device.
28 Using an embedded key
31 This is an example using an embedded key::
40 key-filename = "encrypted-blob.bin.key";
49 key = <0x...>;
56 Using an external key
[all...]
H A Dpre_load.py40 - pre-load-key-path: Path of the directory that store key (provided by
45 - key-name: Filename of the private key to sign
62 key-name = "private.pem";
78 self.key_name = fdt_util.GetString(self._node, 'key-name')
85 [EntryArg('pre-load-key-path', str)])
101 # Read the key
102 key = RSA.import_key(tools.read_file(key_name))
104 # Check if the key ha
[all...]
/u-boot/test/py/tests/
H A Dtest_fit_ecdsa.py8 This test uses mkimage to sign an existing FIT image with an ECDSA key. The
58 def check_signatures(self, key):
64 verifier = DSS.new(key, 'fips-186-3')
90 key_file = f'{tempdir}/ecdsa-test-key.pem'
94 key = generate_ecdsa_key()
100 # invocations of mkimage expect to read the key from disk
102 f.write(key.export_key(format='PEM'))
113 fit.check_signatures(key)
/u-boot/tools/
H A Dmtk_image.c103 char *buf = strdup(imagename), *key, *val, *end, *next; local
114 key = buf;
115 while (key) {
116 next = strchr(key, ';');
120 val = strchr(key, '=');
124 /* Trim key */
125 while (is_blank_char(*key))
126 key++;
128 end = key + strlen(key)
[all...]
/u-boot/lib/libavb/
H A Davb_cmdline.c117 const char* key,
122 key_len = avb_strlen(key);
141 avb_memcpy(new_cmdline + offset, key, key_len);
177 const char* key,
192 return cmdline_append_option(slot_data, key, combined);
196 const char* key,
200 return cmdline_append_option(slot_data, key, digits);
204 const char* key,
212 ret = cmdline_append_option(slot_data, key, hex_data);
116 cmdline_append_option(AvbSlotVerifyData* slot_data, const char* key, const char* value) argument
176 cmdline_append_version(AvbSlotVerifyData* slot_data, const char* key, uint64_t major_version, uint64_t minor_version) argument
195 cmdline_append_uint64_base10(AvbSlotVerifyData* slot_data, const char* key, uint64_t value) argument
203 cmdline_append_hex(AvbSlotVerifyData* slot_data, const char* key, const uint8_t* data, size_t data_len) argument
/u-boot/boot/
H A Dscene_internal.h126 * scene_menu_send_key() - Send a key to a menu for processing
130 * @key: Key code to send (KEY_...)
131 * @event: Place to put any event which is generated by the key
135 int scene_menu_send_key(struct scene *scn, struct scene_obj_menu *menu, int key,
139 * scene_textline_send_key() - Send a key to a textline for processing
143 * @key: Key code to send (KEY_...)
144 * @event: Place to put any event which is generated by the key
148 int key, struct expo_action *event);
185 * @scn: Scene to receive the key
186 * @key
[all...]
/u-boot/lib/rsa/
H A Drsa-sign.c36 * rsa_pem_get_pub_key() - read a public key from a .crt file
38 * @keydir: Directory containins the key
39 * @name Name of key file (will have a .crt extension)
46 EVP_PKEY *key = NULL; local
71 /* Get the public key from the certificate. */
72 key = X509_get_pubkey(cert);
73 if (!key) {
74 rsa_err("Couldn't read public key\n");
80 *evpp = key;
93 * rsa_engine_get_pub_key() - read a public key fro
106 EVP_PKEY *key = NULL; local
235 EVP_PKEY *key = NULL; local
506 rsa_get_exponent(RSA *key, uint64_t *e) argument
555 rsa_get_params(RSA *key, uint64_t *exponent, uint32_t *n0_invp, BIGNUM **modulusp, BIGNUM **r_squaredp) argument
[all...]
/u-boot/lib/efi/
H A Defi_app.c42 efi_uintn_t size, desc_size, key; local
49 ret = boot->get_memory_map(&size, NULL, &key, &desc_size, &version);
57 ret = boot->get_memory_map(&size, desc, &key, &desc_size, &version);
65 *keyp = key;
/u-boot/scripts/dtc/pylibfdt/
H A Dsetup.py39 # Decodes a Makefile assignment line into key and value (and plus for +=)
40 RE_KEY_VALUE = re.compile(r'(?P<key>\w+) *(?P<plus>[+])?= *(?P<value>.*)$')
64 key: Variable name (e.g. 'VAR')
80 key = m.group('key')
83 if 'plus' in m.groupdict() and key in makevars:
84 makevars[key] += ' ' + value
86 makevars[key] = value
/u-boot/cmd/
H A Dbootmenu.c46 char key[3]; /* key identifier of number */ member in struct:bootmenu_entry
91 enum bootmenu_key key = BKEY_NONE; local
99 key = bootmenu_autoboot_loop(menu, cch);
101 /* Some key was pressed, so autoboot was stopped */
102 key = bootmenu_loop(menu, cch);
105 switch (key) {
109 /* no menu key selected, regenerate menu */
114 /* no menu key selected, regenerate menu */
120 return iter->key;
[all...]

Completed in 248 milliseconds

123456789