/u-boot/lib/efi_loader/ |
H A D | initrddump.c | 143 struct efi_input_key key = {0}; local 151 ret = cin->read_key_stroke(cin, &key); 154 switch (key.scan_code) { 161 switch (key.unicode_char | 0x20) { 181 struct efi_input_key key = {0}; local 192 ret = cin->read_key_stroke(cin, &key); 195 switch (key.scan_code) { 202 switch (key.unicode_char) { 217 if (key.unicode_char >= 0xD800 && key [all...] |
H A D | dtbdump.c | 68 struct efi_input_key key = {0}; local 78 ret = cin->read_key_stroke(cin, &key); 81 switch (key.scan_code) { 88 switch (key.unicode_char | 0x20) { 108 struct efi_input_key key = {0}; local 121 ret = cin->read_key_stroke(cin, &key); 124 switch (key.scan_code) { 131 switch (key.unicode_char) { 146 if (key.unicode_char >= 0xD800 && key [all...] |
H A D | smbiosdump.c | 89 struct efi_input_key key = {0}; local 99 ret = cin->read_key_stroke(cin, &key); 102 switch (key.scan_code) { 109 switch (key.unicode_char | 0x20) { 129 struct efi_input_key key = {0}; local 142 ret = cin->read_key_stroke(cin, &key); 145 switch (key.scan_code) { 152 switch (key.unicode_char) { 167 if (key.unicode_char >= 0xD800 && key [all...] |
/u-boot/test/lib/ |
H A D | test_aes.c | 53 /* corrupt the expanded key */ 73 /* corrupt the expanded key */ 86 u8 *key, *key_exp, *iv; local 91 key = malloc(key_len); 98 if (!key || !key_exp || !iv || !nocipher || !ciphered || !uncipher) { 105 rand_buf(key, key_len); 111 /* Expand the key */ 112 aes_expand_key(key, key_len, key_exp); 133 free(key);
|
/u-boot/fs/ubifs/ |
H A D | debug.h | 162 #define ubifs_dbg_msg_key(type, key, fmt, ...) do { \ 166 dbg_snprintf_key(c, key, __tmp_key_buf, DBG_KEY_BUF_LEN)); \ 179 #define ubifs_dbg_msg_key(type, key, fmt, ...) do { \ 183 dbg_snprintf_key(c, key, __tmp_key_buf, DBG_KEY_BUF_LEN)); \ 192 #define dbg_jnlk(key, fmt, ...) \ 193 ubifs_dbg_msg_key("jnl", key, fmt, ##__VA_ARGS__) 196 #define dbg_tnck(key, fmt, ...) \ 197 ubifs_dbg_msg_key("tnc", key, fmt, ##__VA_ARGS__) 204 #define dbg_mntk(key, fmt, ...) \ 205 ubifs_dbg_msg_key("mnt", key, fm [all...] |
H A D | debug.c | 76 return "unknown/invalid key"; 105 const union ubifs_key *key, char *buffer, int len) 108 int type = key_type(c, key); 114 (unsigned long)key_inum(c, key), 120 (unsigned long)key_inum(c, key), 121 get_key_type(type), key_hash(c, key)); 125 (unsigned long)key_inum(c, key), 126 get_key_type(type), key_block(c, key)); 130 (unsigned long)key_inum(c, key), 134 len -= snprintf(p, len, "(bad key typ 104 dbg_snprintf_key(const struct ubifs_info *c, const union ubifs_key *key, char *buffer, int len) argument 242 union ubifs_key key; local 311 union ubifs_key key; local 1147 union ubifs_key key; local 1218 union ubifs_key key; local 1986 union ubifs_key key; local 2221 union ubifs_key key; local [all...] |
H A D | replay.c | 41 * @key: node key 57 union ubifs_key key; member in struct:replay_entry 199 ino = key_inum(c, &r->key); 218 dbg_mntk(&r->key, "LEB %d:%d len %d deletion %d sqnum %llu key ", 224 if (is_hash_key(c, &r->key)) { 226 err = ubifs_tnc_remove_nm(c, &r->key, &r->nm); 228 err = ubifs_tnc_add_nm(c, &r->key, r->lnum, r->offs, 232 switch (key_type(c, &r->key)) { 351 insert_node(struct ubifs_info *c, int lnum, int offs, int len, union ubifs_key *key, unsigned long long sqnum, int deletion, int *used, loff_t old_size, loff_t new_size) argument 399 insert_dent(struct ubifs_info *c, int lnum, int offs, int len, union ubifs_key *key, const char *name, int nlen, unsigned long long sqnum, int deletion, int *used) argument 639 union ubifs_key key; local [all...] |
H A D | misc.h | 212 * ubifs_idx_key - return pointer to an index key. 220 return (void *)((struct ubifs_branch *)idx->branches)->key; 225 return (void *)tmp->key; 242 * @key: node key to lookup 245 * This function look up and reads node with key @key. The caller has to make 251 const union ubifs_key *key, void *node) 253 return ubifs_tnc_locate(c, key, node, NULL, NULL); 250 ubifs_tnc_lookup(struct ubifs_info *c, const union ubifs_key *key, void *node) argument
|
/u-boot/doc/ |
H A D | conf.py | 157 key, val = [x.strip() for x in line.split('=', 2)] 158 if key == 'VERSION': 160 elif key == 'PATCHLEVEL':
|
/u-boot/arch/sh/lib/ |
H A D | bootm.c | 32 static unsigned long sh_check_cmd_arg(char *cmdline, char *key, int base) argument 35 char *p = strstr(cmdline, key); 37 p += strlen(key);
|
/u-boot/include/u-boot/ |
H A D | sha1.h | 85 * \brief Output = HMAC-SHA-1( input buffer, hmac key ) 87 * \param key HMAC secret key 88 * \param keylen length of the HMAC key 93 void sha1_hmac(const unsigned char *key, int keylen,
|
H A D | rsa-mod-exp.h | 15 * struct key_prop - holder for a public key properties 32 * rsa_gen_key_prop() - Generate key properties of RSA public key 33 * @key: Specifies key data in DER format 34 * @keylen: Length of @key 35 * @prop: Generated key property 37 * This function takes a blob of encoded RSA public key data in DER 44 int rsa_gen_key_prop(const void *key, uint32_t keylen, struct key_prop **proc); 47 * rsa_free_key_prop() - Free key propertie [all...] |
/u-boot/fs/btrfs/common/ |
H A D | rbtree-utils.c | 46 struct rb_node *rb_search(struct rb_root *root, void *key, rb_compare_keys comp, argument 56 ret = comp(n, key);
|
/u-boot/fs/btrfs/ |
H A D | root-tree.c | 6 struct btrfs_root_item *item, struct btrfs_key *key) 42 memcpy(key, &found_key, sizeof(found_key)); 5 btrfs_find_last_root(struct btrfs_root *root, u64 objectid, struct btrfs_root_item *item, struct btrfs_key *key) argument
|
/u-boot/include/ |
H A D | search.h | 30 const char *key; member in struct:env_entry 68 * Search for entry matching item.key in internal hash table. If 86 * @key: Name of entry to delete 93 int hdelete_r(const char *key, struct hsearch_data *htab, int flag); 115 #define H_MATCH_KEY (1 << 4) /* search/grep key = variable names */
|
/u-boot/tools/binman/etype/ |
H A D | encrypted.py | 24 The key that must be used to decrypt the binary is either directly embedded 25 in the device tree or indirectly by specifying a key source. The key source 26 can be used as an id of a key that is stored in an external device. 28 Using an embedded key 31 This is an example using an embedded key:: 40 key-filename = "encrypted-blob.bin.key"; 49 key = <0x...>; 56 Using an external key [all...] |
H A D | pre_load.py | 40 - pre-load-key-path: Path of the directory that store key (provided by 45 - key-name: Filename of the private key to sign 62 key-name = "private.pem"; 78 self.key_name = fdt_util.GetString(self._node, 'key-name') 85 [EntryArg('pre-load-key-path', str)]) 101 # Read the key 102 key = RSA.import_key(tools.read_file(key_name)) 104 # Check if the key ha [all...] |
/u-boot/test/py/tests/ |
H A D | test_fit_ecdsa.py | 8 This test uses mkimage to sign an existing FIT image with an ECDSA key. The 58 def check_signatures(self, key): 64 verifier = DSS.new(key, 'fips-186-3') 90 key_file = f'{tempdir}/ecdsa-test-key.pem' 94 key = generate_ecdsa_key() 100 # invocations of mkimage expect to read the key from disk 102 f.write(key.export_key(format='PEM')) 113 fit.check_signatures(key)
|
/u-boot/tools/ |
H A D | mtk_image.c | 103 char *buf = strdup(imagename), *key, *val, *end, *next; local 114 key = buf; 115 while (key) { 116 next = strchr(key, ';'); 120 val = strchr(key, '='); 124 /* Trim key */ 125 while (is_blank_char(*key)) 126 key++; 128 end = key + strlen(key) [all...] |
/u-boot/lib/libavb/ |
H A D | avb_cmdline.c | 117 const char* key, 122 key_len = avb_strlen(key); 141 avb_memcpy(new_cmdline + offset, key, key_len); 177 const char* key, 192 return cmdline_append_option(slot_data, key, combined); 196 const char* key, 200 return cmdline_append_option(slot_data, key, digits); 204 const char* key, 212 ret = cmdline_append_option(slot_data, key, hex_data); 116 cmdline_append_option(AvbSlotVerifyData* slot_data, const char* key, const char* value) argument 176 cmdline_append_version(AvbSlotVerifyData* slot_data, const char* key, uint64_t major_version, uint64_t minor_version) argument 195 cmdline_append_uint64_base10(AvbSlotVerifyData* slot_data, const char* key, uint64_t value) argument 203 cmdline_append_hex(AvbSlotVerifyData* slot_data, const char* key, const uint8_t* data, size_t data_len) argument
|
/u-boot/boot/ |
H A D | scene_internal.h | 126 * scene_menu_send_key() - Send a key to a menu for processing 130 * @key: Key code to send (KEY_...) 131 * @event: Place to put any event which is generated by the key 135 int scene_menu_send_key(struct scene *scn, struct scene_obj_menu *menu, int key, 139 * scene_textline_send_key() - Send a key to a textline for processing 143 * @key: Key code to send (KEY_...) 144 * @event: Place to put any event which is generated by the key 148 int key, struct expo_action *event); 185 * @scn: Scene to receive the key 186 * @key [all...] |
/u-boot/lib/rsa/ |
H A D | rsa-sign.c | 36 * rsa_pem_get_pub_key() - read a public key from a .crt file 38 * @keydir: Directory containins the key 39 * @name Name of key file (will have a .crt extension) 46 EVP_PKEY *key = NULL; local 71 /* Get the public key from the certificate. */ 72 key = X509_get_pubkey(cert); 73 if (!key) { 74 rsa_err("Couldn't read public key\n"); 80 *evpp = key; 93 * rsa_engine_get_pub_key() - read a public key fro 106 EVP_PKEY *key = NULL; local 235 EVP_PKEY *key = NULL; local 506 rsa_get_exponent(RSA *key, uint64_t *e) argument 555 rsa_get_params(RSA *key, uint64_t *exponent, uint32_t *n0_invp, BIGNUM **modulusp, BIGNUM **r_squaredp) argument [all...] |
/u-boot/lib/efi/ |
H A D | efi_app.c | 42 efi_uintn_t size, desc_size, key; local 49 ret = boot->get_memory_map(&size, NULL, &key, &desc_size, &version); 57 ret = boot->get_memory_map(&size, desc, &key, &desc_size, &version); 65 *keyp = key;
|
/u-boot/scripts/dtc/pylibfdt/ |
H A D | setup.py | 39 # Decodes a Makefile assignment line into key and value (and plus for +=) 40 RE_KEY_VALUE = re.compile(r'(?P<key>\w+) *(?P<plus>[+])?= *(?P<value>.*)$') 64 key: Variable name (e.g. 'VAR') 80 key = m.group('key') 83 if 'plus' in m.groupdict() and key in makevars: 84 makevars[key] += ' ' + value 86 makevars[key] = value
|
/u-boot/cmd/ |
H A D | bootmenu.c | 46 char key[3]; /* key identifier of number */ member in struct:bootmenu_entry 91 enum bootmenu_key key = BKEY_NONE; local 99 key = bootmenu_autoboot_loop(menu, cch); 101 /* Some key was pressed, so autoboot was stopped */ 102 key = bootmenu_loop(menu, cch); 105 switch (key) { 109 /* no menu key selected, regenerate menu */ 114 /* no menu key selected, regenerate menu */ 120 return iter->key; [all...] |