Searched refs:pkey (Results 1 - 9 of 9) sorted by relevance

/u-boot/lib/crypto/
H A Dpublic_key.c90 * @pkey: Public key
93 * Verify a signature, @sig, using a RSA public key, @pkey.
97 int public_key_verify_signature(const struct public_key *pkey, argument
106 if (!pkey || !sig)
109 if (pkey->key_is_private)
134 info.key = pkey->key;
135 info.keylen = pkey->keylen;
161 const struct public_key *pkey,
174 pkey->pkey_algo);
178 pkey
159 software_key_determine_akcipher(const char *encoding, const char *hash_algo, const struct public_key *pkey, char alg_name[CRYPTO_MAX_ALG_NAME]) argument
203 struct public_key *pkey = params->key->payload.data[asym_crypto]; local
262 const struct public_key *pkey = params->key->payload.data[asym_crypto]; local
346 public_key_verify_signature(const struct public_key *pkey, const struct public_key_signature *sig) argument
[all...]
/u-boot/lib/rsa/
H A Drsa-sign.c384 static int rsa_sign_with_key(EVP_PKEY *pkey, struct padding_algo *padding_algo, argument
396 size = EVP_PKEY_size(pkey);
411 ckey = EVP_PKEY_CTX_new(pkey, NULL);
419 NULL, pkey) <= 0) {
448 debug("Got signature: %zu bytes, expected %d\n", size, EVP_PKEY_size(pkey));
466 EVP_PKEY *pkey = NULL; local
481 e, &pkey);
484 ret = rsa_sign_with_key(pkey, info->padding, info->checksum, region,
489 EVP_PKEY_free(pkey);
496 EVP_PKEY_free(pkey);
635 EVP_PKEY *pkey = NULL; local
[all...]
/u-boot/include/
H A Dfsl_validate.h103 u32 pkey; /* public key offset */ member in union:fsl_secboot_img_hdr::__anon38
168 u8 pkey[2 * KEY_SIZE_BYTES]; member in struct:ie_key_table
181 u8 pkey[2 * KEY_SIZE_BYTES]; member in struct:srk_table
/u-boot/include/crypto/
H A Dpublic_key.h87 int public_key_verify_signature(const struct public_key *pkey,
/u-boot/lib/efi_loader/
H A Defi_capsule.c286 int efi_get_public_key_data(void **pkey, efi_uintn_t *pkey_len) argument
306 *pkey = NULL;
312 *pkey = (void *)blob;
323 void *fdt_pkey, *pkey; local
379 pkey = malloc(pkey_len);
380 if (!pkey)
383 memcpy(pkey, fdt_pkey, pkey_len);
384 truststore = efi_build_signature_store(pkey, pkey_len);
/u-boot/tools/
H A Dmkeficapsule.c205 gnutls_privkey_t pkey; local
233 ret = gnutls_privkey_init(&pkey);
248 ret = gnutls_privkey_import_x509_raw(pkey, &key, GNUTLS_X509_FMT_PEM,
291 ret = gnutls_pkcs7_sign(pkcs7, x509, pkey, &data, NULL, NULL,
323 * gnutls_privkey_deinit(pkey);
H A Defivar.py280 pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, f.read())
287 p7 = crypto._lib.PKCS7_sign(crt._x509, pkey._pkey, crypto._ffi.NULL, bio_in,
/u-boot/board/freescale/common/
H A Dfsl_validate.c256 memcpy(&img->img_key, &(img->srk_tbl[key_num - 1].pkey),
273 memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len);
322 memcpy(&img->img_key, &(ie_info->ie_key_tbl[ie_num - 1].pkey),
/u-boot/test/lib/
H A Dasn1.c377 struct rsa_key pkey; local
380 ret = rsa_parse_pub_key(&pkey, public_key, public_key_len);
383 ut_assertf(pkey.n_sz == 257, "public key modulus size doesn't match\n");
384 ut_assertf(pkey.e_sz == 3, "public key exponent size doesn't match\n");
385 ut_assertf(pkey.e[0] == 0x01 && pkey.e[1] == 0x00 && pkey.e[2] == 0x01,

Completed in 301 milliseconds