/u-boot/lib/crypto/ |
H A D | public_key.c | 90 * @pkey: Public key 93 * Verify a signature, @sig, using a RSA public key, @pkey. 97 int public_key_verify_signature(const struct public_key *pkey, argument 106 if (!pkey || !sig) 109 if (pkey->key_is_private) 134 info.key = pkey->key; 135 info.keylen = pkey->keylen; 161 const struct public_key *pkey, 174 pkey->pkey_algo); 178 pkey 159 software_key_determine_akcipher(const char *encoding, const char *hash_algo, const struct public_key *pkey, char alg_name[CRYPTO_MAX_ALG_NAME]) argument 203 struct public_key *pkey = params->key->payload.data[asym_crypto]; local 262 const struct public_key *pkey = params->key->payload.data[asym_crypto]; local 346 public_key_verify_signature(const struct public_key *pkey, const struct public_key_signature *sig) argument [all...] |
/u-boot/lib/rsa/ |
H A D | rsa-sign.c | 384 static int rsa_sign_with_key(EVP_PKEY *pkey, struct padding_algo *padding_algo, argument 396 size = EVP_PKEY_size(pkey); 411 ckey = EVP_PKEY_CTX_new(pkey, NULL); 419 NULL, pkey) <= 0) { 448 debug("Got signature: %zu bytes, expected %d\n", size, EVP_PKEY_size(pkey)); 466 EVP_PKEY *pkey = NULL; local 481 e, &pkey); 484 ret = rsa_sign_with_key(pkey, info->padding, info->checksum, region, 489 EVP_PKEY_free(pkey); 496 EVP_PKEY_free(pkey); 635 EVP_PKEY *pkey = NULL; local [all...] |
/u-boot/include/ |
H A D | fsl_validate.h | 103 u32 pkey; /* public key offset */ member in union:fsl_secboot_img_hdr::__anon38 168 u8 pkey[2 * KEY_SIZE_BYTES]; member in struct:ie_key_table 181 u8 pkey[2 * KEY_SIZE_BYTES]; member in struct:srk_table
|
/u-boot/include/crypto/ |
H A D | public_key.h | 87 int public_key_verify_signature(const struct public_key *pkey,
|
/u-boot/lib/efi_loader/ |
H A D | efi_capsule.c | 286 int efi_get_public_key_data(void **pkey, efi_uintn_t *pkey_len) argument 306 *pkey = NULL; 312 *pkey = (void *)blob; 323 void *fdt_pkey, *pkey; local 379 pkey = malloc(pkey_len); 380 if (!pkey) 383 memcpy(pkey, fdt_pkey, pkey_len); 384 truststore = efi_build_signature_store(pkey, pkey_len);
|
/u-boot/tools/ |
H A D | mkeficapsule.c | 205 gnutls_privkey_t pkey; local 233 ret = gnutls_privkey_init(&pkey); 248 ret = gnutls_privkey_import_x509_raw(pkey, &key, GNUTLS_X509_FMT_PEM, 291 ret = gnutls_pkcs7_sign(pkcs7, x509, pkey, &data, NULL, NULL, 323 * gnutls_privkey_deinit(pkey);
|
H A D | efivar.py | 280 pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, f.read()) 287 p7 = crypto._lib.PKCS7_sign(crt._x509, pkey._pkey, crypto._ffi.NULL, bio_in,
|
/u-boot/board/freescale/common/ |
H A D | fsl_validate.c | 256 memcpy(&img->img_key, &(img->srk_tbl[key_num - 1].pkey), 273 memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len); 322 memcpy(&img->img_key, &(ie_info->ie_key_tbl[ie_num - 1].pkey),
|
/u-boot/test/lib/ |
H A D | asn1.c | 377 struct rsa_key pkey; local 380 ret = rsa_parse_pub_key(&pkey, public_key, public_key_len); 383 ut_assertf(pkey.n_sz == 257, "public key modulus size doesn't match\n"); 384 ut_assertf(pkey.e_sz == 3, "public key exponent size doesn't match\n"); 385 ut_assertf(pkey.e[0] == 0x01 && pkey.e[1] == 0x00 && pkey.e[2] == 0x01,
|