/u-boot/lib/ecdsa/ |
H A D | Makefile | 1 obj-$(CONFIG_$(SPL_)ECDSA_VERIFY) += ecdsa-verify.o
|
H A D | ecdsa-verify.c | 69 if (!ops || !ops->verify) 77 return ops->verify(dev, &key, hash, algo->checksum_len, 91 ret = ops->verify(dev, &key, hash, algo->checksum_len, 127 .verify = ecdsa_verify, 133 * We don't implement any wrappers around ecdsa_ops->verify() because it's 134 * trivial to call ops->verify().
|
/u-boot/include/crypto/ |
H A D | ecdsa-uclass.h | 36 int (*verify)(struct udevice *dev, const struct ecdsa_public_key *pubkey, member in struct:ecdsa_ops
|
/u-boot/lib/rsa/ |
H A D | Makefile | 8 obj-$(CONFIG_$(SPL_TPL_)RSA_VERIFY) += rsa-verify.o
|
H A D | rsa-verify.c | 88 .verify = padding_pkcs_15_verify, 192 * padding_pss_verify() - verify the pss padding of a signature 304 .verify = padding_pss_verify, 373 ret = padding->verify(info, buf, key_len, hash, hash_len); 391 * a key_prop structure with properties of the key. Then verify a RSA PKCS1.5 527 debug("%s: Failed to verify required_keynode\n", 538 debug("%s: Could not verify key '%s', trying all\n", __func__, 555 debug("%s: Failed to verify by any means\n", __func__); 595 .verify = rsa_verify, 601 .verify [all...] |
/u-boot/dts/upstream/scripts/ |
H A D | cronjob | 28 if ! git show-ref --quiet --verify refs/tags/v${LATEST_VERSION} ; then 31 if ! git show-ref --quiet --verify refs/tags/v${LATEST_VERSION}-dts ; then 38 REF=$(git show-ref --verify refs/heads/${branch}) 89 REF=$(git show-ref --verify refs/heads/${TESTBRANCH}) 119 REF=$(git show-ref --verify refs/heads/${branch})
|
/u-boot/tools/ |
H A D | image-sig-host.c | 56 .verify = rsa_verify, 63 .verify = rsa_verify, 70 .verify = rsa_verify, 77 .verify = ecdsa_verify, 84 .verify = padding_pkcs_15_verify, 88 .verify = padding_pss_verify,
|
H A D | Makefile | 84 rsa-sign.o rsa-verify.o \
|
/u-boot/cmd/ |
H A D | ximg.c | 36 int verify; local 54 verify = env_get_yesno("verify"); 105 if (verify) { 154 /* verify integrity */ 155 if (verify) {
|
H A D | avb.c | 299 * Device integrity is left to the user to verify out-of-band. 439 U_BOOT_CMD_MKENT(verify, 2, 0, do_avb_verify_part, "", ""), 482 "avb verify [slot_suffix] - run verification process using hash data\n"
|
/u-boot/fs/btrfs/ |
H A D | disk-io.h | 49 int verify, u16 csum_type);
|
H A D | disk-io.c | 317 int verify, int silent, u16 csum_type) 326 if (verify) { 330 printk("checksum verify failed on %llu found %08X wanted %08X\n", 342 int csum_tree_block_size(struct extent_buffer *buf, u16 csum_size, int verify, argument 345 return __csum_tree_block_size(buf, csum_size, verify, 0, csum_type); 349 struct extent_buffer *buf, int verify) 354 return csum_tree_block_size(buf, csum_size, verify, csum_type); 384 printk("parent transid verify failed on %llu wanted %llu found %llu\n", 316 __csum_tree_block_size(struct extent_buffer *buf, u16 csum_size, int verify, int silent, u16 csum_type) argument 348 csum_tree_block(struct btrfs_fs_info *fs_info, struct extent_buffer *buf, int verify) argument
|
/u-boot/arch/arm/mach-stm32mp/ |
H A D | ecdsa_romapi.c | 79 .verify = romapi_ecdsa_verify,
|
/u-boot/boot/ |
H A D | image-board.c | 29 * image_get_ramdisk - get and verify ramdisk image 32 * @verify: checksum verification flag 44 int verify) 63 if (verify) { 377 images->verify); 952 int verify; local 956 verify = env_get_yesno("verify"); 975 if (verify) { 1027 if (verify 43 image_get_ramdisk(ulong rd_addr, u8 arch, int verify) argument [all...] |
H A D | image-fit-sig.c | 130 if (info.crypto->verify(&info, ®ion, 1, fit_value, fit_value_len)) { 195 /* Work out what we need to verify */ 215 printf("Failed to verify required signature '%s'\n", 379 if (info.crypto->verify(&info, region, count, fit_value, 412 * @return 0 if OK, -EPERM if any signatures did not verify, or the 458 * fit_config_verify_required_keys() - verify any required signatures for config 467 * @return 0 if OK, -EPERM if any signatures did not verify, or the 490 /* Work out what we need to verify */ 528 printf("Failed to verify required signature '%s'\n", 540 printf("Failed to verify 'an [all...] |
H A D | image-pre-load.c | 204 ret = info->sig_info.crypto->verify(&info->sig_info, ®, 1, sig, sig_len); 297 ret = info->sig_info.crypto->verify(&info->sig_info, ®, 1, sig, sig_len);
|
H A D | bootm.c | 54 * image_get_kernel - verify legacy format kernel image 56 * @verify: data CRC verification flag 65 static struct legacy_img_hdr *image_get_kernel(ulong img_addr, int verify) argument 85 if (verify) { 154 hdr = image_get_kernel(img_addr, images->verify); 220 images->verify, os_data, os_len); 262 images.verify = env_get_yesno("verify"); 1229 images.verify = 1;
|
H A D | image-fit.c | 1358 err_msg = "Unable to verify required signature"; 1411 * fit_image_verify - verify data integrity 1454 * fit_all_image_verify - verify data integrity for all images 1975 static int fit_image_select(const void *fit, int rd_noffset, int verify) argument 1979 if (verify) { 2120 if (FIT_IMAGE_ENABLE_VERIFY && images->verify) { 2145 ret = fit_image_select(fit, noffset, images->verify); 2293 /* verify that image data is a proper FDT blob */ 2394 /* verify that relocation took place by load address not being in fit */
|
H A D | image-android.c | 239 * @verify: Checksum verification flag. Currently unimplemented. 251 const void *vendor_boot_img, int verify, 250 android_image_get_kernel(const void *hdr, const void *vendor_boot_img, int verify, ulong *os_data, ulong *os_len) argument
|
/u-boot/scripts/ |
H A D | setlocalversion | 48 head=$(git rev-parse --verify --short HEAD 2>/dev/null); then
|
/u-boot/test/py/tests/ |
H A D | test_fit_ecdsa.py | 65 verifier.verify(sha, bytes(raw_sig))
|
H A D | test_fit_auto_signed.py | 95 verifier.verify(SHA256.new(raw_bin), bytes(raw_sig)) 168 # 1 - Create auto FIT with images crc32 checksum, and verify it 177 # 2 - Create auto FIT with signed images, and verify it 187 # 3 - Create auto FIT with signed configs and hashed images, and verify it
|
/u-boot/include/ |
H A D | image.h | 398 int verify; /* env_get("verify")[0] != 'n' */ member in struct:bootm_headers 1332 * @image_offset: Offset in @fit of image to verify 1334 * @data: Image data to verify 1458 uint8_t arch, int verify); 1578 * verify() - Verify a signature against some data 1587 int (*verify)(struct image_sign_info *info, member in struct:crypto_algo 1598 int (*verify)(struct image_sign_info *info, member in struct:padding_algo 1840 * @verify: Checksum verification flag. Currently unimplemented. 1848 const void *vendor_boot_img, int verify, [all...] |
/u-boot/common/spl/ |
H A D | spl_fit.c | 869 images.verify = 1; 907 images.verify = 1; 935 images.verify = 1;
|