/u-boot/lib/efi_loader/ |
A D | efi_variable.c | 54 const struct efi_variable_authentication_2 *auth; in efi_variable_authenticate() local 76 auth = *data; in efi_variable_authenticate() 77 if (*data_size < (sizeof(auth->time_stamp) in efi_variable_authenticate() 78 + auth->auth_info.hdr.dwLength)) in efi_variable_authenticate() 84 memcpy(×tamp, &auth->time_stamp, sizeof(timestamp)); in efi_variable_authenticate() 89 *data += sizeof(auth->time_stamp) + auth->auth_info.hdr.dwLength; in efi_variable_authenticate() 90 *data_size -= (sizeof(auth->time_stamp) in efi_variable_authenticate() 91 + auth->auth_info.hdr.dwLength); in efi_variable_authenticate() 129 if (auth->auth_info.hdr.dwLength < sizeof(auth->auth_info)) in efi_variable_authenticate() 134 auth->auth_info.hdr.dwLength in efi_variable_authenticate() [all …]
|
A D | efi_image_loader.c | 260 WIN_CERTIFICATE **auth, size_t *auth_len) in efi_image_parse() argument 401 if (authsz < sizeof(*auth)) { in efi_image_parse() 403 __func__, authsz, sizeof(*auth)); in efi_image_parse() 406 *auth = efi + authoff; in efi_image_parse() 411 *auth = NULL; in efi_image_parse() 501 u8 *auth, *wincerts_end; in efi_image_authenticate() local 583 auth = (u8 *)wincert + sizeof(*wincert); in efi_image_authenticate() 586 if (auth + sizeof(efi_guid_t) >= wincerts_end) in efi_image_authenticate() 596 auth); in efi_image_authenticate() 600 auth += sizeof(efi_guid_t); in efi_image_authenticate() [all …]
|
/u-boot/drivers/tpm/ |
A D | tpm2_tis_sandbox.c | 70 const u8 **auth, in sandbox_tpm2_check_session() argument 101 handle = get_unaligned_be32(*auth); in sandbox_tpm2_check_session() 102 *auth += sizeof(handle); in sandbox_tpm2_check_session() 138 *auth += sizeof(auth_sz); in sandbox_tpm2_check_session() 141 *auth += sizeof(session_handle); in sandbox_tpm2_check_session() 148 *auth += sizeof(nonce_sz); in sandbox_tpm2_check_session() 155 *auth += sizeof(u8); in sandbox_tpm2_check_session() 157 pw_sz = get_unaligned_be16(*auth); in sandbox_tpm2_check_session() 158 *auth += sizeof(pw_sz); in sandbox_tpm2_check_session() 176 pw = (const char *)*auth; in sandbox_tpm2_check_session() [all …]
|
/u-boot/lib/crypto/ |
A D | pkcs7_verify.c | 343 struct asymmetric_key_id *auth; in pkcs7_verify_sig_chain() local 404 auth = sig->auth_ids[0]; in pkcs7_verify_sig_chain() 405 if (auth) { in pkcs7_verify_sig_chain() 406 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 410 if (asymmetric_key_id_same(p->id, auth)) in pkcs7_verify_sig_chain() 414 auth = sig->auth_ids[1]; in pkcs7_verify_sig_chain() 415 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 421 if (asymmetric_key_id_same(p->skid, auth)) in pkcs7_verify_sig_chain()
|
A D | asymmetric_type.c | 458 void *auth = key->payload.data[asym_auth]; in asymmetric_key_destroy() local 466 subtype->destroy(data, auth); in asymmetric_key_destroy()
|
/u-boot/lib/ |
A D | tpm-v1.c | 530 void *request_auth, const void *auth) in create_request_auth() argument 570 sha1_hmac(auth, DIGEST_LENGTH, hmac_data, sizeof(hmac_data), in create_request_auth() 593 const void *response_auth, const void *auth) in verify_response_auth() argument 634 sha1_hmac(auth, DIGEST_LENGTH, hmac_data, sizeof(hmac_data), in verify_response_auth() 837 u32 tpm_find_key_sha1(struct udevice *dev, const u8 auth[20], in tpm_find_key_sha1() 862 err = tpm_get_pub_key_oiap(key_handles[i], auth, buf, &buf_len); in tpm_find_key_sha1()
|
/u-boot/doc/uefi/ |
A D | uefi.rst | 140 sign-efi-sig-list -c PK.crt -k PK.key PK PK.esl PK.auth 150 sign-efi-sig-list -c PK.crt -k PK.key KEK KEK.esl KEK.auth 160 sign-efi-sig-list -c KEK.crt -k KEK.key db db.esl db.auth 162 Copy the \*.auth files to media, say mmc, that is accessible from U-Boot. 172 fatload mmc 0:1 <tmpaddr> PK.auth 174 fatload mmc 0:1 <tmpaddr> KEK.auth 176 fatload mmc 0:1 <tmpaddr> db.auth
|
/u-boot/board/gdsys/a38x/ |
A D | hre.c | 140 static int find_key(struct udevice *tpm, const uint8_t auth[20], in find_key() 165 err = tpm_get_pub_key_oiap(tpm, key_handles[i], auth, buf, in find_key()
|
/u-boot/board/ti/j721e/ |
A D | README | 44 | | |<---------|---|Load and auth| | | |
|
/u-boot/include/ |
A D | tpm-v1.h | 546 u32 tpm_find_key_sha1(struct udevice *dev, const u8 auth[20],
|
A D | efi_loader.h | 833 WIN_CERTIFICATE **auth, size_t *auth_len);
|
/u-boot/board/gdsys/p1022/ |
A D | controlcenterd-id.c | 305 static int find_key(struct udevice *tpm, const uint8_t auth[20], in find_key() 330 err = tpm_get_pub_key_oiap(tpm, key_handles[i], auth, buf, in find_key()
|
/u-boot/board/ti/am65x/ |
A D | README | 48 | | |<---------|---|Load and auth| | |
|
/u-boot/doc/develop/ |
A D | coccinelle.rst | 380 /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth 504 …linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAST can be used with auth]]
|