/u-boot/lib/rsa/ |
A D | rsa-mod-exp.c | 196 uint32_t val[key->len], acc[key->len], tmp[key->len]; in pow_mod() 201 for (i = 0, ptr = inout + key->len - 1; i < key->len; i++, ptr--) in pow_mod() 219 montgomery_mul(key, acc, val, key->rr); /* acc = a * RR / R mod n */ in pow_mod() 282 if (key.len > RSA_MAX_KEY_BITS || key.len < RSA_MIN_KEY_BITS) { in rsa_mod_exp_sw() 288 uint32_t key1[key.len], key2[key.len]; in rsa_mod_exp_sw() 290 key.modulus = key1; in rsa_mod_exp_sw() 291 key.rr = key2; in rsa_mod_exp_sw() 292 rsa_convert_big_endian(key.modulus, (uint32_t *)prop->modulus, key.len); in rsa_mod_exp_sw() 293 rsa_convert_big_endian(key.rr, (uint32_t *)prop->rr, key.len); in rsa_mod_exp_sw() 294 if (!key.modulus || !key.rr) { in rsa_mod_exp_sw() [all …]
|
A D | rsa-sign.c | 60 EVP_PKEY *key; in rsa_pem_get_pub_key() local 85 if (!key) { in rsa_pem_get_pub_key() 99 EVP_PKEY_free(key); in rsa_pem_get_pub_key() 106 EVP_PKEY_free(key); in rsa_pem_get_pub_key() 128 EVP_PKEY *key; in rsa_engine_get_pub_key() local 165 if (!key) in rsa_engine_get_pub_key() 176 EVP_PKEY_free(key); in rsa_engine_get_pub_key() 253 EVP_PKEY *key; in rsa_engine_get_priv_key() local 290 if (!key) in rsa_engine_get_priv_key() 424 EVP_PKEY *key; in rsa_sign_with_key() local [all …]
|
/u-boot/lib/crypto/ |
A D | rsa_helper.c | 51 key->n = value; in rsa_get_n() 52 key->n_sz = vlen; in rsa_get_n() 63 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() 66 key->e = value; in rsa_get_e() 67 key->e_sz = vlen; in rsa_get_e() 78 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d() 81 key->d = value; in rsa_get_d() 82 key->d_sz = vlen; in rsa_get_d() 96 key->p = value; in rsa_get_p() 111 key->q = value; in rsa_get_q() [all …]
|
A D | public_key.c | 48 if (key) in public_key_describe() 49 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); in public_key_describe() 58 if (key) { in public_key_free() 59 kfree(key->key); in public_key_free() 61 kfree(key); in public_key_free() 136 info.key = pkey->key; in public_key_verify_signature() 222 if (!key) in software_key_query() 224 memcpy(key, pkey->key, pkey->keylen); in software_key_query() 291 if (!key) in software_key_eds_op() 294 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op() [all …]
|
A D | asymmetric_type.c | 63 struct key *find_asymmetric_key(struct key *keyring, in find_asymmetric_key() 68 struct key *key; in find_asymmetric_key() local 135 return key; in find_asymmetric_key() 138 key_put(key); in find_asymmetric_key() 266 static bool asymmetric_key_cmp(const struct key *key, in asymmetric_key_cmp() argument 453 static void asymmetric_key_destroy(struct key *key) in asymmetric_key_destroy() argument 475 struct key *key) in asymmetric_restriction_alloc() argument 484 keyres->key = key; in asymmetric_restriction_alloc() 519 struct key *key; in asymmetric_lookup_restriction() local 538 key = NULL; in asymmetric_lookup_restriction() [all …]
|
A D | Kconfig | 2 bool "Asymmetric (public-key cryptographic) key Support" 4 This option provides support for a key type that holds the data for 5 the asymmetric keys used for public key cryptographic operations such 12 bool "Asymmetric public-key crypto algorithm subtype" 14 This option provides support for asymmetric public key type handling. 20 bool "RSA public key parser" 27 public key data and provides the ability to instantiate a public 28 key. 38 This option provides support for parsing X.509 format blobs for key 39 data and provides the ability to instantiate a crypto key from a [all …]
|
/u-boot/lib/libavb/ |
A D | avb_rsa.c | 26 IAvbKey* key = NULL; in iavb_parse_key_data() local 57 if (key == NULL) { in iavb_parse_key_data() 64 key->rr = key->n + key->len; in iavb_parse_key_data() 71 key->n[i] = avb_be32toh(((uint32_t*)n)[key->len - i - 1]); in iavb_parse_key_data() 72 key->rr[i] = avb_be32toh(((uint32_t*)rr)[key->len - i - 1]); in iavb_parse_key_data() 74 return key; in iavb_parse_key_data() 77 if (key != NULL) { in iavb_parse_key_data() 78 avb_free(key); in iavb_parse_key_data() 84 avb_free(key); in iavb_free_parsed_key() 134 subM(key, c); in montMulAdd() [all …]
|
/u-boot/fs/ubifs/ |
A D | key.h | 87 key->u32[0] = inum; in ino_key_init() 116 key->u32[0] = inum; in lowest_ino_key() 117 key->u32[1] = 0; in lowest_ino_key() 129 key->u32[0] = inum; in highest_ino_key() 147 key->u32[0] = inum; in dent_key_init() 164 key->u32[0] = inum; in dent_key_init_hash() 197 key->u32[0] = inum; in lowest_dent_key() 215 key->u32[0] = inum; in xent_key_init() 248 key->u32[0] = inum; in lowest_xent_key() 264 key->u32[0] = inum; in data_key_init() [all …]
|
A D | tnc.c | 1547 key = &zbr->key; in ubifs_tnc_get_bu_keys() 1885 key = &znode->zbranch[0].key; in correct_parent_keys() 1966 union ubifs_key *key = &zbr->key, *key1; in tnc_insert() local 2097 zbr->key = zn->zbranch[0].key; in tnc_insert() 2120 zi->zbranch[0].key = znode->zbranch[0].key; in tnc_insert() 2125 zi->zbranch[1].key = zn->zbranch[0].key; in tnc_insert() 2169 key_copy(c, key, &zbr.key); in ubifs_tnc_add() 2340 key_copy(c, key, &zbr.key); in ubifs_tnc_add_nm() 2614 key = &znode->zbranch[n].key; in ubifs_tnc_remove_range() 2632 key = &znode->zbranch[i].key; in ubifs_tnc_remove_range() [all …]
|
A D | tnc_misc.c | 140 cmp = keys_cmp(c, key, &zbr[mid].key); in ubifs_search_zbranch() 156 ubifs_assert(keys_cmp(c, key, &zbr[0].key) < 0); in ubifs_search_zbranch() 158 ubifs_assert(keys_cmp(c, key, &zbr[*n].key) > 0); in ubifs_search_zbranch() 160 ubifs_assert(keys_cmp(c, key, &zbr[*n + 1].key) < 0); in ubifs_search_zbranch() 301 key_read(c, &br->key, &zbr->key); in read_znode() 325 i, key_type(c, &zbr->key)); in read_znode() 333 type = key_type(c, &zbr->key); in read_znode() 361 key1 = &znode->zbranch[i].key; in read_znode() 454 union ubifs_key key1, *key = &zbr->key; in ubifs_tnc_read_node() local 471 dbg_tnck(key, "key "); in ubifs_tnc_read_node() [all …]
|
/u-boot/test/env/ |
A D | hashtable.c | 24 char key[20]; in htab_fill() local 29 item.data = key; in htab_fill() 31 item.key = key; in htab_fill() 44 char key[20]; in htab_check_fill() local 50 item.data = key; in htab_check_fill() 51 item.key = key; in htab_check_fill() 54 ut_asserteq_str(key, ritem->key); in htab_check_fill() 67 char key[20]; in htab_create_delete() local 73 item.data = key; in htab_create_delete() 74 item.key = key; in htab_create_delete() [all …]
|
/u-boot/include/crypto/ |
A D | public_key.h | 27 void *key; member 37 extern void public_key_free(struct public_key *key); 58 struct key; 62 extern int restrict_link_by_signature(struct key *dest_keyring, 65 struct key *trust_keyring); 67 extern int restrict_link_by_key_or_keyring(struct key *dest_keyring, 70 struct key *trusted); 72 extern int restrict_link_by_key_or_keyring_chain(struct key *trust_keyring, 75 struct key *trusted); 83 extern int verify_signature(const struct key *,
|
/u-boot/fs/btrfs/ |
A D | subvolume.c | 21 struct btrfs_key key; in get_path_in_subvol() local 37 key.objectid = cur; in get_path_in_subvol() 39 key.offset = (u64)-1; in get_path_in_subvol() 70 cur = key.offset; in get_path_in_subvol() 83 struct btrfs_key key; in list_one_subvol() local 100 key.objectid = cur; in list_one_subvol() 102 key.offset = (u64)-1; in list_one_subvol() 146 cur = key.offset; in list_one_subvol() 163 struct btrfs_key key; in list_subvolums() local 181 key.offset = 0; in list_subvolums() [all …]
|
A D | inode.c | 25 struct btrfs_key key; in btrfs_readlink() local 29 key.objectid = ino; in btrfs_readlink() 31 key.offset = 0; in btrfs_readlink() 77 struct btrfs_key key; in lookup_root_ref() local 81 key.objectid = rootid; in lookup_root_ref() 83 key.offset = (u64)-1; in lookup_root_ref() 124 struct btrfs_key key; in get_parent_inode() local 153 key.objectid = ino; in get_parent_inode() 564 if (key.offset <= file_offset && key.offset + in lookup_data_extent() 591 if (key.offset <= file_offset && key.offset + in lookup_data_extent() [all …]
|
A D | dir-item.c | 86 struct btrfs_key key; in btrfs_lookup_dir_item() local 92 key.objectid = dir; in btrfs_lookup_dir_item() 93 key.type = BTRFS_DIR_ITEM_KEY; in btrfs_lookup_dir_item() 95 key.offset = btrfs_name_hash(name, name_len); in btrfs_lookup_dir_item() 111 found_key.offset != key.offset) in btrfs_lookup_dir_item() 121 struct btrfs_key key; in btrfs_iter_dir() local 125 key.objectid = ino; in btrfs_iter_dir() 126 key.type = BTRFS_DIR_INDEX_KEY; in btrfs_iter_dir() 127 key.offset = 0; in btrfs_iter_dir() 129 ret = btrfs_search_slot(NULL, root, &key, &path, 0, 0); in btrfs_iter_dir() [all …]
|
A D | btrfs.c | 23 struct btrfs_key key; in show_dir() local 44 btrfs_dir_item_key_to_cpu(eb, di, &key); in show_dir() 46 if (key.type == BTRFS_ROOT_ITEM_KEY) { in show_dir() 50 subvol = btrfs_read_fs_root(fs_info, &key); in show_dir() 82 key.objectid); in show_dir() 98 ASSERT(key.type == BTRFS_INODE_ITEM_KEY); in show_dir() 102 if (key.type == BTRFS_INODE_ITEM_KEY) in show_dir() 188 struct btrfs_key key; in btrfs_size() local 204 key.objectid = ino; in btrfs_size() 205 key.type = BTRFS_INODE_ITEM_KEY; in btrfs_size() [all …]
|
A D | ctree.c | 105 struct btrfs_disk_key key; in btrfs_check_node() local 115 if (memcmp(parent_key, &key, sizeof(key))) in btrfs_check_node() 136 struct btrfs_disk_key key; in btrfs_check_leaf() local 163 btrfs_item_key(buf, &key, 0); in btrfs_check_leaf() 165 memcmp(parent_key, &key, sizeof(key))) { in btrfs_check_leaf() 218 struct btrfs_disk_key key; in check_block() local 226 key_ptr = &key; in check_block() 333 struct btrfs_key key; in btrfs_find_item() local 337 key.type = key_type; in btrfs_find_item() 338 key.objectid = iobjectid; in btrfs_find_item() [all …]
|
/u-boot/cmd/ |
A D | bootmenu.c | 108 *key = KEY_NONE; in bootmenu_autoboot_loop() 114 *key = KEY_QUIT; in bootmenu_autoboot_loop() 167 *key = KEY_NONE; in bootmenu_loop() 174 *key = KEY_NONE; in bootmenu_loop() 177 *key = KEY_QUIT; in bootmenu_loop() 186 *key = KEY_NONE; in bootmenu_loop() 194 *key = KEY_UP; in bootmenu_loop() 197 *key = KEY_DOWN; in bootmenu_loop() 200 *key = KEY_NONE; in bootmenu_loop() 211 *key = KEY_QUIT; in bootmenu_loop() [all …]
|
/u-boot/scripts/kconfig/lxdialog/ |
A D | menubox.c | 270 key = wgetch(menu); in dialog_menu() 272 if (key < 256 && isalpha(key)) in dialog_menu() 273 key = tolower(key); in dialog_menu() 295 key == KEY_UP || key == KEY_DOWN || in dialog_menu() 296 key == '-' || key == '+' || in dialog_menu() 297 key == KEY_PPAGE || key == KEY_NPAGE)) { in dialog_menu() 301 if (key == KEY_UP || key == '-') { in dialog_menu() 310 } else if (key == KEY_DOWN || key == '+') { in dialog_menu() 360 switch (key) { in dialog_menu() 386 switch (key) { in dialog_menu() [all …]
|
A D | yesno.c | 31 int i, x, y, key = 0, button = 0; in dialog_yesno() local 65 while (key != KEY_ESC) { in dialog_yesno() 66 key = wgetch(dialog); in dialog_yesno() 67 switch (key) { in dialog_yesno() 80 button = ((key == KEY_LEFT ? --button : ++button) < 0) ? 1 : (button > 1 ? 0 : button); in dialog_yesno() 90 key = on_key_esc(dialog); in dialog_yesno() 100 return key; /* ESC pressed */ in dialog_yesno()
|
/u-boot/doc/uImage.FIT/ |
A D | verified-boot.txt | 15 A key point is that it is possible to field-upgrade the software on machines 25 Images are signed using a private key known only to the signer, but can 26 be verified using a public key. As its name suggests the public key can be 38 | RSA key pair | * +---------------+ 39 | .key .crt | * | Public key in | 40 +--------------+ +------> public key ----->| trusted place | 62 The public key from the signer allows us to verify and therefore trust 77 2. Master public key is placed in read-only memory. 79 3. Secondary public key is placed in first stage images 84 different key at each stage, so that a compromise in one place will not [all …]
|
/u-boot/include/keys/ |
A D | asymmetric-type.h | 73 const struct asymmetric_key_ids *asymmetric_key_ids(const struct key *key) in asymmetric_key_ids() argument 75 return key->payload.data[asym_key_ids]; in asymmetric_key_ids() 78 extern struct key *find_asymmetric_key(struct key *keyring,
|
/u-boot/lib/ |
A D | hashtable.c | 163 free((void *)ep->key); in hdestroy_r() 251 && strcmp(item.key, htab->table[idx].entry.key) == 0) { in _compare_and_overwrite_entry() 306 hval += item.key[count]; in hsearch_r() 391 htab->table[idx].entry.key = strdup(item.key); in hsearch_r() 455 free((void *)ep->key); in _hdelete() 470 e.key = (char *)key; in hdelete_r() 482 "%s, skipping it!\n", key); in hdelete_r() 549 return (strcmp(e1->key, e2->key)); in cmpkey() 646 totlen += strlen(ep->key); in hexport_r() 709 s = list[i]->key; in hexport_r() [all …]
|
/u-boot/lib/efi_loader/ |
A D | efi_console.c | 620 struct efi_key_data key; member 842 key->key = pressed_key; in efi_cin_read_key() 858 if (item->key.key.unicode_char || item->key.key.scan_code) { in efi_cin_notify() 859 if (item->key.key.unicode_char != in efi_cin_notify() 861 item->key.key.scan_code != next_key.key.scan_code) in efi_cin_notify() 1069 key_data->key.unicode_char, in efi_cin_register_key_notify() 1070 key_data->key.scan_code, in efi_cin_register_key_notify() 1178 struct efi_input_key *key) in efi_cin_read_key_stroke() argument 1182 EFI_ENTRY("%p, %p", this, key); in efi_cin_read_key_stroke() 1185 if (!this || !key) { in efi_cin_read_key_stroke() [all …]
|
/u-boot/common/ |
A D | menu.c | 23 char *key; member 85 puts(item->key); in menu_item_print() 102 if (item->key) in menu_item_destroy() 103 free(item->key); in menu_item_destroy() 139 if (!item_key || !item->key) { in menu_item_key_match() 140 if (item_key == item->key) in menu_item_key_match() 146 if (strcmp(item->key, item_key) == 0) in menu_item_key_match() 212 if (key) in menu_interactive_choice() 213 choice_item = menu_item_by_key(m, key); in menu_interactive_choice() 316 item->key = strdup(item_key); in menu_item_add() [all …]
|