Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 322) sorted by relevance

12345678910>>...13

/u-boot/lib/rsa/
A Drsa-mod-exp.c196 uint32_t val[key->len], acc[key->len], tmp[key->len]; in pow_mod()
201 for (i = 0, ptr = inout + key->len - 1; i < key->len; i++, ptr--) in pow_mod()
219 montgomery_mul(key, acc, val, key->rr); /* acc = a * RR / R mod n */ in pow_mod()
282 if (key.len > RSA_MAX_KEY_BITS || key.len < RSA_MIN_KEY_BITS) { in rsa_mod_exp_sw()
288 uint32_t key1[key.len], key2[key.len]; in rsa_mod_exp_sw()
290 key.modulus = key1; in rsa_mod_exp_sw()
291 key.rr = key2; in rsa_mod_exp_sw()
292 rsa_convert_big_endian(key.modulus, (uint32_t *)prop->modulus, key.len); in rsa_mod_exp_sw()
293 rsa_convert_big_endian(key.rr, (uint32_t *)prop->rr, key.len); in rsa_mod_exp_sw()
294 if (!key.modulus || !key.rr) { in rsa_mod_exp_sw()
[all …]
A Drsa-sign.c60 EVP_PKEY *key; in rsa_pem_get_pub_key() local
85 if (!key) { in rsa_pem_get_pub_key()
99 EVP_PKEY_free(key); in rsa_pem_get_pub_key()
106 EVP_PKEY_free(key); in rsa_pem_get_pub_key()
128 EVP_PKEY *key; in rsa_engine_get_pub_key() local
165 if (!key) in rsa_engine_get_pub_key()
176 EVP_PKEY_free(key); in rsa_engine_get_pub_key()
253 EVP_PKEY *key; in rsa_engine_get_priv_key() local
290 if (!key) in rsa_engine_get_priv_key()
424 EVP_PKEY *key; in rsa_sign_with_key() local
[all …]
/u-boot/lib/crypto/
A Drsa_helper.c51 key->n = value; in rsa_get_n()
52 key->n_sz = vlen; in rsa_get_n()
63 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e()
66 key->e = value; in rsa_get_e()
67 key->e_sz = vlen; in rsa_get_e()
78 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d()
81 key->d = value; in rsa_get_d()
82 key->d_sz = vlen; in rsa_get_d()
96 key->p = value; in rsa_get_p()
111 key->q = value; in rsa_get_q()
[all …]
A Dpublic_key.c48 if (key) in public_key_describe()
49 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); in public_key_describe()
58 if (key) { in public_key_free()
59 kfree(key->key); in public_key_free()
61 kfree(key); in public_key_free()
136 info.key = pkey->key; in public_key_verify_signature()
222 if (!key) in software_key_query()
224 memcpy(key, pkey->key, pkey->keylen); in software_key_query()
291 if (!key) in software_key_eds_op()
294 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op()
[all …]
A Dasymmetric_type.c63 struct key *find_asymmetric_key(struct key *keyring, in find_asymmetric_key()
68 struct key *key; in find_asymmetric_key() local
135 return key; in find_asymmetric_key()
138 key_put(key); in find_asymmetric_key()
266 static bool asymmetric_key_cmp(const struct key *key, in asymmetric_key_cmp() argument
453 static void asymmetric_key_destroy(struct key *key) in asymmetric_key_destroy() argument
475 struct key *key) in asymmetric_restriction_alloc() argument
484 keyres->key = key; in asymmetric_restriction_alloc()
519 struct key *key; in asymmetric_lookup_restriction() local
538 key = NULL; in asymmetric_lookup_restriction()
[all …]
A DKconfig2 bool "Asymmetric (public-key cryptographic) key Support"
4 This option provides support for a key type that holds the data for
5 the asymmetric keys used for public key cryptographic operations such
12 bool "Asymmetric public-key crypto algorithm subtype"
14 This option provides support for asymmetric public key type handling.
20 bool "RSA public key parser"
27 public key data and provides the ability to instantiate a public
28 key.
38 This option provides support for parsing X.509 format blobs for key
39 data and provides the ability to instantiate a crypto key from a
[all …]
/u-boot/lib/libavb/
A Davb_rsa.c26 IAvbKey* key = NULL; in iavb_parse_key_data() local
57 if (key == NULL) { in iavb_parse_key_data()
64 key->rr = key->n + key->len; in iavb_parse_key_data()
71 key->n[i] = avb_be32toh(((uint32_t*)n)[key->len - i - 1]); in iavb_parse_key_data()
72 key->rr[i] = avb_be32toh(((uint32_t*)rr)[key->len - i - 1]); in iavb_parse_key_data()
74 return key; in iavb_parse_key_data()
77 if (key != NULL) { in iavb_parse_key_data()
78 avb_free(key); in iavb_parse_key_data()
84 avb_free(key); in iavb_free_parsed_key()
134 subM(key, c); in montMulAdd()
[all …]
/u-boot/fs/ubifs/
A Dkey.h87 key->u32[0] = inum; in ino_key_init()
116 key->u32[0] = inum; in lowest_ino_key()
117 key->u32[1] = 0; in lowest_ino_key()
129 key->u32[0] = inum; in highest_ino_key()
147 key->u32[0] = inum; in dent_key_init()
164 key->u32[0] = inum; in dent_key_init_hash()
197 key->u32[0] = inum; in lowest_dent_key()
215 key->u32[0] = inum; in xent_key_init()
248 key->u32[0] = inum; in lowest_xent_key()
264 key->u32[0] = inum; in data_key_init()
[all …]
A Dtnc.c1547 key = &zbr->key; in ubifs_tnc_get_bu_keys()
1885 key = &znode->zbranch[0].key; in correct_parent_keys()
1966 union ubifs_key *key = &zbr->key, *key1; in tnc_insert() local
2097 zbr->key = zn->zbranch[0].key; in tnc_insert()
2120 zi->zbranch[0].key = znode->zbranch[0].key; in tnc_insert()
2125 zi->zbranch[1].key = zn->zbranch[0].key; in tnc_insert()
2169 key_copy(c, key, &zbr.key); in ubifs_tnc_add()
2340 key_copy(c, key, &zbr.key); in ubifs_tnc_add_nm()
2614 key = &znode->zbranch[n].key; in ubifs_tnc_remove_range()
2632 key = &znode->zbranch[i].key; in ubifs_tnc_remove_range()
[all …]
A Dtnc_misc.c140 cmp = keys_cmp(c, key, &zbr[mid].key); in ubifs_search_zbranch()
156 ubifs_assert(keys_cmp(c, key, &zbr[0].key) < 0); in ubifs_search_zbranch()
158 ubifs_assert(keys_cmp(c, key, &zbr[*n].key) > 0); in ubifs_search_zbranch()
160 ubifs_assert(keys_cmp(c, key, &zbr[*n + 1].key) < 0); in ubifs_search_zbranch()
301 key_read(c, &br->key, &zbr->key); in read_znode()
325 i, key_type(c, &zbr->key)); in read_znode()
333 type = key_type(c, &zbr->key); in read_znode()
361 key1 = &znode->zbranch[i].key; in read_znode()
454 union ubifs_key key1, *key = &zbr->key; in ubifs_tnc_read_node() local
471 dbg_tnck(key, "key "); in ubifs_tnc_read_node()
[all …]
/u-boot/test/env/
A Dhashtable.c24 char key[20]; in htab_fill() local
29 item.data = key; in htab_fill()
31 item.key = key; in htab_fill()
44 char key[20]; in htab_check_fill() local
50 item.data = key; in htab_check_fill()
51 item.key = key; in htab_check_fill()
54 ut_asserteq_str(key, ritem->key); in htab_check_fill()
67 char key[20]; in htab_create_delete() local
73 item.data = key; in htab_create_delete()
74 item.key = key; in htab_create_delete()
[all …]
/u-boot/include/crypto/
A Dpublic_key.h27 void *key; member
37 extern void public_key_free(struct public_key *key);
58 struct key;
62 extern int restrict_link_by_signature(struct key *dest_keyring,
65 struct key *trust_keyring);
67 extern int restrict_link_by_key_or_keyring(struct key *dest_keyring,
70 struct key *trusted);
72 extern int restrict_link_by_key_or_keyring_chain(struct key *trust_keyring,
75 struct key *trusted);
83 extern int verify_signature(const struct key *,
/u-boot/fs/btrfs/
A Dsubvolume.c21 struct btrfs_key key; in get_path_in_subvol() local
37 key.objectid = cur; in get_path_in_subvol()
39 key.offset = (u64)-1; in get_path_in_subvol()
70 cur = key.offset; in get_path_in_subvol()
83 struct btrfs_key key; in list_one_subvol() local
100 key.objectid = cur; in list_one_subvol()
102 key.offset = (u64)-1; in list_one_subvol()
146 cur = key.offset; in list_one_subvol()
163 struct btrfs_key key; in list_subvolums() local
181 key.offset = 0; in list_subvolums()
[all …]
A Dinode.c25 struct btrfs_key key; in btrfs_readlink() local
29 key.objectid = ino; in btrfs_readlink()
31 key.offset = 0; in btrfs_readlink()
77 struct btrfs_key key; in lookup_root_ref() local
81 key.objectid = rootid; in lookup_root_ref()
83 key.offset = (u64)-1; in lookup_root_ref()
124 struct btrfs_key key; in get_parent_inode() local
153 key.objectid = ino; in get_parent_inode()
564 if (key.offset <= file_offset && key.offset + in lookup_data_extent()
591 if (key.offset <= file_offset && key.offset + in lookup_data_extent()
[all …]
A Ddir-item.c86 struct btrfs_key key; in btrfs_lookup_dir_item() local
92 key.objectid = dir; in btrfs_lookup_dir_item()
93 key.type = BTRFS_DIR_ITEM_KEY; in btrfs_lookup_dir_item()
95 key.offset = btrfs_name_hash(name, name_len); in btrfs_lookup_dir_item()
111 found_key.offset != key.offset) in btrfs_lookup_dir_item()
121 struct btrfs_key key; in btrfs_iter_dir() local
125 key.objectid = ino; in btrfs_iter_dir()
126 key.type = BTRFS_DIR_INDEX_KEY; in btrfs_iter_dir()
127 key.offset = 0; in btrfs_iter_dir()
129 ret = btrfs_search_slot(NULL, root, &key, &path, 0, 0); in btrfs_iter_dir()
[all …]
A Dbtrfs.c23 struct btrfs_key key; in show_dir() local
44 btrfs_dir_item_key_to_cpu(eb, di, &key); in show_dir()
46 if (key.type == BTRFS_ROOT_ITEM_KEY) { in show_dir()
50 subvol = btrfs_read_fs_root(fs_info, &key); in show_dir()
82 key.objectid); in show_dir()
98 ASSERT(key.type == BTRFS_INODE_ITEM_KEY); in show_dir()
102 if (key.type == BTRFS_INODE_ITEM_KEY) in show_dir()
188 struct btrfs_key key; in btrfs_size() local
204 key.objectid = ino; in btrfs_size()
205 key.type = BTRFS_INODE_ITEM_KEY; in btrfs_size()
[all …]
A Dctree.c105 struct btrfs_disk_key key; in btrfs_check_node() local
115 if (memcmp(parent_key, &key, sizeof(key))) in btrfs_check_node()
136 struct btrfs_disk_key key; in btrfs_check_leaf() local
163 btrfs_item_key(buf, &key, 0); in btrfs_check_leaf()
165 memcmp(parent_key, &key, sizeof(key))) { in btrfs_check_leaf()
218 struct btrfs_disk_key key; in check_block() local
226 key_ptr = &key; in check_block()
333 struct btrfs_key key; in btrfs_find_item() local
337 key.type = key_type; in btrfs_find_item()
338 key.objectid = iobjectid; in btrfs_find_item()
[all …]
/u-boot/cmd/
A Dbootmenu.c108 *key = KEY_NONE; in bootmenu_autoboot_loop()
114 *key = KEY_QUIT; in bootmenu_autoboot_loop()
167 *key = KEY_NONE; in bootmenu_loop()
174 *key = KEY_NONE; in bootmenu_loop()
177 *key = KEY_QUIT; in bootmenu_loop()
186 *key = KEY_NONE; in bootmenu_loop()
194 *key = KEY_UP; in bootmenu_loop()
197 *key = KEY_DOWN; in bootmenu_loop()
200 *key = KEY_NONE; in bootmenu_loop()
211 *key = KEY_QUIT; in bootmenu_loop()
[all …]
/u-boot/scripts/kconfig/lxdialog/
A Dmenubox.c270 key = wgetch(menu); in dialog_menu()
272 if (key < 256 && isalpha(key)) in dialog_menu()
273 key = tolower(key); in dialog_menu()
295 key == KEY_UP || key == KEY_DOWN || in dialog_menu()
296 key == '-' || key == '+' || in dialog_menu()
297 key == KEY_PPAGE || key == KEY_NPAGE)) { in dialog_menu()
301 if (key == KEY_UP || key == '-') { in dialog_menu()
310 } else if (key == KEY_DOWN || key == '+') { in dialog_menu()
360 switch (key) { in dialog_menu()
386 switch (key) { in dialog_menu()
[all …]
A Dyesno.c31 int i, x, y, key = 0, button = 0; in dialog_yesno() local
65 while (key != KEY_ESC) { in dialog_yesno()
66 key = wgetch(dialog); in dialog_yesno()
67 switch (key) { in dialog_yesno()
80 button = ((key == KEY_LEFT ? --button : ++button) < 0) ? 1 : (button > 1 ? 0 : button); in dialog_yesno()
90 key = on_key_esc(dialog); in dialog_yesno()
100 return key; /* ESC pressed */ in dialog_yesno()
/u-boot/doc/uImage.FIT/
A Dverified-boot.txt15 A key point is that it is possible to field-upgrade the software on machines
25 Images are signed using a private key known only to the signer, but can
26 be verified using a public key. As its name suggests the public key can be
38 | RSA key pair | * +---------------+
39 | .key .crt | * | Public key in |
40 +--------------+ +------> public key ----->| trusted place |
62 The public key from the signer allows us to verify and therefore trust
77 2. Master public key is placed in read-only memory.
79 3. Secondary public key is placed in first stage images
84 different key at each stage, so that a compromise in one place will not
[all …]
/u-boot/include/keys/
A Dasymmetric-type.h73 const struct asymmetric_key_ids *asymmetric_key_ids(const struct key *key) in asymmetric_key_ids() argument
75 return key->payload.data[asym_key_ids]; in asymmetric_key_ids()
78 extern struct key *find_asymmetric_key(struct key *keyring,
/u-boot/lib/
A Dhashtable.c163 free((void *)ep->key); in hdestroy_r()
251 && strcmp(item.key, htab->table[idx].entry.key) == 0) { in _compare_and_overwrite_entry()
306 hval += item.key[count]; in hsearch_r()
391 htab->table[idx].entry.key = strdup(item.key); in hsearch_r()
455 free((void *)ep->key); in _hdelete()
470 e.key = (char *)key; in hdelete_r()
482 "%s, skipping it!\n", key); in hdelete_r()
549 return (strcmp(e1->key, e2->key)); in cmpkey()
646 totlen += strlen(ep->key); in hexport_r()
709 s = list[i]->key; in hexport_r()
[all …]
/u-boot/lib/efi_loader/
A Defi_console.c620 struct efi_key_data key; member
842 key->key = pressed_key; in efi_cin_read_key()
858 if (item->key.key.unicode_char || item->key.key.scan_code) { in efi_cin_notify()
859 if (item->key.key.unicode_char != in efi_cin_notify()
861 item->key.key.scan_code != next_key.key.scan_code) in efi_cin_notify()
1069 key_data->key.unicode_char, in efi_cin_register_key_notify()
1070 key_data->key.scan_code, in efi_cin_register_key_notify()
1178 struct efi_input_key *key) in efi_cin_read_key_stroke() argument
1182 EFI_ENTRY("%p, %p", this, key); in efi_cin_read_key_stroke()
1185 if (!this || !key) { in efi_cin_read_key_stroke()
[all …]
/u-boot/common/
A Dmenu.c23 char *key; member
85 puts(item->key); in menu_item_print()
102 if (item->key) in menu_item_destroy()
103 free(item->key); in menu_item_destroy()
139 if (!item_key || !item->key) { in menu_item_key_match()
140 if (item_key == item->key) in menu_item_key_match()
146 if (strcmp(item->key, item_key) == 0) in menu_item_key_match()
212 if (key) in menu_interactive_choice()
213 choice_item = menu_item_by_key(m, key); in menu_interactive_choice()
316 item->key = strdup(item_key); in menu_item_add()
[all …]

Completed in 49 milliseconds

12345678910>>...13