Searched refs:keydir (Results 1 – 11 of 11) sorted by relevance
| /u-boot/tools/binman/etype/ |
| A D | gbb.py | 58 self.hardware_id, self.keydir, self.bmpblk = self.GetEntryArgsOrProps( 82 keydir = tools.GetInputFilename(self.keydir) 86 '--rootkey=%s/root_key.vbpubk' % keydir, 87 '--recoverykey=%s/recovery_key.vbpubk' % keydir,
|
| A D | vblock.py | 43 (self.keydir, self.keyblock, self.signprivate, self.version, 66 prefix = self.keydir + '/'
|
| /u-boot/lib/rsa/ |
| A D | rsa-sign.c | 137 if (keydir) in rsa_engine_get_pub_key() 138 if (strstr(keydir, "object=")) in rsa_engine_get_pub_key() 141 keydir); in rsa_engine_get_pub_key() 145 keydir, name); in rsa_engine_get_pub_key() 151 if (keydir) in rsa_engine_get_pub_key() 154 keydir, name); in rsa_engine_get_pub_key() 262 if (keydir) in rsa_engine_get_priv_key() 266 keydir); in rsa_engine_get_priv_key() 270 keydir, name); in rsa_engine_get_priv_key() 276 if (keydir) in rsa_engine_get_priv_key() [all …]
|
| /u-boot/tools/ |
| A D | image-host.c | 173 info->keydir = keydir; in fit_image_setup_sig() 354 const char *keydir, void *fit, in fit_image_setup_cipher() argument 368 info->keydir = keydir; in fit_image_setup_cipher() 398 info->keydir, info->keyname, ".bin"); in fit_image_setup_cipher() 420 info->keydir, info->ivname, ".bin"); in fit_image_setup_cipher() 560 if (!IMAGE_ENABLE_ENCRYPT || !keydir) in fit_image_cipher_data() 635 } else if (IMAGE_ENABLE_SIGN && keydir && in fit_image_add_verification_data() 638 ret = fit_image_process_sig(keydir, keydest, in fit_image_add_verification_data() 1005 ret = fit_config_process_sig(keydir, keydest, in fit_config_add_verification_data() 1040 ret = fit_image_cipher_data(keydir, keydest, in fit_cipher_data() [all …]
|
| A D | imagetool.h | 68 const char *keydir; /* Directory holding private keys */ member
|
| A D | kwbimage.c | 389 static int kwb_load_rsa_key(const char *keydir, const char *name, RSA **p_rsa) in kwb_load_rsa_key() argument 395 if (!keydir) in kwb_load_rsa_key() 396 keydir = "."; in kwb_load_rsa_key() 398 snprintf(path, sizeof(path), "%s/%s.key", keydir, name); in kwb_load_rsa_key() 434 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key); in kwb_load_cfg_key()
|
| A D | fit_image.c | 63 ret = fit_cipher_data(params->keydir, dest_blob, ptr, in fit_add_file_data() 71 ret = fit_add_verification_data(params->keydir, dest_blob, ptr, in fit_add_file_data()
|
| A D | mkimage.c | 233 params.keydir = optarg; in process_args()
|
| /u-boot/doc/uImage.FIT/ |
| A D | signature.txt | 497 PKCS11 engine support forms "key id" based on "keydir" and with 499 keydir). "keydir" (if defined) is used to define (prefix for) which PKCS11 source 503 "pkcs11:<keydir>;object=<key-name-hint>;type=<public|private>" 504 or, if keydir contains "object=" 505 "pkcs11:<keydir>;type=<public|private>" 509 Generic HSM engine support forms "key id" based on "keydir" and with 510 "key-name-hint". If "keydir" is specified for mkimage it is used as a prefix in 514 "<keydir><key-name-hint>" 615 Use the portion of the signature token URL after "pkcs11:" as the keydir argument (-k) to mkimage b…
|
| /u-boot/include/ |
| A D | image.h | 1109 int fit_cipher_data(const char *keydir, void *keydest, void *fit, 1134 int fit_add_verification_data(const char *keydir, void *keydest, void *fit, 1253 const char *keydir; /* Directory conaining keys */ member 1469 const char *keydir; /* Directory containing keys */ member
|
| /u-boot/tools/binman/ |
| A D | README.entries | 448 - keydir: Directory containing the public keys to use 1159 - keydir: Directory containing the public keys to use 1160 - keyblock: Name of the key file to use (inside keydir) 1161 - signprivate: Name of provide key file to use (inside keydir) 1163 - kernelkey: Name of the kernel key to use (inside keydir)
|
Completed in 28 milliseconds