Home
last modified time | relevance | path

Searched refs:keydir (Results 1 – 11 of 11) sorted by relevance

/u-boot/tools/binman/etype/
A Dgbb.py58 self.hardware_id, self.keydir, self.bmpblk = self.GetEntryArgsOrProps(
82 keydir = tools.GetInputFilename(self.keydir)
86 '--rootkey=%s/root_key.vbpubk' % keydir,
87 '--recoverykey=%s/recovery_key.vbpubk' % keydir,
A Dvblock.py43 (self.keydir, self.keyblock, self.signprivate, self.version,
66 prefix = self.keydir + '/'
/u-boot/lib/rsa/
A Drsa-sign.c137 if (keydir) in rsa_engine_get_pub_key()
138 if (strstr(keydir, "object=")) in rsa_engine_get_pub_key()
141 keydir); in rsa_engine_get_pub_key()
145 keydir, name); in rsa_engine_get_pub_key()
151 if (keydir) in rsa_engine_get_pub_key()
154 keydir, name); in rsa_engine_get_pub_key()
262 if (keydir) in rsa_engine_get_priv_key()
266 keydir); in rsa_engine_get_priv_key()
270 keydir, name); in rsa_engine_get_priv_key()
276 if (keydir) in rsa_engine_get_priv_key()
[all …]
/u-boot/tools/
A Dimage-host.c173 info->keydir = keydir; in fit_image_setup_sig()
354 const char *keydir, void *fit, in fit_image_setup_cipher() argument
368 info->keydir = keydir; in fit_image_setup_cipher()
398 info->keydir, info->keyname, ".bin"); in fit_image_setup_cipher()
420 info->keydir, info->ivname, ".bin"); in fit_image_setup_cipher()
560 if (!IMAGE_ENABLE_ENCRYPT || !keydir) in fit_image_cipher_data()
635 } else if (IMAGE_ENABLE_SIGN && keydir && in fit_image_add_verification_data()
638 ret = fit_image_process_sig(keydir, keydest, in fit_image_add_verification_data()
1005 ret = fit_config_process_sig(keydir, keydest, in fit_config_add_verification_data()
1040 ret = fit_image_cipher_data(keydir, keydest, in fit_cipher_data()
[all …]
A Dimagetool.h68 const char *keydir; /* Directory holding private keys */ member
A Dkwbimage.c389 static int kwb_load_rsa_key(const char *keydir, const char *name, RSA **p_rsa) in kwb_load_rsa_key() argument
395 if (!keydir) in kwb_load_rsa_key()
396 keydir = "."; in kwb_load_rsa_key()
398 snprintf(path, sizeof(path), "%s/%s.key", keydir, name); in kwb_load_rsa_key()
434 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key); in kwb_load_cfg_key()
A Dfit_image.c63 ret = fit_cipher_data(params->keydir, dest_blob, ptr, in fit_add_file_data()
71 ret = fit_add_verification_data(params->keydir, dest_blob, ptr, in fit_add_file_data()
A Dmkimage.c233 params.keydir = optarg; in process_args()
/u-boot/doc/uImage.FIT/
A Dsignature.txt497 PKCS11 engine support forms "key id" based on "keydir" and with
499 keydir). "keydir" (if defined) is used to define (prefix for) which PKCS11 source
503 "pkcs11:<keydir>;object=<key-name-hint>;type=<public|private>"
504 or, if keydir contains "object="
505 "pkcs11:<keydir>;type=<public|private>"
509 Generic HSM engine support forms "key id" based on "keydir" and with
510 "key-name-hint". If "keydir" is specified for mkimage it is used as a prefix in
514 "<keydir><key-name-hint>"
615 Use the portion of the signature token URL after "pkcs11:" as the keydir argument (-k) to mkimage b…
/u-boot/include/
A Dimage.h1109 int fit_cipher_data(const char *keydir, void *keydest, void *fit,
1134 int fit_add_verification_data(const char *keydir, void *keydest, void *fit,
1253 const char *keydir; /* Directory conaining keys */ member
1469 const char *keydir; /* Directory containing keys */ member
/u-boot/tools/binman/
A DREADME.entries448 - keydir: Directory containing the public keys to use
1159 - keydir: Directory containing the public keys to use
1160 - keyblock: Name of the key file to use (inside keydir)
1161 - signprivate: Name of provide key file to use (inside keydir)
1163 - kernelkey: Name of the kernel key to use (inside keydir)

Completed in 21 milliseconds