Home
last modified time | relevance | path

Searched refs:pkey (Results 1 – 9 of 9) sorted by relevance

/u-boot/lib/crypto/
A Dpublic_key.c104 if (!pkey || !sig) in public_key_verify_signature()
220 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_query()
224 memcpy(key, pkey->key, pkey->keylen); in software_key_query()
228 memcpy(ptr, pkey->params, pkey->paramlen); in software_key_query()
289 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_eds_op()
294 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op()
298 memcpy(ptr, pkey->params, pkey->paramlen); in software_key_eds_op()
361 BUG_ON(!pkey); in public_key_verify_signature()
380 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in public_key_verify_signature()
385 memcpy(key, pkey->key, pkey->keylen); in public_key_verify_signature()
[all …]
/u-boot/test/lib/
A Dasn1.c377 struct rsa_key pkey; in lib_asn1_pkey() local
380 ret = rsa_parse_pub_key(&pkey, public_key, public_key_len); in lib_asn1_pkey()
383 ut_assertf(pkey.n_sz == 257, "public key modulus size doesn't match\n"); in lib_asn1_pkey()
384 ut_assertf(pkey.e_sz == 3, "public key exponent size doesn't match\n"); in lib_asn1_pkey()
385 ut_assertf(pkey.e[0] == 0x01 && pkey.e[1] == 0x00 && pkey.e[2] == 0x01, in lib_asn1_pkey()
/u-boot/board/emulation/common/
A Dqemu_capsule.c15 int efi_get_public_key_data(void **pkey, efi_uintn_t *pkey_len) in efi_get_public_key_data() argument
34 *pkey = NULL; in efi_get_public_key_data()
39 *pkey = (void *)blob; in efi_get_public_key_data()
/u-boot/include/
A Dfsl_validate.h103 u32 pkey; /* public key offset */ member
168 u8 pkey[2 * KEY_SIZE_BYTES]; member
181 u8 pkey[2 * KEY_SIZE_BYTES]; member
/u-boot/include/crypto/
A Dpublic_key.h87 int public_key_verify_signature(const struct public_key *pkey,
/u-boot/lib/efi_loader/
A Defi_capsule.c211 __weak int efi_get_public_key_data(void **pkey, efi_uintn_t *pkey_len) in efi_get_public_key_data() argument
226 void *fdt_pkey, *pkey; in efi_capsule_authenticate() local
289 pkey = malloc(pkey_len); in efi_capsule_authenticate()
290 if (!pkey) in efi_capsule_authenticate()
293 memcpy(pkey, fdt_pkey, pkey_len); in efi_capsule_authenticate()
294 truststore = efi_build_signature_store(pkey, pkey_len); in efi_capsule_authenticate()
/u-boot/drivers/net/
A Dne2000_base.c658 static int pkey = -1; variable
675 pkey = key; in uboot_push_tx_done()
750 pkey = -1; in ne2k_send()
756 if (pkey != -1) { in ne2k_send()
/u-boot/board/freescale/common/
A Dfsl_validate.c253 memcpy(&img->img_key, &(img->srk_tbl[key_num - 1].pkey), in read_validate_srk_tbl()
270 memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len); in read_validate_single_key()
319 memcpy(&img->img_key, &(ie_info->ie_key_tbl[ie_num - 1].pkey), in read_validate_ie_tbl()
/u-boot/tools/
A Defivar.py280 pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, f.read())
287 p7 = crypto._lib.PKCS7_sign(crt._x509, pkey._pkey, crypto._ffi.NULL, bio_in,

Completed in 14 milliseconds