Searched refs:pkey (Results 1 – 9 of 9) sorted by relevance
/u-boot/lib/crypto/ |
A D | public_key.c | 104 if (!pkey || !sig) in public_key_verify_signature() 220 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_query() 224 memcpy(key, pkey->key, pkey->keylen); in software_key_query() 228 memcpy(ptr, pkey->params, pkey->paramlen); in software_key_query() 289 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_eds_op() 294 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op() 298 memcpy(ptr, pkey->params, pkey->paramlen); in software_key_eds_op() 361 BUG_ON(!pkey); in public_key_verify_signature() 380 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in public_key_verify_signature() 385 memcpy(key, pkey->key, pkey->keylen); in public_key_verify_signature() [all …]
|
/u-boot/test/lib/ |
A D | asn1.c | 377 struct rsa_key pkey; in lib_asn1_pkey() local 380 ret = rsa_parse_pub_key(&pkey, public_key, public_key_len); in lib_asn1_pkey() 383 ut_assertf(pkey.n_sz == 257, "public key modulus size doesn't match\n"); in lib_asn1_pkey() 384 ut_assertf(pkey.e_sz == 3, "public key exponent size doesn't match\n"); in lib_asn1_pkey() 385 ut_assertf(pkey.e[0] == 0x01 && pkey.e[1] == 0x00 && pkey.e[2] == 0x01, in lib_asn1_pkey()
|
/u-boot/board/emulation/common/ |
A D | qemu_capsule.c | 15 int efi_get_public_key_data(void **pkey, efi_uintn_t *pkey_len) in efi_get_public_key_data() argument 34 *pkey = NULL; in efi_get_public_key_data() 39 *pkey = (void *)blob; in efi_get_public_key_data()
|
/u-boot/include/ |
A D | fsl_validate.h | 103 u32 pkey; /* public key offset */ member 168 u8 pkey[2 * KEY_SIZE_BYTES]; member 181 u8 pkey[2 * KEY_SIZE_BYTES]; member
|
/u-boot/include/crypto/ |
A D | public_key.h | 87 int public_key_verify_signature(const struct public_key *pkey,
|
/u-boot/lib/efi_loader/ |
A D | efi_capsule.c | 211 __weak int efi_get_public_key_data(void **pkey, efi_uintn_t *pkey_len) in efi_get_public_key_data() argument 226 void *fdt_pkey, *pkey; in efi_capsule_authenticate() local 289 pkey = malloc(pkey_len); in efi_capsule_authenticate() 290 if (!pkey) in efi_capsule_authenticate() 293 memcpy(pkey, fdt_pkey, pkey_len); in efi_capsule_authenticate() 294 truststore = efi_build_signature_store(pkey, pkey_len); in efi_capsule_authenticate()
|
/u-boot/drivers/net/ |
A D | ne2000_base.c | 658 static int pkey = -1; variable 675 pkey = key; in uboot_push_tx_done() 750 pkey = -1; in ne2k_send() 756 if (pkey != -1) { in ne2k_send()
|
/u-boot/board/freescale/common/ |
A D | fsl_validate.c | 253 memcpy(&img->img_key, &(img->srk_tbl[key_num - 1].pkey), in read_validate_srk_tbl() 270 memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len); in read_validate_single_key() 319 memcpy(&img->img_key, &(ie_info->ie_key_tbl[ie_num - 1].pkey), in read_validate_ie_tbl()
|
/u-boot/tools/ |
A D | efivar.py | 280 pkey = crypto.load_privatekey(crypto.FILETYPE_PEM, f.read()) 287 p7 = crypto._lib.PKCS7_sign(crt._x509, pkey._pkey, crypto._ffi.NULL, bio_in,
|
Completed in 14 milliseconds