/u-boot/lib/crypto/ |
A D | x509_public_key.c | 39 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() local 64 if (!sig->s) in x509_get_sig_params() 79 sig->digest = calloc(1, sig->digest_size); in x509_get_sig_params() 80 if (!sig->digest) in x509_get_sig_params() 85 hash_calculate(sig->hash_algo, ®ion, 1, sig->digest); in x509_get_sig_params() 107 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 121 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 124 sig->digest_size, sig->digest); in x509_get_sig_params() 153 if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) { in x509_check_for_self_signed() 165 cert->sig->auth_ids[0] && cert->sig->auth_ids[1]) in x509_check_for_self_signed() [all …]
|
A D | pkcs7_verify.c | 49 struct public_key_signature *sig = sinfo->sig; in pkcs7_digest() local 80 sig->digest = calloc(1, sig->digest_size); in pkcs7_digest() 90 hash_calculate(sinfo->sig->hash_algo, regions, 1, sig->digest); in pkcs7_digest() 126 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 145 struct public_key_signature *sig = sinfo->sig; in pkcs7_digest() local 154 if (sig->digest) in pkcs7_digest() 171 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 221 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 377 sig = x509->sig; in pkcs7_verify_sig_chain() 380 sig->auth_ids[0]->len, sig->auth_ids[0]->data); in pkcs7_verify_sig_chain() [all …]
|
A D | public_key.c | 76 if (sig) { in public_key_signature_free() 79 free(sig->s); in public_key_signature_free() 80 free(sig->digest); in public_key_signature_free() 81 free(sig); in public_key_signature_free() 104 if (!pkey || !sig) in public_key_verify_signature() 117 if (strcmp(sig->pkey_algo, "rsa") || (sig->s_size * 8) != 2048) { in public_key_verify_signature() 119 sig->pkey_algo, sig->s_size * 8); in public_key_verify_signature() 139 if (rsa_verify_with_pkey(&info, sig->digest, sig->s, sig->s_size)) in public_key_verify_signature() 362 BUG_ON(!sig); in public_key_verify_signature() 399 sg_set_buf(&src_sg[0], sig->s, sig->s_size); in public_key_verify_signature() [all …]
|
A D | pkcs7_parser.c | 60 public_key_signature_free(sinfo->sig); in pkcs7_free_signed_info() 144 if (!ctx->sinfo->sig) in pkcs7_parse_message() 243 ctx->sinfo->sig->hash_algo = "md4"; in pkcs7_sig_note_digest_algo() 246 ctx->sinfo->sig->hash_algo = "md5"; in pkcs7_sig_note_digest_algo() 249 ctx->sinfo->sig->hash_algo = "sha1"; in pkcs7_sig_note_digest_algo() 281 ctx->sinfo->sig->pkey_algo = "rsa"; in pkcs7_sig_note_pkey_algo() 282 ctx->sinfo->sig->encoding = "pkcs1"; in pkcs7_sig_note_pkey_algo() 648 if (!ctx->sinfo->sig->s) 651 ctx->sinfo->sig->s_size = vlen; 687 sinfo->sig->auth_ids[0] = kid; [all …]
|
A D | x509_cert_parser.c | 61 public_key_signature_free(cert->sig); in x509_free_certificate() 89 if (!cert->sig) in x509_cert_parse() 218 ctx->cert->sig->hash_algo = "md4"; in x509_note_pkey_algo() 222 ctx->cert->sig->hash_algo = "sha1"; in x509_note_pkey_algo() 251 ctx->cert->sig->pkey_algo = "rsa"; in x509_note_pkey_algo() 252 ctx->cert->sig->encoding = "pkcs1"; in x509_note_pkey_algo() 256 ctx->cert->sig->pkey_algo = "ecrdsa"; in x509_note_pkey_algo() 257 ctx->cert->sig->encoding = "raw"; in x509_note_pkey_algo() 649 if (ctx->cert->sig->auth_ids[1]) in x509_akid_note_kid() 656 ctx->cert->sig->auth_ids[1] = kid; in x509_akid_note_kid() [all …]
|
/u-boot/drivers/reset/ |
A D | reset-imx7.c | 84 val = readl(priv->base + sig[rst->id].offset); in imx7_reset_deassert_imx7() 87 val |= sig[rst->id].bit; in imx7_reset_deassert_imx7() 90 val &= ~sig[rst->id].bit; in imx7_reset_deassert_imx7() 93 writel(val, priv->base + sig[rst->id].offset); in imx7_reset_deassert_imx7() 107 val = readl(priv->base + sig[rst->id].offset); in imx7_reset_assert_imx7() 110 val &= ~sig[rst->id].bit; in imx7_reset_assert_imx7() 113 val |= sig[rst->id].bit; in imx7_reset_assert_imx7() 215 val |= sig[rst->id].bit; in imx7_reset_deassert_imx8mq() 218 val &= ~sig[rst->id].bit; in imx7_reset_deassert_imx8mq() 244 val &= ~sig[rst->id].bit; in imx7_reset_assert_imx8mq() [all …]
|
/u-boot/cmd/ |
A D | acpi.c | 44 struct acpi_table_header *find_table(const char *sig) in find_table() argument 60 if (!memcmp(hdr->signature, sig, ACPI_NAME_LEN)) in find_table() 65 if (!memcmp(sig, "DSDT", ACPI_NAME_LEN) && fadt->dsdt) in find_table() 67 if (!memcmp(sig, "FACS", ACPI_NAME_LEN) && in find_table() 76 static int dump_table_name(const char *sig) in dump_table_name() argument 80 hdr = find_table(sig); in dump_table_name() 172 char sig[ACPI_NAME_LEN]; in do_acpi_dump() local 180 str_to_upper(name, sig, -1); in do_acpi_dump() 181 ret = dump_table_name(sig); in do_acpi_dump() 183 printf("Table '%.*s' not found\n", ACPI_NAME_LEN, sig); in do_acpi_dump()
|
/u-boot/include/u-boot/ |
A D | rsa.h | 97 const uint8_t *hash, uint8_t *sig, uint sig_len); 113 uint8_t *sig, uint sig_len); 116 const void *hash, uint8_t *sig, uint sig_len); 130 uint8_t *sig, uint sig_len) in rsa_verify_hash() argument 137 uint8_t *sig, uint sig_len) in rsa_verify() argument
|
A D | rsa-mod-exp.h | 64 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len, 67 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, 98 int (*mod_exp)(struct udevice *dev, const uint8_t *sig,
|
/u-boot/examples/api/ |
A D | demo.c | 30 struct api_signature *sig = NULL; in main() local 36 if (!api_search_sig(&sig)) in main() 39 syscall_ptr = sig->syscall; in main() 43 if (sig->version > API_SIG_VERSION) in main() 46 printf("API signature found @%x\n", (unsigned int)sig); in main() 47 test_dump_sig(sig); in main() 201 void test_dump_sig(struct api_signature *sig) in test_dump_sig() argument 204 printf(" version\t= %d\n", sig->version); in test_dump_sig() 205 printf(" checksum\t= 0x%08x\n", sig->checksum); in test_dump_sig() 206 printf(" sc entry\t= 0x%08x\n", (unsigned int)sig->syscall); in test_dump_sig()
|
A D | glue.c | 14 static int valid_sig(struct api_signature *sig) in valid_sig() argument 19 if (sig == NULL) in valid_sig() 26 s = *sig; in valid_sig() 31 if (checksum != sig->checksum) in valid_sig() 42 int api_search_sig(struct api_signature **sig) in api_search_sig() argument 48 if (sig == NULL) in api_search_sig() 60 *sig = (struct api_signature *)sp; in api_search_sig() 61 if (valid_sig(*sig)) in api_search_sig() 67 *sig = NULL; in api_search_sig()
|
/u-boot/lib/rsa/ |
A D | rsa-verify.c | 317 struct key_prop *prop, const uint8_t *sig, in rsa_verify_key() argument 329 if (!prop || !sig || !hash || !checksum) in rsa_verify_key() 358 ret = rsa_mod_exp_sw(sig, sig_len, prop, buf); in rsa_verify_key() 391 const void *hash, uint8_t *sig, uint sig_len) in rsa_verify_with_pkey() argument 403 ret = rsa_verify_key(info, prop, sig, sig_len, hash, in rsa_verify_with_pkey() 412 const void *hash, uint8_t *sig, uint sig_len) in rsa_verify_with_pkey() argument 435 const void *hash, uint8_t *sig, in rsa_verify_with_keynode() argument 482 const void *hash, uint8_t *sig, in rsa_verify_with_keynode() argument 534 sig, sig_len, in rsa_verify_hash() 547 uint8_t *sig, uint sig_len) in rsa_verify() argument [all …]
|
/u-boot/doc/sphinx/ |
A D | cdomain.py | 151 def handle_func_like_macro(self, sig, signode): argument 163 m = c_funcptr_sig_re.match(sig) 165 m = c_sig_re.match(sig) 197 def handle_signature(self, sig, signode): argument 202 fullname = self.handle_func_like_macro(sig, signode) 204 fullname = super(CObject, self).handle_signature(sig, signode) 218 def add_target_and_index(self, name, sig, signode): argument
|
/u-boot/arch/sandbox/lib/ |
A D | interrupts.c | 32 void os_signal_action(int sig, unsigned long pc) in os_signal_action() argument 36 switch (sig) { in os_signal_action()
|
/u-boot/test/py/ |
A D | u_boot_console_sandbox.py | 74 def kill(self, sig): argument 84 self.log.action('kill %d' % sig) 85 self.p.kill(sig)
|
/u-boot/api/ |
A D | api.c | 647 struct api_signature *sig; in api_init() local 679 sig = malloc(sizeof(struct api_signature)); in api_init() 680 if (sig == NULL) { in api_init() 685 env_set_hex("api_address", (unsigned long)sig); in api_init() 686 debugf("API sig @ 0x%lX\n", (unsigned long)sig); in api_init() 687 memcpy(sig->magic, API_SIG_MAGIC, 8); in api_init() 688 sig->version = API_SIG_VERSION; in api_init() 689 sig->syscall = &syscall; in api_init() 690 sig->checksum = 0; in api_init() 691 sig->checksum = crc32(0, (unsigned char *)sig, in api_init() [all …]
|
/u-boot/drivers/crypto/rsa_mod_exp/ |
A D | mod_exp_sw.c | 13 static int mod_exp_sw(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in mod_exp_sw() argument 18 ret = rsa_mod_exp_sw(sig, sig_len, prop, out); in mod_exp_sw()
|
A D | mod_exp_uclass.c | 21 int rsa_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in rsa_mod_exp() argument 38 return ops->mod_exp(dev, sig, sig_len, node, out); in rsa_mod_exp()
|
/u-boot/arch/arm/cpu/arm926ejs/mxs/ |
A D | mxsimage-signed.cfg | 6 LOAD 0x8040 spl/u-boot-spl.sig 10 LOAD 0x40001040 u-boot.sig
|
A D | Makefile | 72 %.sig: %.csf 80 …signed.sb: $(src)/mxsimage-signed.cfg u-boot.ivt u-boot.sig spl/u-boot-spl.ivt spl/u-boot-spl.sig …
|
/u-boot/board/broadcom/bcmns3/ |
A D | ns3.c | 41 u32 sig; member 110 hdr.sig = *p32; in mem_info_parse_fixup() 111 if (hdr.sig != BCM_NS3_DDR_INFO_SIG) { in mem_info_parse_fixup() 112 printf("DDR info signature 0x%x invalid\n", hdr.sig); in mem_info_parse_fixup()
|
/u-boot/drivers/ata/ |
A D | libata.c | 24 u32 ata_dev_classify(u32 sig) in ata_dev_classify() argument 28 lbam = (sig >> 16) & 0xff; in ata_dev_classify() 29 lbah = (sig >> 24) & 0xff; in ata_dev_classify()
|
/u-boot/drivers/crypto/fsl/ |
A D | fsl_rsa.c | 19 int fsl_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len, in fsl_mod_exp() argument 30 pkin.a = sig; in fsl_mod_exp()
|
/u-boot/include/crypto/ |
A D | public_key.h | 53 extern void public_key_signature_free(struct public_key_signature *sig); 88 const struct public_key_signature *sig);
|
/u-boot/arch/x86/lib/ |
A D | sfi.c | 43 static void finish_table(struct table_info *tab, const char *sig, void *entry) in finish_table() argument 48 strcpy(hdr->sig, sig); in finish_table()
|