/u-boot/cmd/x86/ |
A D | fsp.c | 17 char *sign; in do_hdr() local 34 sign = (char *)&hdr->sign; in do_hdr() 38 for (i = 0; i < sizeof(hdr->sign); i++) in do_hdr() 39 printf("%c", *sign++); in do_hdr()
|
/u-boot/arch/x86/include/asm/arch-queensbay/fsp/ |
A D | fsp_vpd.h | 13 u64 sign; /* Offset 0x0000 */ member 39 u64 sign; /* Offset 0x0000 */ member
|
/u-boot/arch/x86/lib/fsp2/ |
A D | fsp_support.c | 57 log_debug("offset=%x sign=%x\n", (uint)offset, (uint)fv->sign); in fsp_get_header() 58 if (fv->sign != EFI_FVH_SIGNATURE) in fsp_get_header() 87 if (fsp->sign != EFI_FSPH_SIGNATURE) in fsp_get_header()
|
/u-boot/common/ |
A D | image-sig.c | 76 .sign = rsa_sign, 83 .sign = rsa_sign, 146 crypto_algos[i].sign += gd->reloc_off; in image_get_crypto_algo()
|
/u-boot/doc/uImage.FIT/ |
A D | uefi.its | 53 sign-images = "kernel", "fdt"; 63 sign-images = "kernel";
|
A D | sign-configs.its | 41 sign-images = "fdt", "kernel";
|
A D | verified-boot.txt | 24 Verified boot uses cryptographic algorithms to 'sign' software images. 76 1. Master private key is used by the signer to sign a first-stage image. 78 2. Secondary private key is created and used to sign second-stage images.
|
A D | signature.txt | 25 - sign the hash with a private key to produce a signature 44 In principle any suitable algorithm can be used to sign and verify a hash. 115 - sign-images: A list of images to sign, each being a property of the conf 131 Example: See sign-images.its for an example image tree source file and 132 sign-configs.its for config signing. 371 mkimage will sign configurations/conf-1, the kernel and fdt that are 475 Internet. If an attacker is able to steal the key, they can sign malicious FIT
|
/u-boot/include/ |
A D | vxworks.h | 46 u32 sign; /* "SMAP" signature */ member
|
/u-boot/arch/x86/include/asm/fsp/ |
A D | fsp_infoheader.h | 13 u32 sign; /* 'FSPH' */ member
|
A D | fsp_fv.h | 92 u32 sign; member
|
/u-boot/arch/arm/cpu/arm926ejs/mxs/ |
A D | Makefile | 66 spl/u-boot-spl.csf: spl/u-boot-spl.ivt spl/u-boot-spl.bin board/$(VENDOR)/$(BOARD)/sign/u-boot-spl.… 69 u-boot.csf: u-boot.ivt u-boot.bin board/$(VENDOR)/$(BOARD)/sign/u-boot.csf
|
/u-boot/lib/ |
A D | vsprintf.c | 166 char sign; in number() local 176 sign = 0; in number() 179 sign = '-'; in number() 183 sign = '+'; in number() 186 sign = ' '; in number() 231 if (sign) in number() 232 ADDCH(buf, sign); in number()
|
/u-boot/test/py/tests/vboot/ |
A D | sign-configs-sha1.its | 41 sign-images = "fdt", "kernel";
|
A D | sign-configs-sha256.its | 41 sign-images = "fdt", "kernel";
|
A D | sign-configs-sha1-pss.its | 42 sign-images = "fdt", "kernel";
|
A D | sign-configs-sha256-pss-prod.its | 42 sign-images = "fdt", "kernel";
|
A D | sign-configs-sha256-pss.its | 42 sign-images = "fdt", "kernel";
|
/u-boot/arch/x86/lib/fsp1/ |
A D | fsp_support.c | 30 if (((struct fv_header *)fsp)->sign == EFI_FVH_SIGNATURE) { in fsp_find_header() 113 assert(fsp_vpd->sign == VPD_IMAGE_ID); in fsp_init()
|
/u-boot/board/broadcom/bcmns3/fit/ |
A D | multi.its | 55 sign-images = "fdt", "kernel";
|
/u-boot/arch/x86/include/asm/arch-baytrail/fsp/ |
A D | fsp_vpd.h | 85 uint64_t sign; /* Offset 0x0000 */ member
|
/u-boot/tools/ |
A D | Makefile | 70 rsa-sign.o rsa-verify.o rsa-checksum.o \ 169 HOSTCFLAGS_rsa-sign.o += -Wno-deprecated-declarations
|
/u-boot/arch/x86/include/asm/arch-braswell/fsp/ |
A D | fsp_vpd.h | 142 u64 sign; /* Offset 0x0000 */ member
|
/u-boot/arch/arm/lib/ |
A D | lib1funcs.S | 252 eor ip, r0, r1 @ save the sign of the result. 270 10: teq ip, r0 @ same sign ? 298 movs ip, r0 @ preserve sign of dividend
|
/u-boot/doc/imx/habv4/guides/ |
A D | mx6_mx7_secure_boot.txt | 8 This document describes a step-by-step procedure on how to sign and securely 102 (1) Size of area in file u-boot-dtb.imx to sign. 105 (2) Start of area in u-boot-dtb.imx to sign. 372 A CSF file has to be created to sign the image. HAB does not allow to change
|