| /u-boot/lib/rsa/ |
| A D | rsa-sign.c | 116 if (keydir) in rsa_engine_get_pub_key() 120 keydir); in rsa_engine_get_pub_key() 124 keydir, name); in rsa_engine_get_pub_key() 130 if (keydir) in rsa_engine_get_pub_key() 133 keydir, name); in rsa_engine_get_pub_key() 187 if (keydir && name) in rsa_pem_get_priv_key() 238 if (keydir) in rsa_engine_get_priv_key() 242 keydir); in rsa_engine_get_priv_key() 246 keydir, name); in rsa_engine_get_priv_key() 252 if (keydir && name) in rsa_engine_get_priv_key() [all …]
|
| /u-boot/tools/binman/etype/ |
| A D | gbb.py | 58 self.hardware_id, self.keydir, self.bmpblk = self.GetEntryArgsOrProps( 80 keydir = tools.get_input_filename(self.keydir) 88 rootkey='%s/root_key.vbpubk' % keydir, 89 recoverykey='%s/recovery_key.vbpubk' % keydir,
|
| A D | vblock.py | 42 (self.keydir, self.keyblock, self.signprivate, self.version, 71 prefix = self.keydir + '/'
|
| /u-boot/tools/ |
| A D | image-host.c | 163 const char *keydir, const char *keyfile, void *fit, in fit_image_setup_sig() argument 182 info->keydir = keydir; in fit_image_setup_sig() 368 const char *keydir, void *fit, in fit_image_setup_cipher() argument 382 info->keydir = keydir; in fit_image_setup_cipher() 412 info->keydir, info->keyname, ".bin"); in fit_image_setup_cipher() 434 info->keydir, info->ivname, ".bin"); in fit_image_setup_cipher() 574 if (!IMAGE_ENABLE_ENCRYPT || !keydir) in fit_image_cipher_data() 650 } else if (IMAGE_ENABLE_SIGN && (keydir || keyfile) && in fit_image_add_verification_data() 1190 if (!keydir || !keydest || !fit) in fit_pre_load_data() 1255 ret = fit_image_cipher_data(keydir, keydest, in fit_cipher_data() [all …]
|
| A D | fdt_add_pubkey.c | 8 static const char *keydir = "."; /* -k <keydir> */ variable 40 keydir = optarg; in process_args() 72 info->keydir = keydir; in reset_info()
|
| A D | imagetool.h | 79 const char *keydir; /* Directory holding private keys */ member
|
| A D | sunxi_toc0.c | 707 if (params->keydir) { in toc0_check_params() 708 if (asprintf(&fw_key_file, "%s/%s", params->keydir, fw_key_file) < 0) in toc0_check_params() 710 if (asprintf(&key_item_file, "%s/%s", params->keydir, key_item_file) < 0) in toc0_check_params() 712 if (asprintf(&root_key_file, "%s/%s", params->keydir, root_key_file) < 0) in toc0_check_params()
|
| A D | fit_image.c | 65 ret = fit_pre_load_data(params->keydir, dest_blob, ptr); in fit_add_file_data() 68 ret = fit_cipher_data(params->keydir, dest_blob, ptr, in fit_add_file_data() 76 ret = fit_add_verification_data(params->keydir, in fit_add_file_data()
|
| A D | kwbimage.c | 460 static int kwb_load_rsa_key(const char *keydir, const char *name, RSA **p_rsa) in kwb_load_rsa_key() argument 466 if (!keydir) in kwb_load_rsa_key() 467 keydir = "."; in kwb_load_rsa_key() 469 snprintf(path, sizeof(path), "%s/%s.key", keydir, name); in kwb_load_rsa_key() 505 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key); in kwb_load_cfg_key()
|
| A D | mkimage.c | 297 params.keydir = optarg; in process_args()
|
| /u-boot/doc/usage/fit/ |
| A D | signature.rst | 487 Software signing: keydir vs keyfile 493 The alternative is to pass the 'keydir' argument. In this case the filename of 494 the key is derived from the 'keydir' and the "key-name-hint" property in the 496 exist in "<keydir>/<key-name-hint>.<ext>" Here the extension "ext" is 527 PKCS11 engine support forms "key id" based on "keydir" and with 529 keydir). "keydir" (if defined) is used to define (prefix for) which PKCS11 source 533 "pkcs11:<keydir>;object=<key-name-hint>;type=<public|private>" 535 or, if keydir contains "object=" 536 "pkcs11:<keydir>;type=<public|private>" 541 Generic HSM engine support forms "key id" based on "keydir" and with [all …]
|
| /u-boot/lib/ecdsa/ |
| A D | ecdsa-libcrypto.c | 152 } else if (info->keydir && info->keyname) { in prepare_ctx() 153 snprintf(kname, sizeof(kname), "%s/%s.pem", info->keydir, in prepare_ctx()
|
| /u-boot/include/ |
| A D | image.h | 1198 int fit_pre_load_data(const char *keydir, void *keydest, void *fit); 1200 int fit_cipher_data(const char *keydir, void *keydest, void *fit, 1246 int fit_add_verification_data(const char *keydir, const char *keyfile, 1421 const char *keydir; /* Directory conaining keys */ member 1700 const char *keydir; /* Directory containing keys */ member
|
| /u-boot/tools/binman/ |
| A D | entries.rst | 906 - keydir: Directory containing the public keys to use 2275 - keydir: Directory containing the public keys to use 2276 - keyblock: Name of the key file to use (inside keydir) 2277 - signprivate: Name of provide key file to use (inside keydir) 2279 - kernelkey: Name of the kernel key to use (inside keydir)
|
| /u-boot/doc/develop/package/ |
| A D | entries.rst | 906 - keydir: Directory containing the public keys to use 2275 - keydir: Directory containing the public keys to use 2276 - keyblock: Name of the key file to use (inside keydir) 2277 - signprivate: Name of provide key file to use (inside keydir) 2279 - kernelkey: Name of the kernel key to use (inside keydir)
|