/u-boot/tools/binman/btool/ |
H A D | fdt_add_pubkey.py | 22 def run(self, input_fname, keydir, keyname, required, algo): 27 keydir (str): Directory with public key. Optional parameter, 39 if keydir: 40 args += ['-k', keydir]
|
/u-boot/tools/binman/etype/ |
H A D | gbb.py | 44 - keydir: Directory containing the public keys to use 58 self.hardware_id, self.keydir, self.bmpblk = self.GetEntryArgsOrProps( 60 EntryArg('keydir', str), 80 keydir = tools.get_input_filename(self.keydir) 88 rootkey='%s/root_key.vbpubk' % keydir, 89 recoverykey='%s/recovery_key.vbpubk' % keydir,
|
H A D | vblock.py | 23 - keydir: Directory containing the public keys to use 24 - keyblock: Name of the key file to use (inside keydir) 25 - signprivate: Name of provide key file to use (inside keydir) 27 - kernelkey: Name of the kernel key to use (inside keydir) 42 (self.keydir, self.keyblock, self.signprivate, self.version, 44 EntryArg('keydir', str), 71 prefix = self.keydir + '/'
|
/u-boot/tools/ |
H A D | fdt_add_pubkey.c | 8 static const char *keydir = "."; /* -k <keydir> */ variable 16 fprintf(stderr, "Usage: %s [-a <algo>] [-k <keydir>] [-n <keyname>] [-r <conf|image>]" 26 "\t-k <keydir> Directory with public key. Optional parameter, default value: .\n" 40 keydir = optarg; 72 info->keydir = keydir;
|
H A D | image-host.c | 167 const char *keydir, const char *keyfile, void *fit, 187 info->keydir = keydir; 214 * @keydir: Directory containing keys to use for signing 227 static int fit_image_process_sig(const char *keydir, const char *keyfile, argument 240 if (fit_image_setup_sig(&info, keydir, keyfile, fit, image_name, 345 static int fit_image_read_key_iv_data(const char *keydir, const char *key_iv_name, argument 352 keydir, key_iv_name, ".bin"); 398 const char *keydir, void *fit, 411 info->keydir 166 fit_image_setup_sig(struct image_sign_info *info, const char *keydir, const char *keyfile, void *fit, const char *image_name, int noffset, const char *require_keys, const char *engine_id, const char *algo_name) argument 397 fit_image_setup_cipher(struct image_cipher_info *info, const char *keydir, void *fit, const char *image_name, int image_noffset, int noffset) argument 510 fit_image_process_cipher(const char *keydir, void *keydest, void *fit, const char *image_name, int image_noffset, int node_noffset, const void *data, size_t size, const char *cmdname) argument 559 fit_image_cipher_data(const char *keydir, void *keydest, void *fit, int image_noffset, const char *comment, int require_keys, const char *engine_id, const char *cmdname) argument 646 fit_image_add_verification_data(const char *keydir, const char *keyfile, void *keydest, void *fit, int image_noffset, const char *comment, int require_keys, const char *engine_id, const char *cmdname, const char* algo_name) argument 1044 fit_config_process_sig(const char *keydir, const char *keyfile, void *keydest, void *fit, const char *conf_name, int conf_noffset, int noffset, const char *comment, int require_keys, const char *engine_id, const char *cmdname, const char *algo_name) argument 1115 fit_config_add_verification_data(const char *keydir, const char *keyfile, void *keydest, void *fit, int conf_noffset, const char *comment, int require_keys, const char *engine_id, const char *cmdname, const char *algo_name, struct image_summary *summary) argument 1165 read_pub_key(const char *keydir, const void *name, unsigned char **pubkey, int *pubkey_len) argument 1219 fit_pre_load_data(const char *keydir, void *keydest, void *fit) argument 1269 fit_cipher_data(const char *keydir, void *keydest, void *fit, const char *comment, int require_keys, const char *engine_id, const char *cmdname) argument 1304 fit_add_verification_data(const char *keydir, const char *keyfile, void *keydest, void *fit, const char *comment, int require_keys, const char *engine_id, const char *cmdname, const char *algo_name, struct image_summary *summary) argument [all...] |
H A D | imagetool.h | 79 const char *keydir; /* Directory holding private keys */ member in struct:image_tool_params
|
H A D | sunxi_toc0.c | 707 if (params->keydir) { 708 if (asprintf(&fw_key_file, "%s/%s", params->keydir, fw_key_file) < 0) 710 if (asprintf(&key_item_file, "%s/%s", params->keydir, key_item_file) < 0) 712 if (asprintf(&root_key_file, "%s/%s", params->keydir, root_key_file) < 0)
|
H A D | fit_image.c | 65 ret = fit_pre_load_data(params->keydir, dest_blob, ptr); 68 ret = fit_cipher_data(params->keydir, dest_blob, ptr, 76 ret = fit_add_verification_data(params->keydir,
|
H A D | kwbimage.c | 460 static int kwb_load_rsa_key(const char *keydir, const char *name, RSA **p_rsa) argument 466 if (!keydir) 467 keydir = "."; 469 snprintf(path, sizeof(path), "%s/%s.key", keydir, name); 505 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key);
|
H A D | mkimage.c | 120 "Signing / verified boot options: [-k keydir] [-K dtb] [ -c <comment>] [-p addr] [-r] [-N engine]\n" 298 params.keydir = optarg;
|
/u-boot/lib/rsa/ |
H A D | rsa-sign.c | 38 * @keydir: Directory containins the key 43 static int rsa_pem_get_pub_key(const char *keydir, const char *name, EVP_PKEY **evpp) argument 55 snprintf(path, sizeof(path), "%s/%s.crt", keydir, name); 95 * @keydir: Key prefix 101 static int rsa_engine_get_pub_key(const char *keydir, const char *name, argument 118 if (keydir) { 119 // Check for legacy keydir spec and prepend 120 if (strncmp(pkcs11_schema, keydir, strlen(pkcs11_schema))) { 125 if (strstr(keydir, "object=")) 128 pkcs11_uri_prepend, keydir); 170 rsa_get_pub_key(const char *keydir, const char *name, ENGINE *engine, EVP_PKEY **evpp) argument 186 rsa_pem_get_priv_key(const char *keydir, const char *name, const char *keyfile, EVP_PKEY **evpp) argument 229 rsa_engine_get_priv_key(const char *keydir, const char *name, const char *keyfile, ENGINE *engine, EVP_PKEY **evpp) argument 306 rsa_get_priv_key(const char *keydir, const char *name, const char *keyfile, ENGINE *engine, EVP_PKEY **evpp) argument [all...] |
/u-boot/lib/ecdsa/ |
H A D | ecdsa-libcrypto.c | 166 } else if (info->keydir && info->keyname) { 167 snprintf(kname, sizeof(kname), "%s/%s.pem", info->keydir,
|
/u-boot/include/ |
H A D | image.h | 1266 * @keydir: Directory containing keys 1274 int fit_pre_load_data(const char *keydir, void *keydest, void *fit); 1276 int fit_cipher_data(const char *keydir, void *keydest, void *fit, 1302 * @keydir: Directory containing keys 1322 int fit_add_verification_data(const char *keydir, const char *keyfile, 1492 * Either 'keydir', 'keyname', or 'keyfile' can be NULL. However, either 1493 * 'keyfile', or both 'keydir' and 'keyname' should have valid values. If 1497 const char *keydir; /* Directory conaining keys */ member in struct:image_sign_info 1776 const char *keydir; /* Directory containing keys */ member in struct:image_cipher_info
|