Searched refs:keydir (Results 1 - 13 of 13) sorted by relevance

/u-boot/tools/binman/btool/
H A Dfdt_add_pubkey.py22 def run(self, input_fname, keydir, keyname, required, algo):
27 keydir (str): Directory with public key. Optional parameter,
39 if keydir:
40 args += ['-k', keydir]
/u-boot/tools/binman/etype/
H A Dgbb.py44 - keydir: Directory containing the public keys to use
58 self.hardware_id, self.keydir, self.bmpblk = self.GetEntryArgsOrProps(
60 EntryArg('keydir', str),
80 keydir = tools.get_input_filename(self.keydir)
88 rootkey='%s/root_key.vbpubk' % keydir,
89 recoverykey='%s/recovery_key.vbpubk' % keydir,
H A Dvblock.py23 - keydir: Directory containing the public keys to use
24 - keyblock: Name of the key file to use (inside keydir)
25 - signprivate: Name of provide key file to use (inside keydir)
27 - kernelkey: Name of the kernel key to use (inside keydir)
42 (self.keydir, self.keyblock, self.signprivate, self.version,
44 EntryArg('keydir', str),
71 prefix = self.keydir + '/'
/u-boot/tools/
H A Dfdt_add_pubkey.c8 static const char *keydir = "."; /* -k <keydir> */ variable
16 fprintf(stderr, "Usage: %s [-a <algo>] [-k <keydir>] [-n <keyname>] [-r <conf|image>]"
26 "\t-k <keydir> Directory with public key. Optional parameter, default value: .\n"
40 keydir = optarg;
72 info->keydir = keydir;
H A Dimage-host.c167 const char *keydir, const char *keyfile, void *fit,
187 info->keydir = keydir;
214 * @keydir: Directory containing keys to use for signing
227 static int fit_image_process_sig(const char *keydir, const char *keyfile, argument
240 if (fit_image_setup_sig(&info, keydir, keyfile, fit, image_name,
345 static int fit_image_read_key_iv_data(const char *keydir, const char *key_iv_name, argument
352 keydir, key_iv_name, ".bin");
398 const char *keydir, void *fit,
411 info->keydir
166 fit_image_setup_sig(struct image_sign_info *info, const char *keydir, const char *keyfile, void *fit, const char *image_name, int noffset, const char *require_keys, const char *engine_id, const char *algo_name) argument
397 fit_image_setup_cipher(struct image_cipher_info *info, const char *keydir, void *fit, const char *image_name, int image_noffset, int noffset) argument
510 fit_image_process_cipher(const char *keydir, void *keydest, void *fit, const char *image_name, int image_noffset, int node_noffset, const void *data, size_t size, const char *cmdname) argument
559 fit_image_cipher_data(const char *keydir, void *keydest, void *fit, int image_noffset, const char *comment, int require_keys, const char *engine_id, const char *cmdname) argument
646 fit_image_add_verification_data(const char *keydir, const char *keyfile, void *keydest, void *fit, int image_noffset, const char *comment, int require_keys, const char *engine_id, const char *cmdname, const char* algo_name) argument
1044 fit_config_process_sig(const char *keydir, const char *keyfile, void *keydest, void *fit, const char *conf_name, int conf_noffset, int noffset, const char *comment, int require_keys, const char *engine_id, const char *cmdname, const char *algo_name) argument
1115 fit_config_add_verification_data(const char *keydir, const char *keyfile, void *keydest, void *fit, int conf_noffset, const char *comment, int require_keys, const char *engine_id, const char *cmdname, const char *algo_name, struct image_summary *summary) argument
1165 read_pub_key(const char *keydir, const void *name, unsigned char **pubkey, int *pubkey_len) argument
1219 fit_pre_load_data(const char *keydir, void *keydest, void *fit) argument
1269 fit_cipher_data(const char *keydir, void *keydest, void *fit, const char *comment, int require_keys, const char *engine_id, const char *cmdname) argument
1304 fit_add_verification_data(const char *keydir, const char *keyfile, void *keydest, void *fit, const char *comment, int require_keys, const char *engine_id, const char *cmdname, const char *algo_name, struct image_summary *summary) argument
[all...]
H A Dimagetool.h79 const char *keydir; /* Directory holding private keys */ member in struct:image_tool_params
H A Dsunxi_toc0.c707 if (params->keydir) {
708 if (asprintf(&fw_key_file, "%s/%s", params->keydir, fw_key_file) < 0)
710 if (asprintf(&key_item_file, "%s/%s", params->keydir, key_item_file) < 0)
712 if (asprintf(&root_key_file, "%s/%s", params->keydir, root_key_file) < 0)
H A Dfit_image.c65 ret = fit_pre_load_data(params->keydir, dest_blob, ptr);
68 ret = fit_cipher_data(params->keydir, dest_blob, ptr,
76 ret = fit_add_verification_data(params->keydir,
H A Dkwbimage.c460 static int kwb_load_rsa_key(const char *keydir, const char *name, RSA **p_rsa) argument
466 if (!keydir)
467 keydir = ".";
469 snprintf(path, sizeof(path), "%s/%s.key", keydir, name);
505 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key);
H A Dmkimage.c120 "Signing / verified boot options: [-k keydir] [-K dtb] [ -c <comment>] [-p addr] [-r] [-N engine]\n"
298 params.keydir = optarg;
/u-boot/lib/rsa/
H A Drsa-sign.c38 * @keydir: Directory containins the key
43 static int rsa_pem_get_pub_key(const char *keydir, const char *name, EVP_PKEY **evpp) argument
55 snprintf(path, sizeof(path), "%s/%s.crt", keydir, name);
95 * @keydir: Key prefix
101 static int rsa_engine_get_pub_key(const char *keydir, const char *name, argument
118 if (keydir) {
119 // Check for legacy keydir spec and prepend
120 if (strncmp(pkcs11_schema, keydir, strlen(pkcs11_schema))) {
125 if (strstr(keydir, "object="))
128 pkcs11_uri_prepend, keydir);
170 rsa_get_pub_key(const char *keydir, const char *name, ENGINE *engine, EVP_PKEY **evpp) argument
186 rsa_pem_get_priv_key(const char *keydir, const char *name, const char *keyfile, EVP_PKEY **evpp) argument
229 rsa_engine_get_priv_key(const char *keydir, const char *name, const char *keyfile, ENGINE *engine, EVP_PKEY **evpp) argument
306 rsa_get_priv_key(const char *keydir, const char *name, const char *keyfile, ENGINE *engine, EVP_PKEY **evpp) argument
[all...]
/u-boot/lib/ecdsa/
H A Decdsa-libcrypto.c166 } else if (info->keydir && info->keyname) {
167 snprintf(kname, sizeof(kname), "%s/%s.pem", info->keydir,
/u-boot/include/
H A Dimage.h1266 * @keydir: Directory containing keys
1274 int fit_pre_load_data(const char *keydir, void *keydest, void *fit);
1276 int fit_cipher_data(const char *keydir, void *keydest, void *fit,
1302 * @keydir: Directory containing keys
1322 int fit_add_verification_data(const char *keydir, const char *keyfile,
1492 * Either 'keydir', 'keyname', or 'keyfile' can be NULL. However, either
1493 * 'keyfile', or both 'keydir' and 'keyname' should have valid values. If
1497 const char *keydir; /* Directory conaining keys */ member in struct:image_sign_info
1776 const char *keydir; /* Directory containing keys */ member in struct:image_cipher_info

Completed in 102 milliseconds