/openbmc/u-boot/tools/binman/etype/ |
H A D | gbb.py | 58 self.hardware_id, self.keydir, self.bmpblk = self.GetEntryArgsOrProps( 82 keydir = tools.GetInputFilename(self.keydir) 86 '--rootkey=%s/root_key.vbpubk' % keydir, 87 '--recoverykey=%s/recovery_key.vbpubk' % keydir,
|
H A D | vblock.py | 42 (self.keydir, self.keyblock, self.signprivate, self.version, 65 prefix = self.keydir + '/'
|
/openbmc/u-boot/lib/rsa/ |
H A D | rsa-sign.c | 66 snprintf(path, sizeof(path), "%s/%s.crt", keydir, name); in rsa_pem_get_pub_key() 136 if (keydir) in rsa_engine_get_pub_key() 139 keydir, name); in rsa_engine_get_pub_key() 184 return rsa_engine_get_pub_key(keydir, name, engine, rsap); in rsa_get_pub_key() 185 return rsa_pem_get_pub_key(keydir, name, rsap); in rsa_get_pub_key() 204 snprintf(path, sizeof(path), "%s/%s.key", keydir, name); in rsa_pem_get_priv_key() 247 if (keydir) in rsa_engine_get_priv_key() 250 keydir, name); in rsa_engine_get_priv_key() 295 return rsa_engine_get_priv_key(keydir, name, engine, rsap); in rsa_get_priv_key() 296 return rsa_pem_get_priv_key(keydir, name, rsap); in rsa_get_priv_key() [all …]
|
/openbmc/u-boot/tools/ |
H A D | image-host.c | 155 const char *keydir, void *fit, const char *image_name, in fit_image_setup_sig() argument 172 info->keydir = keydir; in fit_image_setup_sig() 209 static int fit_image_process_sig(const char *keydir, void *keydest, in fit_image_process_sig() argument 222 if (fit_image_setup_sig(&info, keydir, fit, image_name, noffset, in fit_image_process_sig() 340 } else if (IMAGE_ENABLE_SIGN && keydir && in fit_image_add_verification_data() 343 ret = fit_image_process_sig(keydir, keydest, in fit_image_add_verification_data() 603 if (fit_image_setup_sig(&info, keydir, fit, conf_name, noffset, in fit_config_process_sig() 667 ret = fit_config_process_sig(keydir, keydest, in fit_config_add_verification_data() 702 ret = fit_image_add_verification_data(keydir, keydest, in fit_add_verification_data() 710 if (!IMAGE_ENABLE_SIGN || !keydir) in fit_add_verification_data() [all …]
|
H A D | imagetool.h | 65 const char *keydir; /* Directory holding private keys */ member
|
H A D | kwbimage.c | 389 static int kwb_load_rsa_key(const char *keydir, const char *name, RSA **p_rsa) in kwb_load_rsa_key() argument 395 if (!keydir) in kwb_load_rsa_key() 396 keydir = "."; in kwb_load_rsa_key() 398 snprintf(path, sizeof(path), "%s/%s.key", keydir, name); in kwb_load_rsa_key() 434 res = kwb_load_rsa_key(params->keydir, e_key->key_name, &key); in kwb_load_cfg_key()
|
H A D | mkimage.c | 216 params.keydir = optarg; in process_args()
|
H A D | fit_image.c | 60 ret = fit_add_verification_data(params->keydir, dest_blob, ptr, in fit_add_file_data()
|
/openbmc/u-boot/include/ |
H A D | image.h | 1057 int fit_add_verification_data(const char *keydir, void *keydest, void *fit, 1129 const char *keydir; /* Directory conaining keys */ member
|
/openbmc/u-boot/tools/binman/ |
H A D | README.entries | 130 - keydir: Directory containing the public keys to use 630 - keydir: Directory containing the public keys to use 631 - keyblock: Name of the key file to use (inside keydir) 632 - signprivate: Name of provide key file to use (inside keydir) 634 - kernelkey: Name of the kernel key to use (inside keydir)
|
/openbmc/openbmc/poky/meta/classes-recipe/ |
H A D | uboot-sign.bbclass | 14 # UBOOT_SIGN_KEYNAME = "dev" # keys name in keydir (eg. "dev.crt", "dev.key")
|
H A D | kernel-fitimage.bbclass | 105 # UBOOT_SIGN_IMG_KEYNAME = "dev2" # keys name in keydir (eg. "dev2.crt", "dev2.key")
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | signature.txt | 505 Use the portion of the signature token URL after "pkcs11:" as the keydir argument (-k) to mkimage b…
|