Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 25 of 40) sorted by relevance

12

/rk3399_rockchip-uboot/lib/avb/libavb_atx/
H A DKconfig2 bool "support vbmeta public key verify"
6 verify vbmeta public keys.
9 bool "support vbmeta public key verify for SPL"
13 verify vbmeta public keys.
16 bool "support vbmeta public key verify for TPL"
20 verify vbmeta public keys.
/rk3399_rockchip-uboot/cmd/
H A Dsource.c44 int verify = 1; in source() local
46 int verify = env_get_yesno("verify"); in source() local
65 if (verify) { in source()
119 if (verify) { in source()
H A Dximg.c37 int verify; in do_imgextract() local
55 verify = env_get_yesno("verify"); in do_imgextract()
106 if (verify) { in do_imgextract()
156 if (verify) { in do_imgextract()
H A Dmd5sum.c81 int verify = 0; in do_md5sum() local
92 verify = 1; in do_md5sum()
106 if (!verify) { in do_md5sum()
/rk3399_rockchip-uboot/common/
H A Dimage-sig.c75 .verify = rsa_verify,
82 .verify = rsa_verify,
90 .verify = padding_pkcs_15_verify,
95 .verify = padding_pss_verify,
252 if (info.crypto->verify(&info, &region, 1, fit_value, fit_value_len)) { in fit_image_check_sig()
433 if (info.crypto->verify(&info, region, count, fit_value, in fit_config_check_sig()
H A Dbootm.c96 images.verify = env_get_yesno("verify"); in bootm_start()
835 static image_header_t *image_get_kernel(ulong img_addr, int verify) in image_get_kernel() argument
855 if (verify) { in image_get_kernel()
916 hdr = image_get_kernel(img_addr, images->verify); in boot_get_kernel()
976 if (android_image_get_kernel(buf, images->verify, in boot_get_kernel()
1014 images.verify = 1; in bootm_host_load_image()
H A Dimage.c44 int verify);
413 int verify) in image_get_ramdisk() argument
432 if (verify) { in image_get_ramdisk()
1051 images->verify); in boot_get_ramdisk()
H A Dimage-android.c210 int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify, in android_image_get_kernel() argument
715 int verify = 1; in android_image_separate() local
718 verify = mpb_post(3); in android_image_separate()
720 if (hdr->header_version < 3 && verify) { in android_image_separate()
/rk3399_rockchip-uboot/lib/rsa/
H A DMakefile10 obj-$(CONFIG_$(SPL_)FIT_SIGNATURE) += rsa-verify.o rsa-checksum.o
/rk3399_rockchip-uboot/doc/uImage.FIT/
H A Dverified-boot.txt62 The public key from the signer allows us to verify and therefore trust
80 4. We use the master public key to verify the first-stage image. We then
81 use the secondary public key in the first-stage image to verify the second-
92 include hashes to verify images, so it is relatively straightforward to
H A Dbeaglebone_vboot.txt310 There is a test in test/vboot which uses U-Boot's sandbox build to verify that
422 Verifying Hash Integrity ... sha1,rsa2048:devrsa_verify_with_keynode: RSA failed to verify: -13
423 rsa_verify_with_keynode: RSA failed to verify: -13
425 Failed to verify required signature 'key-dev'
443 sha1,rsa2048:devrsa_verify_with_keynode: RSA failed to verify: -13
444 rsa_verify_with_keynode: RSA failed to verify: -13
446 Failed to verify required signature 'key-dev'
459 the private key that you signed with so that it can verify any kernels that
468 Now you have a special U-Boot image with the public key. It can verify can
484 can use to verify against it. These values are obtained from the public key
[all …]
H A Dsignature.txt34 - verify (with the public key) that the extracted signature matches the
44 In principle any suitable algorithm can be used to sign and verify a hash.
134 In order to verify an image that has been signed with a public key we need to
155 verify those).
546 can verify an image but not actually boot it)
/rk3399_rockchip-uboot/board/rockchip/evb_rk3328/
H A DREADME21 * load and verify ATF image
22 * load and verify U-Boot image
/rk3399_rockchip-uboot/doc/
H A DREADME.esbc_validate21 used to verify signature.
36 verify the u-boot code, the subsequent chain of trust should also
H A DREADME.armada-secureboot18 The Armada's trusted boot framework enables the SoC to cryptographically verify
30 key from it, and verify its SHA-256 hash against a SHA-256 stored in a eFuse
33 verify its RSA signature (contained in the header block as well) using the
35 * Choose a code signing key, and use it to verify the header block (excluding
68 are used to sign and verify the secured header and the
71 to sign and verify the array of CSKs.
150 2) Load the secured header, and verify its checksum.
157 7) Load the binary image to the main memory and verify its checksum.
H A DREADME.POST415 This test will verify the CPU cache (L1 cache). The test will
427 This test will verify the following ALU instructions:
452 To verify these instructions the test will run them with
473 for result and so on. This will enable to verify all
499 register will be checked as well (using mfspr). To verify the bc
518 executing the instruction, the test will verify the contents of
524 the test will verify the value of the destination register and
540 To verify the data cache operation the following test scenarios will
592 To verify the instruction cache operation the following test
622 The memory test will verify RAM using sequential writes and reads
[all …]
H A DREADME.android-fastboot-protocol118 "verify:%08x" Send a digital signature to verify the downloaded
H A DREADME.mxsimage163 The mxsimage can also verify and dump contents of an image. Use the following
164 syntax to verify and dump contents of an image:
/rk3399_rockchip-uboot/scripts/
H A Dsetlocalversion47 head=`git rev-parse --verify --short HEAD 2>/dev/null`; then
/rk3399_rockchip-uboot/include/
H A Dimage.h384 int verify; /* env_get("verify")[0] != 'n' */ member
1113 uint8_t arch, int verify);
1245 int (*verify)(struct image_sign_info *info, member
1252 int (*verify)(struct image_sign_info *info, member
1367 int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify,
/rk3399_rockchip-uboot/board/rockchip/evb_rk3399/
H A DREADME24 * load and verify ATF image
25 * load and verify U-Boot image
/rk3399_rockchip-uboot/lib/optee_clientApi/
H A DOpteeClientRkFs_v1.c538 struct rkss_file_verification *verify; in rkss_verify_ptable() local
544 verify = (struct rkss_file_verification *)(void *)vp; in rkss_verify_ptable()
546 if (verify->version != RKSS_VERSION_V1 in rkss_verify_ptable()
547 || verify->checkstr != RKSS_CHECK_STR) { in rkss_verify_ptable()
550 verify->checkstr = RKSS_CHECK_STR; in rkss_verify_ptable()
551 verify->version = RKSS_VERSION_V1; in rkss_verify_ptable()
H A DOpteeClientRkNewFs_v1.c530 struct rkss_file_verification *verify; in rkss_verify_ptable() local
536 verify = (struct rkss_file_verification *)(void *)vp; in rkss_verify_ptable()
538 if (verify->version != RKSS_VERSION_V1 in rkss_verify_ptable()
539 || verify->checkstr != RKSS_CHECK_STR) { in rkss_verify_ptable()
542 verify->checkstr = RKSS_CHECK_STR; in rkss_verify_ptable()
543 verify->version = RKSS_VERSION_V1; in rkss_verify_ptable()
/rk3399_rockchip-uboot/arch/arm/mach-rockchip/
H A Dfit.c141 bool verify) in fit_get_blob() argument
194 if (!verify) in fit_get_blob()
/rk3399_rockchip-uboot/
H A DKconfig49 $ git rev-parse --verify HEAD
294 bool "Enable hardware crypto for FIT image checksum and rsa verify"
297 Enable hardware crypto for FIT image checksum and rsa verify.
361 bool "Enable SPL hardware crypto for FIT image checksum and rsa verify"
364 Enable SPL hardware crypto for FIT image checksum and rsa verify.

12