| /rk3399_rockchip-uboot/lib/avb/libavb_atx/ |
| H A D | Kconfig | 2 bool "support vbmeta public key verify" 6 verify vbmeta public keys. 9 bool "support vbmeta public key verify for SPL" 13 verify vbmeta public keys. 16 bool "support vbmeta public key verify for TPL" 20 verify vbmeta public keys.
|
| /rk3399_rockchip-uboot/cmd/ |
| H A D | source.c | 44 int verify = 1; in source() local 46 int verify = env_get_yesno("verify"); in source() local 65 if (verify) { in source() 119 if (verify) { in source()
|
| H A D | ximg.c | 37 int verify; in do_imgextract() local 55 verify = env_get_yesno("verify"); in do_imgextract() 106 if (verify) { in do_imgextract() 156 if (verify) { in do_imgextract()
|
| H A D | md5sum.c | 81 int verify = 0; in do_md5sum() local 92 verify = 1; in do_md5sum() 106 if (!verify) { in do_md5sum()
|
| /rk3399_rockchip-uboot/common/ |
| H A D | image-sig.c | 75 .verify = rsa_verify, 82 .verify = rsa_verify, 90 .verify = padding_pkcs_15_verify, 95 .verify = padding_pss_verify, 252 if (info.crypto->verify(&info, ®ion, 1, fit_value, fit_value_len)) { in fit_image_check_sig() 433 if (info.crypto->verify(&info, region, count, fit_value, in fit_config_check_sig()
|
| H A D | bootm.c | 96 images.verify = env_get_yesno("verify"); in bootm_start() 835 static image_header_t *image_get_kernel(ulong img_addr, int verify) in image_get_kernel() argument 855 if (verify) { in image_get_kernel() 916 hdr = image_get_kernel(img_addr, images->verify); in boot_get_kernel() 976 if (android_image_get_kernel(buf, images->verify, in boot_get_kernel() 1014 images.verify = 1; in bootm_host_load_image()
|
| H A D | image.c | 44 int verify); 413 int verify) in image_get_ramdisk() argument 432 if (verify) { in image_get_ramdisk() 1051 images->verify); in boot_get_ramdisk()
|
| H A D | image-android.c | 210 int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify, in android_image_get_kernel() argument 715 int verify = 1; in android_image_separate() local 718 verify = mpb_post(3); in android_image_separate() 720 if (hdr->header_version < 3 && verify) { in android_image_separate()
|
| /rk3399_rockchip-uboot/lib/rsa/ |
| H A D | Makefile | 10 obj-$(CONFIG_$(SPL_)FIT_SIGNATURE) += rsa-verify.o rsa-checksum.o
|
| /rk3399_rockchip-uboot/doc/uImage.FIT/ |
| H A D | verified-boot.txt | 62 The public key from the signer allows us to verify and therefore trust 80 4. We use the master public key to verify the first-stage image. We then 81 use the secondary public key in the first-stage image to verify the second- 92 include hashes to verify images, so it is relatively straightforward to
|
| H A D | beaglebone_vboot.txt | 310 There is a test in test/vboot which uses U-Boot's sandbox build to verify that 422 Verifying Hash Integrity ... sha1,rsa2048:devrsa_verify_with_keynode: RSA failed to verify: -13 423 rsa_verify_with_keynode: RSA failed to verify: -13 425 Failed to verify required signature 'key-dev' 443 sha1,rsa2048:devrsa_verify_with_keynode: RSA failed to verify: -13 444 rsa_verify_with_keynode: RSA failed to verify: -13 446 Failed to verify required signature 'key-dev' 459 the private key that you signed with so that it can verify any kernels that 468 Now you have a special U-Boot image with the public key. It can verify can 484 can use to verify against it. These values are obtained from the public key [all …]
|
| H A D | signature.txt | 34 - verify (with the public key) that the extracted signature matches the 44 In principle any suitable algorithm can be used to sign and verify a hash. 134 In order to verify an image that has been signed with a public key we need to 155 verify those). 546 can verify an image but not actually boot it)
|
| /rk3399_rockchip-uboot/board/rockchip/evb_rk3328/ |
| H A D | README | 21 * load and verify ATF image 22 * load and verify U-Boot image
|
| /rk3399_rockchip-uboot/doc/ |
| H A D | README.esbc_validate | 21 used to verify signature. 36 verify the u-boot code, the subsequent chain of trust should also
|
| H A D | README.armada-secureboot | 18 The Armada's trusted boot framework enables the SoC to cryptographically verify 30 key from it, and verify its SHA-256 hash against a SHA-256 stored in a eFuse 33 verify its RSA signature (contained in the header block as well) using the 35 * Choose a code signing key, and use it to verify the header block (excluding 68 are used to sign and verify the secured header and the 71 to sign and verify the array of CSKs. 150 2) Load the secured header, and verify its checksum. 157 7) Load the binary image to the main memory and verify its checksum.
|
| H A D | README.POST | 415 This test will verify the CPU cache (L1 cache). The test will 427 This test will verify the following ALU instructions: 452 To verify these instructions the test will run them with 473 for result and so on. This will enable to verify all 499 register will be checked as well (using mfspr). To verify the bc 518 executing the instruction, the test will verify the contents of 524 the test will verify the value of the destination register and 540 To verify the data cache operation the following test scenarios will 592 To verify the instruction cache operation the following test 622 The memory test will verify RAM using sequential writes and reads [all …]
|
| H A D | README.android-fastboot-protocol | 118 "verify:%08x" Send a digital signature to verify the downloaded
|
| H A D | README.mxsimage | 163 The mxsimage can also verify and dump contents of an image. Use the following 164 syntax to verify and dump contents of an image:
|
| /rk3399_rockchip-uboot/scripts/ |
| H A D | setlocalversion | 47 head=`git rev-parse --verify --short HEAD 2>/dev/null`; then
|
| /rk3399_rockchip-uboot/include/ |
| H A D | image.h | 384 int verify; /* env_get("verify")[0] != 'n' */ member 1113 uint8_t arch, int verify); 1245 int (*verify)(struct image_sign_info *info, member 1252 int (*verify)(struct image_sign_info *info, member 1367 int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify,
|
| /rk3399_rockchip-uboot/board/rockchip/evb_rk3399/ |
| H A D | README | 24 * load and verify ATF image 25 * load and verify U-Boot image
|
| /rk3399_rockchip-uboot/lib/optee_clientApi/ |
| H A D | OpteeClientRkFs_v1.c | 538 struct rkss_file_verification *verify; in rkss_verify_ptable() local 544 verify = (struct rkss_file_verification *)(void *)vp; in rkss_verify_ptable() 546 if (verify->version != RKSS_VERSION_V1 in rkss_verify_ptable() 547 || verify->checkstr != RKSS_CHECK_STR) { in rkss_verify_ptable() 550 verify->checkstr = RKSS_CHECK_STR; in rkss_verify_ptable() 551 verify->version = RKSS_VERSION_V1; in rkss_verify_ptable()
|
| H A D | OpteeClientRkNewFs_v1.c | 530 struct rkss_file_verification *verify; in rkss_verify_ptable() local 536 verify = (struct rkss_file_verification *)(void *)vp; in rkss_verify_ptable() 538 if (verify->version != RKSS_VERSION_V1 in rkss_verify_ptable() 539 || verify->checkstr != RKSS_CHECK_STR) { in rkss_verify_ptable() 542 verify->checkstr = RKSS_CHECK_STR; in rkss_verify_ptable() 543 verify->version = RKSS_VERSION_V1; in rkss_verify_ptable()
|
| /rk3399_rockchip-uboot/arch/arm/mach-rockchip/ |
| H A D | fit.c | 141 bool verify) in fit_get_blob() argument 194 if (!verify) in fit_get_blob()
|
| /rk3399_rockchip-uboot/ |
| H A D | Kconfig | 49 $ git rev-parse --verify HEAD 294 bool "Enable hardware crypto for FIT image checksum and rsa verify" 297 Enable hardware crypto for FIT image checksum and rsa verify. 361 bool "Enable SPL hardware crypto for FIT image checksum and rsa verify" 364 Enable SPL hardware crypto for FIT image checksum and rsa verify.
|