/openbmc/sdbusplus/include/sdbusplus/ |
H A D | vtable.hpp | 22 * @param[in] signature - Signature of method. 23 * @param[in] result - Signature of result. 27 constexpr vtable_t method(const char* member, const char* signature, 34 * @param[in] signature - Signature of method. 35 * @param[in] result - Signature of result. 40 constexpr vtable_t method_o(const char* member, const char* signature, 48 * @param[in] signature - Signature of signal. 51 constexpr vtable_t signal(const char* member, const char* signature, 57 * @param[in] signature - Signature of signal. 61 constexpr vtable_t property(const char* member, const char* signature, [all …]
|
/openbmc/linux/Documentation/arch/arm64/ |
D | acpi_object_usage.rst |
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | Signature_v1.xml | 4 <!--# Redfish Schema: Signature v1.0.3 --> 29 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature"> 33 <EntityType Name="Signature" BaseType="Resource.v1_0_0.Resource" Abstract="true"> 34 …<Annotation Term="OData.Description" String="The `Signature` schema describes a signature or a has… 35 …<Annotation Term="OData.LongDescription" String="This resource contains a signature for a Redfish … 63 … <Annotation Term="OData.Description" String="A signature defined in the UEFI Specification."/> 69 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature.v1_0_0"> 73 <EntityType Name="Signature" BaseType="Signature.Signature"> 74 <Property Name="SignatureTypeRegistry" Type="Signature.SignatureTypeRegistry"> 76 <Annotation Term="OData.Description" String="The type of the signature."/> [all …]
|
/openbmc/openpower-hw-diags/analyzer/ras-data/ |
H A D | ras-data-parser.hpp | 24 /** Define all RAS data flags that may be associated with a signature */ 48 * signature. 49 * @param i_signature The target error signature. 52 const libhei::Signature& i_signature); 55 * @brief Initializes the signature list within the input isolation data 57 * @param i_signature The target error signature. 59 * @return True if the flag is set for the given signature, else false. 61 bool isFlagSet(const libhei::Signature& i_signature, 66 * input signature. 67 * @param i_signature The target error signature. [all …]
|
/openbmc/openpower-pnor-code-mgmt/ |
H A D | image_verify.hpp | 108 /** @class Signature 109 * @brief Contains signature verification functions. 110 * @details The software image class that contains the signature 113 class Signature class 116 Signature() = delete; 117 Signature(const Signature&) = delete; 118 Signature& operator=(const Signature&) = delete; 119 Signature(Signature&&) = default; 120 Signature& operator=(Signature&&) = default; 121 ~Signature() = default; [all …]
|
H A D | image_verify.cpp | 34 Signature::Signature(const std::filesystem::path& imageDirPath, in Signature() function in openpower::software::image::Signature 48 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem() 83 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames() 91 bool Signature::verify() in verify() 99 log<level::ERR>("System level Signature Validation failed"); in verify() 111 // Build Signature File name in verify() 116 // Verify the signature. in verify() 120 log<level::ERR>("Image file Signature Validation failed", in verify() 125 log<level::DEBUG>("Successfully completed Signature validation."); in verify() 140 bool Signature::systemLevelVerify() in systemLevelVerify() [all …]
|
/openbmc/phosphor-bmc-code-mgmt/bmc/ |
H A D | image_verify.hpp | 113 /** @class Signature 114 * @brief Contains signature verification functions. 115 * @details The software image class that contains the signature 118 class Signature class 121 Signature() = delete; 122 Signature(const Signature&) = delete; 123 Signature& operator=(const Signature&) = delete; 124 Signature(Signature&&) = default; 125 Signature& operator=(Signature&&) = default; 126 ~Signature() = default; [all …]
|
H A D | image_verify.cpp | 39 Signature::Signature(const fs::path& imageDirPath, in Signature() function in phosphor::software::image::Signature 55 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem() 91 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames() 99 bool Signature::verifyFullImage() in verifyFullImage() 142 bool Signature::verify() in verify() 151 error("System level Signature Validation failed"); in verify() 197 // Build Signature File name in verify() 201 // Verify the signature. in verify() 206 error("Image file Signature Validation failed on {IMAGE}", in verify() 215 error("Image full file Signature Validation failed"); in verify() [all …]
|
/openbmc/linux/Documentation/security/ |
D | digsig.rst |
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | Signature.v1_0_3.json | 2 "$id": "http://redfish.dmtf.org/schemas/v1/Signature.v1_0_3.json", 3 "$ref": "#/definitions/Signature", 55 "Signature": { object 57 "description": "The `Signature` schema describes a signature or a hash.", 58 "longDescription": "This resource contains a signature for a Redfish implementation.", 116 "description": "The string for the signature.", 117 …signature, and the format shall follow the requirements specified by the value of the `SignatureTy… 125 "description": "The format of the signature.", 126 …"longDescription": "This property shall contain the format type for the signature. The format is … 136 … "$ref": "http://redfish.dmtf.org/schemas/v1/Signature.json#/definitions/SignatureTypeRegistry" [all …]
|
/openbmc/linux/drivers/net/wwan/iosm/ |
D | iosm_ipc_mux_codec.h |
|
/openbmc/sdbusplus/test/message/ |
H A D | native_types.cpp | 12 /* Suite tests that object_path and signature can be cleanly converted to 25 TEST(MessageNativeTypeConversions, Signature) in TEST() argument 27 std::string s2 = sdbusplus::message::signature("iii"); in TEST() 28 sdbusplus::message::signature sig = s2; in TEST() 36 std::vector<sdbusplus::message::signature> v = { in TEST() 37 sdbusplus::message::signature("iii")}; in TEST() 44 std::map<sdbusplus::message::signature, int> m = { in TEST() 45 {sdbusplus::message::signature("iii"), 1}}; in TEST() 47 ASSERT_EQ(m[sdbusplus::message::signature("iii")], 1); in TEST() 52 std::unordered_map<sdbusplus::message::signature, int> u = { in TEST() [all …]
|
/openbmc/linux/tools/crypto/ccp/ |
D | dbc.py |
|
D | dbc_cli.py |
|
/openbmc/qemu/block/ |
H A D | vhdx-endian.c | 37 h->signature = le32_to_cpu(h->signature); in vhdx_header_le_import() 56 new_h->signature = cpu_to_le32(orig_h->signature); in vhdx_header_le_export() 82 d->signature = le32_to_cpu(d->signature); in vhdx_log_desc_le_import() 91 d->signature = cpu_to_le32(d->signature); in vhdx_log_desc_le_export() 120 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_log_entry_hdr_le_import() 135 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_log_entry_hdr_le_export() 152 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_region_header_le_import() 161 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_region_header_le_export() 192 hdr->signature = le64_to_cpu(hdr->signature); in vhdx_metadata_header_le_import() 200 hdr->signature = cpu_to_le64(hdr->signature); in vhdx_metadata_header_le_export()
|
/openbmc/linux/drivers/acpi/acpica/ |
D | tbfind.c |
|
/openbmc/linux/lib/ |
D | check_signature.c |
|
/openbmc/linux/tools/power/acpi/os_specific/service_layers/ |
D | oslinuxtbl.c |
|
/openbmc/linux/include/uapi/linux/ |
D | psp-dbc.h |
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | signature.txt | 1 U-Boot FIT Signature Verification 10 The signature feature allows the hash to be signed with a private key such 25 - sign the hash with a private key to produce a signature 26 - store the resulting signature in the FIT 32 - extract the signature from the FIT 34 - verify (with the public key) that the extracted signature matches the 83 The following properties are required in the FIT's signature node(s) to 85 Signature nodes sit at the same level as hash nodes and are called 86 signature-1, signature-2, etc. 97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA) [all …]
|
/openbmc/openpower-hw-diags/test/ |
H A D | test-root-cause-filter.cpp | 17 libhei::Signature& o_rootCause, 52 // Checkstop signature on the proc in TEST() 57 libhei::Signature checkstopSig{procChip0, eqCoreFir, 0, 14, in TEST() 61 libhei::Signature reAttnSig{procChip0, mc_dstl_fir, 0, 1, in TEST() 64 // Root cause signature on the ocmb in TEST() 70 libhei::Signature ueSig{ocmbChip0, rdfFir, 0, 14, in TEST() 79 libhei::Signature rootCause; in TEST() 100 libhei::Signature ucsAttnSig{procChip0, mc_dstl_fir, 0, 0, in TEST() 115 libhei::Signature reSig{ocmbChip0, rdfFir, 0, 42, in TEST() 132 libhei::Signature fwInitChnlFail{odyChip0, srq_fir, 0, 46, in TEST() [all …]
|
/openbmc/linux/tools/testing/selftests/kexec/ |
D | test_kexec_file_load.sh |
|
/openbmc/qemu/tests/qtest/ |
H A D | boot-sector.c | 20 #define SIGNATURE 0xdead macro 25 /* x86 boot sector code: write SIGNATURE into memory, 47 [0x06] = LOW(SIGNATURE), 48 [0x07] = HIGH(SIGNATURE), 69 /* For s390x, use a mini "kernel" with the appropriate signature */ 82 0xa7, 0x48, LOW(SIGNATURE), HIGH(SIGNATURE), /* lhi r4,0xadde */ 109 LOW(SIGNATURE), SIGNATURE_ADDR, in boot_sector_init() 110 HIGH(SIGNATURE), SIGNATURE_ADDR + 1); in boot_sector_init() 134 /* Loop until signature in memory is OK. */ 139 uint16_t signature; in boot_sector_test() local [all …]
|
/openbmc/openbmc/poky/bitbake/bin/ |
H A D | bitbake-diffsigs | 4 # BitBake task signature data dump and comparison utility 59 """ Find the most recent signature files for the specified PN/task """ 70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1)) 73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2)) 120 help="find the signature data file for the last run of the specified task", 124 help="Signature file to dump. Not used when using -t/--task.", 132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)', 136 … help="find the signature data files for the last two runs of the specified task and compare them", 139 parser.add_argument("-s", "--signature", 144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us… [all …]
|
H A D | bitbake-dumpsig | 4 # BitBake task signature data dump and comparison utility 59 """ Find the most recent signature files for the specified PN/task """ 70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1)) 73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2)) 120 help="find the signature data file for the last run of the specified task", 124 help="Signature file to dump. Not used when using -t/--task.", 132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)', 136 … help="find the signature data files for the last two runs of the specified task and compare them", 139 parser.add_argument("-s", "--signature", 144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us… [all …]
|