| /openbmc/sdbusplus/include/sdbusplus/ |
| H A D | vtable.hpp | 22 * @param[in] signature - Signature of method. 23 * @param[in] result - Signature of result. 27 constexpr vtable_t method(const char* member, const char* signature, 34 * @param[in] signature - Signature of method. 35 * @param[in] result - Signature of result. 40 constexpr vtable_t method_o(const char* member, const char* signature, 48 * @param[in] signature - Signature of signal. 51 constexpr vtable_t signal(const char* member, const char* signature, 57 * @param[in] signature - Signature of signal. 61 constexpr vtable_t property(const char* member, const char* signature, [all …]
|
| /openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
| H A D | Signature_v1.xml | 4 <!--# Redfish Schema: Signature v1.0.3 --> 29 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature"> 33 <EntityType Name="Signature" BaseType="Resource.v1_0_0.Resource" Abstract="true"> 34 …<Annotation Term="OData.Description" String="The `Signature` schema describes a signature or a has… 35 …<Annotation Term="OData.LongDescription" String="This resource contains a signature for a Redfish … 63 … <Annotation Term="OData.Description" String="A signature defined in the UEFI Specification."/> 69 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature.v1_0_0"> 73 <EntityType Name="Signature" BaseType="Signature.Signature"> 74 <Property Name="SignatureTypeRegistry" Type="Signature.SignatureTypeRegistry"> 76 <Annotation Term="OData.Description" String="The type of the signature."/> [all …]
|
| /openbmc/openpower-hw-diags/analyzer/ras-data/ |
| H A D | ras-data-parser.hpp | 24 /** Define all RAS data flags that may be associated with a signature */ 48 * signature. 49 * @param i_signature The target error signature. 52 const libhei::Signature& i_signature); 55 * @brief Initializes the signature list within the input isolation data 57 * @param i_signature The target error signature. 59 * @return True if the flag is set for the given signature, else false. 61 bool isFlagSet(const libhei::Signature& i_signature, 66 * input signature. 67 * @param i_signature The target error signature. [all …]
|
| /openbmc/openpower-pnor-code-mgmt/ |
| H A D | image_verify.hpp | 108 /** @class Signature 109 * @brief Contains signature verification functions. 110 * @details The software image class that contains the signature 113 class Signature class 116 Signature() = delete; 117 Signature(const Signature&) = delete; 118 Signature& operator=(const Signature&) = delete; 119 Signature(Signature&&) = default; 120 Signature& operator=(Signature&&) = default; 121 ~Signature() = default; [all …]
|
| H A D | image_verify.cpp | 34 Signature::Signature(const std::filesystem::path& imageDirPath, in Signature() function in openpower::software::image::Signature 48 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem() 83 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames() 91 bool Signature::verify() in verify() 99 log<level::ERR>("System level Signature Validation failed"); in verify() 111 // Build Signature File name in verify() 116 // Verify the signature. in verify() 120 log<level::ERR>("Image file Signature Validation failed", in verify() 125 log<level::DEBUG>("Successfully completed Signature validation."); in verify() 140 bool Signature::systemLevelVerify() in systemLevelVerify() [all …]
|
| /openbmc/phosphor-bmc-code-mgmt/bmc/ |
| H A D | image_verify.hpp | 113 /** @class Signature 114 * @brief Contains signature verification functions. 115 * @details The software image class that contains the signature 118 class Signature class 121 Signature() = delete; 122 Signature(const Signature&) = delete; 123 Signature& operator=(const Signature&) = delete; 124 Signature(Signature&&) = default; 125 Signature& operator=(Signature&&) = default; 126 ~Signature() = default; [all …]
|
| H A D | image_verify.cpp | 39 Signature::Signature(const fs::path& imageDirPath, in Signature() function in phosphor::software::image::Signature 55 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem() 91 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames() 99 bool Signature::verifyFullImage() in verifyFullImage() 142 bool Signature::verify() in verify() 151 error("System level Signature Validation failed"); in verify() 197 // Build Signature File name in verify() 201 // Verify the signature. in verify() 206 error("Image file Signature Validation failed on {IMAGE}", in verify() 215 error("Image full file Signature Validation failed"); in verify() [all …]
|
| /openbmc/sdbusplus/test/message/ |
| H A D | native_types.cpp | 12 /* Suite tests that object_path and signature can be cleanly converted to 25 TEST(MessageNativeTypeConversions, Signature) in TEST() argument 27 std::string s2 = sdbusplus::message::signature("iii"); in TEST() 28 sdbusplus::message::signature sig = s2; in TEST() 36 std::vector<sdbusplus::message::signature> v = { in TEST() 37 sdbusplus::message::signature("iii")}; in TEST() 44 std::map<sdbusplus::message::signature, int> m = { in TEST() 45 {sdbusplus::message::signature("iii"), 1}}; in TEST() 47 ASSERT_EQ(m[sdbusplus::message::signature("iii")], 1); in TEST() 52 std::unordered_map<sdbusplus::message::signature, int> u = { in TEST() [all …]
|
| /openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
| H A D | Signature.v1_0_3.json | 2 "$id": "http://redfish.dmtf.org/schemas/v1/Signature.v1_0_3.json", 3 "$ref": "#/definitions/Signature", 55 "Signature": { object 57 "description": "The `Signature` schema describes a signature or a hash.", 58 "longDescription": "This resource contains a signature for a Redfish implementation.", 116 "description": "The string for the signature.", 117 …signature, and the format shall follow the requirements specified by the value of the `SignatureTy… 125 "description": "The format of the signature.", 126 …"longDescription": "This property shall contain the format type for the signature. The format is … 136 … "$ref": "http://redfish.dmtf.org/schemas/v1/Signature.json#/definitions/SignatureTypeRegistry" [all …]
|
| /openbmc/qemu/block/ |
| H A D | vhdx-endian.c | 37 h->signature = le32_to_cpu(h->signature); in vhdx_header_le_import() 56 new_h->signature = cpu_to_le32(orig_h->signature); in vhdx_header_le_export() 82 d->signature = le32_to_cpu(d->signature); in vhdx_log_desc_le_import() 91 d->signature = cpu_to_le32(d->signature); in vhdx_log_desc_le_export() 120 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_log_entry_hdr_le_import() 135 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_log_entry_hdr_le_export() 152 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_region_header_le_import() 161 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_region_header_le_export() 192 hdr->signature = le64_to_cpu(hdr->signature); in vhdx_metadata_header_le_import() 200 hdr->signature = cpu_to_le64(hdr->signature); in vhdx_metadata_header_le_export()
|
| /openbmc/openpower-hw-diags/test/ |
| H A D | test-root-cause-filter.cpp | 17 libhei::Signature& o_rootCause, 52 // Checkstop signature on the proc in TEST() 57 libhei::Signature checkstopSig{procChip0, eqCoreFir, 0, 14, in TEST() 61 libhei::Signature reAttnSig{procChip0, mc_dstl_fir, 0, 1, in TEST() 64 // Root cause signature on the ocmb in TEST() 70 libhei::Signature ueSig{ocmbChip0, rdfFir, 0, 14, in TEST() 79 libhei::Signature rootCause; in TEST() 100 libhei::Signature ucsAttnSig{procChip0, mc_dstl_fir, 0, 0, in TEST() 115 libhei::Signature reSig{ocmbChip0, rdfFir, 0, 42, in TEST() 132 libhei::Signature fwInitChnlFail{odyChip0, srq_fir, 0, 46, in TEST() [all …]
|
| /openbmc/qemu/tests/qtest/ |
| H A D | boot-sector.c | 20 #define SIGNATURE 0xdead macro 25 /* x86 boot sector code: write SIGNATURE into memory, 47 [0x06] = LOW(SIGNATURE), 48 [0x07] = HIGH(SIGNATURE), 69 /* For s390x, use a mini "kernel" with the appropriate signature */ 82 0xa7, 0x48, LOW(SIGNATURE), HIGH(SIGNATURE), /* lhi r4,0xadde */ 109 LOW(SIGNATURE), SIGNATURE_ADDR, in boot_sector_init() 110 HIGH(SIGNATURE), SIGNATURE_ADDR + 1); in boot_sector_init() 134 /* Loop until signature in memory is OK. */ 139 uint16_t signature; in boot_sector_test() local [all …]
|
| /openbmc/openbmc/poky/bitbake/bin/ |
| H A D | bitbake-diffsigs | 4 # BitBake task signature data dump and comparison utility 59 """ Find the most recent signature files for the specified PN/task """ 70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1)) 73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2)) 120 help="find the signature data file for the last run of the specified task", 124 help="Signature file to dump. Not used when using -t/--task.", 132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)', 136 … help="find the signature data files for the last two runs of the specified task and compare them", 139 parser.add_argument("-s", "--signature", 144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us… [all …]
|
| H A D | bitbake-dumpsig | 4 # BitBake task signature data dump and comparison utility 59 """ Find the most recent signature files for the specified PN/task """ 70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1)) 73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2)) 120 help="find the signature data file for the last run of the specified task", 124 help="Signature file to dump. Not used when using -t/--task.", 132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)', 136 … help="find the signature data files for the last two runs of the specified task and compare them", 139 parser.add_argument("-s", "--signature", 144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us… [all …]
|
| /openbmc/u-boot/doc/uImage.FIT/ |
| H A D | signature.txt | 1 U-Boot FIT Signature Verification 10 The signature feature allows the hash to be signed with a private key such 25 - sign the hash with a private key to produce a signature 26 - store the resulting signature in the FIT 32 - extract the signature from the FIT 34 - verify (with the public key) that the extracted signature matches the 83 The following properties are required in the FIT's signature node(s) to 85 Signature nodes sit at the same level as hash nodes and are called 86 signature-1, signature-2, etc. 97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA) [all …]
|
| /openbmc/openpower-hw-diags/analyzer/ |
| H A D | filter-root-cause.cpp | 18 bool __lookForBits(const std::vector<libhei::Signature>& i_sigList, in __lookForBits() 19 libhei::Signature& o_rootCause, in __lookForBits() 60 bool __findPllUnlock(const std::vector<libhei::Signature>& i_list, in __findPllUnlock() 61 libhei::Signature& o_rootCause) in __findPllUnlock() 100 bool __findMemoryChannelFailure(const std::vector<libhei::Signature>& i_list, in __findMemoryChannelFailure() 101 libhei::Signature& o_rootCause, in __findMemoryChannelFailure() 173 // Will query if a signature is a potential system checkstop root cause. 176 bool __findCsRootCause(const libhei::Signature& i_signature, in __findCsRootCause() 179 // Check if the input signature has the CS_POSSIBLE or SUE_SOURCE flag set. in __findCsRootCause() 193 bool __findCsRootCause_RE(const std::vector<libhei::Signature>& i_list, in __findCsRootCause_RE() [all …]
|
| /openbmc/u-boot/board/samsung/arndale/ |
| H A D | arndale_spl.c | 9 #define SIGNATURE 0xdeadbeef macro 14 .signature = SIGNATURE, 42 if (machine_param.signature != SIGNATURE) { in spl_get_machine_params() 43 /* Will hang if SIGNATURE dont match */ in spl_get_machine_params()
|
| /openbmc/u-boot/board/samsung/smdk5250/ |
| H A D | smdk5250_spl.c | 11 #define SIGNATURE 0xdeadbeef macro 16 .signature = SIGNATURE, 44 if (machine_param.signature != SIGNATURE) { in spl_get_machine_params() 45 /* Will hang if SIGNATURE dont match */ in spl_get_machine_params()
|
| /openbmc/u-boot/board/samsung/smdk5420/ |
| H A D | smdk5420_spl.c | 11 #define SIGNATURE 0xdeadbeef macro 16 .signature = SIGNATURE, 44 if (machine_param.signature != SIGNATURE) { in spl_get_machine_params() 45 /* Will hang if SIGNATURE dont match */ in spl_get_machine_params()
|
| /openbmc/u-boot/include/u-boot/ |
| H A D | rsa.h | 36 * sign() - calculate and return signature for given input data 41 * @sigp: Set to an allocated buffer holding the signature 44 * This computes input data signature according to selected algorithm. 45 * Resulting signature value is placed in an allocated buffer, the 47 * signature is returned via the sig_len pointer argument. The caller 86 * rsa_verify() - Verify a signature against some data 88 * Verify a RSA PKCS1.5 signature against an expected hash. 93 * @sig: Signature 94 * @sig_len: Number of bytes in signature 145 /* This is the maximum signature length that we support, in bits */
|
| /openbmc/openpower-pnor-code-mgmt/test/ |
| H A D | test_signature.cpp | 85 signature = std::make_unique<Signature>(extractPath, "pnor.xz.squashfs", in SetUp() 92 std::unique_ptr<Signature> signature; member in SignatureTest 101 EXPECT_TRUE(signature->verify()); in TEST_F() 104 /** @brief Test failure scenario with corrupted signature file*/ 110 EXPECT_FALSE(signature->verify()); in TEST_F() 119 EXPECT_FALSE(signature->verify()); in TEST_F() 128 EXPECT_FALSE(signature->verify()); in TEST_F() 136 EXPECT_FALSE(signature->verify()); in TEST_F()
|
| /openbmc/google-misc/subprojects/libcr51sign/include/libcr51sign/ |
| H A D | libcr51sign.h | 168 // @func verify check that the signature is valid for given hashed data 171 // @param[in] scheme - type of signature, hash, etc. 172 // @param[in] sig - signature blob 173 // @param[in] sig_len - length of signature in bytes 241 // @func Trust key in the signature structure 243 // @param[in] scheme - signature scheme 244 // @param[in] signature_structure - signature structure 245 // @param[in] signature_structure_size - Size of signature structure in 248 // @return true: if the key in signature structure is trusted 249 // false: if the key in signature structure is not trusted [all …]
|
| H A D | libcr51sign_support.h | 69 // @func verify check that the signature is valid for given hashed data 72 // @param[in] scheme - type of signature, hash, etc. 73 // @param[in] sig - signature blob 74 // @param[in] sig_len - length of signature in bytes 84 // @func verify the rsa signature with provided modulus and exponent. 87 // @param[in] scheme - type of signature, hash, etc. 91 // @param[in] sig - signature blob 92 // @param[in] sig_len - length of signature in bytes
|
| /openbmc/libcper/sections/ |
| H A D | cper-section-nvidia.c | 130 const char *signature = nvidia_error->Signature; in cper_section_nvidia_to_ir() local 131 add_untrusted_string(section_ir, "signature", signature, in cper_section_nvidia_to_ir() 132 strlen(signature)); in cper_section_nvidia_to_ir() 143 signature); in cper_section_nvidia_to_ir() 190 if (strncmp(nvidia_error->Signature, ip_signature, in cper_section_nvidia_to_ir() 212 //Signature. in ir_section_nvidia_to_cper() 213 strncpy(section_cper->Signature, in ir_section_nvidia_to_cper() 215 json_object_object_get(section, "signature")), in ir_section_nvidia_to_cper() [all...] |
| /openbmc/u-boot/include/ |
| H A D | fsl_validate.h | 16 /* Minimum and maximum size of RSA signature length in bits */ 47 u32 psign; /* signature offset */ 48 u32 sign_len; /* length of the signature in bytes */ 85 * signature offset 86 * length of the signature 119 u32 psign; /* signature offset */ 120 u32 sign_len; /* length of the signature in bytes */ 229 * ESBC client Signature 230 * Encoded hash recovered from signature 245 u8 img_sign[KEY_SIZE_BYTES]; /* ESBC client signature */ [all …]
|