/openbmc/sdbusplus/include/sdbusplus/ |
H A D | vtable.hpp | 22 * @param[in] signature - Signature of method. 23 * @param[in] result - Signature of result. 27 constexpr vtable_t method(const char* member, const char* signature, 34 * @param[in] signature - Signature of method. 35 * @param[in] result - Signature of result. 40 constexpr vtable_t method_o(const char* member, const char* signature, 48 * @param[in] signature - Signature of signal. 51 constexpr vtable_t signal(const char* member, const char* signature, 57 * @param[in] signature - Signature of signal. 61 constexpr vtable_t property(const char* member, const char* signature, [all …]
|
/openbmc/linux/Documentation/arch/arm64/ |
H A D | acpi_object_usage.rst | 9 specification where the object is defined. If "Signature Reserved" is used, 10 the table signature (the first four bytes of the table) is the only portion 30 AEST Signature Reserved (signature == "AEST") 37 AGDI Signature Reserved (signature == "AGDI") 44 APMT Signature Reserved (signature == "APMT") 51 BERT Section 18.3 (signature == "BERT") 58 BOOT Signature Reserved (signature == "BOOT") 64 BGRT Section 5.2.22 (signature == "BGRT") 71 CEDT Signature Reserved (signature == "CEDT") 78 CPEP Section 5.2.18 (signature == "CPEP") [all …]
|
/openbmc/linux/tools/crypto/ccp/ |
H A D | dbc.c | 21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument 24 .auth_needed = !!signature, in get_nonce() 29 if (signature) in get_nonce() 30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce() 39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument 44 assert(signature); in set_uid() 47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid() 54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument 62 assert(signature); in process_param() 65 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param() [all …]
|
H A D | test_dbc.py | 36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" 142 get_nonce(self.d, self.signature) 148 set_uid(self.d, self.uid, self.signature) 154 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature) 160 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000) 173 set_uid(self.d, self.uid, self.signature) 177 get_nonce(self.d, self.signature) 193 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature) 194 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature) 198 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature) [all …]
|
H A D | dbc.py | 33 def get_nonce(device, signature): argument 37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature) 43 def set_uid(device, new_uid, signature): argument 44 if not signature: 45 raise ValueError("Signature required") 48 ret = lib.set_uid(device.fileno(), new_uid, signature) 54 def process_param(device, message, signature, data=None): argument 55 if not signature: 56 raise ValueError("Signature required") 60 sig = ctypes.create_string_buffer(signature, len(signature))
|
H A D | dbc_cli.py | 17 errno.EPERM: "Signature invalid", 50 parser.add_argument("--signature", help="File containing signature for command") 71 if args.signature: 72 if not os.path.exists(args.signature): 73 raise ValueError("Invalid signature file %s" % args.signature) 74 with open(args.signature, "rb") as f: 78 "Invalid signature length %d (expected %d)" % (len(sig), DBC_SIG_SIZE) 113 param, signature = process_param(d, messages[args.message], sig) 115 "Parameter: {par}, response signature {sig}".format( 117 sig=_pretty_buffer(bytes(signature)), [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | Signature_v1.xml | 4 <!--# Redfish Schema: Signature v1.0.3 --> 29 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature"> 33 <EntityType Name="Signature" BaseType="Resource.v1_0_0.Resource" Abstract="true"> 34 …<Annotation Term="OData.Description" String="The `Signature` schema describes a signature or a has… 35 …<Annotation Term="OData.LongDescription" String="This resource contains a signature for a Redfish … 63 … <Annotation Term="OData.Description" String="A signature defined in the UEFI Specification."/> 69 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature.v1_0_0"> 73 <EntityType Name="Signature" BaseType="Signature.Signature"> 74 <Property Name="SignatureTypeRegistry" Type="Signature.SignatureTypeRegistry"> 76 <Annotation Term="OData.Description" String="The type of the signature."/> [all …]
|
/openbmc/openpower-pnor-code-mgmt/ |
H A D | image_verify.hpp | 108 /** @class Signature 109 * @brief Contains signature verification functions. 110 * @details The software image class that contains the signature 113 class Signature class 116 Signature() = delete; 117 Signature(const Signature&) = delete; 118 Signature& operator=(const Signature&) = delete; 119 Signature(Signature&&) = default; 120 Signature& operator=(Signature&&) = default; 121 ~Signature() = default; [all …]
|
H A D | image_verify.cpp | 34 Signature::Signature(const std::filesystem::path& imageDirPath, in Signature() function in openpower::software::image::Signature 48 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem() 83 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames() 91 bool Signature::verify() in verify() 99 log<level::ERR>("System level Signature Validation failed"); in verify() 111 // Build Signature File name in verify() 116 // Verify the signature. in verify() 120 log<level::ERR>("Image file Signature Validation failed", in verify() 125 log<level::DEBUG>("Successfully completed Signature validation."); in verify() 140 bool Signature::systemLevelVerify() in systemLevelVerify() [all …]
|
/openbmc/openpower-hw-diags/analyzer/ras-data/ |
H A D | ras-data-parser.hpp | 24 /** Define all RAS data flags that may be associated with a signature */ 48 * signature. 49 * @param i_signature The target error signature. 52 getResolution(const libhei::Signature& i_signature); 55 * @brief Initializes the signature list within the input isolation data 57 * @param i_signature The target error signature. 59 * @return True if the flag is set for the given signature, else false. 61 bool isFlagSet(const libhei::Signature& i_signature, 66 * input signature. 67 * @param i_signature The target error signature. [all …]
|
/openbmc/phosphor-bmc-code-mgmt/bmc/ |
H A D | image_verify.hpp | 113 /** @class Signature 114 * @brief Contains signature verification functions. 115 * @details The software image class that contains the signature 118 class Signature class 121 Signature() = delete; 122 Signature(const Signature&) = delete; 123 Signature& operator=(const Signature&) = delete; 124 Signature(Signature&&) = default; 125 Signature& operator=(Signature&&) = default; 126 ~Signature() = default; [all …]
|
H A D | image_verify.cpp | 39 Signature::Signature(const fs::path& imageDirPath, in Signature() function in phosphor::software::image::Signature 55 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem() 91 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames() 99 bool Signature::verifyFullImage() in verifyFullImage() 142 bool Signature::verify() in verify() 151 error("System level Signature Validation failed"); in verify() 197 // Build Signature File name in verify() 201 // Verify the signature. in verify() 206 error("Image file Signature Validation failed on {IMAGE}", in verify() 215 error("Image full file Signature Validation failed"); in verify() [all …]
|
/openbmc/linux/drivers/net/wwan/iosm/ |
H A D | iosm_ipc_mux_codec.h | 37 /* ACBH: Signature of the Aggregated Command Block Header. */ 40 /* ADTH: Signature of the Aggregated Datagram Table Header. */ 43 /* ADBH: Signature of the Aggregated Data Block Header. */ 46 /* ADGH: Signature of the Datagram Header. */ 55 /* ADGH: Signature of the Datagram Header. */ 58 /* CMDH: Signature of the Command Header. */ 61 /* QLTH: Signature of the Queue Level Table */ 64 /* FCTH: Signature of the Flow Credit Table */ 90 * @signature: Signature of the Command Header. 101 __le32 signature; member [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | Signature.v1_0_3.json | 2 "$id": "http://redfish.dmtf.org/schemas/v1/Signature.v1_0_3.json", 3 "$ref": "#/definitions/Signature", 55 "Signature": { object 57 "description": "The `Signature` schema describes a signature or a hash.", 58 "longDescription": "This resource contains a signature for a Redfish implementation.", 116 "description": "The string for the signature.", 117 …signature, and the format shall follow the requirements specified by the value of the `SignatureTy… 125 "description": "The format of the signature.", 126 …"longDescription": "This property shall contain the format type for the signature. The format is … 136 … "$ref": "http://redfish.dmtf.org/schemas/v1/Signature.json#/definitions/SignatureTypeRegistry" [all …]
|
/openbmc/linux/Documentation/security/ |
H A D | digsig.rst | 2 Digital Signature Verification API 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 27 Public key and signature consist of header and MPIs:: 38 uint8_t version; /* signature format version */ 39 time_t timestamp; /* signature made */ 48 Signature header is used as an input to generate a signature. 49 Such approach insures that key or signature header could not be changed. 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key [all …]
|
/openbmc/sdbusplus/test/message/ |
H A D | native_types.cpp | 12 /* Suite tests that object_path and signature can be cleanly converted to 25 TEST(MessageNativeTypeConversions, Signature) in TEST() argument 27 std::string s2 = sdbusplus::message::signature("iii"); in TEST() 28 sdbusplus::message::signature sig = s2; in TEST() 36 std::vector<sdbusplus::message::signature> v = { in TEST() 37 sdbusplus::message::signature("iii")}; in TEST() 44 std::map<sdbusplus::message::signature, int> m = { in TEST() 45 {sdbusplus::message::signature("iii"), 1}}; in TEST() 47 ASSERT_EQ(m[sdbusplus::message::signature("iii")], 1); in TEST() 52 std::unordered_map<sdbusplus::message::signature, int> u = { in TEST() [all …]
|
/openbmc/qemu/block/ |
H A D | vhdx-endian.c | 37 h->signature = le32_to_cpu(h->signature); in vhdx_header_le_import() 56 new_h->signature = cpu_to_le32(orig_h->signature); in vhdx_header_le_export() 82 d->signature = le32_to_cpu(d->signature); in vhdx_log_desc_le_import() 91 d->signature = cpu_to_le32(d->signature); in vhdx_log_desc_le_export() 120 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_log_entry_hdr_le_import() 135 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_log_entry_hdr_le_export() 152 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_region_header_le_import() 161 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_region_header_le_export() 192 hdr->signature = le64_to_cpu(hdr->signature); in vhdx_metadata_header_le_import() 200 hdr->signature = cpu_to_le64(hdr->signature); in vhdx_metadata_header_le_export()
|
/openbmc/linux/fs/verity/ |
H A D | signature.c | 11 * signatures with fs-verity, and the alternatives (such as userspace signature 25 * If 1, all verity files must have a valid builtin signature. 38 * fsverity_verify_signature() - check a verity file's signature 40 * @signature: the file's built-in signature 41 * @sig_size: size of signature in bytes, or 0 if no signature 43 * If the file includes a signature of its fs-verity file digest, verify it 46 * Return: 0 on success (signature valid or not required); -errno on failure 49 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument 90 signature, sig_size, fsverity_keyring, in fsverity_verify_signature() 100 fsverity_err(inode, "Incorrect file signature"); in fsverity_verify_signature() [all …]
|
/openbmc/linux/tools/power/acpi/os_specific/service_layers/ |
H A D | oslinuxtbl.c | 22 char signature[ACPI_NAMESEG_SIZE]; member 31 osl_table_name_from_file(char *filename, char *signature, u32 *instance); 33 static acpi_status osl_add_table_to_list(char *signature, u32 instance); 42 char *signature, struct acpi_table_header **table); 57 char *signature, 65 osl_get_bios_table(char *signature, 203 * PARAMETERS: signature - ACPI Signature for desired table. Must be 212 * AE_NOT_FOUND: A table with the signature was not found 214 * NOTE: Assumes the input signature is uppercase. 219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument [all …]
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | signature.txt | 1 U-Boot FIT Signature Verification 10 The signature feature allows the hash to be signed with a private key such 25 - sign the hash with a private key to produce a signature 26 - store the resulting signature in the FIT 32 - extract the signature from the FIT 34 - verify (with the public key) that the extracted signature matches the 83 The following properties are required in the FIT's signature node(s) to 85 Signature nodes sit at the same level as hash nodes and are called 86 signature-1, signature-2, etc. 97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA) [all …]
|
/openbmc/linux/drivers/acpi/acpica/ |
H A D | tbfind.c | 21 * PARAMETERS: signature - String with ACPI table signature 29 * Signature, OEM ID and OEM Table ID. Returns an index that can 34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument 43 /* Validate the input table signature */ in acpi_tb_find_table() 45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table() 59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table() 67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table() 68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table() 75 /* Table with matching signature has been found */ in acpi_tb_find_table() 96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table() [all …]
|
/openbmc/linux/include/uapi/linux/ |
H A D | psp-dbc.h | 29 * @signature: Optional 32 byte signature created by software using a 35 __u8 signature[DBC_SIG_SIZE]; member 41 * @signature: 32 byte signature created by software using a previous nonce 45 __u8 signature[DBC_SIG_SIZE]; member 52 * @signature: 32 byte signature. 55 * - For interpreting results, this signature is updated by the 62 __u8 signature[DBC_SIG_SIZE]; member 81 * -EPERM: invalid signature 98 * 32 byte signature built using the nonce fetched from 110 * This command must be sent using a 32 byte signature built [all …]
|
/openbmc/linux/include/crypto/ |
H A D | sig.h | 3 * Public Key Signature Algorithm 23 * DOC: Generic Public Key Signature API 25 * The Public Key Signature API is used with the algorithms of type 30 * crypto_alloc_sig() - allocate signature tfm handle 36 * Allocate a handle for public key signature algorithm. The returned struct 38 * API invocation for signature operations. 51 * crypto_free_sig() - free signature tfm handle 53 * @tfm: signature tfm handle allocated with crypto_alloc_sig() 70 * @tfm: signature tfm handle allocated with crypto_alloc_sig() 79 * @tfm: signature tfm handle allocated with crypto_alloc_sig() [all …]
|
/openbmc/openbmc/poky/bitbake/bin/ |
H A D | bitbake-diffsigs | 4 # BitBake task signature data dump and comparison utility 59 """ Find the most recent signature files for the specified PN/task """ 70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1)) 73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2)) 120 help="find the signature data file for the last run of the specified task", 124 help="Signature file to dump. Not used when using -t/--task.", 132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)', 136 … help="find the signature data files for the last two runs of the specified task and compare them", 139 parser.add_argument("-s", "--signature", 144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us… [all …]
|
H A D | bitbake-dumpsig | 4 # BitBake task signature data dump and comparison utility 59 """ Find the most recent signature files for the specified PN/task """ 70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1)) 73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2)) 120 help="find the signature data file for the last run of the specified task", 124 help="Signature file to dump. Not used when using -t/--task.", 132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)', 136 … help="find the signature data files for the last two runs of the specified task and compare them", 139 parser.add_argument("-s", "--signature", 144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us… [all …]
|