Home
last modified time | relevance | path

Searched full:signature (Results 1 – 25 of 1701) sorted by relevance

12345678910>>...69

/openbmc/sdbusplus/include/sdbusplus/
H A Dvtable.hpp22 * @param[in] signature - Signature of method.
23 * @param[in] result - Signature of result.
27 constexpr vtable_t method(const char* member, const char* signature,
34 * @param[in] signature - Signature of method.
35 * @param[in] result - Signature of result.
40 constexpr vtable_t method_o(const char* member, const char* signature,
48 * @param[in] signature - Signature of signal.
51 constexpr vtable_t signal(const char* member, const char* signature,
57 * @param[in] signature - Signature of signal.
61 constexpr vtable_t property(const char* member, const char* signature,
[all …]
/openbmc/linux/Documentation/arch/arm64/
H A Dacpi_object_usage.rst9 specification where the object is defined. If "Signature Reserved" is used,
10 the table signature (the first four bytes of the table) is the only portion
30 AEST Signature Reserved (signature == "AEST")
37 AGDI Signature Reserved (signature == "AGDI")
44 APMT Signature Reserved (signature == "APMT")
51 BERT Section 18.3 (signature == "BERT")
58 BOOT Signature Reserved (signature == "BOOT")
64 BGRT Section 5.2.22 (signature == "BGRT")
71 CEDT Signature Reserved (signature == "CEDT")
78 CPEP Section 5.2.18 (signature == "CPEP")
[all …]
/openbmc/linux/tools/crypto/ccp/
H A Ddbc.c21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument
24 .auth_needed = !!signature, in get_nonce()
29 if (signature) in get_nonce()
30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce()
39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument
44 assert(signature); in set_uid()
47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid()
54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument
62 assert(signature); in process_param()
65 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param()
[all …]
H A Dtest_dbc.py36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
142 get_nonce(self.d, self.signature)
148 set_uid(self.d, self.uid, self.signature)
154 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature)
160 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000)
173 set_uid(self.d, self.uid, self.signature)
177 get_nonce(self.d, self.signature)
193 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature)
194 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature)
198 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature)
[all …]
H A Ddbc.py33 def get_nonce(device, signature): argument
37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature)
43 def set_uid(device, new_uid, signature): argument
44 if not signature:
45 raise ValueError("Signature required")
48 ret = lib.set_uid(device.fileno(), new_uid, signature)
54 def process_param(device, message, signature, data=None): argument
55 if not signature:
56 raise ValueError("Signature required")
60 sig = ctypes.create_string_buffer(signature, len(signature))
H A Ddbc_cli.py17 errno.EPERM: "Signature invalid",
50 parser.add_argument("--signature", help="File containing signature for command")
71 if args.signature:
72 if not os.path.exists(args.signature):
73 raise ValueError("Invalid signature file %s" % args.signature)
74 with open(args.signature, "rb") as f:
78 "Invalid signature length %d (expected %d)" % (len(sig), DBC_SIG_SIZE)
113 param, signature = process_param(d, messages[args.message], sig)
115 "Parameter: {par}, response signature {sig}".format(
117 sig=_pretty_buffer(bytes(signature)),
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DSignature_v1.xml4 <!--# Redfish Schema: Signature v1.0.3 -->
29 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature">
33 <EntityType Name="Signature" BaseType="Resource.v1_0_0.Resource" Abstract="true">
34 …<Annotation Term="OData.Description" String="The `Signature` schema describes a signature or a has…
35 …<Annotation Term="OData.LongDescription" String="This resource contains a signature for a Redfish …
63 … <Annotation Term="OData.Description" String="A signature defined in the UEFI Specification."/>
69 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature.v1_0_0">
73 <EntityType Name="Signature" BaseType="Signature.Signature">
74 <Property Name="SignatureTypeRegistry" Type="Signature.SignatureTypeRegistry">
76 <Annotation Term="OData.Description" String="The type of the signature."/>
[all …]
/openbmc/openpower-pnor-code-mgmt/
H A Dimage_verify.hpp108 /** @class Signature
109 * @brief Contains signature verification functions.
110 * @details The software image class that contains the signature
113 class Signature class
116 Signature() = delete;
117 Signature(const Signature&) = delete;
118 Signature& operator=(const Signature&) = delete;
119 Signature(Signature&&) = default;
120 Signature& operator=(Signature&&) = default;
121 ~Signature() = default;
[all …]
H A Dimage_verify.cpp34 Signature::Signature(const std::filesystem::path& imageDirPath, in Signature() function in openpower::software::image::Signature
48 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem()
83 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames()
91 bool Signature::verify() in verify()
99 log<level::ERR>("System level Signature Validation failed"); in verify()
111 // Build Signature File name in verify()
116 // Verify the signature. in verify()
120 log<level::ERR>("Image file Signature Validation failed", in verify()
125 log<level::DEBUG>("Successfully completed Signature validation."); in verify()
140 bool Signature::systemLevelVerify() in systemLevelVerify()
[all …]
/openbmc/openpower-hw-diags/analyzer/ras-data/
H A Dras-data-parser.hpp24 /** Define all RAS data flags that may be associated with a signature */
48 * signature.
49 * @param i_signature The target error signature.
52 getResolution(const libhei::Signature& i_signature);
55 * @brief Initializes the signature list within the input isolation data
57 * @param i_signature The target error signature.
59 * @return True if the flag is set for the given signature, else false.
61 bool isFlagSet(const libhei::Signature& i_signature,
66 * input signature.
67 * @param i_signature The target error signature.
[all …]
/openbmc/phosphor-bmc-code-mgmt/bmc/
H A Dimage_verify.hpp113 /** @class Signature
114 * @brief Contains signature verification functions.
115 * @details The software image class that contains the signature
118 class Signature class
121 Signature() = delete;
122 Signature(const Signature&) = delete;
123 Signature& operator=(const Signature&) = delete;
124 Signature(Signature&&) = default;
125 Signature& operator=(Signature&&) = default;
126 ~Signature() = default;
[all …]
H A Dimage_verify.cpp39 Signature::Signature(const fs::path& imageDirPath, in Signature() function in phosphor::software::image::Signature
55 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem()
91 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames()
99 bool Signature::verifyFullImage() in verifyFullImage()
142 bool Signature::verify() in verify()
151 error("System level Signature Validation failed"); in verify()
197 // Build Signature File name in verify()
201 // Verify the signature. in verify()
206 error("Image file Signature Validation failed on {IMAGE}", in verify()
215 error("Image full file Signature Validation failed"); in verify()
[all …]
/openbmc/linux/drivers/net/wwan/iosm/
H A Diosm_ipc_mux_codec.h37 /* ACBH: Signature of the Aggregated Command Block Header. */
40 /* ADTH: Signature of the Aggregated Datagram Table Header. */
43 /* ADBH: Signature of the Aggregated Data Block Header. */
46 /* ADGH: Signature of the Datagram Header. */
55 /* ADGH: Signature of the Datagram Header. */
58 /* CMDH: Signature of the Command Header. */
61 /* QLTH: Signature of the Queue Level Table */
64 /* FCTH: Signature of the Flow Credit Table */
90 * @signature: Signature of the Command Header.
101 __le32 signature; member
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DSignature.v1_0_3.json2 "$id": "http://redfish.dmtf.org/schemas/v1/Signature.v1_0_3.json",
3 "$ref": "#/definitions/Signature",
55 "Signature": { object
57 "description": "The `Signature` schema describes a signature or a hash.",
58 "longDescription": "This resource contains a signature for a Redfish implementation.",
116 "description": "The string for the signature.",
117signature, and the format shall follow the requirements specified by the value of the `SignatureTy…
125 "description": "The format of the signature.",
126 …"longDescription": "This property shall contain the format type for the signature. The format is …
136 … "$ref": "http://redfish.dmtf.org/schemas/v1/Signature.json#/definitions/SignatureTypeRegistry"
[all …]
/openbmc/linux/Documentation/security/
H A Ddigsig.rst2 Digital Signature Verification API
19 Digital signature verification API provides a method to verify digital signature.
22 Digital signature verification is implemented using cut-down kernel port of
27 Public key and signature consist of header and MPIs::
38 uint8_t version; /* signature format version */
39 time_t timestamp; /* signature made */
48 Signature header is used as an input to generate a signature.
49 Such approach insures that key or signature header could not be changed.
58 digsig_verify() - digital signature verification with public key
62 * digsig_verify() - digital signature verification with public key
[all …]
/openbmc/sdbusplus/test/message/
H A Dnative_types.cpp12 /* Suite tests that object_path and signature can be cleanly converted to
25 TEST(MessageNativeTypeConversions, Signature) in TEST() argument
27 std::string s2 = sdbusplus::message::signature("iii"); in TEST()
28 sdbusplus::message::signature sig = s2; in TEST()
36 std::vector<sdbusplus::message::signature> v = { in TEST()
37 sdbusplus::message::signature("iii")}; in TEST()
44 std::map<sdbusplus::message::signature, int> m = { in TEST()
45 {sdbusplus::message::signature("iii"), 1}}; in TEST()
47 ASSERT_EQ(m[sdbusplus::message::signature("iii")], 1); in TEST()
52 std::unordered_map<sdbusplus::message::signature, int> u = { in TEST()
[all …]
/openbmc/qemu/block/
H A Dvhdx-endian.c37 h->signature = le32_to_cpu(h->signature); in vhdx_header_le_import()
56 new_h->signature = cpu_to_le32(orig_h->signature); in vhdx_header_le_export()
82 d->signature = le32_to_cpu(d->signature); in vhdx_log_desc_le_import()
91 d->signature = cpu_to_le32(d->signature); in vhdx_log_desc_le_export()
120 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_log_entry_hdr_le_import()
135 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_log_entry_hdr_le_export()
152 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_region_header_le_import()
161 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_region_header_le_export()
192 hdr->signature = le64_to_cpu(hdr->signature); in vhdx_metadata_header_le_import()
200 hdr->signature = cpu_to_le64(hdr->signature); in vhdx_metadata_header_le_export()
/openbmc/linux/fs/verity/
H A Dsignature.c11 * signatures with fs-verity, and the alternatives (such as userspace signature
25 * If 1, all verity files must have a valid builtin signature.
38 * fsverity_verify_signature() - check a verity file's signature
40 * @signature: the file's built-in signature
41 * @sig_size: size of signature in bytes, or 0 if no signature
43 * If the file includes a signature of its fs-verity file digest, verify it
46 * Return: 0 on success (signature valid or not required); -errno on failure
49 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
90 signature, sig_size, fsverity_keyring, in fsverity_verify_signature()
100 fsverity_err(inode, "Incorrect file signature"); in fsverity_verify_signature()
[all …]
/openbmc/linux/tools/power/acpi/os_specific/service_layers/
H A Doslinuxtbl.c22 char signature[ACPI_NAMESEG_SIZE]; member
31 osl_table_name_from_file(char *filename, char *signature, u32 *instance);
33 static acpi_status osl_add_table_to_list(char *signature, u32 instance);
42 char *signature, struct acpi_table_header **table);
57 char *signature,
65 osl_get_bios_table(char *signature,
203 * PARAMETERS: signature - ACPI Signature for desired table. Must be
212 * AE_NOT_FOUND: A table with the signature was not found
214 * NOTE: Assumes the input signature is uppercase.
219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument
[all …]
/openbmc/u-boot/doc/uImage.FIT/
H A Dsignature.txt1 U-Boot FIT Signature Verification
10 The signature feature allows the hash to be signed with a private key such
25 - sign the hash with a private key to produce a signature
26 - store the resulting signature in the FIT
32 - extract the signature from the FIT
34 - verify (with the public key) that the extracted signature matches the
83 The following properties are required in the FIT's signature node(s) to
85 Signature nodes sit at the same level as hash nodes and are called
86 signature-1, signature-2, etc.
97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA)
[all …]
/openbmc/linux/drivers/acpi/acpica/
H A Dtbfind.c21 * PARAMETERS: signature - String with ACPI table signature
29 * Signature, OEM ID and OEM Table ID. Returns an index that can
34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument
43 /* Validate the input table signature */ in acpi_tb_find_table()
45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table()
59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table()
67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table()
68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table()
75 /* Table with matching signature has been found */ in acpi_tb_find_table()
96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table()
[all …]
/openbmc/linux/include/uapi/linux/
H A Dpsp-dbc.h29 * @signature: Optional 32 byte signature created by software using a
35 __u8 signature[DBC_SIG_SIZE]; member
41 * @signature: 32 byte signature created by software using a previous nonce
45 __u8 signature[DBC_SIG_SIZE]; member
52 * @signature: 32 byte signature.
55 * - For interpreting results, this signature is updated by the
62 __u8 signature[DBC_SIG_SIZE]; member
81 * -EPERM: invalid signature
98 * 32 byte signature built using the nonce fetched from
110 * This command must be sent using a 32 byte signature built
[all …]
/openbmc/linux/include/crypto/
H A Dsig.h3 * Public Key Signature Algorithm
23 * DOC: Generic Public Key Signature API
25 * The Public Key Signature API is used with the algorithms of type
30 * crypto_alloc_sig() - allocate signature tfm handle
36 * Allocate a handle for public key signature algorithm. The returned struct
38 * API invocation for signature operations.
51 * crypto_free_sig() - free signature tfm handle
53 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
70 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
79 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
[all …]
/openbmc/openbmc/poky/bitbake/bin/
H A Dbitbake-diffsigs4 # BitBake task signature data dump and comparison utility
59 """ Find the most recent signature files for the specified PN/task """
70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1))
73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2))
120 help="find the signature data file for the last run of the specified task",
124 help="Signature file to dump. Not used when using -t/--task.",
132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)',
136 … help="find the signature data files for the last two runs of the specified task and compare them",
139 parser.add_argument("-s", "--signature",
144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us…
[all …]
H A Dbitbake-dumpsig4 # BitBake task signature data dump and comparison utility
59 """ Find the most recent signature files for the specified PN/task """
70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1))
73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2))
120 help="find the signature data file for the last run of the specified task",
124 help="Signature file to dump. Not used when using -t/--task.",
132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)',
136 … help="find the signature data files for the last two runs of the specified task and compare them",
139 parser.add_argument("-s", "--signature",
144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us…
[all …]

12345678910>>...69