Home
last modified time | relevance | path

Searched full:signature (Results 1 – 25 of 786) sorted by relevance

12345678910>>...32

/openbmc/sdbusplus/include/sdbusplus/
H A Dvtable.hpp22 * @param[in] signature - Signature of method.
23 * @param[in] result - Signature of result.
27 constexpr vtable_t method(const char* member, const char* signature,
34 * @param[in] signature - Signature of method.
35 * @param[in] result - Signature of result.
40 constexpr vtable_t method_o(const char* member, const char* signature,
48 * @param[in] signature - Signature of signal.
51 constexpr vtable_t signal(const char* member, const char* signature,
57 * @param[in] signature - Signature of signal.
61 constexpr vtable_t property(const char* member, const char* signature,
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DSignature_v1.xml4 <!--# Redfish Schema: Signature v1.0.3 -->
29 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature">
33 <EntityType Name="Signature" BaseType="Resource.v1_0_0.Resource" Abstract="true">
34 …<Annotation Term="OData.Description" String="The `Signature` schema describes a signature or a has…
35 …<Annotation Term="OData.LongDescription" String="This resource contains a signature for a Redfish …
63 … <Annotation Term="OData.Description" String="A signature defined in the UEFI Specification."/>
69 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Signature.v1_0_0">
73 <EntityType Name="Signature" BaseType="Signature.Signature">
74 <Property Name="SignatureTypeRegistry" Type="Signature.SignatureTypeRegistry">
76 <Annotation Term="OData.Description" String="The type of the signature."/>
[all …]
/openbmc/openpower-hw-diags/analyzer/ras-data/
H A Dras-data-parser.hpp24 /** Define all RAS data flags that may be associated with a signature */
48 * signature.
49 * @param i_signature The target error signature.
52 const libhei::Signature& i_signature);
55 * @brief Initializes the signature list within the input isolation data
57 * @param i_signature The target error signature.
59 * @return True if the flag is set for the given signature, else false.
61 bool isFlagSet(const libhei::Signature& i_signature,
66 * input signature.
67 * @param i_signature The target error signature.
[all …]
/openbmc/openpower-pnor-code-mgmt/
H A Dimage_verify.hpp108 /** @class Signature
109 * @brief Contains signature verification functions.
110 * @details The software image class that contains the signature
113 class Signature class
116 Signature() = delete;
117 Signature(const Signature&) = delete;
118 Signature& operator=(const Signature&) = delete;
119 Signature(Signature&&) = default;
120 Signature& operator=(Signature&&) = default;
121 ~Signature() = default;
[all …]
H A Dimage_verify.cpp34 Signature::Signature(const std::filesystem::path& imageDirPath, in Signature() function in openpower::software::image::Signature
48 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem()
83 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames()
91 bool Signature::verify() in verify()
99 log<level::ERR>("System level Signature Validation failed"); in verify()
111 // Build Signature File name in verify()
116 // Verify the signature. in verify()
120 log<level::ERR>("Image file Signature Validation failed", in verify()
125 log<level::DEBUG>("Successfully completed Signature validation."); in verify()
140 bool Signature::systemLevelVerify() in systemLevelVerify()
[all …]
/openbmc/phosphor-bmc-code-mgmt/bmc/
H A Dimage_verify.hpp113 /** @class Signature
114 * @brief Contains signature verification functions.
115 * @details The software image class that contains the signature
118 class Signature class
121 Signature() = delete;
122 Signature(const Signature&) = delete;
123 Signature& operator=(const Signature&) = delete;
124 Signature(Signature&&) = default;
125 Signature& operator=(Signature&&) = default;
126 ~Signature() = default;
[all …]
H A Dimage_verify.cpp39 Signature::Signature(const fs::path& imageDirPath, in Signature() function in phosphor::software::image::Signature
55 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const in getAvailableKeyTypesFromSystem()
91 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const in getKeyHashFileNames()
99 bool Signature::verifyFullImage() in verifyFullImage()
142 bool Signature::verify() in verify()
151 error("System level Signature Validation failed"); in verify()
197 // Build Signature File name in verify()
201 // Verify the signature. in verify()
206 error("Image file Signature Validation failed on {IMAGE}", in verify()
215 error("Image full file Signature Validation failed"); in verify()
[all …]
/openbmc/sdbusplus/test/message/
H A Dnative_types.cpp12 /* Suite tests that object_path and signature can be cleanly converted to
25 TEST(MessageNativeTypeConversions, Signature) in TEST() argument
27 std::string s2 = sdbusplus::message::signature("iii"); in TEST()
28 sdbusplus::message::signature sig = s2; in TEST()
36 std::vector<sdbusplus::message::signature> v = { in TEST()
37 sdbusplus::message::signature("iii")}; in TEST()
44 std::map<sdbusplus::message::signature, int> m = { in TEST()
45 {sdbusplus::message::signature("iii"), 1}}; in TEST()
47 ASSERT_EQ(m[sdbusplus::message::signature("iii")], 1); in TEST()
52 std::unordered_map<sdbusplus::message::signature, int> u = { in TEST()
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DSignature.v1_0_3.json2 "$id": "http://redfish.dmtf.org/schemas/v1/Signature.v1_0_3.json",
3 "$ref": "#/definitions/Signature",
55 "Signature": { object
57 "description": "The `Signature` schema describes a signature or a hash.",
58 "longDescription": "This resource contains a signature for a Redfish implementation.",
116 "description": "The string for the signature.",
117signature, and the format shall follow the requirements specified by the value of the `SignatureTy…
125 "description": "The format of the signature.",
126 …"longDescription": "This property shall contain the format type for the signature. The format is …
136 … "$ref": "http://redfish.dmtf.org/schemas/v1/Signature.json#/definitions/SignatureTypeRegistry"
[all …]
/openbmc/qemu/block/
H A Dvhdx-endian.c37 h->signature = le32_to_cpu(h->signature); in vhdx_header_le_import()
56 new_h->signature = cpu_to_le32(orig_h->signature); in vhdx_header_le_export()
82 d->signature = le32_to_cpu(d->signature); in vhdx_log_desc_le_import()
91 d->signature = cpu_to_le32(d->signature); in vhdx_log_desc_le_export()
120 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_log_entry_hdr_le_import()
135 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_log_entry_hdr_le_export()
152 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_region_header_le_import()
161 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_region_header_le_export()
192 hdr->signature = le64_to_cpu(hdr->signature); in vhdx_metadata_header_le_import()
200 hdr->signature = cpu_to_le64(hdr->signature); in vhdx_metadata_header_le_export()
/openbmc/openpower-hw-diags/test/
H A Dtest-root-cause-filter.cpp17 libhei::Signature& o_rootCause,
52 // Checkstop signature on the proc in TEST()
57 libhei::Signature checkstopSig{procChip0, eqCoreFir, 0, 14, in TEST()
61 libhei::Signature reAttnSig{procChip0, mc_dstl_fir, 0, 1, in TEST()
64 // Root cause signature on the ocmb in TEST()
70 libhei::Signature ueSig{ocmbChip0, rdfFir, 0, 14, in TEST()
79 libhei::Signature rootCause; in TEST()
100 libhei::Signature ucsAttnSig{procChip0, mc_dstl_fir, 0, 0, in TEST()
115 libhei::Signature reSig{ocmbChip0, rdfFir, 0, 42, in TEST()
132 libhei::Signature fwInitChnlFail{odyChip0, srq_fir, 0, 46, in TEST()
[all …]
/openbmc/qemu/tests/qtest/
H A Dboot-sector.c20 #define SIGNATURE 0xdead macro
25 /* x86 boot sector code: write SIGNATURE into memory,
47 [0x06] = LOW(SIGNATURE),
48 [0x07] = HIGH(SIGNATURE),
69 /* For s390x, use a mini "kernel" with the appropriate signature */
82 0xa7, 0x48, LOW(SIGNATURE), HIGH(SIGNATURE), /* lhi r4,0xadde */
109 LOW(SIGNATURE), SIGNATURE_ADDR, in boot_sector_init()
110 HIGH(SIGNATURE), SIGNATURE_ADDR + 1); in boot_sector_init()
134 /* Loop until signature in memory is OK. */
139 uint16_t signature; in boot_sector_test() local
[all …]
/openbmc/openbmc/poky/bitbake/bin/
H A Dbitbake-diffsigs4 # BitBake task signature data dump and comparison utility
59 """ Find the most recent signature files for the specified PN/task """
70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1))
73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2))
120 help="find the signature data file for the last run of the specified task",
124 help="Signature file to dump. Not used when using -t/--task.",
132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)',
136 … help="find the signature data files for the last two runs of the specified task and compare them",
139 parser.add_argument("-s", "--signature",
144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us…
[all …]
H A Dbitbake-dumpsig4 # BitBake task signature data dump and comparison utility
59 """ Find the most recent signature files for the specified PN/task """
70 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig1))
73 … logger.error('No sigdata files found matching %s %s with signature %s' % (pn, taskname, sig2))
120 help="find the signature data file for the last run of the specified task",
124 help="Signature file to dump. Not used when using -t/--task.",
132 … help='Dump the last signature data instead of comparing (equivalent to using bitbake-dumpsig)',
136 … help="find the signature data files for the last two runs of the specified task and compare them",
139 parser.add_argument("-s", "--signature",
144 …help="First signature file to compare (or signature file to dump, if second not specified). Not us…
[all …]
/openbmc/u-boot/doc/uImage.FIT/
H A Dsignature.txt1 U-Boot FIT Signature Verification
10 The signature feature allows the hash to be signed with a private key such
25 - sign the hash with a private key to produce a signature
26 - store the resulting signature in the FIT
32 - extract the signature from the FIT
34 - verify (with the public key) that the extracted signature matches the
83 The following properties are required in the FIT's signature node(s) to
85 Signature nodes sit at the same level as hash nodes and are called
86 signature-1, signature-2, etc.
97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA)
[all …]
/openbmc/openpower-hw-diags/analyzer/
H A Dfilter-root-cause.cpp18 bool __lookForBits(const std::vector<libhei::Signature>& i_sigList, in __lookForBits()
19 libhei::Signature& o_rootCause, in __lookForBits()
60 bool __findPllUnlock(const std::vector<libhei::Signature>& i_list, in __findPllUnlock()
61 libhei::Signature& o_rootCause) in __findPllUnlock()
100 bool __findMemoryChannelFailure(const std::vector<libhei::Signature>& i_list, in __findMemoryChannelFailure()
101 libhei::Signature& o_rootCause, in __findMemoryChannelFailure()
173 // Will query if a signature is a potential system checkstop root cause.
176 bool __findCsRootCause(const libhei::Signature& i_signature, in __findCsRootCause()
179 // Check if the input signature has the CS_POSSIBLE or SUE_SOURCE flag set. in __findCsRootCause()
193 bool __findCsRootCause_RE(const std::vector<libhei::Signature>& i_list, in __findCsRootCause_RE()
[all …]
/openbmc/u-boot/board/samsung/arndale/
H A Darndale_spl.c9 #define SIGNATURE 0xdeadbeef macro
14 .signature = SIGNATURE,
42 if (machine_param.signature != SIGNATURE) { in spl_get_machine_params()
43 /* Will hang if SIGNATURE dont match */ in spl_get_machine_params()
/openbmc/u-boot/board/samsung/smdk5250/
H A Dsmdk5250_spl.c11 #define SIGNATURE 0xdeadbeef macro
16 .signature = SIGNATURE,
44 if (machine_param.signature != SIGNATURE) { in spl_get_machine_params()
45 /* Will hang if SIGNATURE dont match */ in spl_get_machine_params()
/openbmc/u-boot/board/samsung/smdk5420/
H A Dsmdk5420_spl.c11 #define SIGNATURE 0xdeadbeef macro
16 .signature = SIGNATURE,
44 if (machine_param.signature != SIGNATURE) { in spl_get_machine_params()
45 /* Will hang if SIGNATURE dont match */ in spl_get_machine_params()
/openbmc/u-boot/include/u-boot/
H A Drsa.h36 * sign() - calculate and return signature for given input data
41 * @sigp: Set to an allocated buffer holding the signature
44 * This computes input data signature according to selected algorithm.
45 * Resulting signature value is placed in an allocated buffer, the
47 * signature is returned via the sig_len pointer argument. The caller
86 * rsa_verify() - Verify a signature against some data
88 * Verify a RSA PKCS1.5 signature against an expected hash.
93 * @sig: Signature
94 * @sig_len: Number of bytes in signature
145 /* This is the maximum signature length that we support, in bits */
/openbmc/openpower-pnor-code-mgmt/test/
H A Dtest_signature.cpp85 signature = std::make_unique<Signature>(extractPath, "pnor.xz.squashfs", in SetUp()
92 std::unique_ptr<Signature> signature; member in SignatureTest
101 EXPECT_TRUE(signature->verify()); in TEST_F()
104 /** @brief Test failure scenario with corrupted signature file*/
110 EXPECT_FALSE(signature->verify()); in TEST_F()
119 EXPECT_FALSE(signature->verify()); in TEST_F()
128 EXPECT_FALSE(signature->verify()); in TEST_F()
136 EXPECT_FALSE(signature->verify()); in TEST_F()
/openbmc/google-misc/subprojects/libcr51sign/include/libcr51sign/
H A Dlibcr51sign.h168 // @func verify check that the signature is valid for given hashed data
171 // @param[in] scheme - type of signature, hash, etc.
172 // @param[in] sig - signature blob
173 // @param[in] sig_len - length of signature in bytes
241 // @func Trust key in the signature structure
243 // @param[in] scheme - signature scheme
244 // @param[in] signature_structure - signature structure
245 // @param[in] signature_structure_size - Size of signature structure in
248 // @return true: if the key in signature structure is trusted
249 // false: if the key in signature structure is not trusted
[all …]
H A Dlibcr51sign_support.h69 // @func verify check that the signature is valid for given hashed data
72 // @param[in] scheme - type of signature, hash, etc.
73 // @param[in] sig - signature blob
74 // @param[in] sig_len - length of signature in bytes
84 // @func verify the rsa signature with provided modulus and exponent.
87 // @param[in] scheme - type of signature, hash, etc.
91 // @param[in] sig - signature blob
92 // @param[in] sig_len - length of signature in bytes
/openbmc/libcper/sections/
H A Dcper-section-nvidia.c130 const char *signature = nvidia_error->Signature; in cper_section_nvidia_to_ir() local
131 add_untrusted_string(section_ir, "signature", signature, in cper_section_nvidia_to_ir()
132 strlen(signature)); in cper_section_nvidia_to_ir()
143 signature); in cper_section_nvidia_to_ir()
190 if (strncmp(nvidia_error->Signature, ip_signature, in cper_section_nvidia_to_ir()
212 //Signature. in ir_section_nvidia_to_cper()
213 strncpy(section_cper->Signature, in ir_section_nvidia_to_cper()
215 json_object_object_get(section, "signature")), in ir_section_nvidia_to_cper()
[all...]
/openbmc/u-boot/include/
H A Dfsl_validate.h16 /* Minimum and maximum size of RSA signature length in bits */
47 u32 psign; /* signature offset */
48 u32 sign_len; /* length of the signature in bytes */
85 * signature offset
86 * length of the signature
119 u32 psign; /* signature offset */
120 u32 sign_len; /* length of the signature in bytes */
229 * ESBC client Signature
230 * Encoded hash recovered from signature
245 u8 img_sign[KEY_SIZE_BYTES]; /* ESBC client signature */
[all …]

12345678910>>...32