/openbmc/linux/Documentation/devicetree/bindings/leds/ |
H A D | leds-el15203000.txt | 1 Crane Merchandising System - EL15203000 LED driver 2 -------------------------------------------------- 9 Vending area LED encoded with symbol 'V' (hex code 0x56). 13 encoded with symbol 'S' (hex code 0x53). Supports blinking breathing pattern. 15 Water Pipe LED encoded with symbol 'P' (hex code 0x50) and 18 - cascade pattern 19 - inversed cascade pattern 20 - bounce pattern 21 - inversed bounce pattern 24 - compatible : "crane,el15203000" [all …]
|
/openbmc/bmcweb/static/google/v1/schema/ |
H A D | RootOfTrust_v1.xml | 1 <?xml version="1.0" encoding="UTF-8"?> 2 <!----> 3 <!--################################################################################ --> 4 <!--# Redfish Schema: RootOfTrust v1.0.0 --> 5 <!--# --> 6 <!--# For a detailed change log, see the README file contained in the DSP8010 bundle, --> 7 <!--# available at http://www.dmtf.org/standards/redfish --> 8 <!--# Copyright 2014-2021 DMTF. --> 9 <!--# For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright --> 10 <!--################################################################################ --> [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/ |
H A D | MeasurementSet.interface.yaml | 5 - name: SPDMGetSignedMeasurements 11 - name: MeasurementIndices 17 - name: Nonce 20 A 32-byte hex-encoded string to be signed with the measurements. 23 - name: SlotId 30 - name: Certificate 35 - name: HashingAlgorithm 40 - name: PublicKey 43 A Privacy Enhanced Mail (PEM)-encoded public key that can be 45 - name: SignedMeasurements [all …]
|
/openbmc/linux/tools/perf/util/ |
H A D | demangle-ocaml.c | 1 // SPDX-License-Identifier: GPL-2.0 6 #include "demangle-ocaml.h" 13 /* mangled OCaml symbols start with "caml" followed by an upper-case letter */ 52 /* "__" -> "." */ in ocaml_demangle_sym() 57 /* "$xx" is a hex-encoded character */ in ocaml_demangle_sym() 58 result[j++] = (hex(sym[i + 1]) << 4) | hex(sym[i + 2]); in ocaml_demangle_sym()
|
/openbmc/u-boot/board/gdsys/common/ |
H A D | osd_cmd.c | 1 // SPDX-License-Identifier: GPL-2.0+ 61 dev->name); in do_osd_write() 94 printf("Could not print string to osd %s\n", dev->name); in do_osd_print() 122 printf("Could not set size on osd %s\n", dev->name); in do_osd_size() 132 "write 16-bit hex encoded buffer to osd memory", 133 "osdw [pos_x] [pos_y] [buffer] [count] - write 8-bit hex encoded buffer to osd memory\n" 139 "osdp [pos_x] [pos_y] [color] [text] - write ASCII buffer to osd memory\n" 145 "osdsize [size_x] [size_y] - set OSD XY size in characters\n"
|
/openbmc/u-boot/tools/gdb/ |
H A D | remote.c | 1 // SPDX-License-Identifier: GPL-2.0+ 5 * I am only interested in the write to memory stuff - everything else 84 int remote_desc = -1, remote_timeout = 10; 89 while (n-- > 0) in fputstrn_unfiltered() 105 /* Remote target communications for serial-line targets in custom GDB protocol 111 /* *INDENT-OFF* */ 123 CSUM1 and CSUM2 are ascii hex representation of an 8-bit 125 the hex digits 0-9,a-f are used. 129 + - if CSUM is correct and ready for next packet 130 - - if CSUM is incorrect [all …]
|
/openbmc/sdbusplus/src/message/ |
H A D | native_types.cpp | 15 constexpr std::array<char, 16> hex{'0', '1', '2', '3', '4', '5', '6', '7', variable 22 ret[i] = -1; in __anon685ec59d0102() 49 s.append(1, hex[(c >> 4) & 0xf]); in pathAppendEscape() 50 s.append(1, hex[c & 0xf]); in pathAppendEscape() 65 // If we don't see that this was encoded by sdbusplus, return the naive in filename() 87 if (ch == -1 || cl == -1) in filename() 123 if (!str.empty() && str[str.size() - 1] != '/') in operator /=()
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | AggregationSource.v1_4_3.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 34 "description": "The available OEM-specific actions for this resource.", 35 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 45 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 60 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/context" 63 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/etag" 66 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/id" 69 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/type" [all …]
|
H A D | ManagerAccount.v1_13_0.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 40 "description": "The available OEM-specific actions for this resource.", 41 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 60 …TTP Basic authentication, this parameter shall contain the same password encoded in the `Authoriza… 66 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 82 "format": "uri-reference", 95 …description": "This action clears the secret key for Time-based One-Time Password (TOTP) multi-fac… 96 …"This action shall clear the secret key for RFC6238-defined Time-based One-Time Password (TOTP) mu… [all …]
|
H A D | ComponentIntegrity.v1_3_0.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 34 "description": "The available OEM-specific actions for this resource.", 35 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 43 …"longDescription": "This object shall contain common identity-related authentication information.", 45 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 86 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 123 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 138 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/context" [all …]
|
H A D | Processor.v1_20_1.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 34 "description": "The available OEM-specific actions for this resource.", 35 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 57 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 95 …operties contained in this object shall conform to the Redfish Specification-described requirement… 106 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 177 …operties contained in this object shall conform to the Redfish Specification-described requirement… 214 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | AggregationSource.v1_4_3.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 34 "description": "The available OEM-specific actions for this resource.", 35 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 45 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 60 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/context" 63 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/etag" 66 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/id" 69 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/type" [all …]
|
H A D | ManagerAccount.v1_13_0.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 40 "description": "The available OEM-specific actions for this resource.", 41 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 60 …TTP Basic authentication, this parameter shall contain the same password encoded in the `Authoriza… 66 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 82 "format": "uri-reference", 95 …description": "This action clears the secret key for Time-based One-Time Password (TOTP) multi-fac… 96 …"This action shall clear the secret key for RFC6238-defined Time-based One-Time Password (TOTP) mu… [all …]
|
H A D | ComponentIntegrity.v1_3_0.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 34 "description": "The available OEM-specific actions for this resource.", 35 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 43 …"longDescription": "This object shall contain common identity-related authentication information.", 45 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 86 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 123 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 138 "$ref": "http://redfish.dmtf.org/schemas/v1/odata-v4.json#/definitions/context" [all …]
|
H A D | Processor.v1_20_1.json | 4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json", 5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or… 12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 34 "description": "The available OEM-specific actions for this resource.", 35 …"longDescription": "This property shall contain the available OEM-specific actions for this resour… 57 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 95 …operties contained in this object shall conform to the Redfish Specification-described requirement… 106 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { 177 …operties contained in this object shall conform to the Redfish Specification-described requirement… 214 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": { [all …]
|
/openbmc/openbmc/meta-quanta/meta-gbs/recipes-gbs/cpld-ver-check/files/ |
H A D | cpld_version.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 22 # Major/Minor: base vendor image version, encoded in register 0x0 of the CPLD 28 # e.g. reg[0] = 0x25 -> ver 2.5.0.0 38 # Parse the byte value from i2cget and sanity checks the hex format 46 # 0 if success, non-zero if failed to get the value or value is malformed 59 i2c_val_raw=$(i2cget -y "${i2c_bus_num}" "${i2c_bus_addr}" "${i2c_reg}") || return 61 # Verify that it is of format 0x[hex][hex]. 62 local HEXBYTE_RE='^0x[0-9A-Fa-f]{2}$' 84 # 0 if success, non-zero otherwise
|
/openbmc/openbmc/poky/meta/recipes-core/initrdscripts/initramfs-framework/ |
H A D | finish | 10 if [ -n "$ROOTFS_DIR" ]; then 11 if [ ! -d $ROOTFS_DIR/dev ]; then 15 # Unmount anything that was automounted by busybox via mdev-mount.sh. 18 # if it was set by setup-live, because it'll be mounted over loopback 22 if mountpoint -q "${dev}" && [ "${dev##*/}" != "${ROOT_DISK}" ]; then 23 umount -f "${dev}" || debug "Failed to unmount ${dev}" 31 # Parse any OCT or HEX encoded chars such as spaces 34 mkdir -p "${ROOTFS_DIR}/media/${dir##*/}" 35 mount -n --move "$dir" "${ROOTFS_DIR}/media/${dir##*/}" 39 mount --move /dev $ROOTFS_DIR/dev [all …]
|
/openbmc/phosphor-misc/http-redirect/ |
H A D | http-redirect.awk | 1 #!/usr/bin/awk -f 55 header = substr($0, 1, RSTART - 1) 113 if (version !~ /HTTP\/0*1[.][0-9]+$/) # Support leading 0s, two halves 140 else if (match(host, /:[0-9]*$/)) 143 host = substr(host, 1, RSTART - 1) 147 if (host !~ /^[0-9a-zA-Z.-]+$/) 181 # US ASCII (0-127) excluding CTL (000-037, 177, SP (040), seperators 182 if (match(token, /[^\041-\176]/) || 189 # unreserved, reserved, or encoded. 192 # hide encoded [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | ComponentIntegrity_v1.xml | 1 <?xml version="1.0" encoding="UTF-8"?> 2 <!----> 3 <!--################################################################################ --> 4 <!--# Redfish Schema: ComponentIntegrity v1.3.0 --> 5 <!--# --> 6 <!--# For a detailed change log, see the README file contained in the DSP8010 bundle, --> 7 <!--# available at http://www.dmtf.org/standards/redfish --> 8 <!--# Copyright 2014-2024 DMTF. --> 9 <!--# For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright --> 10 <!--################################################################################ --> [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/installed/ |
H A D | ComponentIntegrity_v1.xml | 1 <?xml version="1.0" encoding="UTF-8"?> 2 <!----> 3 <!--################################################################################ --> 4 <!--# Redfish Schema: ComponentIntegrity v1.3.0 --> 5 <!--# --> 6 <!--# For a detailed change log, see the README file contained in the DSP8010 bundle, --> 7 <!--# available at http://www.dmtf.org/standards/redfish --> 8 <!--# Copyright 2014-2024 DMTF. --> 9 <!--# For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright --> 10 <!--################################################################################ --> [all …]
|
H A D | PCIeFunction_v1.xml | 1 <?xml version="1.0" encoding="UTF-8"?> 2 <!----> 3 <!--################################################################################ --> 4 <!--# Redfish Schema: PCIeFunction v1.6.0 --> 5 <!--# --> 6 <!--# For a detailed change log, see the README file contained in the DSP8010 bundle, --> 7 <!--# available at http://www.dmtf.org/standards/redfish --> 8 <!--# Copyright 2014-2024 DMTF. --> 9 <!--# For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright --> 10 <!--################################################################################ --> [all …]
|
/openbmc/openbmc/meta-security/meta-integrity/classes/ |
H A D | ima-evm-rootfs.bbclass | 2 # set explicitly in a local.conf before activating ima-evm-rootfs. 4 # IMA_EVM_KEY_DIR = "${INTEGRITY_BASE}/data/debug-keys" 12 # --keyid <id> or --keyid-from-cert <filename>. 23 # Must be the absolute path to a der-encoded x509 CA certificate 24 # with a .x509 suffix. See linux-%.bbappend for details. 26 # ima-local-ca.x509 is what ima-gen-local-ca.sh creates. 27 IMA_EVM_ROOT_CA ?= "${IMA_EVM_KEY_DIR}/ima-local-ca.pem" 33 # Avoid re-generating fstab when ima is enabled. 34 WIC_CREATE_EXTRA_ARGS:append = "${@bb.utils.contains('DISTRO_FEATURES', 'ima', ' --no-fstab-update'… 37 IMAGE_INSTALL:append = "${@bb.utils.contains('DISTRO_FEATURES', 'ima', ' ima-evm-utils', '', d)}" [all …]
|
/openbmc/u-boot/cmd/ |
H A D | nvedit_efi.c | 1 // SPDX-License-Identifier: GPL-2.0+ 3 * Integrate UEFI variables to u-boot env interface 20 * Mapping between UEFI variables and u-boot variables: 37 * efi_dump_single_var() - show information about a UEFI variable 42 * Show information encoded in one UEFI variable 88 * efi_dump_vars() - show information about named UEFI variables 94 * Show information encoded in named UEFI variables 106 for (; argc > 0; argc--, argv++) { in efi_dump_vars() 131 * efi_dump_vars() - show information about all the UEFI variables 135 * Show information encoded in all the UEFI variables [all …]
|
/openbmc/u-boot/board/freescale/common/ |
H A D | fsl_validate.c | 1 // SPDX-License-Identifier: GPL-2.0+ 14 #include <u-boot/rsa-mod-exp.h> 34 /* This array contains DER value for SHA-256 */ 66 if (img->hdr.ie_flag & IE_FLAG_MASK) in check_ie() 82 u32 csf_hdr_addr = in_be32(&gur->scratchrw[0]); in get_csf_base_addr() 99 return -1; in get_csf_base_addr() 113 u32 csf_hdr_addr = in_be32(&gur->scratchrw[0]); in get_csf_base_addr() 117 return -1; in get_csf_base_addr() 129 /* For LS-CH3, the address of IE Table is in get_ie_info_addr() 133 *ie_addr = in_le32(&gur->scratchrw[SCRATCH_IE_HIGH_ADR - 1]); in get_ie_info_addr() [all …]
|
/openbmc/linux/security/keys/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 19 to five standard keyrings: UID-specific, GID-specific, session, 43 bool "Enable register of persistent per-UID keyrings" 46 This option provides a register of persistent per-UID keyrings, 53 LSMs gets to rule on which admin-level processes get to access the 77 generated and sealed by a trust source selected at kernel boot-time. 83 source "security/keys/trusted-keys/Kconfig" 100 key can be either a trusted-key or user-key type. Only encrypted 110 user-provided decrypted data. The decrypted data must be hex-ascii 111 encoded. [all …]
|