Home
last modified time | relevance | path

Searched full:integrity (Results 1 – 25 of 723) sorted by relevance

12345678910>>...29

/openbmc/linux/Documentation/block/
H A Ddata-integrity.rst2 Data Integrity
16 protocols (SBC Data Integrity Field, SCC protection proposal) as well
18 support for appending integrity metadata to an I/O. The integrity
29 DIF and the other integrity extensions is that the protection format
31 integrity of the I/O and reject it if corruption is detected. This
35 2. The Data Integrity Extensions
40 allow the operating system to interact with the integrity metadata
45 The SCSI Data Integrity Field works by appending 8 bytes of protection
46 information to each sector. The data + integrity metadata is stored
53 encouraged them to allow separation of the data and integrity metadata
[all …]
/openbmc/phosphor-net-ipmid/
H A Dintegrity_algo.hpp12 namespace integrity namespace
16 * @enum Integrity Algorithms
18 * The Integrity Algorithm Number specifies the algorithm used to generate the
21 * Integrity Algorithm is none the AuthCode value is not calculated and the
37 * Interface is the base class for the Integrity Algorithms.
38 * Unless otherwise specified, the integrity algorithm is applied to the packet
60 * @brief Verify the integrity data of the packet
69 * using integrity algorithm on the packet data, false otherwise
77 * @brief Generate integrity data for the outgoing IPMI packet
88 * @brief Check if the Integrity algorithm is supported
[all …]
H A Dintegrity_algo.cpp12 namespace integrity namespace
30 throw std::runtime_error("Generating integrity data failed"); in generateHMAC()
34 // AuthCode field length is based on the integrity algorithm. So we are in generateHMAC()
50 // Verify if the generated integrity data for the packet and the received in verifyIntegrityData()
51 // integrity data matches. in verifyIntegrityData()
70 // Generated Kn for the integrity algorithm with the additional key keyed in generateKn()
75 throw std::runtime_error("Generating KeyN for integrity " in generateKn()
100 // AuthCode field length is based on the integrity algorithm. So we are in generateHMAC()
116 // Verify if the generated integrity data for the packet and the received in verifyIntegrityData()
117 // integrity data matches. in verifyIntegrityData()
[all …]
H A Dauth_algo.hpp52 explicit Interface(integrity::Algorithms intAlgo, in Interface()
69 * Integrity Key.
82 * @brief Generate the Integrity Check Value
85 * Integrity Check Value.
91 * @note The session integrity key which is the secret key for the
127 // Session Integrity Key
131 * Integrity Algorithm is activated and set in the session data only
133 * integrity algorithm is negotiated in the Open Session Request command
134 * . So the integrity algorithm successfully negotiated is stored
137 integrity::Algorithms intAlgo;
[all …]
H A Dsession.hpp155 * @brief Get Session's Integrity Algorithm
157 * @return pointer to the integrity algorithm
167 throw std::runtime_error("Integrity Algorithm Empty"); in getIntegrityAlgo()
172 * @brief Set Session's Integrity Algorithm
174 * @param[in] integrityAlgo - unique pointer to integrity algorithm
178 std::unique_ptr<cipher::integrity::Interface>&& integrityAlgo) in setIntegrityAlgo()
183 /** @brief Check if integrity algorithm is enabled for this session.
185 * @return true if integrity algorithm is enabled else false.
301 // Integrity Algorithm Interface for the Session
302 std::unique_ptr<cipher::integrity::Interface> integrityAlgoInterface =
/openbmc/phosphor-webui/
H A Dpackage-lock.json10 …"integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7V… string
19 …"integrity": "sha512-zeFQrr+284Ekvd9e7KAX954LkapWiOmQtsfHirhxqfdlX6MEC32iRE+pqUGlYIBchdevaCwvzxWGS… string
30 …"integrity": "sha512-kWc7L0fw1xwvI0zi8OKVBuxRVefwGOrKSQMvrQ3dW+bIIavBY3/NpXmpjMy7bQnLgwgzWQZ8TlM57… string
54 …"integrity": "sha512-4FJkXzKXEDB1snCFZlLP4gpC3JILicCpGbzG9f9G7tGqGCzETQ2hWPrcinA9oU4wtf2biUaEH5065… string
63 …"integrity": "sha512-KXPvOm8K9IJKFM0bmdn8QXh7udDh1g/giieX0NLCaMnb4hEiVFqnop2ImTXCc5e0/oHz3LTqmHGtE… string
72 …"integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUx… string
80 …"integrity": "sha512-GbNIxVB3ZJe3tLeDm1HSn2AhuD/mVcyLDpgtLXa5tplmWrJdF/elxB56XNqCuD6szyNkDi6wuoKXl… string
92 …"integrity": "sha512-6o+mJrZBxOoEX77Ezv9zwW7WV8DdluouRKNY/IR5u/YTMuKHgugHOzYWlYvYLpLA9nPsQCAAASpCI… string
101 …"integrity": "sha512-5eFOm2SyFPK4Rh3XMMRDjN7lBH0orh3ss0g3rTYZnBQ+r6YPj7lgDyCvPphynHvUrobJmeMignBr6… string
111 …"integrity": "sha512-4mWm8DCK2LugIS+p1yArqvG1Pf162upsIsjE7cNBjez+NjliQpVhj20obE520nao0o14DaTnFJv+F… string
[all …]
/openbmc/linux/Documentation/admin-guide/device-mapper/
H A Ddm-integrity.rst2 dm-integrity
5 The dm-integrity target emulates a block device that has additional
6 per-sector tags that can be used for storing integrity information.
8 A general problem with storing integrity tags with every sector is that
9 writing the sector and the integrity tag must be atomic - i.e. in case of
10 crash, either both sector and integrity tag or none of them is written.
12 To guarantee write atomicity, the dm-integrity target uses journal, it
13 writes sector data and integrity tags into a journal, commits the journal
14 and then copies the data and integrity tags to their respective location.
16 The dm-integrity target can be used with the dm-crypt target - in this
[all …]
/openbmc/phosphor-net-ipmid/test/
H A Dcipher.cpp18 * Step-1 Generate Integrity Data for the packet, using the implemented API in TEST()
23 // Hardcoded Session Integrity Key in TEST()
27 auto algoPtr = std::make_unique<cipher::integrity::AlgoSHA1>(sik); in TEST()
31 // Generate the Integrity Data in TEST()
35 cipher::integrity::AlgoSHA1::SHA1_96_AUTHCODE_LENGTH)); in TEST()
38 * Step-2 Generate Integrity data using OpenSSL SHA1 algorithm in TEST()
45 // Generated K1 for the integrity algorithm with the additional key keyed in TEST()
62 FAIL() << "Generating integrity data failed"; in TEST()
65 output.resize(cipher::integrity::AlgoSHA1::SHA1_96_AUTHCODE_LENGTH); in TEST()
68 * Step-3 Check if the integrity data we generated using the implemented API in TEST()
[all …]
/openbmc/linux/block/
H A Dbio-integrity.c3 * bio-integrity.c - bio data integrity extensions
9 #include <linux/blk-integrity.h>
39 * bio_integrity_alloc - Allocate integrity payload and attach it to bio
40 * @bio: bio to attach integrity metadata to
42 * @nr_vecs: Number of integrity metadata scatter-gather elements
44 * Description: This function prepares a bio for attaching integrity
46 * integrity metadata that can be attached.
95 * bio_integrity_free - Free bio integrity payload
98 * Description: Used to free the integrity portion of a bio. Usually
115 * bio_integrity_add_page - Attach integrity metadata
[all …]
H A Dblk-integrity.c3 * blk-integrity.c - Block layer data integrity extensions
9 #include <linux/blk-integrity.h>
20 * blk_rq_count_integrity_sg - Count number of integrity scatterlist elements
22 * @bio: bio with integrity metadata attached
25 * scatterlist corresponding to the integrity metadata in a bio.
59 * blk_rq_map_integrity_sg - Map integrity metadata into a scatterlist
61 * @bio: bio with integrity metadata attached
64 * Description: Map the integrity vectors in request into a
111 * blk_integrity_compare - Compare integrity profile of two disks
116 * sub-devices use the same integrity format before advertising to
[all …]
/openbmc/linux/security/integrity/
H A DMakefile3 # Makefile for caching inode integrity data (iint)
6 obj-$(CONFIG_INTEGRITY) += integrity.o
8 integrity-y := iint.o
9 integrity-$(CONFIG_INTEGRITY_AUDIT) += integrity_audit.o
10 integrity-$(CONFIG_INTEGRITY_SIGNATURE) += digsig.o
11 integrity-$(CONFIG_INTEGRITY_ASYMMETRIC_KEYS) += digsig_asymmetric.o
12 integrity-$(CONFIG_INTEGRITY_PLATFORM_KEYRING) += platform_certs/platform_keyring.o
13 integrity-$(CONFIG_INTEGRITY_MACHINE_KEYRING) += platform_certs/machine_keyring.o
14 integrity-$(CONFIG_LOAD_UEFI_KEYS) += platform_certs/efi_parser.o \
17 integrity-$(CONFIG_LOAD_IPL_KEYS) += platform_certs/load_ipl_s390.o
[all …]
H A DKconfig3 config INTEGRITY config
4 bool "Integrity subsystem"
8 This option enables the integrity subsystem, which is comprised
9 of a number of different components including the Integrity
17 if INTEGRITY
46 bool "Require all keys on the integrity keyrings be signed"
119 bool "Enables integrity auditing support "
123 In addition to enabling integrity auditing support, this
125 controls the level of integrity auditing messages.
126 0 - basic integrity auditing messages (default)
[all …]
H A Diint.c9 * - implements the integrity hooks: integrity_inode_alloc,
11 * - cache integrity information associated with an inode
22 #include "integrity.h"
172 * Free the integrity information(iint) associated with an inode.
203 DEFINE_LSM(integrity) = {
204 .name = "integrity",
225 * integrity_load_keys - load integrity keys hook
240 integrity_dir = securityfs_create_dir("integrity", NULL); in integrity_fs_init()
245 pr_err("Unable to create integrity sysfs dir: %d\n", in integrity_fs_init()
/openbmc/webui-vue/
H A Dpackage-lock.json82 …"integrity": "sha512-7s0VcTwiK/0tNOVdSX9FWMeFdOEcsAOz9HesBldXxFMaGvIak7KC2z9tV9EgsQXn6KUsWsfIkViMN… string
107 …"integrity": "sha512-BcYH1CVJBO9tvyIZ2jVeXgSIMvGZ2FDRvDdOIVQyuklNKSsx+eppDEBq/g47Ayw+RqNFE+URvOShm… string
119 …"integrity": "sha512-qJzAIcv03PyaWqxRgO4mSU3lihncDT296vnyuE2O8uA4w3UHWI4S3hgeZd1L8W1Bft40w9JxJ2b41… string
155 …"integrity": "sha512-oipXieGC3i45Y1A41t4tAqpnEZWgB/lC6Ehh6+rOviR5XWpTtMmLN+fGjz9vOiNRt0p6RtO6DtD0p… string
169 …"integrity": "sha512-BaDeOonYvhdKw+JoMVkAixAAJzG2jVPIwWoKBPdYuY9b452e2rPuI9QPYh3KpofZ3pW2akOmwZLOi… string
181 …"integrity": "sha512-xZeCVVdwb4MsDBkkyZ64tReWYrLRHlMN72vP7Bdm3OUOuyFZExhsHUUnuWnm2/XOlAJzR0LfPpB56… string
194 …"integrity": "sha512-ctSdRHBi20qWOfy27RUb4Fhp07KSJ3sXcuSvTrXrc4aG8NSYDo1ici3Vhg9bg69y5bj0Mr1lh0aeE… string
209 …"integrity": "sha512-kTkaDl7c9vO80zeX1rJxnuRpEsD5tA81yh11X1gQo+PhSti3JS+7qeZo9U4RHobKRiFPKaGK3svUA… string
232 …"integrity": "sha512-03TCmXy2FtXJEZfbXDTSqq1fRJArk7lX9DOFC/47VthYcxyIOx+eXQmdo6DOQvrbpIix+KfXwvuXd… string
249 …"integrity": "sha512-LV76g+C502biUK6AyZ3LK10vDpDyCzZnhZFXkH1L75zHPj68+qc8Zfpx2th+gzwA2MzyK+1g/3EPl… string
[all …]
/openbmc/openbmc/meta-security/meta-integrity/classes/
H A Dsanity-meta-integrity.bbclass5 if 'integrity' not in e.data.getVar('DISTRO_FEATURES').split() and not skip_check:
6 bb.warn("You have included the meta-integrity layer, but \
7 'integrity' has not been enabled in your DISTRO_FEATURES. Some bbappend files \
8 and preferred version setting may not take effect. See the meta-integrity README \
9 for details on enabling integrity support.")
/openbmc/openbmc/meta-security/recipes-ids/tripwire/files/
H A Dtripwire.txt5 3. Run the first integrity check. (/usr/sbin/tripwire--check)
12 … policy file greatly increases Tripwire software's ability to ensure the integrity of your system.
27 … the rules in the policy file. This database serves as the baseline for integrity checks. The synt…
30 Running an Integrity Check
31Integrity Check mode compares the current file system objects with their properties recorded in th…
39 Updating the Database after an Integrity Check
40 Database Update mode enables you to update the Tripwire database after an integrity check if you de…
56 …ine against the current system to determine what changes have occurred. This is an integrity check.
58 …n integrity check, Tripwire software produces report files. Report files summarize any changes tha…
/openbmc/linux/Documentation/ABI/stable/
H A Dsysfs-class-tpm4 Contact: linux-integrity@vger.kernel.org
12 Contact: linux-integrity@vger.kernel.org
24 Contact: linux-integrity@vger.kernel.org
32 Contact: linux-integrity@vger.kernel.org
49 Contact: linux-integrity@vger.kernel.org
72 Contact: linux-integrity@vger.kernel.org
81 Contact: linux-integrity@vger.kernel.org
89 Contact: linux-integrity@vger.kernel.org
112 Contact: linux-integrity@vger.kernel.org
164 Contact: linux-integrity@vger.kernel.org
[all …]
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md2 integrity layer.
6 to have 'integrity' in DISTRO_FEATURES to have effect.
9 DISTRO_FEATURES:append = " integrity"
11 If meta-integrity is included, but integrity is not enabled as a
15 'integrity' has not been enabled in your DISTRO_FEATURES. Some bbappend files
45 make sure to copy the maintainer and add a "[meta-integrity]"
54 1. Adding the integrity layer to your build
59 1. Adding the integrity layer to your build
67 location of the integrity layer to bblayers.conf, along with any
74 /path/to/yocto/meta-security/meta-integrity \
[all …]
/openbmc/linux/include/linux/
H A Dblk-integrity.h48 struct blk_integrity *bi = &disk->queue->integrity; in blk_get_integrity()
65 return q->integrity.profile; in blk_integrity_queue_supports_integrity()
81 * bio_integrity_intervals - Return number of integrity intervals for a bio
86 * sectors but integrity metadata is done in terms of the data integrity
88 * to the appropriate number of integrity intervals.
108 * Return the current bvec that contains the integrity data. bip_iter may be
109 * advanced to iterate over the integrity data.
H A Dt10-pi.h45 if (rq->q->integrity.interval_exp) in t10_pi_ref_tag()
46 shift = rq->q->integrity.interval_exp; in t10_pi_ref_tag()
76 if (rq->q->integrity.interval_exp) in ext_pi_ref_tag()
77 shift = rq->q->integrity.interval_exp; in ext_pi_ref_tag()
/openbmc/openbmc/meta-security/meta-integrity/conf/
H A Dlayer.conf8 BBFILE_COLLECTIONS += "integrity"
27 BBLAYERS_LAYERINDEX_NAME_integrity = "meta-integrity"
29 # Sanity check for meta-integrity layer.
31 INHERIT += "sanity-meta-integrity"
39 WARN_QA:append:integrity = " patch-status missing-metadata"
/openbmc/ipmitool/src/plugins/lanplus/
H A DREADME.lanplus13 algorithms, whereas the integrity algorithms are not all HMAC. See section
28 integrity checking. One the one hand, section 13.28.4 states explicitly
29 that HMAC integrity algorithms use the session integrity key as the HMAC
32 "all keying material for the RSP integrity and confidentiality algorithms
35 integrity and confidentiality algorithms defined in this specification,
38 of authentication codes (integrity checking). Furthermore, we are using
/openbmc/linux/security/integrity/ima/
H A DKconfig2 # IBM Integrity Measurement Architecture
5 bool "Integrity Measurement Architecture(IMA)"
17 The Trusted Computing Group(TCG) runtime Integrity
25 an aggregate integrity value over this list inside the
52 that IMA uses to maintain the integrity aggregate of the
87 prompt "Default integrity hash algorithm"
91 list, integrity appraisal and audit log. The compiled default
144 bool "Appraise integrity measurements"
147 This option enables local measurement integrity appraisal.
153 For more information on integrity appraisal refer to:
/openbmc/phosphor-net-ipmid/command/
H A Drakp34.cpp25 case cipher::integrity::Algorithms::HMAC_SHA1_96: in applyIntegrityAlgo()
28 std::make_unique<cipher::integrity::AlgoSHA1>( in applyIntegrityAlgo()
32 case cipher::integrity::Algorithms::HMAC_SHA256_128: in applyIntegrityAlgo()
35 std::make_unique<cipher::integrity::AlgoSHA256>( in applyIntegrityAlgo()
177 * Session Integrity Key in RAKP34()
213 // Generate Session Integrity Key in RAKP34()
221 * Integrity Check Value in RAKP34()
250 // Integrity Check Value in RAKP34()
263 // Set the Integrity Algorithm in RAKP34()
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/
H A DComponentIntegrity.interface.yaml2 Implement to represent component integrity information acquired from a
38 change that leads to component integrity change should update this
46 whose integrity this resource authenticates.
54 component whose integrity this resource reports.

12345678910>>...29