| /openbmc/openbmc/poky/meta/recipes-devtools/apt/apt/ |
| H A D | triehash | 1 #!/usr/bin/perl -w 3 # Copyright (C) 2016 Julian Andres Klode <jak@jak-linux.org> 27 triehash - Generate a perfect hash function derived from a trie. 63 Which defines the value to be used for non-existing keys. Note that this also 76 =item B<-C>I<.c file> B<--code>=I<.c file> 78 Generate code in the given file. 80 =item B<-H>I<header file> B<--header>=I<header file> 85 =item B<--enum-name=>I<word> 89 =item B<--function-name=>I<word> 93 =item B<--label-prefix=>I<word> [all …]
|
| /openbmc/u-boot/include/ |
| H A D | tpm_api.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 10 #include <tpm-common.h> 11 #include <tpm-v1.h> 12 #include <tpm-v2.h> 19 * Return: return code of the operation 27 * Return: return code of the operation 35 * Return: return code of the operation 48 * Return: return code of the operation 61 * Return: return code of the operation 74 * Return: return code of the operation [all …]
|
| H A D | tpm-v1.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 10 #include <tpm-common.h> 121 /* TPM-defined fatal error codes */ 220 /* TPM-defined non-fatal errors */ 290 * Return: return code of the operation 298 * Return: return code of the operation 306 * Return: return code of the operation 319 * Return: return code of the operation 332 * Return: return code of the operation 345 * Return: return code of the operation [all …]
|
| H A D | fsl_validate.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 23 /* Barker code size in bytes */ 24 #define ESBC_BARKER_LEN 4 /* barker code length in ESBC uboot client */ 27 /* No-error return values */ 33 /* Different Header Struct for LS-CH3 */ 36 u8 barker[ESBC_BARKER_LEN]; /* barker code */ 65 /* Srk table and key revocation check */ 82 * barker code 83 * public key offset 84 * pub key length [all …]
|
| /openbmc/u-boot/include/dt-bindings/input/ |
| H A D | input.h | 4 * Most input bindings include key code, matrix key code format. 5 * In most cases, key code and matrix key code format uses 12 #include "linux-event-codes.h" 14 #define MATRIX_KEY(row, col, code) \ argument 15 ((((row) & 0xFF) << 24) | (((col) & 0xFF) << 16) | ((code) & 0xFFFF))
|
| /openbmc/obmc-ikvm/ |
| H A D | ikvm_input.hpp | 24 * @param[in] kbdPath - Path to the USB keyboard device 25 * @param[in] ptrPath - Path to the USB mouse device 26 * @param[in] udc - Name of UDC 41 * @brief RFB client key event handler 43 * @param[in] down - Boolean indicating whether key is pressed or not 44 * @param[in] key - Key code 45 * @param[in] cl - Handle to the RFB client 47 static void keyEvent(rfbBool down, rfbKeySym key, rfbClientPtr cl); 51 * @param[in] buttonMask - Bitmask indicating which buttons have been 53 * @param[in] x - Pointer x-coordinate [all …]
|
| /openbmc/qemu/docs/system/devices/ |
| H A D | canokey.rst | 4 ------------ 6 CanoKey [1]_ is an open-source secure key with supports of 8 * U2F / FIDO2 with Ed25519 and HMAC-secret 10 * PIV (NIST SP 800-73-4) 14 All these platform-independent features are in canokey-core [3]_. 21 * (virt-card) CanoKey USB/IP 22 * (virt-card) CanoKey FunctionFS 24 In QEMU, yet another CanoKey virt-card is implemented. 27 With the same software configuration as a hardware key, 28 the guest OS can use all the functionalities of a secure key as if [all …]
|
| /openbmc/u-boot/doc/ |
| H A D | README.esbc_validate | 1 SPDX-License-Identifier: GPL-2.0+ 11 SHA-256 and RSA operations are performed using SEC block in HW. 19 $hash_val -Optional. It provides Hash of public/srk key to be 29 6. KEY REVOCATION Feature: 30 QorIQ platforms like B4/T4 have support of srk key table and key 31 revocation in ISBC code in Silicon. 32 The srk key table allows the user to have a key table with multiple 33 keys and revoke any key in case of particular key gets compromised. 34 In case the ISBC code uses the key revocation and srk key table to 35 verify the u-boot code, the subsequent chain of trust should also [all …]
|
| H A D | README.armada-secureboot | 16 ------------------------------- 25 one-time-writeable memory) need to be configured in the correct way. 30 key from it, and verify its SHA-256 hash against a SHA-256 stored in a eFuse 32 * Load an array of code signing public RSA keys from the header block, and 34 "root" RSA key. 35 * Choose a code signing key, and use it to verify the header block (excluding 36 the key array). 38 code signing key. 43 * The SHA-256 value in the eFuse field verifies the "root" public key. 44 * The "root" public key verifies the code signing key array. [all …]
|
| /openbmc/docs/designs/ |
| H A D | sol-sysrq.md | 11 [SysRq][1] is a special key combination used by Linux to perform various 12 low-level commands. BMC usually provides SysRq support in KVM and SOL functions, 18 The key combination consists of Alt+SysRq (usually the `PrintScreen` key) and 19 another key, which controls the command issued. This is not typical key code and 21 sending a serial break signal, followed by the desired key. The "break signal" 22 is usually generated by `ctrl+break` key combination.[2] 31 - The ipmitool SOL. 32 - The SOL in WebUI. 33 - The console with SSH (default) 2200 port. 37 In OpenBMC, the service `obmc-console-server` provides the host console and [all …]
|
| H A D | firmware-update-via-usb.md | 1 # In-Band Update of BMC Firmware using USB 5 Created: 2021-10-12 14 The openbmc project currently has a [phosphor-software-manager][1] repository. 26 - Monitor whether the USB key is inserted. 27 - The first tar file found in the sorted list of files on the USB device is 29 - Manually trigger firmware upgrade. 30 - Disable automatic reboot the BMC firmware after upgrade is complete to prevent 31 a potential loop in the event of a key inserted. 32 - This mechanism attempts to maintain security, for example this feature is 37 The new code would be part of the phosphor-software-manager repository(eg: [all …]
|
| /openbmc/qemu/scsi/ |
| H A D | utils.c | 43 return -1; in scsi_cdb_xfer() 49 uint8_t *buf = cmd->buf; in scsi_cmd_lba() 65 lba = -1; in scsi_cmd_lba() 90 cdb_len = -1; in scsi_cdb_length() 106 sense.key = in_buf[2]; in scsi_parse_sense_buf() 113 sense.key = in_buf[1]; in scsi_parse_sense_buf() 129 buf[2] = sense.key; in scsi_build_sense_buf() 136 buf[1] = sense.key; in scsi_build_sense_buf() 157 .key = NO_SENSE , .asc = 0x00 , .ascq = 0x00 162 .key = NOT_READY, .asc = 0x04, .ascq = 0x03 [all …]
|
| /openbmc/phosphor-logging/docs/ |
| H A D | structured-logging.md | 4 [log](../lib/include/phosphor-logging/log.hpp) and 5 [lg2](../lib/include/phosphor-logging/lg2.hpp). If your code is C++20 (or later) 12 logging where logged events are free-form strings. 14 The principal logging daemon in OpenBMC (systemd-journald) natively supports 22 of various failure-analysis operations, either on the part of a system 23 manufacturer or an end-user, to need to interrogate the system logs to determine 39 accepted log-levels and their definition is historically documented in 44 The pre-C++20 logging APIs presented by phosphor-logging are 52 such as 'debug', 'info', 'emergency', a free-form message string, and any number 53 of entries, which are key-value pairs of data. [all …]
|
| /openbmc/ipmitool/src/plugins/lanplus/ |
| H A D | lanplus_dump.c | 8 * Redistribution of source code must retain the above copyright 22 * PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED. 53 rsp->payload.open_session_response.message_tag); in lanplus_dump_open_session_response() 56 val2str(rsp->payload.open_session_response.rakp_return_code, in lanplus_dump_open_session_response() 60 val2str(rsp->payload.open_session_response.max_priv_level, in lanplus_dump_open_session_response() 64 (long)rsp->payload.open_session_response.console_id); in lanplus_dump_open_session_response() 67 if (rsp->payload.open_session_response.rakp_return_code != in lanplus_dump_open_session_response() 73 (long)rsp->payload.open_session_response.bmc_id); in lanplus_dump_open_session_response() 76 val2str(rsp->payload.open_session_response.auth_alg, in lanplus_dump_open_session_response() 80 val2str(rsp->payload.open_session_response.integrity_alg, in lanplus_dump_open_session_response() [all …]
|
| /openbmc/u-boot/fs/ubifs/ |
| H A D | tnc.c | 1 // SPDX-License-Identifier: GPL-2.0+ 5 * Copyright (C) 2006-2008 Nokia Corporation. 13 * the UBIFS B-tree. 49 * insert_old_idx - record an index node obsoleted since the last commit start. 50 * @c: UBIFS file-system description object 54 * Returns %0 on success, and a negative error code on failure. 62 * That means that the garbage collection and the in-the-gaps method of 67 * they cannot be easily found. In those cases, an entry is added to an RB-tree. 68 * That is what this function does. The RB-tree is ordered by LEB number and 78 return -ENOMEM; in insert_old_idx() [all …]
|
| /openbmc/u-boot/lib/libavb/ |
| H A D | avb_rsa.h | 1 /* SPDX-License-Identifier: MIT OR BSD-3-Clause */ 7 * Use of this source code is governed by a BSD-style license that can be 16 #error "Never include this file, it may only be used from internal avb code." 29 /* Using the key given by |key|, verify a RSA signature |sig| of 34 * The data in |key| must match the format defined in 37 * serialized key. 41 bool avb_rsa_verify(const uint8_t* key,
|
| /openbmc/u-boot/doc/imx/habv4/ |
| H A D | introduction_habv4.txt | 6 ---------------- 9 (HAB) feature in the on-chip ROM. The ROM is responsible for loading the 10 initial program image (U-Boot) from the boot media and HAB enables the ROM 17 Step-by-step guides are available under doc/imx/habv4/guides/ directory, 22 --------------------------------------- 29 The HAB authentication is based on public key cryptography using the RSA 39 +----------+ +----------+ 40 ---> | U-Boot | | Compare | 41 | +----------+ +----------+ 44 | +----------+ Hash / \ Hash [all …]
|
| /openbmc/qemu/docs/devel/ |
| H A D | maintainers.rst | 11 - reviewing patches and suggesting changes 12 - collecting patches and preparing pull requests 13 - tending to the long term health of their area 14 - participating in other project activities 22 -------------------- 25 <https://gitlab.com/qemu-project/qemu/-/blob/master/MAINTAINERS>`__ 29 patches that touch their area of code. 31 The file also describes the status of the area of code to give an idea 34 .. list-table:: Meaning of support status in MAINTAINERS 36 :header-rows: 1 [all …]
|
| /openbmc/phosphor-net-ipmid/ |
| H A D | auth_algo.hpp | 22 * RMCP+ Authenticated Key-Exchange Protocol (RAKP) 24 * RAKP-None is not supported as per the following recommendation 25 * (https://www.us-cert.gov/ncas/alerts/TA13-207A) 65 * @brief Generate the Hash Message Authentication Code 67 * This API is invoked to generate the Key Exchange Authentication Code 69 * Integrity Key. 75 * @note The user key which is the secret key for the hash operation 91 * @note The session integrity key which is the secret key for the 100 * @param[in] algo - authentication algorithm 117 // User Key is hardcoded to PASSW0RD till the IPMI User account [all …]
|
| /openbmc/docs/development/ |
| H A D | gerrit-setup.md | 4 account. This is needed to participate in OpenBMC's Gerrit-based code reviews. 7 installed. E-mail account (recommended to use the same e-mail address for both 14 - `git config --global --add user.name "Your name" (eg. John Smith)` 15 - `git config --global --add user.email "youremail@your-domain" (eg. jsmith@somedomain.com)` 16 - (Optional) 17 `git config --global --add diff.tool "preferred diff tool" (eg. gvimdiff or meld)` 21 Create keys: `ssh-keygen -t ed25519 -C "your_email@your-domain"` 23 - Recommended to use the defaults instead of picking your own directory/file 28 - <https://help.github.com/articles/adding-a-new-ssh-key-to-your-github-account/> 32 - Login to [Gerrit](https://gerrit.openbmc.org/) with your GitHub account. [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/classes/ |
| H A D | signing.bbclass | 4 # SPDX-License-Identifier: MIT 10 # use, it's hard to verify that no copies of the private key have been made 11 # and only authorized persons are able to use the key. Use of an HSM addresses 12 # these risks by only allowing use of the key via an API (often PKCS #11). The 13 # standard way of referring to a specific key in an HSM are PKCS #11 URIs (RFC 18 # widespread, testing code signing in CI is not simple. To solve this at the 26 # Each key recipe PROVIDES a virtual package corresponding to the role, allowing 30 # override the SoftHSM key with the real one: 32 # SIGNING_PKCS11_URI[fit] = "pkcs11:serial=DENK0200554;object=ptx-dev-rauc&pin-value=123456" 33 # SIGNING_PKCS11_MODULE[fit] = "/usr/lib/x86_64-linux-gnu/opensc-pkcs11.so" [all …]
|
| /openbmc/u-boot/lib/efi_selftest/ |
| H A D | efi_selftest_textinputex.c | 1 // SPDX-License-Identifier: GPL-2.0+ 8 * The unicode character and the scan code are printed for text 28 * efi_key_notify_function() - key notification function 30 * This function is called when the registered key is hit. 32 * @key_data: next key 33 * Return: status code 55 .key = { in setup() 66 boottime = systable->boottime; in setup() 68 ret = boottime->locate_protocol(&text_input_ex_protocol_guid, NULL, in setup() 77 ret = con_in_ex->register_key_notify(con_in_ex, &key_data, in setup() [all …]
|
| /openbmc/u-boot/lib/efi_loader/ |
| H A D | efi_console.c | 1 // SPDX-License-Identifier: GPL-2.0+ 86 * @return: non-zero indicates error 94 return -1; in term_read_reply() 97 return -1; in term_read_reply() 105 return -1; in term_read_reply() 111 return -1; in term_read_reply() 116 n[i] += c - '0'; in term_read_reply() 118 return -1; in term_read_reply() 121 if (i != num - 1) in term_read_reply() 122 return -1; in term_read_reply() [all …]
|
| /openbmc/openbmc/meta-ibm/recipes-bsp/u-boot/u-boot-aspeed-sdk/p10bmc/ |
| H A D | ibm.json | 7 "key": [ array 43 "Disable low security key": false, 46 "Disable Uart Message of ROM code": false, 49 "Disable patch code": false, 58 "Enable write Protect of OTP key retire bits": false, 61 "Key Revision": "0x0", 67 "Disable ROM code based programming control": true, 71 "Erase RSA public key after secure boot check": false, 75 "Patch code location": "0x6E0", 76 "Patch code size": "0x18" [all …]
|
| /openbmc/u-boot/drivers/input/ |
| H A D | input.c | 1 // SPDX-License-Identifier: GPL-2.0+ 3 * Translate key codes into ASCII 26 /* Special flag ORed with key code to indicate release */ 32 * These takes map key codes to ASCII. 0xff means no key, or special key. 33 * Three tables are provided - one for plain keys, one for when the shift 34 * 'modifier' key is pressed and one for when the ctrl modifier key is 39 '7', '8', '9', '0', '-', '=', '\b', '\t', /* 0x00 - 0x0f */ 41 'o', 'p', '[', ']', '\r', 0xff, 'a', 's', /* 0x10 - 0x1f */ 43 '\'', '`', 0xff, '\\', 'z', 'x', 'c', 'v', /* 0x20 - 0x2f */ 45 ' ', 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, /* 0x30 - 0x3f */ [all …]
|