Home
last modified time | relevance | path

Searched +full:key +full:- +full:code (Results 1 – 25 of 894) sorted by relevance

12345678910>>...36

/openbmc/openbmc/poky/meta/recipes-devtools/apt/apt/
H A Dtriehash1 #!/usr/bin/perl -w
3 # Copyright (C) 2016 Julian Andres Klode <jak@jak-linux.org>
27 triehash - Generate a perfect hash function derived from a trie.
63 Which defines the value to be used for non-existing keys. Note that this also
76 =item B<-C>I<.c file> B<--code>=I<.c file>
78 Generate code in the given file.
80 =item B<-H>I<header file> B<--header>=I<header file>
85 =item B<--enum-name=>I<word>
89 =item B<--function-name=>I<word>
93 =item B<--label-prefix=>I<word>
[all …]
/openbmc/u-boot/include/
H A Dtpm_api.h1 /* SPDX-License-Identifier: GPL-2.0+ */
10 #include <tpm-common.h>
11 #include <tpm-v1.h>
12 #include <tpm-v2.h>
19 * Return: return code of the operation
27 * Return: return code of the operation
35 * Return: return code of the operation
48 * Return: return code of the operation
61 * Return: return code of the operation
74 * Return: return code of the operation
[all …]
H A Dtpm-v1.h1 /* SPDX-License-Identifier: GPL-2.0+ */
10 #include <tpm-common.h>
121 /* TPM-defined fatal error codes */
220 /* TPM-defined non-fatal errors */
290 * Return: return code of the operation
298 * Return: return code of the operation
306 * Return: return code of the operation
319 * Return: return code of the operation
332 * Return: return code of the operation
345 * Return: return code of the operation
[all …]
H A Dfsl_validate.h1 /* SPDX-License-Identifier: GPL-2.0+ */
23 /* Barker code size in bytes */
24 #define ESBC_BARKER_LEN 4 /* barker code length in ESBC uboot client */
27 /* No-error return values */
33 /* Different Header Struct for LS-CH3 */
36 u8 barker[ESBC_BARKER_LEN]; /* barker code */
65 /* Srk table and key revocation check */
82 * barker code
83 * public key offset
84 * pub key length
[all …]
/openbmc/u-boot/include/dt-bindings/input/
H A Dinput.h4 * Most input bindings include key code, matrix key code format.
5 * In most cases, key code and matrix key code format uses
12 #include "linux-event-codes.h"
14 #define MATRIX_KEY(row, col, code) \ argument
15 ((((row) & 0xFF) << 24) | (((col) & 0xFF) << 16) | ((code) & 0xFFFF))
/openbmc/obmc-ikvm/
H A Dikvm_input.hpp24 * @param[in] kbdPath - Path to the USB keyboard device
25 * @param[in] ptrPath - Path to the USB mouse device
26 * @param[in] udc - Name of UDC
41 * @brief RFB client key event handler
43 * @param[in] down - Boolean indicating whether key is pressed or not
44 * @param[in] key - Key code
45 * @param[in] cl - Handle to the RFB client
47 static void keyEvent(rfbBool down, rfbKeySym key, rfbClientPtr cl);
51 * @param[in] buttonMask - Bitmask indicating which buttons have been
53 * @param[in] x - Pointer x-coordinate
[all …]
/openbmc/qemu/docs/system/devices/
H A Dcanokey.rst4 ------------
6 CanoKey [1]_ is an open-source secure key with supports of
8 * U2F / FIDO2 with Ed25519 and HMAC-secret
10 * PIV (NIST SP 800-73-4)
14 All these platform-independent features are in canokey-core [3]_.
21 * (virt-card) CanoKey USB/IP
22 * (virt-card) CanoKey FunctionFS
24 In QEMU, yet another CanoKey virt-card is implemented.
27 With the same software configuration as a hardware key,
28 the guest OS can use all the functionalities of a secure key as if
[all …]
/openbmc/u-boot/doc/
H A DREADME.esbc_validate1 SPDX-License-Identifier: GPL-2.0+
11 SHA-256 and RSA operations are performed using SEC block in HW.
19 $hash_val -Optional. It provides Hash of public/srk key to be
29 6. KEY REVOCATION Feature:
30 QorIQ platforms like B4/T4 have support of srk key table and key
31 revocation in ISBC code in Silicon.
32 The srk key table allows the user to have a key table with multiple
33 keys and revoke any key in case of particular key gets compromised.
34 In case the ISBC code uses the key revocation and srk key table to
35 verify the u-boot code, the subsequent chain of trust should also
[all …]
H A DREADME.armada-secureboot16 -------------------------------
25 one-time-writeable memory) need to be configured in the correct way.
30 key from it, and verify its SHA-256 hash against a SHA-256 stored in a eFuse
32 * Load an array of code signing public RSA keys from the header block, and
34 "root" RSA key.
35 * Choose a code signing key, and use it to verify the header block (excluding
36 the key array).
38 code signing key.
43 * The SHA-256 value in the eFuse field verifies the "root" public key.
44 * The "root" public key verifies the code signing key array.
[all …]
/openbmc/docs/designs/
H A Dsol-sysrq.md11 [SysRq][1] is a special key combination used by Linux to perform various
12 low-level commands. BMC usually provides SysRq support in KVM and SOL functions,
18 The key combination consists of Alt+SysRq (usually the `PrintScreen` key) and
19 another key, which controls the command issued. This is not typical key code and
21 sending a serial break signal, followed by the desired key. The "break signal"
22 is usually generated by `ctrl+break` key combination.[2]
31 - The ipmitool SOL.
32 - The SOL in WebUI.
33 - The console with SSH (default) 2200 port.
37 In OpenBMC, the service `obmc-console-server` provides the host console and
[all …]
H A Dfirmware-update-via-usb.md1 # In-Band Update of BMC Firmware using USB
5 Created: 2021-10-12
14 The openbmc project currently has a [phosphor-software-manager][1] repository.
26 - Monitor whether the USB key is inserted.
27 - The first tar file found in the sorted list of files on the USB device is
29 - Manually trigger firmware upgrade.
30 - Disable automatic reboot the BMC firmware after upgrade is complete to prevent
31 a potential loop in the event of a key inserted.
32 - This mechanism attempts to maintain security, for example this feature is
37 The new code would be part of the phosphor-software-manager repository(eg:
[all …]
/openbmc/qemu/scsi/
H A Dutils.c43 return -1; in scsi_cdb_xfer()
49 uint8_t *buf = cmd->buf; in scsi_cmd_lba()
65 lba = -1; in scsi_cmd_lba()
90 cdb_len = -1; in scsi_cdb_length()
106 sense.key = in_buf[2]; in scsi_parse_sense_buf()
113 sense.key = in_buf[1]; in scsi_parse_sense_buf()
129 buf[2] = sense.key; in scsi_build_sense_buf()
136 buf[1] = sense.key; in scsi_build_sense_buf()
157 .key = NO_SENSE , .asc = 0x00 , .ascq = 0x00
162 .key = NOT_READY, .asc = 0x04, .ascq = 0x03
[all …]
/openbmc/phosphor-logging/docs/
H A Dstructured-logging.md4 [log](../lib/include/phosphor-logging/log.hpp) and
5 [lg2](../lib/include/phosphor-logging/lg2.hpp). If your code is C++20 (or later)
12 logging where logged events are free-form strings.
14 The principal logging daemon in OpenBMC (systemd-journald) natively supports
22 of various failure-analysis operations, either on the part of a system
23 manufacturer or an end-user, to need to interrogate the system logs to determine
39 accepted log-levels and their definition is historically documented in
44 The pre-C++20 logging APIs presented by phosphor-logging are
52 such as 'debug', 'info', 'emergency', a free-form message string, and any number
53 of entries, which are key-value pairs of data.
[all …]
/openbmc/ipmitool/src/plugins/lanplus/
H A Dlanplus_dump.c8 * Redistribution of source code must retain the above copyright
22 * PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED.
53 rsp->payload.open_session_response.message_tag); in lanplus_dump_open_session_response()
56 val2str(rsp->payload.open_session_response.rakp_return_code, in lanplus_dump_open_session_response()
60 val2str(rsp->payload.open_session_response.max_priv_level, in lanplus_dump_open_session_response()
64 (long)rsp->payload.open_session_response.console_id); in lanplus_dump_open_session_response()
67 if (rsp->payload.open_session_response.rakp_return_code != in lanplus_dump_open_session_response()
73 (long)rsp->payload.open_session_response.bmc_id); in lanplus_dump_open_session_response()
76 val2str(rsp->payload.open_session_response.auth_alg, in lanplus_dump_open_session_response()
80 val2str(rsp->payload.open_session_response.integrity_alg, in lanplus_dump_open_session_response()
[all …]
/openbmc/u-boot/fs/ubifs/
H A Dtnc.c1 // SPDX-License-Identifier: GPL-2.0+
5 * Copyright (C) 2006-2008 Nokia Corporation.
13 * the UBIFS B-tree.
49 * insert_old_idx - record an index node obsoleted since the last commit start.
50 * @c: UBIFS file-system description object
54 * Returns %0 on success, and a negative error code on failure.
62 * That means that the garbage collection and the in-the-gaps method of
67 * they cannot be easily found. In those cases, an entry is added to an RB-tree.
68 * That is what this function does. The RB-tree is ordered by LEB number and
78 return -ENOMEM; in insert_old_idx()
[all …]
/openbmc/u-boot/lib/libavb/
H A Davb_rsa.h1 /* SPDX-License-Identifier: MIT OR BSD-3-Clause */
7 * Use of this source code is governed by a BSD-style license that can be
16 #error "Never include this file, it may only be used from internal avb code."
29 /* Using the key given by |key|, verify a RSA signature |sig| of
34 * The data in |key| must match the format defined in
37 * serialized key.
41 bool avb_rsa_verify(const uint8_t* key,
/openbmc/u-boot/doc/imx/habv4/
H A Dintroduction_habv4.txt6 ----------------
9 (HAB) feature in the on-chip ROM. The ROM is responsible for loading the
10 initial program image (U-Boot) from the boot media and HAB enables the ROM
17 Step-by-step guides are available under doc/imx/habv4/guides/ directory,
22 ---------------------------------------
29 The HAB authentication is based on public key cryptography using the RSA
39 +----------+ +----------+
40 ---> | U-Boot | | Compare |
41 | +----------+ +----------+
44 | +----------+ Hash / \ Hash
[all …]
/openbmc/qemu/docs/devel/
H A Dmaintainers.rst11 - reviewing patches and suggesting changes
12 - collecting patches and preparing pull requests
13 - tending to the long term health of their area
14 - participating in other project activities
22 --------------------
25 <https://gitlab.com/qemu-project/qemu/-/blob/master/MAINTAINERS>`__
29 patches that touch their area of code.
31 The file also describes the status of the area of code to give an idea
34 .. list-table:: Meaning of support status in MAINTAINERS
36 :header-rows: 1
[all …]
/openbmc/phosphor-net-ipmid/
H A Dauth_algo.hpp22 * RMCP+ Authenticated Key-Exchange Protocol (RAKP)
24 * RAKP-None is not supported as per the following recommendation
25 * (https://www.us-cert.gov/ncas/alerts/TA13-207A)
65 * @brief Generate the Hash Message Authentication Code
67 * This API is invoked to generate the Key Exchange Authentication Code
69 * Integrity Key.
75 * @note The user key which is the secret key for the hash operation
91 * @note The session integrity key which is the secret key for the
100 * @param[in] algo - authentication algorithm
117 // User Key is hardcoded to PASSW0RD till the IPMI User account
[all …]
/openbmc/docs/development/
H A Dgerrit-setup.md4 account. This is needed to participate in OpenBMC's Gerrit-based code reviews.
7 installed. E-mail account (recommended to use the same e-mail address for both
14 - `git config --global --add user.name "Your name" (eg. John Smith)`
15 - `git config --global --add user.email "youremail@your-domain" (eg. jsmith@somedomain.com)`
16 - (Optional)
17 `git config --global --add diff.tool "preferred diff tool" (eg. gvimdiff or meld)`
21 Create keys: `ssh-keygen -t ed25519 -C "your_email@your-domain"`
23 - Recommended to use the defaults instead of picking your own directory/file
28 - <https://help.github.com/articles/adding-a-new-ssh-key-to-your-github-account/>
32 - Login to [Gerrit](https://gerrit.openbmc.org/) with your GitHub account.
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/classes/
H A Dsigning.bbclass4 # SPDX-License-Identifier: MIT
10 # use, it's hard to verify that no copies of the private key have been made
11 # and only authorized persons are able to use the key. Use of an HSM addresses
12 # these risks by only allowing use of the key via an API (often PKCS #11). The
13 # standard way of referring to a specific key in an HSM are PKCS #11 URIs (RFC
18 # widespread, testing code signing in CI is not simple. To solve this at the
26 # Each key recipe PROVIDES a virtual package corresponding to the role, allowing
30 # override the SoftHSM key with the real one:
32 # SIGNING_PKCS11_URI[fit] = "pkcs11:serial=DENK0200554;object=ptx-dev-rauc&pin-value=123456"
33 # SIGNING_PKCS11_MODULE[fit] = "/usr/lib/x86_64-linux-gnu/opensc-pkcs11.so"
[all …]
/openbmc/u-boot/lib/efi_selftest/
H A Defi_selftest_textinputex.c1 // SPDX-License-Identifier: GPL-2.0+
8 * The unicode character and the scan code are printed for text
28 * efi_key_notify_function() - key notification function
30 * This function is called when the registered key is hit.
32 * @key_data: next key
33 * Return: status code
55 .key = { in setup()
66 boottime = systable->boottime; in setup()
68 ret = boottime->locate_protocol(&text_input_ex_protocol_guid, NULL, in setup()
77 ret = con_in_ex->register_key_notify(con_in_ex, &key_data, in setup()
[all …]
/openbmc/u-boot/lib/efi_loader/
H A Defi_console.c1 // SPDX-License-Identifier: GPL-2.0+
86 * @return: non-zero indicates error
94 return -1; in term_read_reply()
97 return -1; in term_read_reply()
105 return -1; in term_read_reply()
111 return -1; in term_read_reply()
116 n[i] += c - '0'; in term_read_reply()
118 return -1; in term_read_reply()
121 if (i != num - 1) in term_read_reply()
122 return -1; in term_read_reply()
[all …]
/openbmc/openbmc/meta-ibm/recipes-bsp/u-boot/u-boot-aspeed-sdk/p10bmc/
H A Dibm.json7 "key": [ array
43 "Disable low security key": false,
46 "Disable Uart Message of ROM code": false,
49 "Disable patch code": false,
58 "Enable write Protect of OTP key retire bits": false,
61 "Key Revision": "0x0",
67 "Disable ROM code based programming control": true,
71 "Erase RSA public key after secure boot check": false,
75 "Patch code location": "0x6E0",
76 "Patch code size": "0x18"
[all …]
/openbmc/u-boot/drivers/input/
H A Dinput.c1 // SPDX-License-Identifier: GPL-2.0+
3 * Translate key codes into ASCII
26 /* Special flag ORed with key code to indicate release */
32 * These takes map key codes to ASCII. 0xff means no key, or special key.
33 * Three tables are provided - one for plain keys, one for when the shift
34 * 'modifier' key is pressed and one for when the ctrl modifier key is
39 '7', '8', '9', '0', '-', '=', '\b', '\t', /* 0x00 - 0x0f */
41 'o', 'p', '[', ']', '\r', 0xff, 'a', 's', /* 0x10 - 0x1f */
43 '\'', '`', 0xff, '\\', 'z', 'x', 'c', 'v', /* 0x20 - 0x2f */
45 ' ', 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, /* 0x30 - 0x3f */
[all …]

12345678910>>...36