Home
last modified time | relevance | path

Searched full:signatures (Results 1 – 25 of 238) sorted by relevance

12345678910

/openbmc/openbmc/poky/scripts/lib/checklayer/cases/
H A Dbsp.py73 # Collect signatures for all machines that we are testing
79 # signatures do not agree on how to execute the task.
152 signatures = tasks[task]
154 # different signatures in some cases, for example in
161 if len(signatures.keys()) > 1 and \
165 # Sort signatures by machines, because the hex values don't mean anything.
170 next_line_key = (pn, sorted(signatures.values()))
173 … line += ' != '.join(['%s (%s)' % (signature, ', '.join([m for m in signatures[signature]])) for
174 … signature in sorted(signatures.keys(), key=lambda s: signatures[s])])
177 # Randomly pick two mismatched signatures and remember how to invoke
[all …]
/openbmc/linux/tools/testing/selftests/arm64/pauth/
H A Dpac.c39 void sign_specific(struct signatures *sign, size_t val) in sign_specific()
47 void sign_all(struct signatures *sign, size_t val) in sign_all()
56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same()
70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set()
92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all()
179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all()
260 struct signatures signed_vals; in TEST()
299 struct signatures new_keys; in TEST()
300 struct signatures old_keys; in TEST()
333 struct signatures trash; in TEST()
[all …]
H A Dexec_target.c12 struct signatures signed_vals; in main()
31 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/
H A DCertificate.interface.yaml34 code. CRLSigning: The public key is used for verifying signatures on
42 signatures, other than signatures on certificates
47 KeyCertSign: The public key is used for verifying signatures on
51 NonRepudiation: The public key is used to verify digital signatures,
52 other than signatures on certificates and CRLs,
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/CSR/
H A DCreate.interface.yaml97 verifying signatures on
107 signatures, other than signatures on
113 KeyCertSign: The public key is used for verifying signatures on
119 signatures,
120 other than signatures on certificates and CRLs,
/openbmc/linux/security/integrity/ima/
H A DKconfig182 bool "Appraise firmware signatures"
192 bool "Appraise kexec kernel image signatures"
200 Kernel image signatures can not be verified by the original
205 bool "Appraise kernel modules signatures"
212 Kernel module signatures can only be verified by IMA-appraisal,
233 bool "Support module-style signatures for appraisal"
240 Adds support for signatures appended to files. The format of the
243 to accept such signatures.
/openbmc/libcper/generator/sections/
H A Dgen-section-nvidia.c18 const char *signatures[] = { in generate_section_nvidia() local
46 int idx_random = rand() % (sizeof(signatures) / sizeof(signatures[0])); in generate_section_nvidia()
47 strncpy(nvidia_error->Signature, signatures[idx_random], in generate_section_nvidia()
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dbblock.rst9 Then, it compares these signatures with the ones from the sstate cache (if they
20 specific signatures, forcing BitBake to use the sstate cache for them.
28 with caution. If you do not understand why signatures change, see the section
75 ``bblock`` will dump the signatures in the ``build/conf/bblock.conf`` file,
98 have locked signatures.
/openbmc/linux/drivers/scsi/
H A Dfdomain_isa.c40 * The following BIOS signature signatures are for boards which do *NOT*
65 } signatures[] = { variable
84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures)
101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match()
102 signatures[i].signature, in fdomain_isa_match()
103 signatures[i].length)) in fdomain_isa_match()
107 sig = &signatures[i]; in fdomain_isa_match()
/openbmc/openbmc/poky/scripts/
H A Dsstate-diff-machines.sh142 …rintf "\n\n === Comparing signatures for task ${TASK} between ${MACHINE1} and ${MACHINE2} ===\n" |…
143 …}/list.M | grep ${PRE_PATTERN} "${PATTERN}" | grep ${TASK} > ${OUTPUT}/signatures.${MACHINE2}.${TA…
144 …for i in `cat ${OUTPUT}/signatures.${MACHINE2}.${TASK} | sed 's#[^/]*/\([^/]*\)/.*#\1#g' | sort -u…
153 done | tee -a ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log
155 ERRORS=`grep "^ERROR.*" ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log | wc -l`
157 echo "ERROR: ${ERRORS} errors found in ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log"
H A Dbuildhistory-diff47 parser.add_argument('-s', '---signatures',
51 help="Report list of signatures differing instead of output")
52 parser.add_argument('-S', '--signatures-with-diff',
H A Dyocto-check-layer69 help='check that software layers do not change signatures (on by default)')
178 …logger.info("%s already in %s. To capture initial signatures, layer under test should not present "
211 logger.info('Getting initial signatures ...')
218 results_status[layer['name']] = 'FAIL (Generating world signatures)'
/openbmc/linux/fs/verity/
H A Dsignature.c3 * Verification of builtin signatures
9 * This file implements verification of fs-verity builtin signatures. Please
11 * signatures with fs-verity, and the alternatives (such as userspace signature
67 * The ".fs-verity" keyring is empty, due to builtin signatures in fsverity_verify_signature()
H A DKconfig43 fs-verity builtin signatures.
46 the only way to do signatures with fs-verity, and the
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/
H A Dtpm2-tss-engine_1.2.0.bb2 …or downwards communication. It supports RSA decryption and signatures as well as ECDSA signatures."
13 file://0002-Fix-mismatch-of-OpenSSL-function-signatures-that-cau.patch \
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DSignatureCollection_v1.xml42 …<Annotation Term="OData.Description" String="Signatures can be installed through a `POST` to the s…
57 …dfish/v1/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String>
58 …BlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String>
59 …BlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String>
H A DSignature_v1.xml49 … <Annotation Term="OData.Description" String="Use the `DELETE` operation to remove signatures."/>
54 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S…
55 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S…
56 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S…
/openbmc/linux/security/integrity/platform_certs/
H A Dload_powerpc.c104 pr_err("Couldn't parse db signatures: %d\n", rc); in load_powerpc_certs()
121 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_powerpc_certs()
137 pr_err("Couldn't parse trustedcadb signatures: %d\n", rc); in load_powerpc_certs()
153 pr_err("Couldn't parse moduledb signatures: %d\n", rc); in load_powerpc_certs()
H A Dload_uefi.c130 pr_err("Couldn't parse MokListRT signatures from EFI MOKvar config table: %d\n", in load_moklist_certs()
143 pr_err("Couldn't parse MokListRT signatures: %d\n", rc); in load_moklist_certs()
193 pr_err("Couldn't parse db signatures: %d\n", in load_uefi_certs()
210 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_uefi_certs()
229 pr_err("Couldn't parse mokx signatures %d\n", rc); in load_uefi_certs()
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DSignatureCollection.json93 … "/redfish/v1/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures",
94 …esourceBlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures",
95 …ResourceBlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures"
/openbmc/linux/Documentation/admin-guide/
H A Dmodule-signing.rst13 .. - Non-valid signatures and unsigned modules.
30 involved. The signatures are not themselves encoded in any industrial standard
93 their signatures checked without causing a dependency loop.
128 Cryptographic keypairs are required to generate and check signatures. A
132 kernel so that it can be used to check the signatures as the modules are
260 Non-valid signatures and unsigned modules
/openbmc/openbmc/poky/meta/recipes-extended/zip/zip-3.0/
H A D0001-configure-Include-dirent.h-for-closedir-opendir-APIs.patch11 without including signatures, it fails to build the test
12 due to missing signatures which come from dirent.h
/openbmc/phosphor-certificate-manager/
H A Dcerts_manager.hpp149 * - CRLSigning: The public key is used for verifying signatures on
157 * signatures, other than signatures on certificatesand CRLs.
161 * - KeyCertSign: The public key is used for verifying signatures on
166 * signatures, other than signatures on certificates and CRLs, and
/openbmc/linux/Documentation/ABI/testing/
H A Dima_policy56 limited to fsverity digest based signatures
146 Example of appraise rule allowing modsig appended signatures:
172 signatures (format version 3) stored in security.ima xattr.
/openbmc/linux/tools/testing/selftests/kexec/
H A Dtest_kexec_file_load.sh6 # both signatures depending on the IMA policy, or none.
64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures"
228 # Are there pe and ima signatures

12345678910