/openbmc/openbmc/poky/scripts/lib/checklayer/cases/ |
H A D | bsp.py | 73 # Collect signatures for all machines that we are testing 79 # signatures do not agree on how to execute the task. 152 signatures = tasks[task] 154 # different signatures in some cases, for example in 161 if len(signatures.keys()) > 1 and \ 165 # Sort signatures by machines, because the hex values don't mean anything. 170 next_line_key = (pn, sorted(signatures.values())) 173 … line += ' != '.join(['%s (%s)' % (signature, ', '.join([m for m in signatures[signature]])) for 174 … signature in sorted(signatures.keys(), key=lambda s: signatures[s])]) 177 # Randomly pick two mismatched signatures and remember how to invoke [all …]
|
/openbmc/linux/tools/testing/selftests/arm64/pauth/ |
H A D | pac.c | 39 void sign_specific(struct signatures *sign, size_t val) in sign_specific() 47 void sign_all(struct signatures *sign, size_t val) in sign_all() 56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same() 70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set() 92 int exec_sign_all(struct signatures *signed_vals, size_t val) in exec_sign_all() 179 ret = read(new_stdout[0], signed_vals, sizeof(struct signatures)); in exec_sign_all() 260 struct signatures signed_vals; in TEST() 299 struct signatures new_keys; in TEST() 300 struct signatures old_keys; in TEST() 333 struct signatures trash; in TEST() [all …]
|
H A D | exec_target.c | 12 struct signatures signed_vals; in main() 31 fwrite(&signed_vals, sizeof(struct signatures), 1, stdout); in main()
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 34 code. CRLSigning: The public key is used for verifying signatures on 42 signatures, other than signatures on certificates 47 KeyCertSign: The public key is used for verifying signatures on 51 NonRepudiation: The public key is used to verify digital signatures, 52 other than signatures on certificates and CRLs,
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/CSR/ |
H A D | Create.interface.yaml | 97 verifying signatures on 107 signatures, other than signatures on 113 KeyCertSign: The public key is used for verifying signatures on 119 signatures, 120 other than signatures on certificates and CRLs,
|
/openbmc/linux/security/integrity/ima/ |
H A D | Kconfig | 182 bool "Appraise firmware signatures" 192 bool "Appraise kexec kernel image signatures" 200 Kernel image signatures can not be verified by the original 205 bool "Appraise kernel modules signatures" 212 Kernel module signatures can only be verified by IMA-appraisal, 233 bool "Support module-style signatures for appraisal" 240 Adds support for signatures appended to files. The format of the 243 to accept such signatures.
|
/openbmc/libcper/generator/sections/ |
H A D | gen-section-nvidia.c | 18 const char *signatures[] = { in generate_section_nvidia() local 46 int idx_random = rand() % (sizeof(signatures) / sizeof(signatures[0])); in generate_section_nvidia() 47 strncpy(nvidia_error->Signature, signatures[idx_random], in generate_section_nvidia()
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | bblock.rst | 9 Then, it compares these signatures with the ones from the sstate cache (if they 20 specific signatures, forcing BitBake to use the sstate cache for them. 28 with caution. If you do not understand why signatures change, see the section 75 ``bblock`` will dump the signatures in the ``build/conf/bblock.conf`` file, 98 have locked signatures.
|
/openbmc/linux/drivers/scsi/ |
H A D | fdomain_isa.c | 40 * The following BIOS signature signatures are for boards which do *NOT* 65 } signatures[] = { variable 84 #define SIGNATURE_COUNT ARRAY_SIZE(signatures) 101 if (check_signature(p + signatures[i].offset, in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match() 103 signatures[i].length)) in fdomain_isa_match() 107 sig = &signatures[i]; in fdomain_isa_match()
|
/openbmc/openbmc/poky/scripts/ |
H A D | sstate-diff-machines.sh | 142 …rintf "\n\n === Comparing signatures for task ${TASK} between ${MACHINE1} and ${MACHINE2} ===\n" |… 143 …}/list.M | grep ${PRE_PATTERN} "${PATTERN}" | grep ${TASK} > ${OUTPUT}/signatures.${MACHINE2}.${TA… 144 …for i in `cat ${OUTPUT}/signatures.${MACHINE2}.${TASK} | sed 's#[^/]*/\([^/]*\)/.*#\1#g' | sort -u… 153 done | tee -a ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log 155 ERRORS=`grep "^ERROR.*" ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log | wc -l` 157 echo "ERROR: ${ERRORS} errors found in ${OUTPUT}/signatures.${MACHINE2}.${TASK}.log"
|
H A D | buildhistory-diff | 47 parser.add_argument('-s', '---signatures', 51 help="Report list of signatures differing instead of output") 52 parser.add_argument('-S', '--signatures-with-diff',
|
H A D | yocto-check-layer | 69 help='check that software layers do not change signatures (on by default)') 178 …logger.info("%s already in %s. To capture initial signatures, layer under test should not present " 211 logger.info('Getting initial signatures ...') 218 results_status[layer['name']] = 'FAIL (Generating world signatures)'
|
/openbmc/linux/fs/verity/ |
H A D | signature.c | 3 * Verification of builtin signatures 9 * This file implements verification of fs-verity builtin signatures. Please 11 * signatures with fs-verity, and the alternatives (such as userspace signature 67 * The ".fs-verity" keyring is empty, due to builtin signatures in fsverity_verify_signature()
|
H A D | Kconfig | 43 fs-verity builtin signatures. 46 the only way to do signatures with fs-verity, and the
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/ |
H A D | tpm2-tss-engine_1.2.0.bb | 2 …or downwards communication. It supports RSA decryption and signatures as well as ECDSA signatures." 13 file://0002-Fix-mismatch-of-OpenSSL-function-signatures-that-cau.patch \
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | SignatureCollection_v1.xml | 42 …<Annotation Term="OData.Description" String="Signatures can be installed through a `POST` to the s… 57 …dfish/v1/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String> 58 …BlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String> 59 …BlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures</String>
|
H A D | Signature_v1.xml | 49 … <Annotation Term="OData.Description" String="Use the `DELETE` operation to remove signatures."/> 54 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S… 55 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S… 56 …Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures/{SignatureId}</S…
|
/openbmc/linux/security/integrity/platform_certs/ |
H A D | load_powerpc.c | 104 pr_err("Couldn't parse db signatures: %d\n", rc); in load_powerpc_certs() 121 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_powerpc_certs() 137 pr_err("Couldn't parse trustedcadb signatures: %d\n", rc); in load_powerpc_certs() 153 pr_err("Couldn't parse moduledb signatures: %d\n", rc); in load_powerpc_certs()
|
H A D | load_uefi.c | 130 pr_err("Couldn't parse MokListRT signatures from EFI MOKvar config table: %d\n", in load_moklist_certs() 143 pr_err("Couldn't parse MokListRT signatures: %d\n", rc); in load_moklist_certs() 193 pr_err("Couldn't parse db signatures: %d\n", in load_uefi_certs() 210 pr_err("Couldn't parse dbx signatures: %d\n", rc); in load_uefi_certs() 229 pr_err("Couldn't parse mokx signatures %d\n", rc); in load_uefi_certs()
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | SignatureCollection.json | 93 … "/redfish/v1/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures", 94 …esourceBlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures", 95 …ResourceBlockId}/Systems/{ComputerSystemId}/SecureBoot/SecureBootDatabases/{DatabaseId}/Signatures"
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | module-signing.rst | 13 .. - Non-valid signatures and unsigned modules. 30 involved. The signatures are not themselves encoded in any industrial standard 93 their signatures checked without causing a dependency loop. 128 Cryptographic keypairs are required to generate and check signatures. A 132 kernel so that it can be used to check the signatures as the modules are 260 Non-valid signatures and unsigned modules
|
/openbmc/openbmc/poky/meta/recipes-extended/zip/zip-3.0/ |
H A D | 0001-configure-Include-dirent.h-for-closedir-opendir-APIs.patch | 11 without including signatures, it fails to build the test 12 due to missing signatures which come from dirent.h
|
/openbmc/phosphor-certificate-manager/ |
H A D | certs_manager.hpp | 149 * - CRLSigning: The public key is used for verifying signatures on 157 * signatures, other than signatures on certificatesand CRLs. 161 * - KeyCertSign: The public key is used for verifying signatures on 166 * signatures, other than signatures on certificates and CRLs, and
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | ima_policy | 56 limited to fsverity digest based signatures 146 Example of appraise rule allowing modsig appended signatures: 172 signatures (format version 3) stored in security.ima xattr.
|
/openbmc/linux/tools/testing/selftests/kexec/ |
H A D | test_kexec_file_load.sh | 6 # both signatures depending on the IMA policy, or none. 64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures" 228 # Are there pe and ima signatures
|