/openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
H A D | test_vmicert_management.robot | 33 Get CSR Request Signed By VMI And Verify 34 [Documentation] Get CSR request signed by VMI using different user roles and verify. 36 [Template] Get Certificate Signed By VMI 76 [Template] Get Certificate Signed By VMI 91 Get Corrupted CSR Request Signed By VMI And Verify 94 [Template] Get Certificate Signed By VMI 170 …... Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_… 171 …... Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_… 172 …... Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_… 173 …... Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_… [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/json-schema-validator/json-schema-validator/ |
H A D | 0002-Fix-assumed-signed-char.patch | 4 Subject: [PATCH 2/3] Fix assumed signed char 6 The code assumes that char is signed, but whether char is signed or 12 Fix this by specifying signed char. 16 Signed-off-by: Parian Golchin <Parian.Golchin@iris-sensing.com> 30 +static const signed char _address_trans_keys[] = { 39 + const signed char * _keys; 40 const signed char * _acts; 50 + const signed char *_lower = _keys; 51 + const signed char *_upper = _keys + _klen - 1; 52 + const signed char *_mid; [all …]
|
/openbmc/linux/arch/parisc/include/uapi/asm/ |
H A D | stat.h | 15 signed int st_size; 16 signed int st_atime; 18 signed int st_mtime; 20 signed int st_ctime; 55 signed long long st_size; 56 signed int st_blksize; 58 signed long long st_blocks; 59 signed int st_atime; 61 signed int st_mtime; 63 signed int st_ctime;
|
/openbmc/qemu/target/hexagon/idef-parser/ |
H A D | idef-parser.lex | 84 yylval->rvalue.signedness = SIGNED; 93 yylval->rvalue.signedness = SIGNED; 101 yylval->rvalue.signedness = SIGNED; 110 yylval->rvalue.signedness = SIGNED; 119 yylval->rvalue.signedness = SIGNED; 123 yylval->rvalue.signedness = SIGNED; 134 yylval->rvalue.signedness = SIGNED; 141 yylval->rvalue.signedness = SIGNED; 182 "fSATN" { yylval->sat.signedness = SIGNED; 187 yylval->cast.signedness = SIGNED; [all …]
|
/openbmc/linux/arch/ia64/include/asm/ |
H A D | asm-prototypes.h | 18 signed int __divsi3(signed int, unsigned int); 19 signed int __modsi3(signed int, unsigned int); 21 signed long long __divdi3(signed long long, unsigned long long); 22 signed long long __moddi3(signed long long, unsigned long long);
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | signature.txt | 10 The signature feature allows the hash to be signed with a private key such 95 When the image is signed, the following properties are added (mandatory): 99 When the image is signed, the following properties are optional: 101 - timestamp: Time when image was signed (standard Unix time_t format) 112 For config bindings (see Signed Configurations below), the following 117 two images will be looked up in the config and signed if present. 137 In order to verify an image that has been signed with a public key we need to 138 have a trusted public key. This cannot be stored in the signed image, since 171 Signed Configurations 175 FIT with the same signed images, but with the configuration changed such [all …]
|
/openbmc/linux/arch/mips/include/asm/octeon/ |
H A D | cvmx-fau.h | 147 * @value: Signed value to add. 166 * @value: Signed value to add. 181 * @value: Signed value to add. 197 * @value: Signed value to add. 211 * @value: Signed value to add. 226 * @value: Signed value to add. 250 * @value: Signed value to add. 275 * @value: Signed value to add. 298 * @value: Signed value to add. 319 * @value: Signed value to add. [all …]
|
/openbmc/linux/tools/include/nolibc/ |
H A D | stdint.h | 11 typedef signed char int8_t; 13 typedef signed short int16_t; 15 typedef signed int int32_t; 17 typedef signed long long int64_t; 19 typedef signed long ssize_t; 21 typedef signed long intptr_t; 22 typedef signed long ptrdiff_t;
|
H A D | std.h | 27 typedef signed int pid_t; 31 typedef signed long off_t; 32 typedef signed long blksize_t; 33 typedef signed long blkcnt_t; 34 typedef signed long time_t;
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/ |
H A D | MeasurementSet.interface.yaml | 7 This method generates an SPDM cryptographic signed statement over the 20 A 32-byte hex-encoded string to be signed with the measurements. 39 signed statement. 48 Base64 encoded cryptographic signed statement generated by the 54 cryptographic signed statement. 59 cryptographic signed statement.
|
/openbmc/linux/include/linux/ |
H A D | math64.h | 33 * div_s64_rem - signed 64bit divide with 32bit divisor with remainder 34 * @dividend: signed 64bit dividend 35 * @divisor: signed 32bit divisor 36 * @remainder: pointer to signed 32bit remainder 73 * div64_s64 - signed 64bit divide with 64bit divisor 74 * @dividend: signed 64bit dividend 75 * @divisor: signed 64bit divisor 135 * div_s64 - signed 64bit divide with 32bit divisor 136 * @dividend: signed 64bit dividend 137 * @divisor: signed 32bit divisor [all …]
|
/openbmc/linux/tools/testing/selftests/kexec/ |
H A D | test_kexec_file_load.sh | 8 # To determine whether the kernel image is signed, this test depends 19 # be signed, but these policy rules may be replaced with a custom 36 # kexec kernel image be signed. Policy rules are walked 67 log_info "kexec kernel image PE signed" 69 log_info "kexec kernel image not PE signed" 89 log_info "kexec kernel image IMA signed" 91 log_info "kexec kernel image not IMA signed" 106 log_info "kexec kernel image modsig signed" 108 log_info "kexec kernel image not modsig signed" 215 "kexec signed kernel image required" [all …]
|
/openbmc/linux/security/integrity/ima/ |
H A D | Kconfig | 178 to be signed. Unsigned files might prevent the system from 186 This option defines a policy requiring all firmware to be signed, 197 be signed and verified by a public key on the trusted IMA 209 Enabling this rule will require all kernel modules to be signed 221 Enabling this rule will require the IMA policy to be signed and 241 appended signature is the same used for signed kernel modules. 246 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)" 254 key is validly signed by a CA cert in the system built-in or 260 provided they are validly signed by a key already resident in the 281 X509 certificates signed by a trusted key on the [all …]
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | module-signing.rst | 11 .. - Signed modules and stripping. 12 .. - Loading signed modules. 24 or modules signed with an invalid key. Module signing increases security by 49 (1) :menuselection:`Require modules to be validly signed` 71 If this is on then modules will be automatically signed during the 73 be signed manually using:: 78 (3) :menuselection:`Which hash algorithm should modules be signed with?` 92 than being a module) so that modules signed with that algorithm can have 101 and allow the kernel modules to be signed with a key of your choosing. 207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key [all …]
|
/openbmc/linux/sound/core/oss/ |
H A D | rate.c | 36 signed short last_S1; 37 signed short last_S2; 70 signed int val; in resample_expand() 71 signed short S1, S2; in resample_expand() 72 signed short *src, *dst; in resample_expand() 90 src = (signed short *)src_channels[channel].area.addr + in resample_expand() 92 dst = (signed short *)dst_channels[channel].area.addr + in resample_expand() 107 val = S1 + ((S2 - S1) * (signed int)pos) / BITS; in resample_expand() 129 signed int val; in resample_shrink() 130 signed short S1, S2; in resample_shrink() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/netcat/netcat/ |
H A D | make-netcat_flag_count_work.patch | 6 signed char 7 A char has the same range of values as signed char on X86, 9 return a negative value, now we force variable c as signed char 14 Signed-off-by: Roy.Li <rongqing.li@windriver.com> 28 + register signed char c;
|
/openbmc/openbmc/meta-arm/ci/ |
H A D | patchreview | 9 # - validate signed-off-by 37 # Whether the patch has a Signed-off-by or not 39 # Whether the Signed-off-by tag is malformed in some way 41 # The Signed-off-by tag value 70 sob_re = re.compile(r"^[\t ]*(Signed[-_ ]off[-_ ]by:?)[\t ]*(.+)", re.IGNORECASE | re.MULTILINE) 84 # Find the Signed-off-by tag 88 if value != "Signed-off-by:": 155 print("Missing Signed-off-by tag (%s)" % patch) 159 print("Malformed Signed-off-by '%s' (%s)" % (r.malformed_sob, patch)) 194 Patches missing Signed-off-by: %s [all …]
|
/openbmc/openbmc-build-scripts/config/gitlint/ |
H A D | bad_signedoffby.py | 7 name = "bad-signed-off-by" 17 x for x in commit.message.body if x.startswith("Signed-off-by:") 20 match = re.search("Signed-off-by: (.*) <(.*)>", sob) 23 RuleViolation(self.id, "Invalid Signed-off-by format", sob) 34 … "Signed-off-by user has too few words; likely user id instead of legal name?",
|
/openbmc/openbmc-test-automation/redfish/update_service/ |
H A D | test_redfish_signed_image_update.robot | 2 Documentation Redfish BMC/Host signed and unsigned code update 3 ... over BMC functional signed image. 36 Redfish Signed Code Update 37 [Documentation] BMC/Host signed code update over functional signed 40 [Template] Redfish Signed Firmware Update 47 [Documentation] BMC/Host unsigned code update over functional signed 77 Redfish Signed Firmware Update
|
/openbmc/qemu/.gitlab-ci.d/ |
H A D | check-dco.py | 3 # check-dco.py: validate all commits are signed off 36 print("\nChecking for 'Signed-off-by: NAME <EMAIL>' " + 57 if "Signed-off-by:" in line: 64 print(" ❌ FAIL missing Signed-off-by tag") 70 ❌ ERROR: One or more commits are missing a valid Signed-off-By tag. 81 Signed-off-by: YOUR NAME <EMAIL>
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/ippool/ippool/ |
H A D | 0001-Use-unsigned-int-type-for-1-bit-integer-bitfield.patch | 6 In C++, signed integers are represented in two's complement. This also applies to signed bitfields. 7 A signed bitfield composed of one bit can therefore store a value in the range -1 to 0. 9 Therefore fix this case by using unsigned int instead of signed int 12 Signed-off-by: Khem Raj <raj.khem@gmail.com>
|
/openbmc/qemu/tests/tcg/hexagon/ |
H A D | test_cmp.S | 1 /* Purpose: test a signed and unsigned comparison */ 8 jump signed 11 .globl signed 12 signed: label
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-multimedia/libmodplug/libmodplug/ |
H A D | 0001-fastmix-Drop-register-storage-class-keyword.patch | 9 Signed-off-by: Khem Raj <raj.khem@gmail.com> 25 const signed char *p = (signed char *)(pChn->pCurrentSample+pChn->nPos);\ 34 const signed short *p = (signed short *)(pChn->pCurrentSample+(pChn->nPos*2));\
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/ |
H A D | 0003-configure.ac-allow-cross-compilation.patch | 12 Signed-off-by: Jackie Huang <jackie.huang@windriver.com> 13 Signed-off-by: Yi Zhao <yi.zhao@windriver.com> 16 Signed-off-by: Changqing Li <changqing.li@windriver.com> 19 Signed-off-by: Randy MacLeod <randy.macleod@windriver.com> 20 Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
|
/openbmc/u-boot/doc/imx/habv4/guides/ |
H A D | encrypted_boot.txt | 36 cat u-boot-dtb.imx csf-u-boot.bin > u-boot-signed.imx 38 u-boot-signed.imx u-boot-signed-pad.bin 39 cat u-boot-signed-pad.imx DEK_blob.bin > u-boot-encrypted.imx 41 NOTE: u-boot-signed.bin needs to be padded to the value
|