Home
last modified time | relevance | path

Searched full:signed (Results 1 – 25 of 3851) sorted by relevance

12345678910>>...155

/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmicert_management.robot33 Get CSR Request Signed By VMI And Verify
34 [Documentation] Get CSR request signed by VMI using different user roles and verify.
36 [Template] Get Certificate Signed By VMI
76 [Template] Get Certificate Signed By VMI
91 Get Corrupted CSR Request Signed By VMI And Verify
94 [Template] Get Certificate Signed By VMI
170 …... Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_…
171 …... Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_…
172 …... Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_…
173 …... Get Certificate Signed By VMI ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} ${True} ${True} ${HTTP_…
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/json-schema-validator/json-schema-validator/
H A D0002-Fix-assumed-signed-char.patch4 Subject: [PATCH 2/3] Fix assumed signed char
6 The code assumes that char is signed, but whether char is signed or
12 Fix this by specifying signed char.
16 Signed-off-by: Parian Golchin <Parian.Golchin@iris-sensing.com>
30 +static const signed char _address_trans_keys[] = {
39 + const signed char * _keys;
40 const signed char * _acts;
50 + const signed char *_lower = _keys;
51 + const signed char *_upper = _keys + _klen - 1;
52 + const signed char *_mid;
[all …]
/openbmc/linux/arch/parisc/include/uapi/asm/
H A Dstat.h15 signed int st_size;
16 signed int st_atime;
18 signed int st_mtime;
20 signed int st_ctime;
55 signed long long st_size;
56 signed int st_blksize;
58 signed long long st_blocks;
59 signed int st_atime;
61 signed int st_mtime;
63 signed int st_ctime;
/openbmc/qemu/target/hexagon/idef-parser/
H A Didef-parser.lex84 yylval->rvalue.signedness = SIGNED;
93 yylval->rvalue.signedness = SIGNED;
101 yylval->rvalue.signedness = SIGNED;
110 yylval->rvalue.signedness = SIGNED;
119 yylval->rvalue.signedness = SIGNED;
123 yylval->rvalue.signedness = SIGNED;
134 yylval->rvalue.signedness = SIGNED;
141 yylval->rvalue.signedness = SIGNED;
182 "fSATN" { yylval->sat.signedness = SIGNED;
187 yylval->cast.signedness = SIGNED;
[all …]
/openbmc/linux/arch/ia64/include/asm/
H A Dasm-prototypes.h18 signed int __divsi3(signed int, unsigned int);
19 signed int __modsi3(signed int, unsigned int);
21 signed long long __divdi3(signed long long, unsigned long long);
22 signed long long __moddi3(signed long long, unsigned long long);
/openbmc/u-boot/doc/uImage.FIT/
H A Dsignature.txt10 The signature feature allows the hash to be signed with a private key such
95 When the image is signed, the following properties are added (mandatory):
99 When the image is signed, the following properties are optional:
101 - timestamp: Time when image was signed (standard Unix time_t format)
112 For config bindings (see Signed Configurations below), the following
117 two images will be looked up in the config and signed if present.
137 In order to verify an image that has been signed with a public key we need to
138 have a trusted public key. This cannot be stored in the signed image, since
171 Signed Configurations
175 FIT with the same signed images, but with the configuration changed such
[all …]
/openbmc/linux/arch/mips/include/asm/octeon/
H A Dcvmx-fau.h147 * @value: Signed value to add.
166 * @value: Signed value to add.
181 * @value: Signed value to add.
197 * @value: Signed value to add.
211 * @value: Signed value to add.
226 * @value: Signed value to add.
250 * @value: Signed value to add.
275 * @value: Signed value to add.
298 * @value: Signed value to add.
319 * @value: Signed value to add.
[all …]
/openbmc/linux/tools/include/nolibc/
H A Dstdint.h11 typedef signed char int8_t;
13 typedef signed short int16_t;
15 typedef signed int int32_t;
17 typedef signed long long int64_t;
19 typedef signed long ssize_t;
21 typedef signed long intptr_t;
22 typedef signed long ptrdiff_t;
H A Dstd.h27 typedef signed int pid_t;
31 typedef signed long off_t;
32 typedef signed long blksize_t;
33 typedef signed long blkcnt_t;
34 typedef signed long time_t;
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/
H A DMeasurementSet.interface.yaml7 This method generates an SPDM cryptographic signed statement over the
20 A 32-byte hex-encoded string to be signed with the measurements.
39 signed statement.
48 Base64 encoded cryptographic signed statement generated by the
54 cryptographic signed statement.
59 cryptographic signed statement.
/openbmc/linux/include/linux/
H A Dmath64.h33 * div_s64_rem - signed 64bit divide with 32bit divisor with remainder
34 * @dividend: signed 64bit dividend
35 * @divisor: signed 32bit divisor
36 * @remainder: pointer to signed 32bit remainder
73 * div64_s64 - signed 64bit divide with 64bit divisor
74 * @dividend: signed 64bit dividend
75 * @divisor: signed 64bit divisor
135 * div_s64 - signed 64bit divide with 32bit divisor
136 * @dividend: signed 64bit dividend
137 * @divisor: signed 32bit divisor
[all …]
/openbmc/linux/tools/testing/selftests/kexec/
H A Dtest_kexec_file_load.sh8 # To determine whether the kernel image is signed, this test depends
19 # be signed, but these policy rules may be replaced with a custom
36 # kexec kernel image be signed. Policy rules are walked
67 log_info "kexec kernel image PE signed"
69 log_info "kexec kernel image not PE signed"
89 log_info "kexec kernel image IMA signed"
91 log_info "kexec kernel image not IMA signed"
106 log_info "kexec kernel image modsig signed"
108 log_info "kexec kernel image not modsig signed"
215 "kexec signed kernel image required"
[all …]
/openbmc/linux/security/integrity/ima/
H A DKconfig178 to be signed. Unsigned files might prevent the system from
186 This option defines a policy requiring all firmware to be signed,
197 be signed and verified by a public key on the trusted IMA
209 Enabling this rule will require all kernel modules to be signed
221 Enabling this rule will require the IMA policy to be signed and
241 appended signature is the same used for signed kernel modules.
246 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)"
254 key is validly signed by a CA cert in the system built-in or
260 provided they are validly signed by a key already resident in the
281 X509 certificates signed by a trusted key on the
[all …]
/openbmc/linux/Documentation/admin-guide/
H A Dmodule-signing.rst11 .. - Signed modules and stripping.
12 .. - Loading signed modules.
24 or modules signed with an invalid key. Module signing increases security by
49 (1) :menuselection:`Require modules to be validly signed`
71 If this is on then modules will be automatically signed during the
73 be signed manually using::
78 (3) :menuselection:`Which hash algorithm should modules be signed with?`
92 than being a module) so that modules signed with that algorithm can have
101 and allow the kernel modules to be signed with a key of your choosing.
207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
[all …]
/openbmc/linux/sound/core/oss/
H A Drate.c36 signed short last_S1;
37 signed short last_S2;
70 signed int val; in resample_expand()
71 signed short S1, S2; in resample_expand()
72 signed short *src, *dst; in resample_expand()
90 src = (signed short *)src_channels[channel].area.addr + in resample_expand()
92 dst = (signed short *)dst_channels[channel].area.addr + in resample_expand()
107 val = S1 + ((S2 - S1) * (signed int)pos) / BITS; in resample_expand()
129 signed int val; in resample_shrink()
130 signed short S1, S2; in resample_shrink()
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/netcat/netcat/
H A Dmake-netcat_flag_count_work.patch6 signed char
7 A char has the same range of values as signed char on X86,
9 return a negative value, now we force variable c as signed char
14 Signed-off-by: Roy.Li <rongqing.li@windriver.com>
28 + register signed char c;
/openbmc/openbmc/meta-arm/ci/
H A Dpatchreview9 # - validate signed-off-by
37 # Whether the patch has a Signed-off-by or not
39 # Whether the Signed-off-by tag is malformed in some way
41 # The Signed-off-by tag value
70 sob_re = re.compile(r"^[\t ]*(Signed[-_ ]off[-_ ]by:?)[\t ]*(.+)", re.IGNORECASE | re.MULTILINE)
84 # Find the Signed-off-by tag
88 if value != "Signed-off-by:":
155 print("Missing Signed-off-by tag (%s)" % patch)
159 print("Malformed Signed-off-by '%s' (%s)" % (r.malformed_sob, patch))
194 Patches missing Signed-off-by: %s
[all …]
/openbmc/openbmc-build-scripts/config/gitlint/
H A Dbad_signedoffby.py7 name = "bad-signed-off-by"
17 x for x in commit.message.body if x.startswith("Signed-off-by:")
20 match = re.search("Signed-off-by: (.*) <(.*)>", sob)
23 RuleViolation(self.id, "Invalid Signed-off-by format", sob)
34 … "Signed-off-by user has too few words; likely user id instead of legal name?",
/openbmc/openbmc-test-automation/redfish/update_service/
H A Dtest_redfish_signed_image_update.robot2 Documentation Redfish BMC/Host signed and unsigned code update
3 ... over BMC functional signed image.
36 Redfish Signed Code Update
37 [Documentation] BMC/Host signed code update over functional signed
40 [Template] Redfish Signed Firmware Update
47 [Documentation] BMC/Host unsigned code update over functional signed
77 Redfish Signed Firmware Update
/openbmc/qemu/.gitlab-ci.d/
H A Dcheck-dco.py3 # check-dco.py: validate all commits are signed off
36 print("\nChecking for 'Signed-off-by: NAME <EMAIL>' " +
57 if "Signed-off-by:" in line:
64 print(" ❌ FAIL missing Signed-off-by tag")
70 ❌ ERROR: One or more commits are missing a valid Signed-off-By tag.
81 Signed-off-by: YOUR NAME <EMAIL>
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/ippool/ippool/
H A D0001-Use-unsigned-int-type-for-1-bit-integer-bitfield.patch6 In C++, signed integers are represented in two's complement. This also applies to signed bitfields.
7 A signed bitfield composed of one bit can therefore store a value in the range -1 to 0.
9 Therefore fix this case by using unsigned int instead of signed int
12 Signed-off-by: Khem Raj <raj.khem@gmail.com>
/openbmc/qemu/tests/tcg/hexagon/
H A Dtest_cmp.S1 /* Purpose: test a signed and unsigned comparison */
8 jump signed
11 .globl signed
12 signed: label
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-multimedia/libmodplug/libmodplug/
H A D0001-fastmix-Drop-register-storage-class-keyword.patch9 Signed-off-by: Khem Raj <raj.khem@gmail.com>
25 const signed char *p = (signed char *)(pChn->pCurrentSample+pChn->nPos);\
34 const signed short *p = (signed short *)(pChn->pCurrentSample+(pChn->nPos*2));\
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/
H A D0003-configure.ac-allow-cross-compilation.patch12 Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
13 Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16 Signed-off-by: Changqing Li <changqing.li@windriver.com>
19 Signed-off-by: Randy MacLeod <randy.macleod@windriver.com>
20 Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
/openbmc/u-boot/doc/imx/habv4/guides/
H A Dencrypted_boot.txt36 cat u-boot-dtb.imx csf-u-boot.bin > u-boot-signed.imx
38 u-boot-signed.imx u-boot-signed-pad.bin
39 cat u-boot-signed-pad.imx DEK_blob.bin > u-boot-encrypted.imx
41 NOTE: u-boot-signed.bin needs to be padded to the value

12345678910>>...155