Home
last modified time | relevance | path

Searched full:signature (Results 1 – 25 of 1730) sorted by relevance

12345678910>>...70

/kernel/linux/linux-6.6/Documentation/arch/arm64/
Dacpi_object_usage.rst9 specification where the object is defined. If "Signature Reserved" is used,
10 the table signature (the first four bytes of the table) is the only portion
30 AEST Signature Reserved (signature == "AEST")
37 AGDI Signature Reserved (signature == "AGDI")
44 APMT Signature Reserved (signature == "APMT")
51 BERT Section 18.3 (signature == "BERT")
58 BOOT Signature Reserved (signature == "BOOT")
64 BGRT Section 5.2.22 (signature == "BGRT")
71 CEDT Signature Reserved (signature == "CEDT")
78 CPEP Section 5.2.18 (signature == "CPEP")
[all …]
/kernel/linux/linux-6.6/tools/crypto/ccp/
Ddbc.c21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument
24 .auth_needed = !!signature, in get_nonce()
29 if (signature) in get_nonce()
30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce()
39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument
44 assert(signature); in set_uid()
47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid()
54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument
62 assert(signature); in process_param()
65 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param()
[all …]
Dtest_dbc.py36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
142 get_nonce(self.d, self.signature)
148 set_uid(self.d, self.uid, self.signature)
154 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature)
160 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000)
173 set_uid(self.d, self.uid, self.signature)
177 get_nonce(self.d, self.signature)
193 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature)
194 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature)
198 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature)
[all …]
Ddbc.py33 def get_nonce(device, signature): argument
37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature)
43 def set_uid(device, new_uid, signature): argument
44 if not signature:
45 raise ValueError("Signature required")
48 ret = lib.set_uid(device.fileno(), new_uid, signature)
54 def process_param(device, message, signature, data=None): argument
55 if not signature:
56 raise ValueError("Signature required")
60 sig = ctypes.create_string_buffer(signature, len(signature))
Ddbc_cli.py17 errno.EPERM: "Signature invalid",
50 parser.add_argument("--signature", help="File containing signature for command")
71 if args.signature:
72 if not os.path.exists(args.signature):
73 raise ValueError("Invalid signature file %s" % args.signature)
74 with open(args.signature, "rb") as f:
78 "Invalid signature length %d (expected %d)" % (len(sig), DBC_SIG_SIZE)
113 param, signature = process_param(d, messages[args.message], sig) variable
115 "Parameter: {par}, response signature {sig}".format(
117 sig=_pretty_buffer(bytes(signature)),
[all …]
/kernel/linux/linux-5.10/Documentation/arm64/
Dacpi_object_usage.rst9 specification where the object is defined. If "Signature Reserved" is used,
10 the table signature (the first four bytes of the table) is the only portion
30 BERT Section 18.3 (signature == "BERT")
37 BOOT Signature Reserved (signature == "BOOT")
43 BGRT Section 5.2.22 (signature == "BGRT")
50 CPEP Section 5.2.18 (signature == "CPEP")
58 CSRT Signature Reserved (signature == "CSRT")
64 DBG2 Signature Reserved (signature == "DBG2")
71 DBGP Signature Reserved (signature == "DBGP")
77 DSDT Section 5.2.11.1 (signature == "DSDT")
[all …]
/kernel/linux/linux-6.6/drivers/net/wwan/iosm/
Diosm_ipc_mux_codec.h37 /* ACBH: Signature of the Aggregated Command Block Header. */
40 /* ADTH: Signature of the Aggregated Datagram Table Header. */
43 /* ADBH: Signature of the Aggregated Data Block Header. */
46 /* ADGH: Signature of the Datagram Header. */
55 /* ADGH: Signature of the Datagram Header. */
58 /* CMDH: Signature of the Command Header. */
61 /* QLTH: Signature of the Queue Level Table */
64 /* FCTH: Signature of the Flow Credit Table */
90 * @signature: Signature of the Command Header.
101 __le32 signature; member
[all …]
/kernel/linux/linux-6.6/Documentation/security/
Ddigsig.rst2 Digital Signature Verification API
19 Digital signature verification API provides a method to verify digital signature.
22 Digital signature verification is implemented using cut-down kernel port of
27 Public key and signature consist of header and MPIs::
38 uint8_t version; /* signature format version */
39 time_t timestamp; /* signature made */
48 Signature header is used as an input to generate a signature.
49 Such approach insures that key or signature header could not be changed.
58 digsig_verify() - digital signature verification with public key
62 * digsig_verify() - digital signature verification with public key
[all …]
/kernel/linux/linux-5.10/Documentation/security/
Ddigsig.rst2 Digital Signature Verification API
19 Digital signature verification API provides a method to verify digital signature.
22 Digital signature verification is implemented using cut-down kernel port of
27 Public key and signature consist of header and MPIs::
38 uint8_t version; /* signature format version */
39 time_t timestamp; /* signature made */
48 Signature header is used as an input to generate a signature.
49 Such approach insures that key or signature header could not be changed.
58 digsig_verify() - digital signature verification with public key
62 * digsig_verify() - digital signature verification with public key
[all …]
/kernel/linux/linux-5.10/tools/power/acpi/os_specific/service_layers/
Doslinuxtbl.c22 char signature[ACPI_NAMESEG_SIZE]; member
31 osl_table_name_from_file(char *filename, char *signature, u32 *instance);
33 static acpi_status osl_add_table_to_list(char *signature, u32 instance);
42 char *signature, struct acpi_table_header **table);
57 char *signature,
65 osl_get_bios_table(char *signature,
203 * PARAMETERS: signature - ACPI Signature for desired table. Must be
212 * AE_NOT_FOUND: A table with the signature was not found
214 * NOTE: Assumes the input signature is uppercase.
219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument
[all …]
/kernel/linux/linux-6.6/tools/power/acpi/os_specific/service_layers/
Doslinuxtbl.c22 char signature[ACPI_NAMESEG_SIZE]; member
31 osl_table_name_from_file(char *filename, char *signature, u32 *instance);
33 static acpi_status osl_add_table_to_list(char *signature, u32 instance);
42 char *signature, struct acpi_table_header **table);
57 char *signature,
65 osl_get_bios_table(char *signature,
203 * PARAMETERS: signature - ACPI Signature for desired table. Must be
212 * AE_NOT_FOUND: A table with the signature was not found
214 * NOTE: Assumes the input signature is uppercase.
219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument
[all …]
/kernel/linux/linux-6.6/fs/verity/
Dsignature.c11 * signatures with fs-verity, and the alternatives (such as userspace signature
26 * If 1, all verity files must have a valid builtin signature.
76 * fsverity_verify_signature() - check a verity file's signature
78 * @signature: the file's built-in signature
79 * @sig_size: size of signature in bytes, or 0 if no signature
81 * If the file includes a signature of its fs-verity file digest, verify it
84 * Return: 0 on success (signature valid or not required); -errno on failure
87 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
127 err = fsverity_verify_certchain(vi, signature, sig_size); in fsverity_verify_signature()
135 signature, sig_size, fsverity_keyring, in fsverity_verify_signature()
[all …]
/kernel/linux/linux-6.6/drivers/acpi/acpica/
Dtbfind.c21 * PARAMETERS: signature - String with ACPI table signature
29 * Signature, OEM ID and OEM Table ID. Returns an index that can
34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument
43 /* Validate the input table signature */ in acpi_tb_find_table()
45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table()
59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table()
67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table()
68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table()
75 /* Table with matching signature has been found */ in acpi_tb_find_table()
96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table()
[all …]
/kernel/linux/linux-5.10/drivers/acpi/acpica/
Dtbfind.c21 * PARAMETERS: signature - String with ACPI table signature
29 * Signature, OEM ID and OEM Table ID. Returns an index that can
34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument
43 /* Validate the input table signature */ in acpi_tb_find_table()
45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table()
59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table()
67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table()
68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table()
75 /* Table with matching signature has been found */ in acpi_tb_find_table()
96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table()
[all …]
/kernel/linux/linux-6.6/include/uapi/linux/
Dpsp-dbc.h29 * @signature: Optional 32 byte signature created by software using a
35 __u8 signature[DBC_SIG_SIZE]; member
41 * @signature: 32 byte signature created by software using a previous nonce
45 __u8 signature[DBC_SIG_SIZE]; member
52 * @signature: 32 byte signature.
55 * - For interpreting results, this signature is updated by the
62 __u8 signature[DBC_SIG_SIZE]; member
81 * -EPERM: invalid signature
98 * 32 byte signature built using the nonce fetched from
110 * This command must be sent using a 32 byte signature built
[all …]
/kernel/linux/linux-6.6/include/crypto/
Dsig.h3 * Public Key Signature Algorithm
23 * DOC: Generic Public Key Signature API
25 * The Public Key Signature API is used with the algorithms of type
30 * crypto_alloc_sig() - allocate signature tfm handle
36 * Allocate a handle for public key signature algorithm. The returned struct
38 * API invocation for signature operations.
51 * crypto_free_sig() - free signature tfm handle
53 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
70 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
79 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/kexec/
Dtest_kexec_file_load.sh5 # the IMA signature stored in the security.ima xattr or the PE signature,
23 # Return 1 for IMA signature required and 0 for not required.
29 "IMA kernel image signature required"
31 log_info "IMA signature required"
41 # First check for appended signature (modsig), then xattr
47 log_info "IMA or appended(modsig) signature required"
52 [ $ret -eq 1 ] && log_info "IMA signature required";
59 # Return 1 for PE signature found and 0 for not found.
64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures"
75 # Return 1 for IMA signature found and 0 for not found.
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/kexec/
Dtest_kexec_file_load.sh5 # the IMA signature stored in the security.ima xattr or the PE signature,
23 # Return 1 for IMA signature required and 0 for not required.
29 "IMA kernel image signature required"
31 log_info "IMA signature required"
41 # First check for appended signature (modsig), then xattr
47 log_info "IMA or appended(modsig) signature required"
52 [ $ret -eq 1 ] && log_info "IMA signature required";
59 # Return 1 for PE signature found and 0 for not found.
64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures"
75 # Return 1 for IMA signature found and 0 for not found.
[all …]
/kernel/linux/linux-6.6/lib/
Dcheck_signature.c8 * @signature: signature block
9 * @length: length of signature
11 * Perform a signature comparison with the mmio address io_addr. This
17 const unsigned char *signature, int length) in check_signature() argument
20 if (readb(io_addr) != *signature) in check_signature()
23 signature++; in check_signature()
/kernel/linux/linux-5.10/lib/
Dcheck_signature.c8 * @signature: signature block
9 * @length: length of signature
11 * Perform a signature comparison with the mmio address io_addr. This
17 const unsigned char *signature, int length) in check_signature() argument
20 if (readb(io_addr) != *signature) in check_signature()
23 signature++; in check_signature()
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
DKconfig8 as encryption, decryption, signature generation and signature
22 If signature generation and/or verification are to be used,
54 signature data and provides the ability to verify the signature.
69 bool "Support for PE file signature verification"
76 This option provides support for verifying the signature(s) on a
80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"
82 This option causes some selftests to be run on the signature
/kernel/linux/linux-6.6/kernel/
DKconfig.kexec49 bool "Verify kernel signature during kexec_file_load() syscall"
54 signature of the kernel image. The image can still be loaded without
55 a valid signature unless you also enable KEXEC_SIG_FORCE, though if
56 there's a signature that we can check, then it must be valid.
58 In addition to this option, you need to enable signature
63 bool "Require a valid signature in kexec_file_load() syscall"
67 This option makes kernel signature verification mandatory for
71 bool "Enable Image signature verification support (ARM)"
77 Enable Image signature verification support.
80 bool "Enable bzImage signature verification support"
[all …]
/kernel/linux/linux-5.10/include/linux/
Dmodule_signature.h3 * Module signature handling.
15 #define MODULE_SIG_STRING "~Module signature appended~\n"
20 PKEY_ID_PKCS7, /* Signature in PKCS#7 message */
24 * Module signature information block.
26 * The constituents of the signature section are, in order:
30 * - Signature data
40 __be32 sig_len; /* Length of signature data */
/kernel/linux/linux-6.6/include/linux/
Dmodule_signature.h3 * Module signature handling.
15 #define MODULE_SIG_STRING "~Module signature appended~\n"
20 PKEY_ID_PKCS7, /* Signature in PKCS#7 message */
24 * Module signature information block.
26 * The constituents of the signature section are, in order:
30 * - Signature data
40 __be32 sig_len; /* Length of signature data */
/kernel/linux/linux-6.6/tools/power/acpi/tools/acpidump/
Dapdump.c33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header()
35 /* Make sure signature is all ASCII and a valid ACPI name */ in ap_is_valid_header()
37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header()
39 "Table signature (0x%8.8X) is invalid\n", in ap_is_valid_header()
40 *(u32 *)table->signature); in ap_is_valid_header()
73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum()
88 table->signature); in ap_is_valid_checksum()
102 * DESCRIPTION: Obtain table length according to table signature.
116 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length()
168 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer()
[all …]

12345678910>>...70