| /kernel/linux/linux-6.6/Documentation/arch/arm64/ |
| D | acpi_object_usage.rst | 9 specification where the object is defined. If "Signature Reserved" is used, 10 the table signature (the first four bytes of the table) is the only portion 30 AEST Signature Reserved (signature == "AEST") 37 AGDI Signature Reserved (signature == "AGDI") 44 APMT Signature Reserved (signature == "APMT") 51 BERT Section 18.3 (signature == "BERT") 58 BOOT Signature Reserved (signature == "BOOT") 64 BGRT Section 5.2.22 (signature == "BGRT") 71 CEDT Signature Reserved (signature == "CEDT") 78 CPEP Section 5.2.18 (signature == "CPEP") [all …]
|
| /kernel/linux/linux-6.6/tools/crypto/ccp/ |
| D | dbc.c | 21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument 24 .auth_needed = !!signature, in get_nonce() 29 if (signature) in get_nonce() 30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce() 39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument 44 assert(signature); in set_uid() 47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid() 54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument 62 assert(signature); in process_param() 65 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param() [all …]
|
| D | test_dbc.py | 36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" 142 get_nonce(self.d, self.signature) 148 set_uid(self.d, self.uid, self.signature) 154 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature) 160 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000) 173 set_uid(self.d, self.uid, self.signature) 177 get_nonce(self.d, self.signature) 193 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature) 194 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature) 198 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature) [all …]
|
| D | dbc.py | 33 def get_nonce(device, signature): argument 37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature) 43 def set_uid(device, new_uid, signature): argument 44 if not signature: 45 raise ValueError("Signature required") 48 ret = lib.set_uid(device.fileno(), new_uid, signature) 54 def process_param(device, message, signature, data=None): argument 55 if not signature: 56 raise ValueError("Signature required") 60 sig = ctypes.create_string_buffer(signature, len(signature))
|
| D | dbc_cli.py | 17 errno.EPERM: "Signature invalid", 50 parser.add_argument("--signature", help="File containing signature for command") 71 if args.signature: 72 if not os.path.exists(args.signature): 73 raise ValueError("Invalid signature file %s" % args.signature) 74 with open(args.signature, "rb") as f: 78 "Invalid signature length %d (expected %d)" % (len(sig), DBC_SIG_SIZE) 113 param, signature = process_param(d, messages[args.message], sig) variable 115 "Parameter: {par}, response signature {sig}".format( 117 sig=_pretty_buffer(bytes(signature)), [all …]
|
| /kernel/linux/linux-5.10/Documentation/arm64/ |
| D | acpi_object_usage.rst | 9 specification where the object is defined. If "Signature Reserved" is used, 10 the table signature (the first four bytes of the table) is the only portion 30 BERT Section 18.3 (signature == "BERT") 37 BOOT Signature Reserved (signature == "BOOT") 43 BGRT Section 5.2.22 (signature == "BGRT") 50 CPEP Section 5.2.18 (signature == "CPEP") 58 CSRT Signature Reserved (signature == "CSRT") 64 DBG2 Signature Reserved (signature == "DBG2") 71 DBGP Signature Reserved (signature == "DBGP") 77 DSDT Section 5.2.11.1 (signature == "DSDT") [all …]
|
| /kernel/linux/linux-6.6/drivers/net/wwan/iosm/ |
| D | iosm_ipc_mux_codec.h | 37 /* ACBH: Signature of the Aggregated Command Block Header. */ 40 /* ADTH: Signature of the Aggregated Datagram Table Header. */ 43 /* ADBH: Signature of the Aggregated Data Block Header. */ 46 /* ADGH: Signature of the Datagram Header. */ 55 /* ADGH: Signature of the Datagram Header. */ 58 /* CMDH: Signature of the Command Header. */ 61 /* QLTH: Signature of the Queue Level Table */ 64 /* FCTH: Signature of the Flow Credit Table */ 90 * @signature: Signature of the Command Header. 101 __le32 signature; member [all …]
|
| /kernel/linux/linux-6.6/Documentation/security/ |
| D | digsig.rst | 2 Digital Signature Verification API 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 27 Public key and signature consist of header and MPIs:: 38 uint8_t version; /* signature format version */ 39 time_t timestamp; /* signature made */ 48 Signature header is used as an input to generate a signature. 49 Such approach insures that key or signature header could not be changed. 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key [all …]
|
| /kernel/linux/linux-5.10/Documentation/security/ |
| D | digsig.rst | 2 Digital Signature Verification API 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 27 Public key and signature consist of header and MPIs:: 38 uint8_t version; /* signature format version */ 39 time_t timestamp; /* signature made */ 48 Signature header is used as an input to generate a signature. 49 Such approach insures that key or signature header could not be changed. 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key [all …]
|
| /kernel/linux/linux-5.10/tools/power/acpi/os_specific/service_layers/ |
| D | oslinuxtbl.c | 22 char signature[ACPI_NAMESEG_SIZE]; member 31 osl_table_name_from_file(char *filename, char *signature, u32 *instance); 33 static acpi_status osl_add_table_to_list(char *signature, u32 instance); 42 char *signature, struct acpi_table_header **table); 57 char *signature, 65 osl_get_bios_table(char *signature, 203 * PARAMETERS: signature - ACPI Signature for desired table. Must be 212 * AE_NOT_FOUND: A table with the signature was not found 214 * NOTE: Assumes the input signature is uppercase. 219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument [all …]
|
| /kernel/linux/linux-6.6/tools/power/acpi/os_specific/service_layers/ |
| D | oslinuxtbl.c | 22 char signature[ACPI_NAMESEG_SIZE]; member 31 osl_table_name_from_file(char *filename, char *signature, u32 *instance); 33 static acpi_status osl_add_table_to_list(char *signature, u32 instance); 42 char *signature, struct acpi_table_header **table); 57 char *signature, 65 osl_get_bios_table(char *signature, 203 * PARAMETERS: signature - ACPI Signature for desired table. Must be 212 * AE_NOT_FOUND: A table with the signature was not found 214 * NOTE: Assumes the input signature is uppercase. 219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument [all …]
|
| /kernel/linux/linux-6.6/fs/verity/ |
| D | signature.c | 11 * signatures with fs-verity, and the alternatives (such as userspace signature 26 * If 1, all verity files must have a valid builtin signature. 76 * fsverity_verify_signature() - check a verity file's signature 78 * @signature: the file's built-in signature 79 * @sig_size: size of signature in bytes, or 0 if no signature 81 * If the file includes a signature of its fs-verity file digest, verify it 84 * Return: 0 on success (signature valid or not required); -errno on failure 87 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument 127 err = fsverity_verify_certchain(vi, signature, sig_size); in fsverity_verify_signature() 135 signature, sig_size, fsverity_keyring, in fsverity_verify_signature() [all …]
|
| /kernel/linux/linux-6.6/drivers/acpi/acpica/ |
| D | tbfind.c | 21 * PARAMETERS: signature - String with ACPI table signature 29 * Signature, OEM ID and OEM Table ID. Returns an index that can 34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument 43 /* Validate the input table signature */ in acpi_tb_find_table() 45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table() 59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table() 67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table() 68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table() 75 /* Table with matching signature has been found */ in acpi_tb_find_table() 96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table() [all …]
|
| /kernel/linux/linux-5.10/drivers/acpi/acpica/ |
| D | tbfind.c | 21 * PARAMETERS: signature - String with ACPI table signature 29 * Signature, OEM ID and OEM Table ID. Returns an index that can 34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument 43 /* Validate the input table signature */ in acpi_tb_find_table() 45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table() 59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table() 67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table() 68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table() 75 /* Table with matching signature has been found */ in acpi_tb_find_table() 96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table() [all …]
|
| /kernel/linux/linux-6.6/include/uapi/linux/ |
| D | psp-dbc.h | 29 * @signature: Optional 32 byte signature created by software using a 35 __u8 signature[DBC_SIG_SIZE]; member 41 * @signature: 32 byte signature created by software using a previous nonce 45 __u8 signature[DBC_SIG_SIZE]; member 52 * @signature: 32 byte signature. 55 * - For interpreting results, this signature is updated by the 62 __u8 signature[DBC_SIG_SIZE]; member 81 * -EPERM: invalid signature 98 * 32 byte signature built using the nonce fetched from 110 * This command must be sent using a 32 byte signature built [all …]
|
| /kernel/linux/linux-6.6/include/crypto/ |
| D | sig.h | 3 * Public Key Signature Algorithm 23 * DOC: Generic Public Key Signature API 25 * The Public Key Signature API is used with the algorithms of type 30 * crypto_alloc_sig() - allocate signature tfm handle 36 * Allocate a handle for public key signature algorithm. The returned struct 38 * API invocation for signature operations. 51 * crypto_free_sig() - free signature tfm handle 53 * @tfm: signature tfm handle allocated with crypto_alloc_sig() 70 * @tfm: signature tfm handle allocated with crypto_alloc_sig() 79 * @tfm: signature tfm handle allocated with crypto_alloc_sig() [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/kexec/ |
| D | test_kexec_file_load.sh | 5 # the IMA signature stored in the security.ima xattr or the PE signature, 23 # Return 1 for IMA signature required and 0 for not required. 29 "IMA kernel image signature required" 31 log_info "IMA signature required" 41 # First check for appended signature (modsig), then xattr 47 log_info "IMA or appended(modsig) signature required" 52 [ $ret -eq 1 ] && log_info "IMA signature required"; 59 # Return 1 for PE signature found and 0 for not found. 64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures" 75 # Return 1 for IMA signature found and 0 for not found. [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/kexec/ |
| D | test_kexec_file_load.sh | 5 # the IMA signature stored in the security.ima xattr or the PE signature, 23 # Return 1 for IMA signature required and 0 for not required. 29 "IMA kernel image signature required" 31 log_info "IMA signature required" 41 # First check for appended signature (modsig), then xattr 47 log_info "IMA or appended(modsig) signature required" 52 [ $ret -eq 1 ] && log_info "IMA signature required"; 59 # Return 1 for PE signature found and 0 for not found. 64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures" 75 # Return 1 for IMA signature found and 0 for not found. [all …]
|
| /kernel/linux/linux-6.6/lib/ |
| D | check_signature.c | 8 * @signature: signature block 9 * @length: length of signature 11 * Perform a signature comparison with the mmio address io_addr. This 17 const unsigned char *signature, int length) in check_signature() argument 20 if (readb(io_addr) != *signature) in check_signature() 23 signature++; in check_signature()
|
| /kernel/linux/linux-5.10/lib/ |
| D | check_signature.c | 8 * @signature: signature block 9 * @length: length of signature 11 * Perform a signature comparison with the mmio address io_addr. This 17 const unsigned char *signature, int length) in check_signature() argument 20 if (readb(io_addr) != *signature) in check_signature() 23 signature++; in check_signature()
|
| /kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
| D | Kconfig | 8 as encryption, decryption, signature generation and signature 22 If signature generation and/or verification are to be used, 54 signature data and provides the ability to verify the signature. 69 bool "Support for PE file signature verification" 76 This option provides support for verifying the signature(s) on a 80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification" 82 This option causes some selftests to be run on the signature
|
| /kernel/linux/linux-6.6/kernel/ |
| D | Kconfig.kexec | 49 bool "Verify kernel signature during kexec_file_load() syscall" 54 signature of the kernel image. The image can still be loaded without 55 a valid signature unless you also enable KEXEC_SIG_FORCE, though if 56 there's a signature that we can check, then it must be valid. 58 In addition to this option, you need to enable signature 63 bool "Require a valid signature in kexec_file_load() syscall" 67 This option makes kernel signature verification mandatory for 71 bool "Enable Image signature verification support (ARM)" 77 Enable Image signature verification support. 80 bool "Enable bzImage signature verification support" [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | module_signature.h | 3 * Module signature handling. 15 #define MODULE_SIG_STRING "~Module signature appended~\n" 20 PKEY_ID_PKCS7, /* Signature in PKCS#7 message */ 24 * Module signature information block. 26 * The constituents of the signature section are, in order: 30 * - Signature data 40 __be32 sig_len; /* Length of signature data */
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | module_signature.h | 3 * Module signature handling. 15 #define MODULE_SIG_STRING "~Module signature appended~\n" 20 PKEY_ID_PKCS7, /* Signature in PKCS#7 message */ 24 * Module signature information block. 26 * The constituents of the signature section are, in order: 30 * - Signature data 40 __be32 sig_len; /* Length of signature data */
|
| /kernel/linux/linux-6.6/tools/power/acpi/tools/acpidump/ |
| D | apdump.c | 33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header() 35 /* Make sure signature is all ASCII and a valid ACPI name */ in ap_is_valid_header() 37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header() 39 "Table signature (0x%8.8X) is invalid\n", in ap_is_valid_header() 40 *(u32 *)table->signature); in ap_is_valid_header() 73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum() 88 table->signature); in ap_is_valid_checksum() 102 * DESCRIPTION: Obtain table length according to table signature. 116 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length() 168 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer() [all …]
|