/linux/Documentation/arch/arm64/ |
H A D | acpi_object_usage.rst | 9 specification where the object is defined. If "Signature Reserved" is used, 10 the table signature (the first four bytes of the table) is the only portion 30 AEST Signature Reserved (signature == "AEST") 37 AGDI Signature Reserved (signature == "AGDI") 44 APMT Signature Reserved (signature == "APMT") 51 BERT Section 18.3 (signature == "BERT") 58 BOOT Signature Reserved (signature == "BOOT") 64 BGRT Section 5.2.22 (signature == "BGRT") 71 CEDT Signature Reserved (signature == "CEDT") 78 CPEP Section 5.2.18 (signature == "CPEP") [all …]
|
/linux/tools/crypto/ccp/ |
H A D | dbc.c | 21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument 24 .auth_needed = !!signature, in get_nonce() 29 if (signature) in get_nonce() 30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce() 39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument 44 assert(signature); in set_uid() 47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid() 54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument 61 assert(signature); in process_param() 64 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param() [all …]
|
H A D | test_dbc.py | 36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" 143 get_nonce(self.d, self.signature) 150 set_uid(self.d, self.uid, self.signature) 156 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature) 162 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000) 175 set_uid(self.d, self.uid, self.signature) 179 get_nonce(self.d, self.signature) 195 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature) 196 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature) 200 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature) [all …]
|
H A D | dbc_cli.py | 17 errno.EPERM: "Signature invalid", 50 parser.add_argument("--signature", help="File containing signature for command") 71 if args.signature: 72 if not os.path.exists(args.signature): 73 raise ValueError("Invalid signature file %s" % args.signature) 74 with open(args.signature, "rb") as f: 78 "Invalid signature length %d (expected %d)" % (len(sig), DBC_SIG_SIZE) 113 param, signature = process_param(d, messages[args.message], sig) variable 115 "Parameter: {par}, response signature {sig}".format( 117 sig=_pretty_buffer(bytes(signature)), [all …]
|
H A D | dbc.py | 33 def get_nonce(device, signature): argument 37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature) 43 def set_uid(device, new_uid, signature): argument 44 if not signature: 45 raise ValueError("Signature required") 48 ret = lib.set_uid(device.fileno(), new_uid, signature) 54 def process_param(device, message, signature, data=None): argument 55 if not signature: 56 raise ValueError("Signature required") 60 sig = ctypes.create_string_buffer(signature, len(signature))
|
/linux/drivers/net/wwan/iosm/ |
H A D | iosm_ipc_mux_codec.h | 37 /* ACBH: Signature of the Aggregated Command Block Header. */ 40 /* ADTH: Signature of the Aggregated Datagram Table Header. */ 43 /* ADBH: Signature of the Aggregated Data Block Header. */ 46 /* ADGH: Signature of the Datagram Header. */ 55 /* ADGH: Signature of the Datagram Header. */ 58 /* CMDH: Signature of the Command Header. */ 61 /* QLTH: Signature of the Queue Level Table */ 64 /* FCTH: Signature of the Flow Credit Table */ 90 * @signature: Signature of the Command Header. 101 __le32 signature; member [all …]
|
/linux/Documentation/security/ |
H A D | digsig.rst | 2 Digital Signature Verification API 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 27 Public key and signature consist of header and MPIs:: 38 uint8_t version; /* signature format version */ 39 time_t timestamp; /* signature made */ 48 Signature header is used as an input to generate a signature. 49 Such approach insures that key or signature header could not be changed. 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key [all …]
|
/linux/tools/power/acpi/os_specific/service_layers/ |
H A D | oslinuxtbl.c | 22 char signature[ACPI_NAMESEG_SIZE]; member 31 osl_table_name_from_file(char *filename, char *signature, u32 *instance); 33 static acpi_status osl_add_table_to_list(char *signature, u32 instance); 42 char *signature, struct acpi_table_header **table); 57 char *signature, 65 osl_get_bios_table(char *signature, 203 * PARAMETERS: signature - ACPI Signature for desired table. Must be 212 * AE_NOT_FOUND: A table with the signature was not found 214 * NOTE: Assumes the input signature is uppercase. 219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument [all …]
|
/linux/fs/verity/ |
H A D | signature.c | 11 * signatures with fs-verity, and the alternatives (such as userspace signature 26 * If 1, all verity files must have a valid builtin signature. 39 * fsverity_verify_signature() - check a verity file's signature 41 * @signature: the file's built-in signature 42 * @sig_size: size of signature in bytes, or 0 if no signature 44 * If the file includes a signature of its fs-verity file digest, verify it 51 * Return: 0 on success (signature valid or not required); -errno on failure 54 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument 95 signature, sig_size, fsverity_keyring, in fsverity_verify_signature() 105 fsverity_err(inode, "Incorrect file signature"); in fsverity_verify_signature() [all …]
|
/linux/drivers/acpi/acpica/ |
H A D | tbfind.c | 21 * PARAMETERS: signature - String with ACPI table signature 29 * Signature, OEM ID and OEM Table ID. Returns an index that can 34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument 43 /* Validate the input table signature */ in acpi_tb_find_table() 45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table() 59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table() 67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table() 68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table() 75 /* Table with matching signature has been found */ in acpi_tb_find_table() 96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table() [all …]
|
/linux/include/uapi/linux/ |
H A D | psp-dbc.h | 29 * @signature: Optional 32 byte signature created by software using a 35 __u8 signature[DBC_SIG_SIZE]; member 41 * @signature: 32 byte signature created by software using a previous nonce 45 __u8 signature[DBC_SIG_SIZE]; member 52 * @signature: 32 byte signature. 55 * - For interpreting results, this signature is updated by the 62 __u8 signature[DBC_SIG_SIZE]; member 81 * -EPERM: invalid signature 98 * 32 byte signature built using the nonce fetched from 110 * This command must be sent using a 32 byte signature built [all …]
|
/linux/tools/testing/selftests/kexec/ |
H A D | test_kexec_file_load.sh | 5 # the IMA signature stored in the security.ima xattr or the PE signature, 23 # Return 1 for IMA signature required and 0 for not required. 29 "IMA kernel image signature required" 31 log_info "IMA signature required" 41 # First check for appended signature (modsig), then xattr 47 log_info "IMA or appended(modsig) signature required" 52 [ $ret -eq 1 ] && log_info "IMA signature required"; 59 # Return 1 for PE signature found and 0 for not found. 64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures" 75 # Return 1 for IMA signature found and 0 for not found. [all …]
|
/linux/include/crypto/ |
H A D | sig.h | 3 * Public Key Signature Algorithm 23 * DOC: Generic Public Key Signature API 25 * The Public Key Signature API is used with the algorithms of type 30 * crypto_alloc_sig() - allocate signature tfm handle 36 * Allocate a handle for public key signature algorithm. The returned struct 38 * API invocation for signature operations. 51 * crypto_free_sig() - free signature tfm handle 53 * @tfm: signature tfm handle allocated with crypto_alloc_sig() 70 * @tfm: signature tfm handle allocated with crypto_alloc_sig() 79 * @tfm: signature tfm handle allocated with crypto_alloc_sig() [all …]
|
/linux/kernel/ |
H A D | Kconfig.kexec | 51 bool "Verify kernel signature during kexec_file_load() syscall" 56 signature of the kernel image. The image can still be loaded without 57 a valid signature unless you also enable KEXEC_SIG_FORCE, though if 58 there's a signature that we can check, then it must be valid. 60 In addition to this option, you need to enable signature 65 bool "Require a valid signature in kexec_file_load() syscall" 69 This option makes kernel signature verification mandatory for 73 bool "Enable Image signature verification support (ARM)" 79 Enable Image signature verification support. 82 bool "Enable bzImage signature verification support" [all …]
|
/linux/tools/power/acpi/tools/acpidump/ |
H A D | apdump.c | 33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header() 35 /* Make sure signature is all ASCII and a valid ACPI name */ in ap_is_valid_header() 37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header() 39 "Table signature (0x%8.8X) is invalid\n", in ap_is_valid_header() 40 *(u32 *)table->signature); in ap_is_valid_header() 73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum() 88 table->signature); in ap_is_valid_checksum() 102 * DESCRIPTION: Obtain table length according to table signature. 116 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length() 168 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer() [all …]
|
/linux/crypto/asymmetric_keys/ |
H A D | Kconfig | 8 as encryption, decryption, signature generation and signature 22 If signature generation and/or verification are to be used, 54 signature data and provides the ability to verify the signature. 69 bool "Support for PE file signature verification" 76 This option provides support for verifying the signature(s) on a 80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification" 82 This option causes some selftests to be run on the signature
|
/linux/lib/ |
H A D | check_signature.c | 8 * @signature: signature block 9 * @length: length of signature 11 * Perform a signature comparison with the mmio address io_addr. This 17 const unsigned char *signature, int length) in check_signature() argument 20 if (readb(io_addr) != *signature) in check_signature() 23 signature++; in check_signature()
|
/linux/include/linux/ |
H A D | module_signature.h | 3 * Module signature handling. 15 #define MODULE_SIG_STRING "~Module signature appended~\n" 20 PKEY_ID_PKCS7, /* Signature in PKCS#7 message */ 24 * Module signature information block. 26 * The constituents of the signature section are, in order: 30 * - Signature data 40 __be32 sig_len; /* Length of signature data */
|
/linux/include/rdma/ |
H A D | signature.h | 23 * enum ib_signature_type - Signature types 33 * enum ib_t10_dif_bg_type - Signature T10-DIF block-guard types 68 * struct ib_sig_domain - Parameters for signature domain 70 * @sig: union of all signature domain attributes that may 81 * struct ib_sig_attrs - Parameters for signature handover operation 82 * @check_mask: bitmask for signature byte check (8 bytes) 101 * Signature check masks (8 bytes in total) according to the T10-PI standard: 114 * struct ib_sig_err - signature error descriptor
|
/linux/Documentation/admin-guide/ |
H A D | module-signing.rst | 22 installation and then checks the signature upon loading the module. This 26 signature checking is done by the kernel so that it is not necessary to have 34 sizes 256, 384, and 512 (the algorithm is selected by data in the signature). 45 CONFIG_MODULE_SIG "Module signature verification" 53 signature for which the key is not known or a module that is unsigned. 61 signature that can be verified by a public key in the kernel's possession 64 Irrespective of the setting here, if the module has a signature block that 130 private key is used to generate a signature and the corresponding public key is 245 A signed module has a digital signature simply appended at the end. The string 246 ``~Module signature appended~.`` at the end of the module's file confirms that a [all …]
|
/linux/drivers/net/wireless/realtek/rtw89/ |
H A D | acpi.c | 31 return p->signature[0] == 0x00 && in chk_acpi_policy_6ghz_sig() 32 p->signature[1] == 0xE0 && in chk_acpi_policy_6ghz_sig() 33 p->signature[2] == 0x4C; in chk_acpi_policy_6ghz_sig() 60 rtw89_debug(rtwdev, RTW89_DBG_ACPI, "%s: bad signature\n", __func__); in rtw89_acpi_dsm_get_policy_6ghz() 82 return p->signature[0] == 0x52 && in chk_acpi_policy_6ghz_sp_sig() 83 p->signature[1] == 0x54 && in chk_acpi_policy_6ghz_sp_sig() 84 p->signature[2] == 0x4B && in chk_acpi_policy_6ghz_sp_sig() 85 p->signature[3] == 0x07; in chk_acpi_policy_6ghz_sp_sig() 111 rtw89_debug(rtwdev, RTW89_DBG_ACPI, "%s: bad signature\n", __func__); in rtw89_acpi_dsm_get_policy_6ghz_sp()
|
/linux/Documentation/crypto/ |
H A D | asymmetric-keys.rst | 12 - Signature verification. 112 1) Signature verification. 116 (eg. decryption and signature generation) require extra key data. 119 Signature Verification 122 An operation is provided to perform cryptographic signature verification, using 129 it to check the signature. The caller must have parsed the signature and 144 make up the actual signature must be stored in sig->mpi[] and the count of MPIs 151 The function will return 0 upon success or -EKEYREJECTED if the signature 219 signature creation operations (which are distinguished by the operation ID 225 Optional. This is the entry point for signature verification. The [all …]
|
/linux/Documentation/filesystems/ |
H A D | fsverity.rst | 80 verifying a signature of it using any userspace cryptographic 86 signature in their "security.ima" extended attribute, as controlled 95 files with a verified fs-verity's built-in signature. For 99 - Trusted userspace code in combination with `Built-in signature 142 - ``sig_size`` is the size of the builtin signature in bytes, or 0 if no 143 builtin signature is provided. Currently the builtin signature is 145 - ``sig_ptr`` is the pointer to the builtin signature, or NULL if no 146 builtin signature is provided. A builtin signature is only needed 147 if the `Built-in signature verification`_ feature is being used. It 149 signature is being handled entirely in userspace. [all …]
|
/linux/security/integrity/ |
H A D | integrity.h | 79 * signature header format v2 - for using with asymmetric keys 81 * The signature_v2_hdr struct includes a signature format version 82 * to simplify defining new signature formats. 84 * signature format: 85 * version 2: regular file data hash based signature 86 * version 3: struct ima_file_id data based signature 90 uint8_t version; /* signature format version */ 93 __be16 sig_size; /* signature size */ 94 uint8_t sig[]; /* signature payload */ 98 * IMA signature version 3 disambiguates the data that is signed, by
|
/linux/scripts/ |
H A D | extract-module-sig.pl | 6 # Reads the module file and writes out some or all of the signature 9 # -0: The unsigned module, no signature data at all 10 # -a: All of the signature data, including magic number 14 # -s: Just the crypto signature or PKCS#7 message 25 my $magic_number = "~Module signature appended~\n"; 87 print STDERR "Found $sig_len bytes of signature ["; 112 # The unsigned module, no signature data at all 116 # All of the signature data, including magic number 135 # Just the crypto signature or PKCS#7 message
|