Home
last modified time | relevance | path

Searched full:signature (Results 1 – 25 of 961) sorted by relevance

12345678910>>...39

/linux/Documentation/arch/arm64/
H A Dacpi_object_usage.rst9 specification where the object is defined. If "Signature Reserved" is used,
10 the table signature (the first four bytes of the table) is the only portion
30 AEST Signature Reserved (signature == "AEST")
37 AGDI Signature Reserved (signature == "AGDI")
44 APMT Signature Reserved (signature == "APMT")
51 BERT Section 18.3 (signature == "BERT")
58 BOOT Signature Reserved (signature == "BOOT")
64 BGRT Section 5.2.22 (signature == "BGRT")
71 CEDT Signature Reserved (signature == "CEDT")
78 CPEP Section 5.2.18 (signature == "CPEP")
[all …]
/linux/tools/crypto/ccp/
H A Ddbc.c21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument
24 .auth_needed = !!signature, in get_nonce()
29 if (signature) in get_nonce()
30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce()
39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument
44 assert(signature); in set_uid()
47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid()
54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument
61 assert(signature); in process_param()
64 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param()
[all …]
H A Dtest_dbc.py36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
143 get_nonce(self.d, self.signature)
150 set_uid(self.d, self.uid, self.signature)
156 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature)
162 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000)
175 set_uid(self.d, self.uid, self.signature)
179 get_nonce(self.d, self.signature)
195 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature)
196 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature)
200 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature)
[all …]
H A Ddbc_cli.py17 errno.EPERM: "Signature invalid",
50 parser.add_argument("--signature", help="File containing signature for command")
71 if args.signature:
72 if not os.path.exists(args.signature):
73 raise ValueError("Invalid signature file %s" % args.signature)
74 with open(args.signature, "rb") as f:
78 "Invalid signature length %d (expected %d)" % (len(sig), DBC_SIG_SIZE)
113 param, signature = process_param(d, messages[args.message], sig) variable
115 "Parameter: {par}, response signature {sig}".format(
117 sig=_pretty_buffer(bytes(signature)),
[all …]
H A Ddbc.py33 def get_nonce(device, signature): argument
37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature)
43 def set_uid(device, new_uid, signature): argument
44 if not signature:
45 raise ValueError("Signature required")
48 ret = lib.set_uid(device.fileno(), new_uid, signature)
54 def process_param(device, message, signature, data=None): argument
55 if not signature:
56 raise ValueError("Signature required")
60 sig = ctypes.create_string_buffer(signature, len(signature))
/linux/drivers/net/wwan/iosm/
H A Diosm_ipc_mux_codec.h37 /* ACBH: Signature of the Aggregated Command Block Header. */
40 /* ADTH: Signature of the Aggregated Datagram Table Header. */
43 /* ADBH: Signature of the Aggregated Data Block Header. */
46 /* ADGH: Signature of the Datagram Header. */
55 /* ADGH: Signature of the Datagram Header. */
58 /* CMDH: Signature of the Command Header. */
61 /* QLTH: Signature of the Queue Level Table */
64 /* FCTH: Signature of the Flow Credit Table */
90 * @signature: Signature of the Command Header.
101 __le32 signature; member
[all …]
/linux/Documentation/security/
H A Ddigsig.rst2 Digital Signature Verification API
19 Digital signature verification API provides a method to verify digital signature.
22 Digital signature verification is implemented using cut-down kernel port of
27 Public key and signature consist of header and MPIs::
38 uint8_t version; /* signature format version */
39 time_t timestamp; /* signature made */
48 Signature header is used as an input to generate a signature.
49 Such approach insures that key or signature header could not be changed.
58 digsig_verify() - digital signature verification with public key
62 * digsig_verify() - digital signature verification with public key
[all …]
/linux/tools/power/acpi/os_specific/service_layers/
H A Doslinuxtbl.c22 char signature[ACPI_NAMESEG_SIZE]; member
31 osl_table_name_from_file(char *filename, char *signature, u32 *instance);
33 static acpi_status osl_add_table_to_list(char *signature, u32 instance);
42 char *signature, struct acpi_table_header **table);
57 char *signature,
65 osl_get_bios_table(char *signature,
203 * PARAMETERS: signature - ACPI Signature for desired table. Must be
212 * AE_NOT_FOUND: A table with the signature was not found
214 * NOTE: Assumes the input signature is uppercase.
219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument
[all …]
/linux/fs/verity/
H A Dsignature.c11 * signatures with fs-verity, and the alternatives (such as userspace signature
26 * If 1, all verity files must have a valid builtin signature.
39 * fsverity_verify_signature() - check a verity file's signature
41 * @signature: the file's built-in signature
42 * @sig_size: size of signature in bytes, or 0 if no signature
44 * If the file includes a signature of its fs-verity file digest, verify it
51 * Return: 0 on success (signature valid or not required); -errno on failure
54 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
95 signature, sig_size, fsverity_keyring, in fsverity_verify_signature()
105 fsverity_err(inode, "Incorrect file signature"); in fsverity_verify_signature()
[all …]
/linux/drivers/acpi/acpica/
H A Dtbfind.c21 * PARAMETERS: signature - String with ACPI table signature
29 * Signature, OEM ID and OEM Table ID. Returns an index that can
34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument
43 /* Validate the input table signature */ in acpi_tb_find_table()
45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table()
59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table()
67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table()
68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table()
75 /* Table with matching signature has been found */ in acpi_tb_find_table()
96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table()
[all …]
/linux/include/uapi/linux/
H A Dpsp-dbc.h29 * @signature: Optional 32 byte signature created by software using a
35 __u8 signature[DBC_SIG_SIZE]; member
41 * @signature: 32 byte signature created by software using a previous nonce
45 __u8 signature[DBC_SIG_SIZE]; member
52 * @signature: 32 byte signature.
55 * - For interpreting results, this signature is updated by the
62 __u8 signature[DBC_SIG_SIZE]; member
81 * -EPERM: invalid signature
98 * 32 byte signature built using the nonce fetched from
110 * This command must be sent using a 32 byte signature built
[all …]
/linux/tools/testing/selftests/kexec/
H A Dtest_kexec_file_load.sh5 # the IMA signature stored in the security.ima xattr or the PE signature,
23 # Return 1 for IMA signature required and 0 for not required.
29 "IMA kernel image signature required"
31 log_info "IMA signature required"
41 # First check for appended signature (modsig), then xattr
47 log_info "IMA or appended(modsig) signature required"
52 [ $ret -eq 1 ] && log_info "IMA signature required";
59 # Return 1 for PE signature found and 0 for not found.
64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures"
75 # Return 1 for IMA signature found and 0 for not found.
[all …]
/linux/include/crypto/
H A Dsig.h3 * Public Key Signature Algorithm
23 * DOC: Generic Public Key Signature API
25 * The Public Key Signature API is used with the algorithms of type
30 * crypto_alloc_sig() - allocate signature tfm handle
36 * Allocate a handle for public key signature algorithm. The returned struct
38 * API invocation for signature operations.
51 * crypto_free_sig() - free signature tfm handle
53 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
70 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
79 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
[all …]
/linux/kernel/
H A DKconfig.kexec51 bool "Verify kernel signature during kexec_file_load() syscall"
56 signature of the kernel image. The image can still be loaded without
57 a valid signature unless you also enable KEXEC_SIG_FORCE, though if
58 there's a signature that we can check, then it must be valid.
60 In addition to this option, you need to enable signature
65 bool "Require a valid signature in kexec_file_load() syscall"
69 This option makes kernel signature verification mandatory for
73 bool "Enable Image signature verification support (ARM)"
79 Enable Image signature verification support.
82 bool "Enable bzImage signature verification support"
[all …]
/linux/tools/power/acpi/tools/acpidump/
H A Dapdump.c33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header()
35 /* Make sure signature is all ASCII and a valid ACPI name */ in ap_is_valid_header()
37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header()
39 "Table signature (0x%8.8X) is invalid\n", in ap_is_valid_header()
40 *(u32 *)table->signature); in ap_is_valid_header()
73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum()
88 table->signature); in ap_is_valid_checksum()
102 * DESCRIPTION: Obtain table length according to table signature.
116 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length()
168 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer()
[all …]
/linux/crypto/asymmetric_keys/
H A DKconfig8 as encryption, decryption, signature generation and signature
22 If signature generation and/or verification are to be used,
54 signature data and provides the ability to verify the signature.
69 bool "Support for PE file signature verification"
76 This option provides support for verifying the signature(s) on a
80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"
82 This option causes some selftests to be run on the signature
/linux/lib/
H A Dcheck_signature.c8 * @signature: signature block
9 * @length: length of signature
11 * Perform a signature comparison with the mmio address io_addr. This
17 const unsigned char *signature, int length) in check_signature() argument
20 if (readb(io_addr) != *signature) in check_signature()
23 signature++; in check_signature()
/linux/include/linux/
H A Dmodule_signature.h3 * Module signature handling.
15 #define MODULE_SIG_STRING "~Module signature appended~\n"
20 PKEY_ID_PKCS7, /* Signature in PKCS#7 message */
24 * Module signature information block.
26 * The constituents of the signature section are, in order:
30 * - Signature data
40 __be32 sig_len; /* Length of signature data */
/linux/include/rdma/
H A Dsignature.h23 * enum ib_signature_type - Signature types
33 * enum ib_t10_dif_bg_type - Signature T10-DIF block-guard types
68 * struct ib_sig_domain - Parameters for signature domain
70 * @sig: union of all signature domain attributes that may
81 * struct ib_sig_attrs - Parameters for signature handover operation
82 * @check_mask: bitmask for signature byte check (8 bytes)
101 * Signature check masks (8 bytes in total) according to the T10-PI standard:
114 * struct ib_sig_err - signature error descriptor
/linux/Documentation/admin-guide/
H A Dmodule-signing.rst22 installation and then checks the signature upon loading the module. This
26 signature checking is done by the kernel so that it is not necessary to have
34 sizes 256, 384, and 512 (the algorithm is selected by data in the signature).
45 CONFIG_MODULE_SIG "Module signature verification"
53 signature for which the key is not known or a module that is unsigned.
61 signature that can be verified by a public key in the kernel's possession
64 Irrespective of the setting here, if the module has a signature block that
130 private key is used to generate a signature and the corresponding public key is
245 A signed module has a digital signature simply appended at the end. The string
246 ``~Module signature appended~.`` at the end of the module's file confirms that a
[all …]
/linux/drivers/net/wireless/realtek/rtw89/
H A Dacpi.c31 return p->signature[0] == 0x00 && in chk_acpi_policy_6ghz_sig()
32 p->signature[1] == 0xE0 && in chk_acpi_policy_6ghz_sig()
33 p->signature[2] == 0x4C; in chk_acpi_policy_6ghz_sig()
60 rtw89_debug(rtwdev, RTW89_DBG_ACPI, "%s: bad signature\n", __func__); in rtw89_acpi_dsm_get_policy_6ghz()
82 return p->signature[0] == 0x52 && in chk_acpi_policy_6ghz_sp_sig()
83 p->signature[1] == 0x54 && in chk_acpi_policy_6ghz_sp_sig()
84 p->signature[2] == 0x4B && in chk_acpi_policy_6ghz_sp_sig()
85 p->signature[3] == 0x07; in chk_acpi_policy_6ghz_sp_sig()
111 rtw89_debug(rtwdev, RTW89_DBG_ACPI, "%s: bad signature\n", __func__); in rtw89_acpi_dsm_get_policy_6ghz_sp()
/linux/Documentation/crypto/
H A Dasymmetric-keys.rst12 - Signature verification.
112 1) Signature verification.
116 (eg. decryption and signature generation) require extra key data.
119 Signature Verification
122 An operation is provided to perform cryptographic signature verification, using
129 it to check the signature. The caller must have parsed the signature and
144 make up the actual signature must be stored in sig->mpi[] and the count of MPIs
151 The function will return 0 upon success or -EKEYREJECTED if the signature
219 signature creation operations (which are distinguished by the operation ID
225 Optional. This is the entry point for signature verification. The
[all …]
/linux/Documentation/filesystems/
H A Dfsverity.rst80 verifying a signature of it using any userspace cryptographic
86 signature in their "security.ima" extended attribute, as controlled
95 files with a verified fs-verity's built-in signature. For
99 - Trusted userspace code in combination with `Built-in signature
142 - ``sig_size`` is the size of the builtin signature in bytes, or 0 if no
143 builtin signature is provided. Currently the builtin signature is
145 - ``sig_ptr`` is the pointer to the builtin signature, or NULL if no
146 builtin signature is provided. A builtin signature is only needed
147 if the `Built-in signature verification`_ feature is being used. It
149 signature is being handled entirely in userspace.
[all …]
/linux/security/integrity/
H A Dintegrity.h79 * signature header format v2 - for using with asymmetric keys
81 * The signature_v2_hdr struct includes a signature format version
82 * to simplify defining new signature formats.
84 * signature format:
85 * version 2: regular file data hash based signature
86 * version 3: struct ima_file_id data based signature
90 uint8_t version; /* signature format version */
93 __be16 sig_size; /* signature size */
94 uint8_t sig[]; /* signature payload */
98 * IMA signature version 3 disambiguates the data that is signed, by
/linux/scripts/
H A Dextract-module-sig.pl6 # Reads the module file and writes out some or all of the signature
9 # -0: The unsigned module, no signature data at all
10 # -a: All of the signature data, including magic number
14 # -s: Just the crypto signature or PKCS#7 message
25 my $magic_number = "~Module signature appended~\n";
87 print STDERR "Found $sig_len bytes of signature [";
112 # The unsigned module, no signature data at all
116 # All of the signature data, including magic number
135 # Just the crypto signature or PKCS#7 message

12345678910>>...39