Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 334) sorted by relevance

12345678910>>...14

/linux/tools/crypto/ccp/
H A Ddbc.c21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument
24 .auth_needed = !!signature, in get_nonce()
29 if (signature) in get_nonce()
30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce()
39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument
44 assert(signature); in set_uid()
47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid()
54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument
61 assert(signature); in process_param()
64 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param()
[all …]
H A Dtest_dbc.py36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
143 get_nonce(self.d, self.signature)
150 set_uid(self.d, self.uid, self.signature)
156 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature)
162 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000)
175 set_uid(self.d, self.uid, self.signature)
179 get_nonce(self.d, self.signature)
195 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature)
196 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature)
200 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature)
[all …]
H A Ddbc.py33 def get_nonce(device, signature): argument
37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature)
43 def set_uid(device, new_uid, signature): argument
44 if not signature:
48 ret = lib.set_uid(device.fileno(), new_uid, signature)
54 def process_param(device, message, signature, data=None): argument
55 if not signature:
60 sig = ctypes.create_string_buffer(signature, len(signature))
H A Ddbc_cli.py71 if args.signature:
72 if not os.path.exists(args.signature):
73 raise ValueError("Invalid signature file %s" % args.signature)
74 with open(args.signature, "rb") as f:
113 param, signature = process_param(d, messages[args.message], sig) variable
117 sig=_pretty_buffer(bytes(signature)),
126 param, signature = process_param(d, messages[args.message], sig, data) variable
130 sig=_pretty_buffer(bytes(signature)),
/linux/tools/power/acpi/os_specific/service_layers/
H A Doslinuxtbl.c22 char signature[ACPI_NAMESEG_SIZE] ACPI_NONSTRING; member
31 osl_table_name_from_file(char *filename, char *signature, u32 *instance);
33 static acpi_status osl_add_table_to_list(char *signature, u32 instance);
42 char *signature, struct acpi_table_header **table);
57 char *signature,
65 osl_get_bios_table(char *signature,
219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument
240 osl_get_bios_table(signature, instance, table, address); in acpi_os_get_table_by_name()
244 status = osl_get_customized_table(STATIC_TABLE_DIR, signature, in acpi_os_get_table_by_name()
255 signature, instance, table, in acpi_os_get_table_by_name()
[all …]
/linux/tools/power/acpi/tools/acpidump/
H A Dapdump.c33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header()
37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header()
40 *(u32 *)table->signature); in ap_is_valid_header()
73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum()
88 table->signature); in ap_is_valid_checksum()
117 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length()
169 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer()
293 int ap_dump_table_by_name(char *signature) in ap_dump_table_by_name() argument
302 if (strlen(signature) != ACPI_NAMESEG_SIZE) { in ap_dump_table_by_name()
305 signature); in ap_dump_table_by_name()
[all …]
/linux/drivers/acpi/acpica/
H A Dtbfind.c34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument
45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table()
59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table()
67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table()
68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table()
96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table()
97 header.signature, ACPI_NAMESEG_SIZE) && (!oem_id[0] in acpi_tb_find_table()
113 header.signature)); in acpi_tb_find_table()
H A Dtbprint.c73 acpi_tb_fix_string(out_header->signature, ACPI_NAMESEG_SIZE); in acpi_tb_cleanup_table_header()
103 if (ACPI_COMPARE_NAMESEG(header->signature, ACPI_SIG_FACS)) { in acpi_tb_print_table_header()
108 header->signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header()
111 header)->signature)) { in acpi_tb_print_table_header()
129 } else if (acpi_gbl_CDAT && !acpi_ut_valid_nameseg(header->signature)) { in acpi_tb_print_table_header()
144 local_header.signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header()
H A Dtbxface.c165 table_desc->signature.ascii)); in ACPI_EXPORT_SYMBOL_INIT()
216 acpi_get_table_header(char *signature, in ACPI_EXPORT_SYMBOL_INIT()
225 if (!signature || !out_table_header) { in ACPI_EXPORT_SYMBOL_INIT()
234 (&(acpi_gbl_root_table_list.tables[i].signature), in ACPI_EXPORT_SYMBOL_INIT()
235 signature)) { in ACPI_EXPORT_SYMBOL_INIT()
297 acpi_get_table(char *signature, in ACPI_EXPORT_SYMBOL()
307 if (!signature || !out_table) { in ACPI_EXPORT_SYMBOL()
326 if (!ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in ACPI_EXPORT_SYMBOL()
H A Dtbxfload.c121 !ACPI_COMPARE_NAMESEG(table->signature.ascii, ACPI_SIG_DSDT) || in ACPI_EXPORT_SYMBOL_INIT()
174 (table->signature.ascii, ACPI_SIG_SSDT) in ACPI_EXPORT_SYMBOL_INIT()
175 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT()
177 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT()
191 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT()
198 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT()
406 (acpi_gbl_root_table_list.tables[i].signature.ascii, in ACPI_EXPORT_SYMBOL()
H A Dtbdata.c99 ACPI_MOVE_32_TO_32(table_desc->signature.ascii, table->signature); in acpi_tb_init_table_descriptor()
496 char *signature, u32 *table_index) in acpi_tb_verify_temp_table() argument
511 if (signature && in acpi_tb_verify_temp_table()
512 !ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in acpi_tb_verify_temp_table()
515 table_desc->signature.integer, signature)); in acpi_tb_verify_temp_table()
532 signature. in acpi_tb_verify_temp_table()
534 table_desc->signature.ascii : "????", in acpi_tb_verify_temp_table()
552 (table_desc->signature. in acpi_tb_verify_temp_table()
554 signature. in acpi_tb_verify_temp_table()
H A Dutmisc.c62 if (ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_DSDT) || in acpi_ut_is_aml_table()
63 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_PSDT) || in acpi_ut_is_aml_table()
64 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_SSDT) || in acpi_ut_is_aml_table()
65 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_OSDT) || in acpi_ut_is_aml_table()
66 ACPI_IS_OEM_SIG(table->signature)) { in acpi_ut_is_aml_table()
/linux/Documentation/security/
H A Ddigsig.rst19 Digital signature verification API provides a method to verify digital signature.
22 Digital signature verification is implemented using cut-down kernel port of
27 Public key and signature consist of header and MPIs::
38 uint8_t version; /* signature format version */
39 time_t timestamp; /* signature made */
48 Signature header is used as an input to generate a signature.
49 Such approach insures that key or signature header could not be changed.
58 digsig_verify() - digital signature verification with public key
62 * digsig_verify() - digital signature verification with public key
64 * @sig: digital signature
[all …]
/linux/Documentation/arch/arm64/
H A Dacpi_object_usage.rst10 the table signature (the first four bytes of the table) is the only portion
30 AEST Signature Reserved (signature == "AEST")
37 AGDI Signature Reserved (signature == "AGDI")
44 APMT Signature Reserved (signature == "APMT")
51 BERT Section 18.3 (signature == "BERT")
58 BOOT Signature Reserved (signature == "BOOT")
64 BGRT Section 5.2.22 (signature == "BGRT")
71 CEDT Signature Reserved (signature == "CEDT")
78 CPEP Section 5.2.18 (signature == "CPEP")
86 CSRT Signature Reserved (signature == "CSRT")
[all …]
/linux/drivers/net/wwan/iosm/
H A Diosm_ipc_mux_codec.h101 __le32 signature; member
120 __le32 signature; member
137 __le32 signature; member
158 __le32 signature; member
183 __le32 signature; member
207 __le32 signature; member
235 __le32 signature; member
/linux/drivers/gpu/drm/nouveau/nvkm/nvfw/
H A Dflcn.c71 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_dump()
72 hdr->signature[3]); in flcn_bl_dmem_desc_dump()
95 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_v1_dump()
96 hdr->signature[3]); in flcn_bl_dmem_desc_v1_dump()
/linux/drivers/platform/cznic/
H A Dturris-omnia-mcu-keyctl.c40 memcpy(mcu->signature, &reply[1], in omnia_msg_signed_irq_handler()
50 void *signature) in omnia_mcu_sign() argument
82 memcpy(signature, mcu->signature, OMNIA_MCU_CRYPTO_SIGNATURE_LEN); in omnia_mcu_sign()
85 memzero_explicit(mcu->signature, sizeof(mcu->signature)); in omnia_mcu_sign()
/linux/crypto/asymmetric_keys/
H A DKconfig8 as encryption, decryption, signature generation and signature
22 If signature generation and/or verification are to be used,
55 signature data and provides the ability to verify the signature.
81 bool "Support for PE file signature verification"
88 This option provides support for verifying the signature(s) on a
92 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"
94 This option causes some selftests to be run on the signature
/linux/lib/
H A Dcheck_signature.c17 const unsigned char *signature, int length) in check_signature() argument
20 if (readb(io_addr) != *signature) in check_signature()
23 signature++; in check_signature()
/linux/kernel/
H A DKconfig.kexec50 bool "Verify kernel signature during kexec_file_load() syscall"
55 signature of the kernel image. The image can still be loaded without
56 a valid signature unless you also enable KEXEC_SIG_FORCE, though if
57 there's a signature that we can check, then it must be valid.
59 In addition to this option, you need to enable signature
64 bool "Require a valid signature in kexec_file_load() syscall"
68 This option makes kernel signature verification mandatory for
72 bool "Enable Image signature verification support (ARM)"
78 Enable Image signature verification support.
81 bool "Enable bzImage signature verification support"
[all …]
/linux/arch/x86/pci/
H A Dpcbios.c78 unsigned long signature; /* _32_ */ member
148 u32 signature, eax, ebx, ecx; in check_pcibios() local
161 : "=d" (signature), in check_pcibios()
178 if (status || signature != PCI_SIGNATURE) { in check_pcibios()
180 status, signature); in check_pcibios()
318 if (get_kernel_nofault(sig, &check->fields.signature)) in pci_find_bios()
321 if (check->fields.signature != BIOS32_SIGNATURE) in pci_find_bios()
/linux/drivers/scsi/
H A Dfdomain_isa.c59 static struct signature { struct
60 const char *signature; member
91 struct signature *sig = NULL; in fdomain_isa_match()
93 static struct signature *saved_sig; in fdomain_isa_match()
102 signatures[i].signature, in fdomain_isa_match()
/linux/include/uapi/linux/
H A Dpsp-dbc.h35 __u8 signature[DBC_SIG_SIZE]; member
45 __u8 signature[DBC_SIG_SIZE]; member
62 __u8 signature[DBC_SIG_SIZE]; member
/linux/drivers/platform/x86/lenovo/
H A Dthink-lmi.c785 if (!setting->signature || !setting->signature[0]) in cert_to_password_store()
794 auth_str = cert_command(setting, passwd, setting->signature); in cert_to_password_store()
821 char *signature; in certificate_store() local
834 if (!setting->signature || !setting->signature[0]) in certificate_store()
841 auth_str = cert_command(setting, serial, setting->signature); in certificate_store()
861 signature = tlmi_priv.pwd_admin->signature; in certificate_store()
863 signature = setting->signature; in certificate_store()
869 signature = tlmi_priv.pwd_admin->signature; in certificate_store()
872 signature = setting->signature; in certificate_store()
878 if (!signature || !signature[0]) { in certificate_store()
[all …]
/linux/include/acpi/
H A Dactbl.h69 char signature[ACPI_NAMESEG_SIZE] ACPI_NONSTRING; /* ASCII table signature */ member
106 char signature[8]; /* ACPI signature, contains "RSD PTR " */ member
120 char signature[8]; member
163 char signature[4]; /* ASCII table signature */ member
339 union acpi_name_union signature; member

12345678910>>...14