| /linux/tools/crypto/ccp/ |
| H A D | dbc.c | 21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument 24 .auth_needed = !!signature, in get_nonce() 29 if (signature) in get_nonce() 30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce() 39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument 44 assert(signature); in set_uid() 47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid() 54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument 61 assert(signature); in process_param() 64 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param() [all …]
|
| H A D | test_dbc.py | 36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" 143 get_nonce(self.d, self.signature) 150 set_uid(self.d, self.uid, self.signature) 156 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature) 162 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000) 175 set_uid(self.d, self.uid, self.signature) 179 get_nonce(self.d, self.signature) 195 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature) 196 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature) 200 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature) [all …]
|
| H A D | dbc.py | 33 def get_nonce(device, signature): argument 37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature) 43 def set_uid(device, new_uid, signature): argument 44 if not signature: 48 ret = lib.set_uid(device.fileno(), new_uid, signature) 54 def process_param(device, message, signature, data=None): argument 55 if not signature: 60 sig = ctypes.create_string_buffer(signature, len(signature))
|
| H A D | dbc_cli.py | 71 if args.signature: 72 if not os.path.exists(args.signature): 73 raise ValueError("Invalid signature file %s" % args.signature) 74 with open(args.signature, "rb") as f: 113 param, signature = process_param(d, messages[args.message], sig) variable 117 sig=_pretty_buffer(bytes(signature)), 126 param, signature = process_param(d, messages[args.message], sig, data) variable 130 sig=_pretty_buffer(bytes(signature)),
|
| /linux/tools/power/acpi/os_specific/service_layers/ |
| H A D | oslinuxtbl.c | 22 char signature[ACPI_NAMESEG_SIZE] ACPI_NONSTRING; member 31 osl_table_name_from_file(char *filename, char *signature, u32 *instance); 33 static acpi_status osl_add_table_to_list(char *signature, u32 instance); 42 char *signature, struct acpi_table_header **table); 57 char *signature, 65 osl_get_bios_table(char *signature, 219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument 240 osl_get_bios_table(signature, instance, table, address); in acpi_os_get_table_by_name() 244 status = osl_get_customized_table(STATIC_TABLE_DIR, signature, in acpi_os_get_table_by_name() 255 signature, instance, table, in acpi_os_get_table_by_name() [all …]
|
| /linux/tools/power/acpi/tools/acpidump/ |
| H A D | apdump.c | 33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header() 37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header() 40 *(u32 *)table->signature); in ap_is_valid_header() 73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum() 88 table->signature); in ap_is_valid_checksum() 117 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length() 169 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer() 293 int ap_dump_table_by_name(char *signature) in ap_dump_table_by_name() argument 302 if (strlen(signature) != ACPI_NAMESEG_SIZE) { in ap_dump_table_by_name() 305 signature); in ap_dump_table_by_name() [all …]
|
| /linux/drivers/acpi/acpica/ |
| H A D | tbfind.c | 34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument 45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table() 59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table() 67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table() 68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table() 96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table() 97 header.signature, ACPI_NAMESEG_SIZE) && (!oem_id[0] in acpi_tb_find_table() 113 header.signature)); in acpi_tb_find_table()
|
| H A D | tbprint.c | 73 acpi_tb_fix_string(out_header->signature, ACPI_NAMESEG_SIZE); in acpi_tb_cleanup_table_header() 103 if (ACPI_COMPARE_NAMESEG(header->signature, ACPI_SIG_FACS)) { in acpi_tb_print_table_header() 108 header->signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header() 111 header)->signature)) { in acpi_tb_print_table_header() 129 } else if (acpi_gbl_CDAT && !acpi_ut_valid_nameseg(header->signature)) { in acpi_tb_print_table_header() 144 local_header.signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header()
|
| H A D | tbxface.c | 165 table_desc->signature.ascii)); in ACPI_EXPORT_SYMBOL_INIT() 216 acpi_get_table_header(char *signature, in ACPI_EXPORT_SYMBOL_INIT() 225 if (!signature || !out_table_header) { in ACPI_EXPORT_SYMBOL_INIT() 234 (&(acpi_gbl_root_table_list.tables[i].signature), in ACPI_EXPORT_SYMBOL_INIT() 235 signature)) { in ACPI_EXPORT_SYMBOL_INIT() 297 acpi_get_table(char *signature, in ACPI_EXPORT_SYMBOL() 307 if (!signature || !out_table) { in ACPI_EXPORT_SYMBOL() 326 if (!ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in ACPI_EXPORT_SYMBOL()
|
| H A D | tbxfload.c | 121 !ACPI_COMPARE_NAMESEG(table->signature.ascii, ACPI_SIG_DSDT) || in ACPI_EXPORT_SYMBOL_INIT() 174 (table->signature.ascii, ACPI_SIG_SSDT) in ACPI_EXPORT_SYMBOL_INIT() 175 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 177 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 191 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 198 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 406 (acpi_gbl_root_table_list.tables[i].signature.ascii, in ACPI_EXPORT_SYMBOL()
|
| H A D | tbdata.c | 99 ACPI_MOVE_32_TO_32(table_desc->signature.ascii, table->signature); in acpi_tb_init_table_descriptor() 496 char *signature, u32 *table_index) in acpi_tb_verify_temp_table() argument 511 if (signature && in acpi_tb_verify_temp_table() 512 !ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in acpi_tb_verify_temp_table() 515 table_desc->signature.integer, signature)); in acpi_tb_verify_temp_table() 532 signature. in acpi_tb_verify_temp_table() 534 table_desc->signature.ascii : "????", in acpi_tb_verify_temp_table() 552 (table_desc->signature. in acpi_tb_verify_temp_table() 554 signature. in acpi_tb_verify_temp_table()
|
| H A D | utmisc.c | 62 if (ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_DSDT) || in acpi_ut_is_aml_table() 63 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_PSDT) || in acpi_ut_is_aml_table() 64 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_SSDT) || in acpi_ut_is_aml_table() 65 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_OSDT) || in acpi_ut_is_aml_table() 66 ACPI_IS_OEM_SIG(table->signature)) { in acpi_ut_is_aml_table()
|
| /linux/Documentation/security/ |
| H A D | digsig.rst | 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 27 Public key and signature consist of header and MPIs:: 38 uint8_t version; /* signature format version */ 39 time_t timestamp; /* signature made */ 48 Signature header is used as an input to generate a signature. 49 Such approach insures that key or signature header could not be changed. 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key 64 * @sig: digital signature [all …]
|
| /linux/Documentation/arch/arm64/ |
| H A D | acpi_object_usage.rst | 10 the table signature (the first four bytes of the table) is the only portion 30 AEST Signature Reserved (signature == "AEST") 37 AGDI Signature Reserved (signature == "AGDI") 44 APMT Signature Reserved (signature == "APMT") 51 BERT Section 18.3 (signature == "BERT") 58 BOOT Signature Reserved (signature == "BOOT") 64 BGRT Section 5.2.22 (signature == "BGRT") 71 CEDT Signature Reserved (signature == "CEDT") 78 CPEP Section 5.2.18 (signature == "CPEP") 86 CSRT Signature Reserved (signature == "CSRT") [all …]
|
| /linux/drivers/net/wwan/iosm/ |
| H A D | iosm_ipc_mux_codec.h | 101 __le32 signature; member 120 __le32 signature; member 137 __le32 signature; member 158 __le32 signature; member 183 __le32 signature; member 207 __le32 signature; member 235 __le32 signature; member
|
| /linux/drivers/gpu/drm/nouveau/nvkm/nvfw/ |
| H A D | flcn.c | 71 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_dump() 72 hdr->signature[3]); in flcn_bl_dmem_desc_dump() 95 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_v1_dump() 96 hdr->signature[3]); in flcn_bl_dmem_desc_v1_dump()
|
| /linux/drivers/platform/cznic/ |
| H A D | turris-omnia-mcu-keyctl.c | 40 memcpy(mcu->signature, &reply[1], in omnia_msg_signed_irq_handler() 50 void *signature) in omnia_mcu_sign() argument 82 memcpy(signature, mcu->signature, OMNIA_MCU_CRYPTO_SIGNATURE_LEN); in omnia_mcu_sign() 85 memzero_explicit(mcu->signature, sizeof(mcu->signature)); in omnia_mcu_sign()
|
| /linux/crypto/asymmetric_keys/ |
| H A D | Kconfig | 8 as encryption, decryption, signature generation and signature 22 If signature generation and/or verification are to be used, 55 signature data and provides the ability to verify the signature. 81 bool "Support for PE file signature verification" 88 This option provides support for verifying the signature(s) on a 92 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification" 94 This option causes some selftests to be run on the signature
|
| /linux/lib/ |
| H A D | check_signature.c | 17 const unsigned char *signature, int length) in check_signature() argument 20 if (readb(io_addr) != *signature) in check_signature() 23 signature++; in check_signature()
|
| /linux/kernel/ |
| H A D | Kconfig.kexec | 50 bool "Verify kernel signature during kexec_file_load() syscall" 55 signature of the kernel image. The image can still be loaded without 56 a valid signature unless you also enable KEXEC_SIG_FORCE, though if 57 there's a signature that we can check, then it must be valid. 59 In addition to this option, you need to enable signature 64 bool "Require a valid signature in kexec_file_load() syscall" 68 This option makes kernel signature verification mandatory for 72 bool "Enable Image signature verification support (ARM)" 78 Enable Image signature verification support. 81 bool "Enable bzImage signature verification support" [all …]
|
| /linux/arch/x86/pci/ |
| H A D | pcbios.c | 78 unsigned long signature; /* _32_ */ member 148 u32 signature, eax, ebx, ecx; in check_pcibios() local 161 : "=d" (signature), in check_pcibios() 178 if (status || signature != PCI_SIGNATURE) { in check_pcibios() 180 status, signature); in check_pcibios() 318 if (get_kernel_nofault(sig, &check->fields.signature)) in pci_find_bios() 321 if (check->fields.signature != BIOS32_SIGNATURE) in pci_find_bios()
|
| /linux/drivers/scsi/ |
| H A D | fdomain_isa.c | 59 static struct signature { struct 60 const char *signature; member 91 struct signature *sig = NULL; in fdomain_isa_match() 93 static struct signature *saved_sig; in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match()
|
| /linux/include/uapi/linux/ |
| H A D | psp-dbc.h | 35 __u8 signature[DBC_SIG_SIZE]; member 45 __u8 signature[DBC_SIG_SIZE]; member 62 __u8 signature[DBC_SIG_SIZE]; member
|
| /linux/drivers/platform/x86/lenovo/ |
| H A D | think-lmi.c | 785 if (!setting->signature || !setting->signature[0]) in cert_to_password_store() 794 auth_str = cert_command(setting, passwd, setting->signature); in cert_to_password_store() 821 char *signature; in certificate_store() local 834 if (!setting->signature || !setting->signature[0]) in certificate_store() 841 auth_str = cert_command(setting, serial, setting->signature); in certificate_store() 861 signature = tlmi_priv.pwd_admin->signature; in certificate_store() 863 signature = setting->signature; in certificate_store() 869 signature = tlmi_priv.pwd_admin->signature; in certificate_store() 872 signature = setting->signature; in certificate_store() 878 if (!signature || !signature[0]) { in certificate_store() [all …]
|
| /linux/include/acpi/ |
| H A D | actbl.h | 69 char signature[ACPI_NAMESEG_SIZE] ACPI_NONSTRING; /* ASCII table signature */ member 106 char signature[8]; /* ACPI signature, contains "RSD PTR " */ member 120 char signature[8]; member 163 char signature[4]; /* ASCII table signature */ member 339 union acpi_name_union signature; member
|