Home
last modified time | relevance | path

Searched full:signature (Results 1 – 25 of 962) sorted by relevance

12345678910>>...39

/linux-6.8/Documentation/arch/arm64/
Dacpi_object_usage.rst9 specification where the object is defined. If "Signature Reserved" is used,
10 the table signature (the first four bytes of the table) is the only portion
30 AEST Signature Reserved (signature == "AEST")
37 AGDI Signature Reserved (signature == "AGDI")
44 APMT Signature Reserved (signature == "APMT")
51 BERT Section 18.3 (signature == "BERT")
58 BOOT Signature Reserved (signature == "BOOT")
64 BGRT Section 5.2.22 (signature == "BGRT")
71 CEDT Signature Reserved (signature == "CEDT")
78 CPEP Section 5.2.18 (signature == "CPEP")
[all …]
/linux-6.8/tools/crypto/ccp/
Ddbc.c21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument
24 .auth_needed = !!signature, in get_nonce()
29 if (signature) in get_nonce()
30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce()
39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument
44 assert(signature); in set_uid()
47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid()
54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument
62 assert(signature); in process_param()
65 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param()
[all …]
Dtest_dbc.py36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"
142 get_nonce(self.d, self.signature)
148 set_uid(self.d, self.uid, self.signature)
154 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature)
160 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000)
173 set_uid(self.d, self.uid, self.signature)
177 get_nonce(self.d, self.signature)
193 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature)
194 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature)
198 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature)
[all …]
Ddbc.py33 def get_nonce(device, signature): argument
37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature)
43 def set_uid(device, new_uid, signature): argument
44 if not signature:
45 raise ValueError("Signature required")
48 ret = lib.set_uid(device.fileno(), new_uid, signature)
54 def process_param(device, message, signature, data=None): argument
55 if not signature:
56 raise ValueError("Signature required")
60 sig = ctypes.create_string_buffer(signature, len(signature))
Ddbc_cli.py17 errno.EPERM: "Signature invalid",
50 parser.add_argument("--signature", help="File containing signature for command")
71 if args.signature:
72 if not os.path.exists(args.signature):
73 raise ValueError("Invalid signature file %s" % args.signature)
74 with open(args.signature, "rb") as f:
78 "Invalid signature length %d (expected %d)" % (len(sig), DBC_SIG_SIZE)
113 param, signature = process_param(d, messages[args.message], sig) variable
115 "Parameter: {par}, response signature {sig}".format(
117 sig=_pretty_buffer(bytes(signature)),
[all …]
/linux-6.8/drivers/net/wwan/iosm/
Diosm_ipc_mux_codec.h37 /* ACBH: Signature of the Aggregated Command Block Header. */
40 /* ADTH: Signature of the Aggregated Datagram Table Header. */
43 /* ADBH: Signature of the Aggregated Data Block Header. */
46 /* ADGH: Signature of the Datagram Header. */
55 /* ADGH: Signature of the Datagram Header. */
58 /* CMDH: Signature of the Command Header. */
61 /* QLTH: Signature of the Queue Level Table */
64 /* FCTH: Signature of the Flow Credit Table */
90 * @signature: Signature of the Command Header.
101 __le32 signature; member
[all …]
/linux-6.8/Documentation/security/
Ddigsig.rst2 Digital Signature Verification API
19 Digital signature verification API provides a method to verify digital signature.
22 Digital signature verification is implemented using cut-down kernel port of
27 Public key and signature consist of header and MPIs::
38 uint8_t version; /* signature format version */
39 time_t timestamp; /* signature made */
48 Signature header is used as an input to generate a signature.
49 Such approach insures that key or signature header could not be changed.
58 digsig_verify() - digital signature verification with public key
62 * digsig_verify() - digital signature verification with public key
[all …]
/linux-6.8/tools/power/acpi/os_specific/service_layers/
Doslinuxtbl.c22 char signature[ACPI_NAMESEG_SIZE]; member
31 osl_table_name_from_file(char *filename, char *signature, u32 *instance);
33 static acpi_status osl_add_table_to_list(char *signature, u32 instance);
42 char *signature, struct acpi_table_header **table);
57 char *signature,
65 osl_get_bios_table(char *signature,
203 * PARAMETERS: signature - ACPI Signature for desired table. Must be
212 * AE_NOT_FOUND: A table with the signature was not found
214 * NOTE: Assumes the input signature is uppercase.
219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument
[all …]
/linux-6.8/fs/verity/
Dsignature.c11 * signatures with fs-verity, and the alternatives (such as userspace signature
25 * If 1, all verity files must have a valid builtin signature.
38 * fsverity_verify_signature() - check a verity file's signature
40 * @signature: the file's built-in signature
41 * @sig_size: size of signature in bytes, or 0 if no signature
43 * If the file includes a signature of its fs-verity file digest, verify it
46 * Return: 0 on success (signature valid or not required); -errno on failure
49 const u8 *signature, size_t sig_size) in fsverity_verify_signature() argument
90 signature, sig_size, fsverity_keyring, in fsverity_verify_signature()
100 fsverity_err(inode, "Incorrect file signature"); in fsverity_verify_signature()
[all …]
/linux-6.8/drivers/acpi/acpica/
Dtbfind.c21 * PARAMETERS: signature - String with ACPI table signature
29 * Signature, OEM ID and OEM Table ID. Returns an index that can
34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument
43 /* Validate the input table signature */ in acpi_tb_find_table()
45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table()
59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table()
67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table()
68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table()
75 /* Table with matching signature has been found */ in acpi_tb_find_table()
96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table()
[all …]
/linux-6.8/include/uapi/linux/
Dpsp-dbc.h29 * @signature: Optional 32 byte signature created by software using a
35 __u8 signature[DBC_SIG_SIZE]; member
41 * @signature: 32 byte signature created by software using a previous nonce
45 __u8 signature[DBC_SIG_SIZE]; member
52 * @signature: 32 byte signature.
55 * - For interpreting results, this signature is updated by the
62 __u8 signature[DBC_SIG_SIZE]; member
81 * -EPERM: invalid signature
98 * 32 byte signature built using the nonce fetched from
110 * This command must be sent using a 32 byte signature built
[all …]
/linux-6.8/include/crypto/
Dsig.h3 * Public Key Signature Algorithm
23 * DOC: Generic Public Key Signature API
25 * The Public Key Signature API is used with the algorithms of type
30 * crypto_alloc_sig() - allocate signature tfm handle
36 * Allocate a handle for public key signature algorithm. The returned struct
38 * API invocation for signature operations.
51 * crypto_free_sig() - free signature tfm handle
53 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
70 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
79 * @tfm: signature tfm handle allocated with crypto_alloc_sig()
[all …]
/linux-6.8/tools/testing/selftests/kexec/
Dtest_kexec_file_load.sh5 # the IMA signature stored in the security.ima xattr or the PE signature,
23 # Return 1 for IMA signature required and 0 for not required.
29 "IMA kernel image signature required"
31 log_info "IMA signature required"
41 # First check for appended signature (modsig), then xattr
47 log_info "IMA or appended(modsig) signature required"
52 [ $ret -eq 1 ] && log_info "IMA signature required";
59 # Return 1 for PE signature found and 0 for not found.
64 pesign -i $KERNEL_IMAGE --show-signature | grep -q "No signatures"
75 # Return 1 for IMA signature found and 0 for not found.
[all …]
/linux-6.8/crypto/asymmetric_keys/
DKconfig8 as encryption, decryption, signature generation and signature
21 If signature generation and/or verification are to be used,
53 signature data and provides the ability to verify the signature.
68 bool "Support for PE file signature verification"
75 This option provides support for verifying the signature(s) on a
79 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"
81 This option causes some selftests to be run on the signature
/linux-6.8/lib/
Dcheck_signature.c8 * @signature: signature block
9 * @length: length of signature
11 * Perform a signature comparison with the mmio address io_addr. This
17 const unsigned char *signature, int length) in check_signature() argument
20 if (readb(io_addr) != *signature) in check_signature()
23 signature++; in check_signature()
/linux-6.8/kernel/
DKconfig.kexec49 bool "Verify kernel signature during kexec_file_load() syscall"
54 signature of the kernel image. The image can still be loaded without
55 a valid signature unless you also enable KEXEC_SIG_FORCE, though if
56 there's a signature that we can check, then it must be valid.
58 In addition to this option, you need to enable signature
63 bool "Require a valid signature in kexec_file_load() syscall"
67 This option makes kernel signature verification mandatory for
71 bool "Enable Image signature verification support (ARM)"
77 Enable Image signature verification support.
80 bool "Enable bzImage signature verification support"
[all …]
/linux-6.8/tools/power/acpi/tools/acpidump/
Dapdump.c33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header()
35 /* Make sure signature is all ASCII and a valid ACPI name */ in ap_is_valid_header()
37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header()
39 "Table signature (0x%8.8X) is invalid\n", in ap_is_valid_header()
40 *(u32 *)table->signature); in ap_is_valid_header()
73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum()
88 table->signature); in ap_is_valid_checksum()
102 * DESCRIPTION: Obtain table length according to table signature.
116 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length()
168 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer()
[all …]
/linux-6.8/include/linux/
Dmodule_signature.h3 * Module signature handling.
15 #define MODULE_SIG_STRING "~Module signature appended~\n"
20 PKEY_ID_PKCS7, /* Signature in PKCS#7 message */
24 * Module signature information block.
26 * The constituents of the signature section are, in order:
30 * - Signature data
40 __be32 sig_len; /* Length of signature data */
/linux-6.8/include/rdma/
Dsignature.h23 * enum ib_signature_type - Signature types
33 * enum ib_t10_dif_bg_type - Signature T10-DIF block-guard types
68 * struct ib_sig_domain - Parameters for signature domain
70 * @sig: union of all signature domain attributes that may
81 * struct ib_sig_attrs - Parameters for signature handover operation
82 * @check_mask: bitmask for signature byte check (8 bytes)
101 * Signature check masks (8 bytes in total) according to the T10-PI standard:
114 * struct ib_sig_err - signature error descriptor
/linux-6.8/Documentation/admin-guide/
Dmodule-signing.rst22 installation and then checks the signature upon loading the module. This
26 signature checking is done by the kernel so that it is not necessary to have
34 sizes 256, 384, and 512 (the algorithm is selected by data in the signature).
45 CONFIG_MODULE_SIG "Module signature verification"
53 signature for which the key is not known or a module that is unsigned.
61 signature that can be verified by a public key in the kernel's possession
64 Irrespective of the setting here, if the module has a signature block that
130 private key is used to generate a signature and the corresponding public key is
245 A signed module has a digital signature simply appended at the end. The string
246 ``~Module signature appended~.`` at the end of the module's file confirms that a
[all …]
/linux-6.8/Documentation/crypto/
Dasymmetric-keys.rst12 - Signature verification.
112 1) Signature verification.
116 (eg. decryption and signature generation) require extra key data.
119 Signature Verification
122 An operation is provided to perform cryptographic signature verification, using
129 it to check the signature. The caller must have parsed the signature and
144 make up the actual signature must be stored in sig->mpi[] and the count of MPIs
151 The function will return 0 upon success or -EKEYREJECTED if the signature
219 signature creation operations (which are distinguished by the operation ID
225 Optional. This is the entry point for signature verification. The
[all …]
/linux-6.8/scripts/
Dextract-module-sig.pl6 # Reads the module file and writes out some or all of the signature
9 # -0: The unsigned module, no signature data at all
10 # -a: All of the signature data, including magic number
14 # -s: Just the crypto signature or PKCS#7 message
25 my $magic_number = "~Module signature appended~\n";
87 print STDERR "Found $sig_len bytes of signature [";
112 # The unsigned module, no signature data at all
116 # All of the signature data, including magic number
135 # Just the crypto signature or PKCS#7 message
/linux-6.8/kernel/module/
Ddecompress.c59 * Calculate length of the header which consists of signature, header
65 const u8 signature[] = { 0x1f, 0x8b, 0x08 }; in module_gzip_header_len() local
68 if (size < len || memcmp(buf, signature, sizeof(signature))) in module_gzip_header_len()
152 static const u8 signature[] = { 0xfd, '7', 'z', 'X', 'Z', 0 }; in module_xz_decompress() local
159 if (size < sizeof(signature) || in module_xz_decompress()
160 memcmp(buf, signature, sizeof(signature))) { in module_xz_decompress()
210 static const u8 signature[] = { 0x28, 0xb5, 0x2f, 0xfd }; in module_zstd_decompress() local
221 if (size < sizeof(signature) || in module_zstd_decompress()
222 memcmp(buf, signature, sizeof(signature))) { in module_zstd_decompress()
/linux-6.8/security/integrity/platform_certs/
Dkeyring_handler.h23 * Return the handler for particular signature list types found in the db.
28 * Return the handler for particular signature list types found in the mok.
33 * Return the handler for particular signature list types for CA keys.
38 * Return the handler for particular signature list types for code signing keys.
43 * Return the handler for particular signature list types found in the dbx.
/linux-6.8/security/integrity/
Dintegrity.h126 * signature header format v2 - for using with asymmetric keys
128 * The signature_v2_hdr struct includes a signature format version
129 * to simplify defining new signature formats.
131 * signature format:
132 * version 2: regular file data hash based signature
133 * version 3: struct ima_file_id data based signature
137 uint8_t version; /* signature format version */
140 __be16 sig_size; /* signature size */
141 uint8_t sig[]; /* signature payload */
145 * IMA signature version 3 disambiguates the data that is signed, by

12345678910>>...39