/linux-6.12.1/tools/crypto/ccp/ |
D | dbc.c | 21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument 24 .auth_needed = !!signature, in get_nonce() 29 if (signature) in get_nonce() 30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce() 39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument 44 assert(signature); in set_uid() 47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid() 54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument 61 assert(signature); in process_param() 64 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param() [all …]
|
D | test_dbc.py | 36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" 143 get_nonce(self.d, self.signature) 150 set_uid(self.d, self.uid, self.signature) 156 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature) 162 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000) 175 set_uid(self.d, self.uid, self.signature) 179 get_nonce(self.d, self.signature) 195 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature) 196 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature) 200 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature) [all …]
|
D | dbc.py | 33 def get_nonce(device, signature): argument 37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature) 43 def set_uid(device, new_uid, signature): argument 44 if not signature: 48 ret = lib.set_uid(device.fileno(), new_uid, signature) 54 def process_param(device, message, signature, data=None): argument 55 if not signature: 60 sig = ctypes.create_string_buffer(signature, len(signature))
|
D | dbc_cli.py | 71 if args.signature: 72 if not os.path.exists(args.signature): 73 raise ValueError("Invalid signature file %s" % args.signature) 74 with open(args.signature, "rb") as f: 113 param, signature = process_param(d, messages[args.message], sig) variable 117 sig=_pretty_buffer(bytes(signature)), 126 param, signature = process_param(d, messages[args.message], sig, data) variable 130 sig=_pretty_buffer(bytes(signature)),
|
/linux-6.12.1/tools/power/acpi/os_specific/service_layers/ |
D | oslinuxtbl.c | 22 char signature[ACPI_NAMESEG_SIZE]; member 31 osl_table_name_from_file(char *filename, char *signature, u32 *instance); 33 static acpi_status osl_add_table_to_list(char *signature, u32 instance); 42 char *signature, struct acpi_table_header **table); 57 char *signature, 65 osl_get_bios_table(char *signature, 219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument 240 osl_get_bios_table(signature, instance, table, address); in acpi_os_get_table_by_name() 244 status = osl_get_customized_table(STATIC_TABLE_DIR, signature, in acpi_os_get_table_by_name() 255 signature, instance, table, in acpi_os_get_table_by_name() [all …]
|
/linux-6.12.1/drivers/acpi/acpica/ |
D | tbfind.c | 34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument 45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table() 59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table() 67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table() 68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table() 96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table() 97 header.signature, ACPI_NAMESEG_SIZE) && (!oem_id[0] in acpi_tb_find_table() 113 header.signature)); in acpi_tb_find_table()
|
D | tbxface.c | 165 table_desc->signature.ascii)); in ACPI_EXPORT_SYMBOL_INIT() 216 acpi_get_table_header(char *signature, in ACPI_EXPORT_SYMBOL_INIT() 225 if (!signature || !out_table_header) { in ACPI_EXPORT_SYMBOL_INIT() 234 (&(acpi_gbl_root_table_list.tables[i].signature), in ACPI_EXPORT_SYMBOL_INIT() 235 signature)) { in ACPI_EXPORT_SYMBOL_INIT() 297 acpi_get_table(char *signature, in ACPI_EXPORT_SYMBOL() 307 if (!signature || !out_table) { in ACPI_EXPORT_SYMBOL() 326 if (!ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in ACPI_EXPORT_SYMBOL()
|
D | tbprint.c | 73 acpi_tb_fix_string(out_header->signature, ACPI_NAMESEG_SIZE); in acpi_tb_cleanup_table_header() 98 if (ACPI_COMPARE_NAMESEG(header->signature, ACPI_SIG_FACS)) { in acpi_tb_print_table_header() 103 header->signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header() 106 header)->signature)) { in acpi_tb_print_table_header() 131 local_header.signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header()
|
D | tbxfload.c | 121 !ACPI_COMPARE_NAMESEG(table->signature.ascii, ACPI_SIG_DSDT) || in ACPI_EXPORT_SYMBOL_INIT() 174 (table->signature.ascii, ACPI_SIG_SSDT) in ACPI_EXPORT_SYMBOL_INIT() 175 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 177 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 191 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 198 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 406 (acpi_gbl_root_table_list.tables[i].signature.ascii, in ACPI_EXPORT_SYMBOL()
|
D | tbdata.c | 99 ACPI_MOVE_32_TO_32(table_desc->signature.ascii, table->signature); in acpi_tb_init_table_descriptor() 496 char *signature, u32 *table_index) in acpi_tb_verify_temp_table() argument 511 if (signature && in acpi_tb_verify_temp_table() 512 !ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in acpi_tb_verify_temp_table() 515 table_desc->signature.integer, signature)); in acpi_tb_verify_temp_table() 532 signature. in acpi_tb_verify_temp_table() 534 table_desc->signature.ascii : "????", in acpi_tb_verify_temp_table() 552 (table_desc->signature. in acpi_tb_verify_temp_table() 554 signature. in acpi_tb_verify_temp_table()
|
/linux-6.12.1/tools/power/acpi/tools/acpidump/ |
D | apdump.c | 33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header() 37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header() 40 *(u32 *)table->signature); in ap_is_valid_header() 73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum() 88 table->signature); in ap_is_valid_checksum() 116 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length() 168 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer() 292 int ap_dump_table_by_name(char *signature) in ap_dump_table_by_name() argument 301 if (strlen(signature) != ACPI_NAMESEG_SIZE) { in ap_dump_table_by_name() 304 signature); in ap_dump_table_by_name() [all …]
|
/linux-6.12.1/Documentation/security/ |
D | digsig.rst | 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 27 Public key and signature consist of header and MPIs:: 38 uint8_t version; /* signature format version */ 39 time_t timestamp; /* signature made */ 48 Signature header is used as an input to generate a signature. 49 Such approach insures that key or signature header could not be changed. 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key 64 * @sig: digital signature [all …]
|
/linux-6.12.1/Documentation/arch/arm64/ |
D | acpi_object_usage.rst | 10 the table signature (the first four bytes of the table) is the only portion 30 AEST Signature Reserved (signature == "AEST") 37 AGDI Signature Reserved (signature == "AGDI") 44 APMT Signature Reserved (signature == "APMT") 51 BERT Section 18.3 (signature == "BERT") 58 BOOT Signature Reserved (signature == "BOOT") 64 BGRT Section 5.2.22 (signature == "BGRT") 71 CEDT Signature Reserved (signature == "CEDT") 78 CPEP Section 5.2.18 (signature == "CPEP") 86 CSRT Signature Reserved (signature == "CSRT") [all …]
|
/linux-6.12.1/drivers/net/wwan/iosm/ |
D | iosm_ipc_mux_codec.h | 101 __le32 signature; member 120 __le32 signature; member 137 __le32 signature; member 158 __le32 signature; member 183 __le32 signature; member 207 __le32 signature; member 235 __le32 signature; member
|
/linux-6.12.1/drivers/gpu/drm/nouveau/nvkm/nvfw/ |
D | flcn.c | 71 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_dump() 72 hdr->signature[3]); in flcn_bl_dmem_desc_dump() 95 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_v1_dump() 96 hdr->signature[3]); in flcn_bl_dmem_desc_v1_dump()
|
/linux-6.12.1/drivers/net/wireless/realtek/rtw89/ |
D | acpi.c | 31 return p->signature[0] == 0x00 && in chk_acpi_policy_6ghz_sig() 32 p->signature[1] == 0xE0 && in chk_acpi_policy_6ghz_sig() 33 p->signature[2] == 0x4C; in chk_acpi_policy_6ghz_sig() 82 return p->signature[0] == 0x52 && in chk_acpi_policy_6ghz_sp_sig() 83 p->signature[1] == 0x54 && in chk_acpi_policy_6ghz_sp_sig() 84 p->signature[2] == 0x4B && in chk_acpi_policy_6ghz_sp_sig() 85 p->signature[3] == 0x07; in chk_acpi_policy_6ghz_sp_sig()
|
/linux-6.12.1/kernel/module/ |
D | decompress.c | 65 const u8 signature[] = { 0x1f, 0x8b, 0x08 }; in module_gzip_header_len() local 68 if (size < len || memcmp(buf, signature, sizeof(signature))) in module_gzip_header_len() 152 static const u8 signature[] = { 0xfd, '7', 'z', 'X', 'Z', 0 }; in module_xz_decompress() local 159 if (size < sizeof(signature) || in module_xz_decompress() 160 memcmp(buf, signature, sizeof(signature))) { in module_xz_decompress() 210 static const u8 signature[] = { 0x28, 0xb5, 0x2f, 0xfd }; in module_zstd_decompress() local 221 if (size < sizeof(signature) || in module_zstd_decompress() 222 memcmp(buf, signature, sizeof(signature))) { in module_zstd_decompress()
|
/linux-6.12.1/crypto/asymmetric_keys/ |
D | Kconfig | 8 as encryption, decryption, signature generation and signature 22 If signature generation and/or verification are to be used, 54 signature data and provides the ability to verify the signature. 69 bool "Support for PE file signature verification" 76 This option provides support for verifying the signature(s) on a 80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification" 82 This option causes some selftests to be run on the signature
|
/linux-6.12.1/kernel/ |
D | Kconfig.kexec | 51 bool "Verify kernel signature during kexec_file_load() syscall" 56 signature of the kernel image. The image can still be loaded without 57 a valid signature unless you also enable KEXEC_SIG_FORCE, though if 58 there's a signature that we can check, then it must be valid. 60 In addition to this option, you need to enable signature 65 bool "Require a valid signature in kexec_file_load() syscall" 69 This option makes kernel signature verification mandatory for 73 bool "Enable Image signature verification support (ARM)" 79 Enable Image signature verification support. 82 bool "Enable bzImage signature verification support" [all …]
|
/linux-6.12.1/lib/ |
D | check_signature.c | 17 const unsigned char *signature, int length) in check_signature() argument 20 if (readb(io_addr) != *signature) in check_signature() 23 signature++; in check_signature()
|
/linux-6.12.1/drivers/acpi/ |
D | acpi_fpdt.c | 35 u32 signature; member 167 char *signature = (subtable_type == SUBTABLE_FBPT ? "FBPT" : "S3PT"); in fpdt_process_subtable() local 180 if (strncmp((char *)&subtable_header->signature, signature, 4)) { in fpdt_process_subtable() 207 record_header->type, signature); in fpdt_process_subtable() 223 record_header->type, signature); in fpdt_process_subtable() 238 record_header->type, signature); in fpdt_process_subtable()
|
/linux-6.12.1/arch/x86/pci/ |
D | pcbios.c | 78 unsigned long signature; /* _32_ */ member 148 u32 signature, eax, ebx, ecx; in check_pcibios() local 161 : "=d" (signature), in check_pcibios() 178 if (status || signature != PCI_SIGNATURE) { in check_pcibios() 180 status, signature); in check_pcibios() 318 if (get_kernel_nofault(sig, &check->fields.signature)) in pci_find_bios() 321 if (check->fields.signature != BIOS32_SIGNATURE) in pci_find_bios()
|
/linux-6.12.1/arch/x86/include/asm/ |
D | cpuid.h | 195 uint32_t base, eax, signature[3]; in hypervisor_cpuid_base() local 198 cpuid(base, &eax, &signature[0], &signature[1], &signature[2]); in hypervisor_cpuid_base() 205 if (!__builtin_memcmp(sig, signature, 12) && in hypervisor_cpuid_base()
|
/linux-6.12.1/drivers/scsi/ |
D | fdomain_isa.c | 59 static struct signature { struct 60 const char *signature; argument 91 struct signature *sig = NULL; in fdomain_isa_match() 93 static struct signature *saved_sig; in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match()
|
/linux-6.12.1/arch/x86/boot/compressed/ |
D | pgtable_64.c | 38 char *signature; in find_trampoline_placement() local 52 signature = (char *)&boot_params_ptr->efi_info.efi_loader_signature; in find_trampoline_placement() 53 if (strncmp(signature, EFI32_LOADER_SIGNATURE, 4) && in find_trampoline_placement() 54 strncmp(signature, EFI64_LOADER_SIGNATURE, 4)) { in find_trampoline_placement()
|