| /OK3568_Linux_fs/kernel/tools/power/acpi/os_specific/service_layers/ |
| H A D | oslinuxtbl.c | 22 char signature[ACPI_NAMESEG_SIZE]; member 31 osl_table_name_from_file(char *filename, char *signature, u32 *instance); 33 static acpi_status osl_add_table_to_list(char *signature, u32 instance); 42 char *signature, struct acpi_table_header **table); 57 char *signature, 65 osl_get_bios_table(char *signature, 219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument 240 osl_get_bios_table(signature, instance, table, address); in acpi_os_get_table_by_name() 244 status = osl_get_customized_table(STATIC_TABLE_DIR, signature, in acpi_os_get_table_by_name() 255 signature, instance, table, in acpi_os_get_table_by_name() [all …]
|
| /OK3568_Linux_fs/kernel/fs/incfs/ |
| H A D | verity.c | 74 struct mem_range signature = { in incfs_end_enable_verity() local 98 error = incfs_write_verity_signature_to_backing_file(bfc, signature, in incfs_end_enable_verity() 116 .size = signature.len, in incfs_end_enable_verity() 212 u8 *signature, size_t sig_size) in incfs_calc_verity_digest_from_desc() argument 242 err = __fsverity_verify_signature(inode, signature, sig_size, in incfs_calc_verity_digest_from_desc() 281 u8 *signature, size_t signature_size, in incfs_calc_verity_digest() argument 291 signature, signature_size); in incfs_calc_verity_digest() 430 struct incfs_df_signature *signature = NULL; in incfs_add_signature_record() local 490 signature = kzalloc(sizeof(*signature), GFP_NOFS); in incfs_add_signature_record() 491 if (!signature) { in incfs_add_signature_record() [all …]
|
| H A D | integrity.c | 92 static int incfs_parse_signature(struct mem_range signature, in incfs_parse_signature() argument 95 u8 *p = signature.data; in incfs_parse_signature() 96 u8 *top = signature.data + signature.len; in incfs_parse_signature() 99 if (signature.len > INCFS_MAX_SIGNATURE_SIZE) in incfs_parse_signature() 130 struct mtree *incfs_alloc_mtree(struct mem_range signature, in incfs_alloc_mtree() argument 146 error = incfs_parse_signature(signature, &si); in incfs_alloc_mtree()
|
| /OK3568_Linux_fs/kernel/tools/power/acpi/tools/acpidump/ |
| H A D | apdump.c | 33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header() 37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header() 40 *(u32 *)table->signature); in ap_is_valid_header() 73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum() 86 table->signature); in ap_is_valid_checksum() 114 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length() 166 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer() 290 int ap_dump_table_by_name(char *signature) in ap_dump_table_by_name() argument 299 if (strlen(signature) != ACPI_NAMESEG_SIZE) { in ap_dump_table_by_name() 302 signature); in ap_dump_table_by_name() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/acpi/acpica/ |
| H A D | tbfind.c | 34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument 45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table() 59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table() 67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table() 68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table() 96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table() 97 header.signature, ACPI_NAMESEG_SIZE) && (!oem_id[0] in acpi_tb_find_table() 113 header.signature)); in acpi_tb_find_table()
|
| H A D | tbprint.c | 72 acpi_tb_fix_string(out_header->signature, ACPI_NAMESEG_SIZE); in acpi_tb_cleanup_table_header() 97 if (ACPI_COMPARE_NAMESEG(header->signature, ACPI_SIG_FACS)) { in acpi_tb_print_table_header() 102 header->signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header() 104 } else if (ACPI_VALIDATE_RSDP_SIG(header->signature)) { in acpi_tb_print_table_header() 129 local_header.signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header() 161 if (ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_S3PT) || in acpi_tb_verify_checksum() 162 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_FACS)) { in acpi_tb_verify_checksum() 176 table->signature, table->checksum, in acpi_tb_verify_checksum()
|
| H A D | tbxface.c | 165 table_desc->signature.ascii)); in ACPI_EXPORT_SYMBOL_INIT() 216 acpi_get_table_header(char *signature, in ACPI_EXPORT_SYMBOL_INIT() 225 if (!signature || !out_table_header) { in ACPI_EXPORT_SYMBOL_INIT() 234 (&(acpi_gbl_root_table_list.tables[i].signature), in ACPI_EXPORT_SYMBOL_INIT() 235 signature)) { in ACPI_EXPORT_SYMBOL_INIT() 297 acpi_get_table(char *signature, in ACPI_EXPORT_SYMBOL() 307 if (!signature || !out_table) { in ACPI_EXPORT_SYMBOL() 326 if (!ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in ACPI_EXPORT_SYMBOL()
|
| H A D | tbxfload.c | 121 !ACPI_COMPARE_NAMESEG(table->signature.ascii, ACPI_SIG_DSDT) || in ACPI_EXPORT_SYMBOL_INIT() 174 (table->signature.ascii, ACPI_SIG_SSDT) in ACPI_EXPORT_SYMBOL_INIT() 175 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 177 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 191 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 198 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 382 (acpi_gbl_root_table_list.tables[i].signature.ascii, in ACPI_EXPORT_SYMBOL()
|
| H A D | tbdata.c | 99 ACPI_MOVE_32_TO_32(table_desc->signature.ascii, table->signature); in acpi_tb_init_table_descriptor() 468 char *signature, u32 *table_index) in acpi_tb_verify_temp_table() argument 483 if (signature && in acpi_tb_verify_temp_table() 484 !ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in acpi_tb_verify_temp_table() 487 table_desc->signature.integer, signature)); in acpi_tb_verify_temp_table() 504 signature. in acpi_tb_verify_temp_table() 506 table_desc->signature.ascii : "????", in acpi_tb_verify_temp_table() 524 (table_desc->signature. in acpi_tb_verify_temp_table() 526 signature. in acpi_tb_verify_temp_table()
|
| H A D | utmisc.c | 62 if (ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_DSDT) || in acpi_ut_is_aml_table() 63 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_PSDT) || in acpi_ut_is_aml_table() 64 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_SSDT) || in acpi_ut_is_aml_table() 65 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_OSDT) || in acpi_ut_is_aml_table() 66 ACPI_IS_OEM_SIG(table->signature)) { in acpi_ut_is_aml_table()
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | sfi_acpi.h | 66 extern int sfi_acpi_table_parse(char *signature, char *oem_id, 70 static inline int __init acpi_sfi_table_parse(char *signature, in acpi_sfi_table_parse() argument 73 if (!acpi_table_parse(signature, handler)) in acpi_sfi_table_parse() 76 return sfi_acpi_table_parse(signature, NULL, NULL, handler); in acpi_sfi_table_parse() 79 static inline int sfi_acpi_table_parse(char *signature, char *oem_id, in sfi_acpi_table_parse() argument 86 static inline int __init acpi_sfi_table_parse(char *signature, in acpi_sfi_table_parse() argument 89 return acpi_table_parse(signature, handler); in acpi_sfi_table_parse()
|
| /OK3568_Linux_fs/kernel/Documentation/security/ |
| H A D | digsig.rst | 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 27 Public key and signature consist of header and MPIs:: 38 uint8_t version; /* signature format version */ 39 time_t timestamp; /* signature made */ 48 Signature header is used as an input to generate a signature. 49 Such approach insures that key or signature header could not be changed. 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key 64 * @sig: digital signature [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/arm64/ |
| H A D | acpi_object_usage.rst | 10 the table signature (the first four bytes of the table) is the only portion 30 BERT Section 18.3 (signature == "BERT") 37 BOOT Signature Reserved (signature == "BOOT") 43 BGRT Section 5.2.22 (signature == "BGRT") 50 CPEP Section 5.2.18 (signature == "CPEP") 58 CSRT Signature Reserved (signature == "CSRT") 64 DBG2 Signature Reserved (signature == "DBG2") 71 DBGP Signature Reserved (signature == "DBGP") 77 DSDT Section 5.2.11.1 (signature == "DSDT") 87 DMAR Signature Reserved (signature == "DMAR") [all …]
|
| /OK3568_Linux_fs/kernel/drivers/gpu/drm/nouveau/nvkm/nvfw/ |
| H A D | flcn.c | 71 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_dump() 72 hdr->signature[3]); in flcn_bl_dmem_desc_dump() 95 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_v1_dump() 96 hdr->signature[3]); in flcn_bl_dmem_desc_v1_dump()
|
| /OK3568_Linux_fs/external/xserver/render/ |
| H A D | glyph.c | 122 CARD32 signature, Bool match, unsigned char sha1[20]) in FindGlyphRef() argument 130 elt = signature % tableSize; in FindGlyphRef() 135 s = gr->signature; in FindGlyphRef() 148 else if (s == signature && in FindGlyphRef() 153 step = signature % hash->hashSet->rehash; in FindGlyphRef() 190 CARD32 signature = *(CARD32 *) sha1; in FindGlyphByHash() local 195 gr = FindGlyphRef(&globalGlyphs[format], signature, TRUE, sha1); in FindGlyphByHash() 256 CARD32 signature; in FreeGlyph() local 266 signature = *(CARD32 *) glyph->sha1; in FreeGlyph() 267 gr = FindGlyphRef(&globalGlyphs[format], signature, TRUE, glyph->sha1); in FreeGlyph() [all …]
|
| /OK3568_Linux_fs/buildroot/dl/qt5location/git/src/3rdparty/mapbox-gl-native/include/mbgl/style/expression/ |
| H A D | compound_expression.hpp | 67 CompoundExpressionBase(std::string name_, const detail::SignatureBase& signature) : in CompoundExpressionBase() argument 68 Expression(Kind::CompoundExpression, signature.result), in CompoundExpressionBase() 70 params(signature.params) in CompoundExpressionBase() 99 signature(signature_), in CompoundExpression() 104 return signature.apply(evaluationParams, args); in evaluate() 122 return signature.name; in getOperator() 126 Signature signature; member in mbgl::style::expression::CompoundExpression
|
| /OK3568_Linux_fs/u-boot/cmd/ |
| H A D | bmp.c | 75 if (!((bmp->header.signature[0] == 'B') && in gunzip_bmp() 76 (bmp->header.signature[1] == 'M'))) { in gunzip_bmp() 198 if (!((bmp->header.signature[0]=='B') && in bmp_info() 199 (bmp->header.signature[1]=='M'))) in bmp_info() 238 if (!((bmp->header.signature[0]=='B') && in bmp_display() 239 (bmp->header.signature[1]=='M'))) in bmp_display()
|
| /OK3568_Linux_fs/u-boot/disk/ |
| H A D | part_mac.c | 60 (mpart->signature != MAC_PARTITION_MAGIC) ) { in part_test_mac() 120 if (mpart->signature != MAC_PARTITION_MAGIC) { in part_print_mac() 123 mpart->signature); in part_print_mac() 166 if (ddb_p->signature != MAC_DRIVER_MAGIC) { in part_mac_read_ddb() 192 if (pdb_p->signature != MAC_PARTITION_MAGIC) { in part_mac_read_pdb() 195 pdb_p->signature); in part_mac_read_pdb()
|
| /OK3568_Linux_fs/u-boot/doc/uImage.FIT/ |
| H A D | signature.txt | 10 The signature feature allows the hash to be signed with a private key such 25 - sign the hash with a private key to produce a signature 26 - store the resulting signature in the FIT 32 - extract the signature from the FIT 34 - verify (with the public key) that the extracted signature matches the 83 The following properties are required in the FIT's signature node(s) to 86 signature@1, signature@2, etc. 97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA) 139 Public keys should be stored as sub-nodes in a /signature node. Required 183 signature@1 { [all …]
|
| /OK3568_Linux_fs/kernel/arch/x86/pci/ |
| H A D | pcbios.c | 65 unsigned long signature; /* _32_ */ member 135 u32 signature, eax, ebx, ecx; in check_pcibios() local 148 : "=d" (signature), in check_pcibios() 165 if (status || signature != PCI_SIGNATURE) { in check_pcibios() 167 status, signature); in check_pcibios() 305 if (get_kernel_nofault(sig, &check->fields.signature)) in pci_find_bios() 308 if (check->fields.signature != BIOS32_SIGNATURE) in pci_find_bios()
|
| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | Kconfig | 8 as encryption, decryption, signature generation and signature 21 If signature generation and/or verification are to be used, 74 signature data and provides the ability to verify the signature. 89 bool "Support for PE file signature verification" 96 This option provides support for verifying the signature(s) on a
|
| /OK3568_Linux_fs/kernel/lib/ |
| H A D | check_signature.c | 17 const unsigned char *signature, int length) in check_signature() argument 20 if (readb(io_addr) != *signature) in check_signature() 23 signature++; in check_signature()
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | module-signing.rst | 22 installation and then checks the signature upon loading the module. This 26 signature checking is done by the kernel so that it is not necessary to have 34 SHA-512 (the algorithm is selected by data in the signature). 45 CONFIG_MODULE_SIG "Module signature verification" 53 signature for which the key is not known or a module that is unsigned. 61 signature that can be verified by a public key in the kernel's possession 64 Irrespective of the setting here, if the module has a signature block that 129 private key is used to generate a signature and the corresponding public key is 240 A signed module has a digital signature simply appended at the end. The string 241 ``~Module signature appended~.`` at the end of the module's file confirms that a [all …]
|
| /OK3568_Linux_fs/kernel/drivers/scsi/ |
| H A D | fdomain_isa.c | 59 static struct signature { struct 60 const char *signature; argument 91 struct signature *sig = NULL; in fdomain_isa_match() 93 static struct signature *saved_sig; in fdomain_isa_match() 102 signatures[i].signature, in fdomain_isa_match()
|
| /OK3568_Linux_fs/external/rknpu2/examples/3rdparty/opencv/opencv-linux-aarch64/include/opencv2/flann/ |
| H A D | saving.h | 71 char signature[16]; 89 memset(header.signature, 0, sizeof(header.signature)); 90 strcpy(header.signature, FLANN_SIGNATURE_); 116 if (strcmp(header.signature,FLANN_SIGNATURE_)!=0) {
|