Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 1261) sorted by relevance

12345678910>>...51

/OK3568_Linux_fs/kernel/tools/power/acpi/os_specific/service_layers/
H A Doslinuxtbl.c22 char signature[ACPI_NAMESEG_SIZE]; member
31 osl_table_name_from_file(char *filename, char *signature, u32 *instance);
33 static acpi_status osl_add_table_to_list(char *signature, u32 instance);
42 char *signature, struct acpi_table_header **table);
57 char *signature,
65 osl_get_bios_table(char *signature,
219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument
240 osl_get_bios_table(signature, instance, table, address); in acpi_os_get_table_by_name()
244 status = osl_get_customized_table(STATIC_TABLE_DIR, signature, in acpi_os_get_table_by_name()
255 signature, instance, table, in acpi_os_get_table_by_name()
[all …]
/OK3568_Linux_fs/kernel/fs/incfs/
H A Dverity.c74 struct mem_range signature = { in incfs_end_enable_verity() local
98 error = incfs_write_verity_signature_to_backing_file(bfc, signature, in incfs_end_enable_verity()
116 .size = signature.len, in incfs_end_enable_verity()
212 u8 *signature, size_t sig_size) in incfs_calc_verity_digest_from_desc() argument
242 err = __fsverity_verify_signature(inode, signature, sig_size, in incfs_calc_verity_digest_from_desc()
281 u8 *signature, size_t signature_size, in incfs_calc_verity_digest() argument
291 signature, signature_size); in incfs_calc_verity_digest()
430 struct incfs_df_signature *signature = NULL; in incfs_add_signature_record() local
490 signature = kzalloc(sizeof(*signature), GFP_NOFS); in incfs_add_signature_record()
491 if (!signature) { in incfs_add_signature_record()
[all …]
H A Dintegrity.c92 static int incfs_parse_signature(struct mem_range signature, in incfs_parse_signature() argument
95 u8 *p = signature.data; in incfs_parse_signature()
96 u8 *top = signature.data + signature.len; in incfs_parse_signature()
99 if (signature.len > INCFS_MAX_SIGNATURE_SIZE) in incfs_parse_signature()
130 struct mtree *incfs_alloc_mtree(struct mem_range signature, in incfs_alloc_mtree() argument
146 error = incfs_parse_signature(signature, &si); in incfs_alloc_mtree()
/OK3568_Linux_fs/kernel/tools/power/acpi/tools/acpidump/
H A Dapdump.c33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header()
37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header()
40 *(u32 *)table->signature); in ap_is_valid_header()
73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum()
86 table->signature); in ap_is_valid_checksum()
114 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length()
166 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer()
290 int ap_dump_table_by_name(char *signature) in ap_dump_table_by_name() argument
299 if (strlen(signature) != ACPI_NAMESEG_SIZE) { in ap_dump_table_by_name()
302 signature); in ap_dump_table_by_name()
[all …]
/OK3568_Linux_fs/kernel/drivers/acpi/acpica/
H A Dtbfind.c34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument
45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table()
59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table()
67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table()
68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table()
96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table()
97 header.signature, ACPI_NAMESEG_SIZE) && (!oem_id[0] in acpi_tb_find_table()
113 header.signature)); in acpi_tb_find_table()
H A Dtbprint.c72 acpi_tb_fix_string(out_header->signature, ACPI_NAMESEG_SIZE); in acpi_tb_cleanup_table_header()
97 if (ACPI_COMPARE_NAMESEG(header->signature, ACPI_SIG_FACS)) { in acpi_tb_print_table_header()
102 header->signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header()
104 } else if (ACPI_VALIDATE_RSDP_SIG(header->signature)) { in acpi_tb_print_table_header()
129 local_header.signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header()
161 if (ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_S3PT) || in acpi_tb_verify_checksum()
162 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_FACS)) { in acpi_tb_verify_checksum()
176 table->signature, table->checksum, in acpi_tb_verify_checksum()
H A Dtbxface.c165 table_desc->signature.ascii)); in ACPI_EXPORT_SYMBOL_INIT()
216 acpi_get_table_header(char *signature, in ACPI_EXPORT_SYMBOL_INIT()
225 if (!signature || !out_table_header) { in ACPI_EXPORT_SYMBOL_INIT()
234 (&(acpi_gbl_root_table_list.tables[i].signature), in ACPI_EXPORT_SYMBOL_INIT()
235 signature)) { in ACPI_EXPORT_SYMBOL_INIT()
297 acpi_get_table(char *signature, in ACPI_EXPORT_SYMBOL()
307 if (!signature || !out_table) { in ACPI_EXPORT_SYMBOL()
326 if (!ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in ACPI_EXPORT_SYMBOL()
H A Dtbxfload.c121 !ACPI_COMPARE_NAMESEG(table->signature.ascii, ACPI_SIG_DSDT) || in ACPI_EXPORT_SYMBOL_INIT()
174 (table->signature.ascii, ACPI_SIG_SSDT) in ACPI_EXPORT_SYMBOL_INIT()
175 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT()
177 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT()
191 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT()
198 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT()
382 (acpi_gbl_root_table_list.tables[i].signature.ascii, in ACPI_EXPORT_SYMBOL()
H A Dtbdata.c99 ACPI_MOVE_32_TO_32(table_desc->signature.ascii, table->signature); in acpi_tb_init_table_descriptor()
468 char *signature, u32 *table_index) in acpi_tb_verify_temp_table() argument
483 if (signature && in acpi_tb_verify_temp_table()
484 !ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in acpi_tb_verify_temp_table()
487 table_desc->signature.integer, signature)); in acpi_tb_verify_temp_table()
504 signature. in acpi_tb_verify_temp_table()
506 table_desc->signature.ascii : "????", in acpi_tb_verify_temp_table()
524 (table_desc->signature. in acpi_tb_verify_temp_table()
526 signature. in acpi_tb_verify_temp_table()
H A Dutmisc.c62 if (ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_DSDT) || in acpi_ut_is_aml_table()
63 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_PSDT) || in acpi_ut_is_aml_table()
64 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_SSDT) || in acpi_ut_is_aml_table()
65 ACPI_COMPARE_NAMESEG(table->signature, ACPI_SIG_OSDT) || in acpi_ut_is_aml_table()
66 ACPI_IS_OEM_SIG(table->signature)) { in acpi_ut_is_aml_table()
/OK3568_Linux_fs/kernel/include/linux/
H A Dsfi_acpi.h66 extern int sfi_acpi_table_parse(char *signature, char *oem_id,
70 static inline int __init acpi_sfi_table_parse(char *signature, in acpi_sfi_table_parse() argument
73 if (!acpi_table_parse(signature, handler)) in acpi_sfi_table_parse()
76 return sfi_acpi_table_parse(signature, NULL, NULL, handler); in acpi_sfi_table_parse()
79 static inline int sfi_acpi_table_parse(char *signature, char *oem_id, in sfi_acpi_table_parse() argument
86 static inline int __init acpi_sfi_table_parse(char *signature, in acpi_sfi_table_parse() argument
89 return acpi_table_parse(signature, handler); in acpi_sfi_table_parse()
/OK3568_Linux_fs/kernel/Documentation/security/
H A Ddigsig.rst19 Digital signature verification API provides a method to verify digital signature.
22 Digital signature verification is implemented using cut-down kernel port of
27 Public key and signature consist of header and MPIs::
38 uint8_t version; /* signature format version */
39 time_t timestamp; /* signature made */
48 Signature header is used as an input to generate a signature.
49 Such approach insures that key or signature header could not be changed.
58 digsig_verify() - digital signature verification with public key
62 * digsig_verify() - digital signature verification with public key
64 * @sig: digital signature
[all …]
/OK3568_Linux_fs/kernel/Documentation/arm64/
H A Dacpi_object_usage.rst10 the table signature (the first four bytes of the table) is the only portion
30 BERT Section 18.3 (signature == "BERT")
37 BOOT Signature Reserved (signature == "BOOT")
43 BGRT Section 5.2.22 (signature == "BGRT")
50 CPEP Section 5.2.18 (signature == "CPEP")
58 CSRT Signature Reserved (signature == "CSRT")
64 DBG2 Signature Reserved (signature == "DBG2")
71 DBGP Signature Reserved (signature == "DBGP")
77 DSDT Section 5.2.11.1 (signature == "DSDT")
87 DMAR Signature Reserved (signature == "DMAR")
[all …]
/OK3568_Linux_fs/kernel/drivers/gpu/drm/nouveau/nvkm/nvfw/
H A Dflcn.c71 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_dump()
72 hdr->signature[3]); in flcn_bl_dmem_desc_dump()
95 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_v1_dump()
96 hdr->signature[3]); in flcn_bl_dmem_desc_v1_dump()
/OK3568_Linux_fs/external/xserver/render/
H A Dglyph.c122 CARD32 signature, Bool match, unsigned char sha1[20]) in FindGlyphRef() argument
130 elt = signature % tableSize; in FindGlyphRef()
135 s = gr->signature; in FindGlyphRef()
148 else if (s == signature && in FindGlyphRef()
153 step = signature % hash->hashSet->rehash; in FindGlyphRef()
190 CARD32 signature = *(CARD32 *) sha1; in FindGlyphByHash() local
195 gr = FindGlyphRef(&globalGlyphs[format], signature, TRUE, sha1); in FindGlyphByHash()
256 CARD32 signature; in FreeGlyph() local
266 signature = *(CARD32 *) glyph->sha1; in FreeGlyph()
267 gr = FindGlyphRef(&globalGlyphs[format], signature, TRUE, glyph->sha1); in FreeGlyph()
[all …]
/OK3568_Linux_fs/buildroot/dl/qt5location/git/src/3rdparty/mapbox-gl-native/include/mbgl/style/expression/
H A Dcompound_expression.hpp67 CompoundExpressionBase(std::string name_, const detail::SignatureBase& signature) : in CompoundExpressionBase() argument
68 Expression(Kind::CompoundExpression, signature.result), in CompoundExpressionBase()
70 params(signature.params) in CompoundExpressionBase()
99 signature(signature_), in CompoundExpression()
104 return signature.apply(evaluationParams, args); in evaluate()
122 return signature.name; in getOperator()
126 Signature signature; member in mbgl::style::expression::CompoundExpression
/OK3568_Linux_fs/u-boot/cmd/
H A Dbmp.c75 if (!((bmp->header.signature[0] == 'B') && in gunzip_bmp()
76 (bmp->header.signature[1] == 'M'))) { in gunzip_bmp()
198 if (!((bmp->header.signature[0]=='B') && in bmp_info()
199 (bmp->header.signature[1]=='M'))) in bmp_info()
238 if (!((bmp->header.signature[0]=='B') && in bmp_display()
239 (bmp->header.signature[1]=='M'))) in bmp_display()
/OK3568_Linux_fs/u-boot/disk/
H A Dpart_mac.c60 (mpart->signature != MAC_PARTITION_MAGIC) ) { in part_test_mac()
120 if (mpart->signature != MAC_PARTITION_MAGIC) { in part_print_mac()
123 mpart->signature); in part_print_mac()
166 if (ddb_p->signature != MAC_DRIVER_MAGIC) { in part_mac_read_ddb()
192 if (pdb_p->signature != MAC_PARTITION_MAGIC) { in part_mac_read_pdb()
195 pdb_p->signature); in part_mac_read_pdb()
/OK3568_Linux_fs/u-boot/doc/uImage.FIT/
H A Dsignature.txt10 The signature feature allows the hash to be signed with a private key such
25 - sign the hash with a private key to produce a signature
26 - store the resulting signature in the FIT
32 - extract the signature from the FIT
34 - verify (with the public key) that the extracted signature matches the
83 The following properties are required in the FIT's signature node(s) to
86 signature@1, signature@2, etc.
97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA)
139 Public keys should be stored as sub-nodes in a /signature node. Required
183 signature@1 {
[all …]
/OK3568_Linux_fs/kernel/arch/x86/pci/
H A Dpcbios.c65 unsigned long signature; /* _32_ */ member
135 u32 signature, eax, ebx, ecx; in check_pcibios() local
148 : "=d" (signature), in check_pcibios()
165 if (status || signature != PCI_SIGNATURE) { in check_pcibios()
167 status, signature); in check_pcibios()
305 if (get_kernel_nofault(sig, &check->fields.signature)) in pci_find_bios()
308 if (check->fields.signature != BIOS32_SIGNATURE) in pci_find_bios()
/OK3568_Linux_fs/kernel/crypto/asymmetric_keys/
H A DKconfig8 as encryption, decryption, signature generation and signature
21 If signature generation and/or verification are to be used,
74 signature data and provides the ability to verify the signature.
89 bool "Support for PE file signature verification"
96 This option provides support for verifying the signature(s) on a
/OK3568_Linux_fs/kernel/lib/
H A Dcheck_signature.c17 const unsigned char *signature, int length) in check_signature() argument
20 if (readb(io_addr) != *signature) in check_signature()
23 signature++; in check_signature()
/OK3568_Linux_fs/kernel/Documentation/admin-guide/
H A Dmodule-signing.rst22 installation and then checks the signature upon loading the module. This
26 signature checking is done by the kernel so that it is not necessary to have
34 SHA-512 (the algorithm is selected by data in the signature).
45 CONFIG_MODULE_SIG "Module signature verification"
53 signature for which the key is not known or a module that is unsigned.
61 signature that can be verified by a public key in the kernel's possession
64 Irrespective of the setting here, if the module has a signature block that
129 private key is used to generate a signature and the corresponding public key is
240 A signed module has a digital signature simply appended at the end. The string
241 ``~Module signature appended~.`` at the end of the module's file confirms that a
[all …]
/OK3568_Linux_fs/kernel/drivers/scsi/
H A Dfdomain_isa.c59 static struct signature { struct
60 const char *signature; member
91 struct signature *sig = NULL; in fdomain_isa_match()
93 static struct signature *saved_sig; in fdomain_isa_match()
102 signatures[i].signature, in fdomain_isa_match()
/OK3568_Linux_fs/external/rknpu2/examples/3rdparty/opencv/opencv-linux-aarch64/include/opencv2/flann/
H A Dsaving.h71 char signature[16];
89 memset(header.signature, 0, sizeof(header.signature));
90 strcpy(header.signature, FLANN_SIGNATURE_);
116 if (strcmp(header.signature,FLANN_SIGNATURE_)!=0) {

12345678910>>...51