/openbmc/u-boot/fs/ubifs/ |
H A D | key.h | 12 * This header contains various key-related definitions and helper function. 13 * UBIFS allows several key schemes, so we access key fields only via these 14 * helpers. At the moment only one key scheme is supported. 16 * Simple key scheme 20 * in case of direntry key). Next 3 bits are node type. The last 29 bits are 79 * ino_key_init - initialize inode key. 81 * @key: key to initialize 85 union ubifs_key *key, ino_t inum) in ino_key_init() argument 87 key->u32[0] = inum; in ino_key_init() 88 key->u32[1] = UBIFS_INO_KEY << UBIFS_S_KEY_BLOCK_BITS; in ino_key_init() [all …]
|
/openbmc/qemu/hw/usb/ |
H A D | u2f-emulated.c | 104 static void u2f_emulated_reset(U2FEmulatedState *key) in u2f_emulated_reset() argument 106 key->pending_out_start = 0; in u2f_emulated_reset() 107 key->pending_out_end = 0; in u2f_emulated_reset() 108 key->pending_out_num = 0; in u2f_emulated_reset() 111 static void u2f_pending_out_add(U2FEmulatedState *key, in u2f_pending_out_add() argument 116 if (key->pending_out_num >= PENDING_OUT_NUM) { in u2f_pending_out_add() 120 index = key->pending_out_end; in u2f_pending_out_add() 121 key->pending_out_end = (index + 1) % PENDING_OUT_NUM; in u2f_pending_out_add() 122 ++key->pending_out_num; in u2f_pending_out_add() 124 memcpy(&key->pending_out[index], packet, U2FHID_PACKET_SIZE); in u2f_pending_out_add() [all …]
|
H A D | u2f-passthru.c | 118 static void u2f_passthru_reset(U2FPassthruState *key) in u2f_passthru_reset() argument 120 timer_del(&key->timer); in u2f_passthru_reset() 121 qemu_set_fd_handler(key->hidraw_fd, NULL, NULL, key); in u2f_passthru_reset() 122 key->last_transaction_time = 0; in u2f_passthru_reset() 123 key->current_transactions_start = 0; in u2f_passthru_reset() 124 key->current_transactions_end = 0; in u2f_passthru_reset() 125 key->current_transactions_num = 0; in u2f_passthru_reset() 130 U2FPassthruState *key = opaque; in u2f_timeout_check() local 133 if (time > key->last_transaction_time + TRANSACTION_TIMEOUT) { in u2f_timeout_check() 134 u2f_passthru_reset(key); in u2f_timeout_check() [all …]
|
H A D | canokey.c | 70 CanoKeyState *key = base; in canokey_emu_stall_ep() local 72 key->ep_in_size[ep_in] = 0; in canokey_emu_stall_ep() 73 key->ep_in_state[ep_in] = CANOKEY_EP_IN_STALL; in canokey_emu_stall_ep() 80 CanoKeyState *key = base; in canokey_emu_set_address() local 81 key->dev.addr = addr; in canokey_emu_set_address() 89 CanoKeyState *key = base; in canokey_emu_prepare_receive() local 90 key->ep_out[ep] = pbuf; in canokey_emu_prepare_receive() 91 key->ep_out_size[ep] = size; in canokey_emu_prepare_receive() 99 CanoKeyState *key = base; in canokey_emu_transmit() local 101 memcpy(key->ep_in[ep_in] + key->ep_in_size[ep_in], in canokey_emu_transmit() [all …]
|
H A D | u2f.c | 36 /* U2F key Vendor / Product */ 50 [STR_PRODUCT] = "U2F USB key", 52 [STR_CONFIG] = "U2F key config", 53 [STR_INTERFACE] = "U2F key interface" 142 static void u2f_key_reset(U2FKeyState *key) in u2f_key_reset() argument 144 key->pending_in_start = 0; in u2f_key_reset() 145 key->pending_in_end = 0; in u2f_key_reset() 146 key->pending_in_num = 0; in u2f_key_reset() 151 U2FKeyState *key = U2F_KEY(dev); in u2f_key_handle_reset() local 153 u2f_key_reset(key); in u2f_key_handle_reset() [all …]
|
/openbmc/u-boot/lib/rsa/ |
H A D | rsa-mod-exp.c | 33 * @key: Key containing modulus to subtract 36 static void subtract_modulus(const struct rsa_public_key *key, uint32_t num[]) in subtract_modulus() argument 41 for (i = 0; i < key->len; i++) { in subtract_modulus() 42 acc += (uint64_t)num[i] - key->modulus[i]; in subtract_modulus() 51 * @key: Key containing modulus to check 55 static int greater_equal_modulus(const struct rsa_public_key *key, in greater_equal_modulus() argument 60 for (i = (int)key->len - 1; i >= 0; i--) { in greater_equal_modulus() 61 if (num[i] < key->modulus[i]) in greater_equal_modulus() 63 if (num[i] > key->modulus[i]) in greater_equal_modulus() 75 * @key: RSA key [all …]
|
/openbmc/qemu/qobject/ |
H A D | qdict.c | 45 /* Set the initial value from the key size. */ in tdb_hash() 56 static QDictEntry *alloc_entry(const char *key, QObject *value) in alloc_entry() argument 61 entry->key = g_strdup(key); in alloc_entry() 78 * qdict_entry_key(): Return qdict entry key 85 return entry->key; in qdict_entry_key() 92 const char *key, unsigned int bucket) in qdict_find() argument 97 if (!strcmp(entry->key, key)) { in qdict_find() 107 * Insert the pair 'key:value' into 'qdict', if 'key' already exists 115 void qdict_put_obj(QDict *qdict, const char *key, QObject *value) in qdict_put_obj() argument 120 bucket = tdb_hash(key) % QDICT_BUCKET_MAX; in qdict_put_obj() [all …]
|
/openbmc/u-boot/lib/libavb/ |
H A D | avb_rsa.c | 7 * key for computation. The code extends libmincrypt RSA verification code to 8 * support multiple RSA key lengths and hash digest algorithms. 25 IAvbKey* key = NULL; in iavb_parse_key_data() local 33 avb_error("Invalid key.\n"); in iavb_parse_key_data() 39 avb_error("Unexpected key length.\n"); in iavb_parse_key_data() 45 avb_error("Key does not match expected length.\n"); in iavb_parse_key_data() 52 /* Store n and rr following the key header so we only have to do one in iavb_parse_key_data() 55 key = (IAvbKey*)(avb_malloc(sizeof(IAvbKey) + 2 * h.key_num_bits / 8)); in iavb_parse_key_data() 56 if (key == NULL) { in iavb_parse_key_data() 60 key->len = h.key_num_bits / 32; in iavb_parse_key_data() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
H A D | 0001-Adapt-to-OpenSSL-1.1.1.patch | 16 key.c | 133 ++++++++++++++++++++++++++++++++++++++++++++++++++-- 28 key = pamsshagentauth_key_new(KEY_RSA1); 31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e); 32 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n); 37 BN_num_bits(key->rsa->n), bits); 39 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa)); 40 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa)); 42 + keybits = BN_num_bits(RSA_get0_n(key->rsa)); 45 + BN_num_bits(RSA_get0_n(key->rsa)), bits); 55 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); [all …]
|
H A D | 0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch | 14 key.c | 36 ++++++++++++++++++------------------ 26 key = pamsshagentauth_key_new(KEY_RSA1); 30 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e); 31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n); 39 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); 40 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e); 41 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->n); 44 ssh_encode_identity_rsa1(Buffer *b, RSA *key, const char *comment) 48 pamsshagentauth_buffer_put_int(b, BN_num_bits(key->n)); 49 pamsshagentauth_buffer_put_bignum(b, key->n); [all …]
|
/openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/static/js/ |
H A D | filtersnippet.js | 8 function date_enable (key, action) { argument 10 var elemFrom=document.getElementById("date_from_"+key); 11 var elemTo=document.getElementById("date_to_"+key); 37 function date_init (key, from_date, to_date, min_date, max_date, initial_enable) { argument 39 var elemFrom=document.getElementById("date_from_"+key); 40 var elemTo=document.getElementById("date_to_"+key); 56 if (key == initial_enable) { 57 date_enable (key, "enable"); 59 date_enable (key, "disable"); 65 key=$(this).attr("data-key"); [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | signing-keys.bb | 27 # Export public key of the rpm signing key 29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'), 33 # Export public key of the ipk signing key 35 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'), 39 # Export public key of the feed signing key 41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'), 49 if [ -f "${B}/rpm-key" ]; then 50 …install -D -m 0644 "${B}/rpm-key" "${D}${sysconfdir}/pki/rpm-gpg/RPM-GPG-KEY-${DISTRO}-${DISTRO_CO… 52 if [ -f "${B}/ipk-key" ]; then 53 …install -D -m 0644 "${B}/ipk-key" "${D}${sysconfdir}/pki/ipk-gpg/IPK-GPG-KEY-${DISTRO}-${DISTRO_CO… [all …]
|
/openbmc/openbmc/poky/meta/classes-global/ |
H A D | packagedata.bbclass | 19 for key in data.keys(): 20 d.setVar(key, data[key]) 24 for key in sdata.keys(): 25 if key in vars: 26 if sdata[key] != vars[key]: 27 if key == "PN": 28 …age from one recipe or the other or only build one of the recipes." % (vars[key], pkg, sdata[key])) 29 …sed and they will be unable to find the right workdir." % (vars["PN"], key, vars[key], sdata[key])) 36 if key.endswith(":" + pkg): 37 d.setVar(key, sdata[key]) [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 210.out | 10 …"job0", "options": {"driver": "luks", "file": "imgfile", "iter-time": 10, "key-secret": "keysec0",… 15 image: json:{"driver": "IMGFMT", "file": {"driver": "file", "filename": "TEST_IMG"}, "key-secret": … 30 key offset: 4096 34 key offset: 262144 37 key offset: 520192 40 key offset: 778240 43 key offset: 1036288 46 key offset: 1294336 49 key offset: 1552384 52 key offset: 1810432 [all …]
|
/openbmc/openbmc/poky/bitbake/lib/bb/ |
H A D | COW.py | 54 def __setitem__(cls, key, value): argument 58 key += MUTABLE 59 setattr(cls, key, value) 61 def __getmutable__(cls, key, readonly=False): argument 62 nkey = key + MUTABLE 73 print("Warning: Doing a copy because %s is a mutable type." % key, file=cls.__warn__) 83 def __getreadonly__(cls, key, default=__getmarker__): argument 87 return cls.__getitem__(key, default, True) 89 def __getitem__(cls, key, default=__getmarker__, readonly=False): argument 92 value = getattr(cls, key) [all …]
|
/openbmc/qemu/util/ |
H A D | keyval.c | 2 * Parsing KEY=VALUE,... strings 14 * KEY=VALUE,... syntax: 16 * key-vals = [ key-val { ',' key-val } [ ',' ] ] 17 * key-val = key '=' val | help 18 * key = key-fragment { '.' key-fragment } 19 * key-fragment = qapi-name | index 27 * key-vals specifies a JSON object, i.e. a tree whose root is an 31 * Each key-val = key-fragment '.' ... '=' val specifies a path from 36 * L '.' key-fragment is a child of the node denoted by path L 37 * key-fragment is a child of the tree root [all …]
|
/openbmc/qemu/include/qobject/ |
H A D | qdict.h | 22 char *key; member 42 void qdict_put_obj(QDict *qdict, const char *key, QObject *value); 43 void qdict_del(QDict *qdict, const char *key); 44 int qdict_haskey(const QDict *qdict, const char *key); 45 QObject *qdict_get(const QDict *qdict, const char *key); 50 #define qdict_put(qdict, key, obj) \ argument 51 qdict_put_obj(qdict, key, QOBJECT(obj)) 53 void qdict_put_bool(QDict *qdict, const char *key, bool value); 54 void qdict_put_int(QDict *qdict, const char *key, int64_t value); 55 void qdict_put_null(QDict *qdict, const char *key); [all …]
|
/openbmc/openbmc/poky/meta/lib/oe/ |
H A D | data.py | 10 def typed_value(key, d): argument 13 var_type = d.getVarFlag(key, 'type') 14 flags = d.getVarFlags(key) 22 return oe.maketype.create(d.getVar(key) or '', var_type, **flags) 24 bb.msg.fatal("Data", "%s: %s" % (key, str(exc))) 30 for key in d.keys(): 31 if key.startswith("_"): 33 elif key.startswith("BB"): 35 elif key.startswith("B_pn"): 37 elif key.startswith("do_"): [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | Key_v1.xml | 4 <!--# Redfish Schema: Key v1.4.1 --> 30 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Key"> 34 <EntityType Name="Key" BaseType="Resource.v1_0_0.Resource" Abstract="true"> 35 …<Annotation Term="OData.Description" String="The `Key` schema describes sensitive data for accessi… 36 …<Annotation Term="OData.LongDescription" String="This resource shall represent a key for a Redfish… 77 …"OData.LongDescription" String="This value shall indicate an RFC4253-defined 'ssh-rsa' key type."/> 81 …"OData.LongDescription" String="This value shall indicate an RFC4253-defined 'ssh-dss' key type."/> 85 …erm="OData.LongDescription" String="This value shall indicate an RFC5656-defined ECDSA key type."/> 89 …ta.LongDescription" String="This value shall indicate an RFC8709-defined 'ssh-ed25519' key type."/> 153 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Key.v1_0_0"> [all …]
|
/openbmc/qemu/include/hw/nvram/ |
H A D | fw_cfg.h | 103 * @key: selector key value for new fw_cfg item 107 * Add a new fw_cfg item, available by selecting the given key, as a raw 111 void fw_cfg_add_bytes(FWCfgState *s, uint16_t key, void *data, size_t len); 116 * @key: selector key value for new fw_cfg item 119 * Add a new fw_cfg item, available by selecting the given key. The item 123 void fw_cfg_add_string(FWCfgState *s, uint16_t key, const char *value); 128 * @key: selector key value for new fw_cfg item 131 * Replace the fw_cfg item available by selecting the given key. The new 137 void fw_cfg_modify_string(FWCfgState *s, uint16_t key, const char *value); 142 * @key: selector key value for new fw_cfg item [all …]
|
/openbmc/u-boot/test/env/ |
H A D | hashtable.c | 23 char key[20]; in htab_fill() local 26 sprintf(key, "%d", (int)i); in htab_fill() 28 item.data = key; in htab_fill() 30 item.key = key; in htab_fill() 43 char key[20]; in htab_check_fill() local 46 sprintf(key, "%d", (int)i); in htab_check_fill() 49 item.data = key; in htab_check_fill() 50 item.key = key; in htab_check_fill() 53 ut_asserteq_str(key, ritem->key); in htab_check_fill() 54 ut_asserteq_str(key, ritem->data); in htab_check_fill() [all …]
|
/openbmc/qemu/replay/ |
H A D | replay-input.c | 22 InputKeyEvent *key; in replay_save_input_event() local 30 key = evt->u.key.data; in replay_save_input_event() 31 replay_put_dword(key->key->type); in replay_save_input_event() 33 switch (key->key->type) { in replay_save_input_event() 35 replay_put_qword(key->key->u.number.data); in replay_save_input_event() 36 replay_put_byte(key->down); in replay_save_input_event() 39 replay_put_dword(key->key->u.qcode.data); in replay_save_input_event() 40 replay_put_byte(key->down); in replay_save_input_event() 80 InputKeyEvent key; in replay_read_input_event() local 81 key.key = &keyValue; in replay_read_input_event() [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 17 An X.509 certificate contains a public key, validity, and an identity 24 Key usage extensions define the purpose of the public key contained in 27 Valid Key usage extensions and its usage description is based on 31 ClientAuthentication: The public key is used for TLS WWW client 33 CodeSigning: The public key is used for the signing of executable 34 code. CRLSigning: The public key is used for verifying signatures on 36 DataEncipherment: The public key is used for directly enciphering 39 DecipherOnly: The public key could be used for deciphering data 40 while performing key agreement. 41 DigitalSignature: The public key is used for verifying digital [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | check-qdict.c | 46 // key "" will have tdb hash 12345 in qdict_put_obj_test() 73 const char *key = "test"; in qdict_get_test() local 76 qdict_put_int(tests_dict, key, value); in qdict_get_test() 78 obj = qdict_get(tests_dict, key); in qdict_get_test() 91 const char *key = "int"; in qdict_get_int_test() local 94 qdict_put_int(tests_dict, key, value); in qdict_get_int_test() 96 ret = qdict_get_int(tests_dict, key); in qdict_get_int_test() 106 const char *key = "int"; in qdict_get_try_int_test() local 109 qdict_put_int(tests_dict, key, value); in qdict_get_try_int_test() 112 ret = qdict_get_try_int(tests_dict, key, 0); in qdict_get_try_int_test() [all …]
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/ |
H A D | sshd_check_keys | 12 # Atomically rename file public key 16 # private key file is on disk before the rename, and ensuring that the 17 # public key rename is completed before the private key rename, since we 18 # switch on the existence of the private key to trigger key generation. 19 # This does mean it is possible for the public key to exist, but be garbage 20 # but this is OK because in that case the private key won't exist and the 62 for key in ${HOST_KEYS} ; do 63 [ -f $key ] && continue 64 case $key in 66 echo " generating ssh RSA host key..." [all …]
|