Home
last modified time | relevance | path

Searched full:key (Results 1 – 25 of 1939) sorted by relevance

12345678910>>...78

/openbmc/u-boot/fs/ubifs/
H A Dkey.h12 * This header contains various key-related definitions and helper function.
13 * UBIFS allows several key schemes, so we access key fields only via these
14 * helpers. At the moment only one key scheme is supported.
16 * Simple key scheme
20 * in case of direntry key). Next 3 bits are node type. The last 29 bits are
79 * ino_key_init - initialize inode key.
81 * @key: key to initialize
85 union ubifs_key *key, ino_t inum) in ino_key_init() argument
87 key->u32[0] = inum; in ino_key_init()
88 key->u32[1] = UBIFS_INO_KEY << UBIFS_S_KEY_BLOCK_BITS; in ino_key_init()
[all …]
/openbmc/qemu/hw/usb/
H A Du2f-emulated.c104 static void u2f_emulated_reset(U2FEmulatedState *key) in u2f_emulated_reset() argument
106 key->pending_out_start = 0; in u2f_emulated_reset()
107 key->pending_out_end = 0; in u2f_emulated_reset()
108 key->pending_out_num = 0; in u2f_emulated_reset()
111 static void u2f_pending_out_add(U2FEmulatedState *key, in u2f_pending_out_add() argument
116 if (key->pending_out_num >= PENDING_OUT_NUM) { in u2f_pending_out_add()
120 index = key->pending_out_end; in u2f_pending_out_add()
121 key->pending_out_end = (index + 1) % PENDING_OUT_NUM; in u2f_pending_out_add()
122 ++key->pending_out_num; in u2f_pending_out_add()
124 memcpy(&key->pending_out[index], packet, U2FHID_PACKET_SIZE); in u2f_pending_out_add()
[all …]
H A Du2f-passthru.c118 static void u2f_passthru_reset(U2FPassthruState *key) in u2f_passthru_reset() argument
120 timer_del(&key->timer); in u2f_passthru_reset()
121 qemu_set_fd_handler(key->hidraw_fd, NULL, NULL, key); in u2f_passthru_reset()
122 key->last_transaction_time = 0; in u2f_passthru_reset()
123 key->current_transactions_start = 0; in u2f_passthru_reset()
124 key->current_transactions_end = 0; in u2f_passthru_reset()
125 key->current_transactions_num = 0; in u2f_passthru_reset()
130 U2FPassthruState *key = opaque; in u2f_timeout_check() local
133 if (time > key->last_transaction_time + TRANSACTION_TIMEOUT) { in u2f_timeout_check()
134 u2f_passthru_reset(key); in u2f_timeout_check()
[all …]
H A Dcanokey.c70 CanoKeyState *key = base; in canokey_emu_stall_ep() local
72 key->ep_in_size[ep_in] = 0; in canokey_emu_stall_ep()
73 key->ep_in_state[ep_in] = CANOKEY_EP_IN_STALL; in canokey_emu_stall_ep()
80 CanoKeyState *key = base; in canokey_emu_set_address() local
81 key->dev.addr = addr; in canokey_emu_set_address()
89 CanoKeyState *key = base; in canokey_emu_prepare_receive() local
90 key->ep_out[ep] = pbuf; in canokey_emu_prepare_receive()
91 key->ep_out_size[ep] = size; in canokey_emu_prepare_receive()
99 CanoKeyState *key = base; in canokey_emu_transmit() local
101 memcpy(key->ep_in[ep_in] + key->ep_in_size[ep_in], in canokey_emu_transmit()
[all …]
H A Du2f.c36 /* U2F key Vendor / Product */
50 [STR_PRODUCT] = "U2F USB key",
52 [STR_CONFIG] = "U2F key config",
53 [STR_INTERFACE] = "U2F key interface"
142 static void u2f_key_reset(U2FKeyState *key) in u2f_key_reset() argument
144 key->pending_in_start = 0; in u2f_key_reset()
145 key->pending_in_end = 0; in u2f_key_reset()
146 key->pending_in_num = 0; in u2f_key_reset()
151 U2FKeyState *key = U2F_KEY(dev); in u2f_key_handle_reset() local
153 u2f_key_reset(key); in u2f_key_handle_reset()
[all …]
/openbmc/u-boot/lib/rsa/
H A Drsa-mod-exp.c33 * @key: Key containing modulus to subtract
36 static void subtract_modulus(const struct rsa_public_key *key, uint32_t num[]) in subtract_modulus() argument
41 for (i = 0; i < key->len; i++) { in subtract_modulus()
42 acc += (uint64_t)num[i] - key->modulus[i]; in subtract_modulus()
51 * @key: Key containing modulus to check
55 static int greater_equal_modulus(const struct rsa_public_key *key, in greater_equal_modulus() argument
60 for (i = (int)key->len - 1; i >= 0; i--) { in greater_equal_modulus()
61 if (num[i] < key->modulus[i]) in greater_equal_modulus()
63 if (num[i] > key->modulus[i]) in greater_equal_modulus()
75 * @key: RSA key
[all …]
/openbmc/qemu/qobject/
H A Dqdict.c45 /* Set the initial value from the key size. */ in tdb_hash()
56 static QDictEntry *alloc_entry(const char *key, QObject *value) in alloc_entry() argument
61 entry->key = g_strdup(key); in alloc_entry()
78 * qdict_entry_key(): Return qdict entry key
85 return entry->key; in qdict_entry_key()
92 const char *key, unsigned int bucket) in qdict_find() argument
97 if (!strcmp(entry->key, key)) { in qdict_find()
107 * Insert the pair 'key:value' into 'qdict', if 'key' already exists
115 void qdict_put_obj(QDict *qdict, const char *key, QObject *value) in qdict_put_obj() argument
120 bucket = tdb_hash(key) % QDICT_BUCKET_MAX; in qdict_put_obj()
[all …]
/openbmc/u-boot/lib/libavb/
H A Davb_rsa.c7 * key for computation. The code extends libmincrypt RSA verification code to
8 * support multiple RSA key lengths and hash digest algorithms.
25 IAvbKey* key = NULL; in iavb_parse_key_data() local
33 avb_error("Invalid key.\n"); in iavb_parse_key_data()
39 avb_error("Unexpected key length.\n"); in iavb_parse_key_data()
45 avb_error("Key does not match expected length.\n"); in iavb_parse_key_data()
52 /* Store n and rr following the key header so we only have to do one in iavb_parse_key_data()
55 key = (IAvbKey*)(avb_malloc(sizeof(IAvbKey) + 2 * h.key_num_bits / 8)); in iavb_parse_key_data()
56 if (key == NULL) { in iavb_parse_key_data()
60 key->len = h.key_num_bits / 32; in iavb_parse_key_data()
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/
H A D0001-Adapt-to-OpenSSL-1.1.1.patch16 key.c | 133 ++++++++++++++++++++++++++++++++++++++++++++++++++--
28 key = pamsshagentauth_key_new(KEY_RSA1);
31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e);
32 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n);
37 BN_num_bits(key->rsa->n), bits);
39 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa));
40 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa));
42 + keybits = BN_num_bits(RSA_get0_n(key->rsa));
45 + BN_num_bits(RSA_get0_n(key->rsa)), bits);
55 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n));
[all …]
H A D0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch14 key.c | 36 ++++++++++++++++++------------------
26 key = pamsshagentauth_key_new(KEY_RSA1);
30 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e);
31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n);
39 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n));
40 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e);
41 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->n);
44 ssh_encode_identity_rsa1(Buffer *b, RSA *key, const char *comment)
48 pamsshagentauth_buffer_put_int(b, BN_num_bits(key->n));
49 pamsshagentauth_buffer_put_bignum(b, key->n);
[all …]
/openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/static/js/
H A Dfiltersnippet.js8 function date_enable (key, action) { argument
10 var elemFrom=document.getElementById("date_from_"+key);
11 var elemTo=document.getElementById("date_to_"+key);
37 function date_init (key, from_date, to_date, min_date, max_date, initial_enable) { argument
39 var elemFrom=document.getElementById("date_from_"+key);
40 var elemTo=document.getElementById("date_to_"+key);
56 if (key == initial_enable) {
57 date_enable (key, "enable");
59 date_enable (key, "disable");
65 key=$(this).attr("data-key");
[all …]
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dsigning-keys.bb27 # Export public key of the rpm signing key
29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'),
33 # Export public key of the ipk signing key
35 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'),
39 # Export public key of the feed signing key
41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
49 if [ -f "${B}/rpm-key" ]; then
50 …install -D -m 0644 "${B}/rpm-key" "${D}${sysconfdir}/pki/rpm-gpg/RPM-GPG-KEY-${DISTRO}-${DISTRO_CO…
52 if [ -f "${B}/ipk-key" ]; then
53 …install -D -m 0644 "${B}/ipk-key" "${D}${sysconfdir}/pki/ipk-gpg/IPK-GPG-KEY-${DISTRO}-${DISTRO_CO…
[all …]
/openbmc/openbmc/poky/meta/classes-global/
H A Dpackagedata.bbclass19 for key in data.keys():
20 d.setVar(key, data[key])
24 for key in sdata.keys():
25 if key in vars:
26 if sdata[key] != vars[key]:
27 if key == "PN":
28 …age from one recipe or the other or only build one of the recipes." % (vars[key], pkg, sdata[key]))
29 …sed and they will be unable to find the right workdir." % (vars["PN"], key, vars[key], sdata[key]))
36 if key.endswith(":" + pkg):
37 d.setVar(key, sdata[key])
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D210.out10 …"job0", "options": {"driver": "luks", "file": "imgfile", "iter-time": 10, "key-secret": "keysec0",…
15 image: json:{"driver": "IMGFMT", "file": {"driver": "file", "filename": "TEST_IMG"}, "key-secret": …
30 key offset: 4096
34 key offset: 262144
37 key offset: 520192
40 key offset: 778240
43 key offset: 1036288
46 key offset: 1294336
49 key offset: 1552384
52 key offset: 1810432
[all …]
/openbmc/openbmc/poky/bitbake/lib/bb/
H A DCOW.py54 def __setitem__(cls, key, value): argument
58 key += MUTABLE
59 setattr(cls, key, value)
61 def __getmutable__(cls, key, readonly=False): argument
62 nkey = key + MUTABLE
73 print("Warning: Doing a copy because %s is a mutable type." % key, file=cls.__warn__)
83 def __getreadonly__(cls, key, default=__getmarker__): argument
87 return cls.__getitem__(key, default, True)
89 def __getitem__(cls, key, default=__getmarker__, readonly=False): argument
92 value = getattr(cls, key)
[all …]
/openbmc/qemu/util/
H A Dkeyval.c2 * Parsing KEY=VALUE,... strings
14 * KEY=VALUE,... syntax:
16 * key-vals = [ key-val { ',' key-val } [ ',' ] ]
17 * key-val = key '=' val | help
18 * key = key-fragment { '.' key-fragment }
19 * key-fragment = qapi-name | index
27 * key-vals specifies a JSON object, i.e. a tree whose root is an
31 * Each key-val = key-fragment '.' ... '=' val specifies a path from
36 * L '.' key-fragment is a child of the node denoted by path L
37 * key-fragment is a child of the tree root
[all …]
/openbmc/qemu/include/qobject/
H A Dqdict.h22 char *key; member
42 void qdict_put_obj(QDict *qdict, const char *key, QObject *value);
43 void qdict_del(QDict *qdict, const char *key);
44 int qdict_haskey(const QDict *qdict, const char *key);
45 QObject *qdict_get(const QDict *qdict, const char *key);
50 #define qdict_put(qdict, key, obj) \ argument
51 qdict_put_obj(qdict, key, QOBJECT(obj))
53 void qdict_put_bool(QDict *qdict, const char *key, bool value);
54 void qdict_put_int(QDict *qdict, const char *key, int64_t value);
55 void qdict_put_null(QDict *qdict, const char *key);
[all …]
/openbmc/openbmc/poky/meta/lib/oe/
H A Ddata.py10 def typed_value(key, d): argument
13 var_type = d.getVarFlag(key, 'type')
14 flags = d.getVarFlags(key)
22 return oe.maketype.create(d.getVar(key) or '', var_type, **flags)
24 bb.msg.fatal("Data", "%s: %s" % (key, str(exc)))
30 for key in d.keys():
31 if key.startswith("_"):
33 elif key.startswith("BB"):
35 elif key.startswith("B_pn"):
37 elif key.startswith("do_"):
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DKey_v1.xml4 <!--# Redfish Schema: Key v1.4.1 -->
30 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Key">
34 <EntityType Name="Key" BaseType="Resource.v1_0_0.Resource" Abstract="true">
35 …<Annotation Term="OData.Description" String="The `Key` schema describes sensitive data for accessi…
36 …<Annotation Term="OData.LongDescription" String="This resource shall represent a key for a Redfish…
77 …"OData.LongDescription" String="This value shall indicate an RFC4253-defined 'ssh-rsa' key type."/>
81 …"OData.LongDescription" String="This value shall indicate an RFC4253-defined 'ssh-dss' key type."/>
85 …erm="OData.LongDescription" String="This value shall indicate an RFC5656-defined ECDSA key type."/>
89 …ta.LongDescription" String="This value shall indicate an RFC8709-defined 'ssh-ed25519' key type."/>
153 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Key.v1_0_0">
[all …]
/openbmc/qemu/include/hw/nvram/
H A Dfw_cfg.h103 * @key: selector key value for new fw_cfg item
107 * Add a new fw_cfg item, available by selecting the given key, as a raw
111 void fw_cfg_add_bytes(FWCfgState *s, uint16_t key, void *data, size_t len);
116 * @key: selector key value for new fw_cfg item
119 * Add a new fw_cfg item, available by selecting the given key. The item
123 void fw_cfg_add_string(FWCfgState *s, uint16_t key, const char *value);
128 * @key: selector key value for new fw_cfg item
131 * Replace the fw_cfg item available by selecting the given key. The new
137 void fw_cfg_modify_string(FWCfgState *s, uint16_t key, const char *value);
142 * @key: selector key value for new fw_cfg item
[all …]
/openbmc/u-boot/test/env/
H A Dhashtable.c23 char key[20]; in htab_fill() local
26 sprintf(key, "%d", (int)i); in htab_fill()
28 item.data = key; in htab_fill()
30 item.key = key; in htab_fill()
43 char key[20]; in htab_check_fill() local
46 sprintf(key, "%d", (int)i); in htab_check_fill()
49 item.data = key; in htab_check_fill()
50 item.key = key; in htab_check_fill()
53 ut_asserteq_str(key, ritem->key); in htab_check_fill()
54 ut_asserteq_str(key, ritem->data); in htab_check_fill()
[all …]
/openbmc/qemu/replay/
H A Dreplay-input.c22 InputKeyEvent *key; in replay_save_input_event() local
30 key = evt->u.key.data; in replay_save_input_event()
31 replay_put_dword(key->key->type); in replay_save_input_event()
33 switch (key->key->type) { in replay_save_input_event()
35 replay_put_qword(key->key->u.number.data); in replay_save_input_event()
36 replay_put_byte(key->down); in replay_save_input_event()
39 replay_put_dword(key->key->u.qcode.data); in replay_save_input_event()
40 replay_put_byte(key->down); in replay_save_input_event()
80 InputKeyEvent key; in replay_read_input_event() local
81 key.key = &keyValue; in replay_read_input_event()
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/
H A DCertificate.interface.yaml17 An X.509 certificate contains a public key, validity, and an identity
24 Key usage extensions define the purpose of the public key contained in
27 Valid Key usage extensions and its usage description is based on
31 ClientAuthentication: The public key is used for TLS WWW client
33 CodeSigning: The public key is used for the signing of executable
34 code. CRLSigning: The public key is used for verifying signatures on
36 DataEncipherment: The public key is used for directly enciphering
39 DecipherOnly: The public key could be used for deciphering data
40 while performing key agreement.
41 DigitalSignature: The public key is used for verifying digital
[all …]
/openbmc/qemu/tests/unit/
H A Dcheck-qdict.c46 // key "" will have tdb hash 12345 in qdict_put_obj_test()
73 const char *key = "test"; in qdict_get_test() local
76 qdict_put_int(tests_dict, key, value); in qdict_get_test()
78 obj = qdict_get(tests_dict, key); in qdict_get_test()
91 const char *key = "int"; in qdict_get_int_test() local
94 qdict_put_int(tests_dict, key, value); in qdict_get_int_test()
96 ret = qdict_get_int(tests_dict, key); in qdict_get_int_test()
106 const char *key = "int"; in qdict_get_try_int_test() local
109 qdict_put_int(tests_dict, key, value); in qdict_get_try_int_test()
112 ret = qdict_get_try_int(tests_dict, key, 0); in qdict_get_try_int_test()
[all …]
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/
H A Dsshd_check_keys12 # Atomically rename file public key
16 # private key file is on disk before the rename, and ensuring that the
17 # public key rename is completed before the private key rename, since we
18 # switch on the existence of the private key to trigger key generation.
19 # This does mean it is possible for the public key to exist, but be garbage
20 # but this is OK because in that case the private key won't exist and the
62 for key in ${HOST_KEYS} ; do
63 [ -f $key ] && continue
64 case $key in
66 echo " generating ssh RSA host key..."
[all …]

12345678910>>...78