Home
last modified time | relevance | path

Searched +full:random +full:- +full:access (Results 1 – 25 of 728) sorted by relevance

12345678910>>...30

/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Inventory/Item/
H A DDimm.interface.yaml4 - name: MemoryDataWidth
8 - name: MemorySizeInKB
12 - name: MemoryDeviceLocator
16 - name: MemoryType
20 - name: MemoryTypeDetail
24 - name: MaxMemorySpeedInMhz
28 - name: MemoryAttributes
33 - name: MemoryConfiguredSpeedInMhz
37 - name: ECC
40 Error-Correcting Code.
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot48 ${random_userid} ${random_username}= Create Random IPMI User
67 ${random_userid} ${random_username}= Create Random IPMI User
76 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
78 ${users_access}= Get User Access Ipmi ${CHANNEL_NUMBER}
81 ${index}= Evaluate ${random_userid} - 1
82 # Verify the user access of created user.
97 ${random_userid} ${random_username}= Create Random IPMI User
118 ${random_invalid_id}= Evaluate random.randint(16, 1000) modules=random
136 ${random_userid} ${random_username}= Create Random IPMI User
167 ${random_userid} ${random_username}= Create Random IPMI User
[all …]
H A Dtest_ipmi_payload.robot93 Verify Set User Access Payload For Standard Payload SOL
96 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex}
104 # Get default user access payload values.
105 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format}
107 # Disable Standard payload 1 via set user access payload command.
108 Set User Access Payload For Given User ${user_id_in_hex} Disable
113 Verify Set User Access Payload For Operator Privileged User
114 [Documentation] Try to set user access payload using operator privileged user and expect error.
127 Verify Set User Access Payload For Invalid User
128 [Documentation] Verify set user access payload IPMI command for invalid user.
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access".
17 ${xpath_select_user} //input[contains(@class,"custom-control-input")]
20 ${xpath_edit_user} //*[@data-test-id='userManagement-tableRowAction-edit-0']
21 ${xpath_delete_user} //*[@data-test-id='userManagement-tableRowAction-delete-1']
22 ${xpath_account_status_enabled_button} //*[@data-test-id='userManagement-radioButton-statusEnable…
23 ${xpath_account_status_disabled_button} //*[@data-test-id='userManagement-radioButton-statusDisabl…
24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username']
25 ${xpath_privilege_list_button} //*[@data-test-id='userManagement-select-privilege']
26 ${xpath_password_input_button} //*[@data-test-id='userManagement-input-password']
27 ${xpath_password_confirm_button} //*[@data-test-id='userManagement-input-passwordConfirmati…
[all …]
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libcrypt/
H A Dlibcrypt-openssl-random-perl_0.17.bb1 SUMMARY = "Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator access"
3 HOMEPAGE = "https://metacpan.org/pod/Crypt::OpenSSL::Random"
4 LICENSE = "Artistic-1.0 | GPL-1.0-or-later"
8 SRC_URI = "${CPAN_MIRROR}/authors/id/R/RU/RURBAN/Crypt-OpenSSL-Random-${PV}.tar.gz"
11 S = "${WORKDIR}/Crypt-OpenSSL-Random-${PV}"
15 libcrypt-openssl-guess-perl-native \
18 EXTRA_CPANFLAGS = "INC='-I${STAGING_INCDIR}' LIBS='-L${STAGING_LIBDIR} -L${STAGING_BASELIBDIR} -lcr…
20 inherit cpan ptest-perl
23 perl-module-exporter \
24 perl-module-strict \
[all …]
/openbmc/linux/arch/x86/tools/
H A Dinsn_sanity.c1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * x86 decoder sanity test - based on test_get_insn.c
23 * Feed random binary to instruction decoder and ensure not to
24 * access out-of-instruction-buffer.
32 static int x86_64; /* x86-64 bit mode flag */
33 static unsigned int seed; /* Random seed */
42 fprintf(stderr, "Usage: %s [-y|-n|-v] [-s seed[,no]] [-m max] [-i input]\n", prog); in usage()
43 fprintf(stderr, "\t-y 64bit mode\n"); in usage()
44 fprintf(stderr, "\t-n 32bit mode\n"); in usage()
45 fprintf(stderr, "\t-v Verbosity(-vv dumps any decoded result)\n"); in usage()
[all …]
/openbmc/qemu/docs/system/
H A Dsecrets.rst4 -----------------------------
9 unlock key material, remote desktop services require an access password.
13 At startup this can be done using the ``-object secret,...`` command line
15 monitor commands. The examples that follow will illustrate use of ``-object``
25 multi-user host. Command line arguments are usually visible in the process
36 -object secret,id=secvnc0,data=87539319
45 -object secret,id=secvnc0,data=ODc1MzkzMTk=,format=base64
58 -object secret,id=secvnc0,file=vnc-password.txt
61 In this example the file ``vnc-password.txt`` contains the plain text secret
72 -object secret,id=sec0,file=vnc-password.txt,format=base64
[all …]
/openbmc/libcper/generator/sections/
H A Dgen-section-dmar.c2 * Functions for generating pseudo-random CPER DMAr error sections.
9 #include <libcper/generator/gen-utils.h>
10 #include <libcper/generator/sections/gen-section.h>
12 //Generates a single pseudo-random generic DMAr error section, saving the resulting address to the …
18 //Create random bytes. in generate_section_dmar_generic()
29 *(bytes + 5) = rand() % 2; //Access type. in generate_section_dmar_generic()
38 //Generates a single pseudo-random VT-d DMAr error section, saving the resulting address to the giv…
44 //Create random bytes. in generate_section_dmar_vtd()
50 *(bytes + 36 + i) = 0; //Reserved bytes 36-47. in generate_section_dmar_vtd()
56 *reserved &= ~0x1FFF0000; //Bits 80-92 of fault record. in generate_section_dmar_vtd()
[all …]
/openbmc/linux/Documentation/admin-guide/
H A Dhw_random.rst2 Hardware random number generators
10 a Random Number Generator (RNG). The software has two parts:
12 sysfs support, plus a hardware-specific driver that plugs
17 latest version of the "rng-tools" package from the
24 /dev/random special files.
30 and read() system calls, you can read random data from
34 output if the hardware "has-data" flag is set, but nevertheless
35 a security-conscious person would run fitness tests on the
36 data before assuming it is truly random.
38 The rng-tools package uses such tests in "rngd", and lets you
[all …]
/openbmc/linux/Documentation/block/
H A Dblk-mq.rst1 .. SPDX-License-Identifier: GPL-2.0
4 Multi-Queue Block IO Queueing Mechanism (blk-mq)
7 The Multi-Queue Block IO Queueing Mechanism is an API to enable fast storage
16 ----------
20 performance possible for those devices with a high penalty when doing random
21 access, and the bottleneck was the mechanical moving parts, a lot slower than
26 However, with the development of Solid State Drives and Non-Volatile Memories
27 without mechanical parts nor random access penalty and capable of performing
28 high parallel access, the bottleneck of the stack had moved from the storage
30 in those devices' design, the multi-queue mechanism was introduced.
[all …]
/openbmc/linux/security/keys/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
7 bool "Enable access key retention support"
11 access keys in the kernel.
18 a searchable sequence of keys. Each process is equipped with access
19 to five standard keyrings: UID-specific, GID-specific, session,
43 bool "Enable register of persistent per-UID keyrings"
46 This option provides a register of persistent per-UID keyrings,
53 LSMs gets to rule on which admin-level processes get to access the
76 keys in the kernel. Trusted keys are random number symmetric keys,
77 generated and sealed by a trust source selected at kernel boot-time.
[all …]
/openbmc/linux/Documentation/devicetree/bindings/power/reset/
H A Dkeystone-reset.txt14 - compatible: ti,keystone-reset
16 - ti,syscon-pll: phandle/offset pair. The phandle to syscon used to
17 access pll controller registers and the offset to use
20 - ti,syscon-dev: phandle/offset pair. The phandle to syscon used to
21 access device state control registers and the offset
26 - ti,soft-reset: Boolean option indicating soft reset.
29 - ti,wdt-list: WDT list that can cause SoC reset. It's not related
32 in format: <0>, <2>; It can be in random order and
34 reset watchdogs and can be in random order.
40 pllctrl: pll-controller@2310000 {
[all …]
/openbmc/linux/drivers/net/wireless/ath/ath9k/
H A DKconfig1 # SPDX-License-Identifier: ISC
55 Say Y, if you have a SoC with a compatible built-in
64 Say Y, if you need access to ath9k's statistics for
140 Say Y to have ath9k poll the RF-Kill GPIO every couple of
142 a platform that can toggle the RF-Kill GPIO.
150 for multi-channel concurrency. Enable this if P2P PowerSave support
159 tristate "Atheros ath9k pci loader for EEPROM-less chips"
164 AR500X to AR92XX-generation of ath9k PCI(e) WiFi chips, which have
170 access Points and such.
194 Say Y, if you need access to ath9k_htc's statistics.
[all …]
/openbmc/linux/crypto/
H A Djitterentropy.c2 * Non-physical true random number generator based on timing jitter --
5 * Copyright Stephan Mueller <smueller@chronox.de>, 2015 - 2023
32 * the restrictions contained in a BSD-style copyright.)
54 …error "The CPU Jitter random number generator must not be compiled with optimizations. See documen…
65 /* SHA3-256 is used as conditioner */
69 * access that information while the RNG executes its loops to
70 * calculate the next random value. */
80 unsigned char *mem; /* Memory access location with size of
85 unsigned int memaccessloops; /* Number of memory accesses per random
91 /* Intermittent health test failure threshold of 2^-30 */
[all …]
/openbmc/linux/drivers/iio/dummy/
H A Diio_simple_dummy_buffer.c1 // SPDX-License-Identifier: GPL-2.0-only
29 [DUMMY_INDEX_DIFFVOLTAGE_1M2] = -33,
30 [DUMMY_INDEX_DIFFVOLTAGE_3M4] = -2,
35 * iio_simple_dummy_trigger_h() - the trigger handler function
37 * @p: private data - always a pointer to the poll func.
47 struct iio_dev *indio_dev = pf->indio_dev; in iio_simple_dummy_trigger_h()
51 data = kzalloc(indio_dev->scan_bytes, GFP_KERNEL); in iio_simple_dummy_trigger_h()
62 * can be considered to be random access so efficient reading is just in iio_simple_dummy_trigger_h()
68 * Here let's pretend we have random access. And the values are in the in iio_simple_dummy_trigger_h()
71 for_each_set_bit(j, indio_dev->active_scan_mask, indio_dev->masklength) in iio_simple_dummy_trigger_h()
[all …]
/openbmc/qemu/tests/tcg/aarch64/system/
H A Dmte.S8 * SPDX-License-Identifier: LGPL-2.1-or-later
11 #define addr x0 /* Ptr to the start of the MTE-enabled page. */
12 #define tagged_addr x1 /* 'addr' ptr with a random-generated tag added. */
55 * ATA[43] = 0b1 => Enable access to allocation tags at EL1
67 * MTE-enabled page resides at the 3rd 2MB chunk in the second 1GB
77 * Set GCR for random tag generation. 0xA5 is just a random value to set
98 * Store a random value (0xdeadbeef) to tagged_addr address. This must
101 * set the same, otherwise something is off and the test fails -- an
107 /* This label is used by GDB Python script test-mte.py. */
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Ddev_cgroup.c15 short type = ctx->access_type & 0xFFFF; in bpf_prog1()
17 short access = ctx->access_type >> 16; in bpf_prog1() local
32 if (access & BPF_DEVCG_ACC_READ) in bpf_prog1()
35 if (access & BPF_DEVCG_ACC_WRITE) in bpf_prog1()
38 if (access & BPF_DEVCG_ACC_MKNOD) in bpf_prog1()
41 bpf_trace_printk(fmt, sizeof(fmt), ctx->major, ctx->minor); in bpf_prog1()
44 /* Allow access to /dev/zero and /dev/random. in bpf_prog1()
47 if (ctx->major != 1 || type != BPF_DEVCG_DEV_CHAR) in bpf_prog1()
50 switch (ctx->minor) { in bpf_prog1()
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DProcessor.v1_20_1.json4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json",
5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or…
12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
34 "description": "The available OEM-specific actions for this resource.",
35 …"longDescription": "This property shall contain the available OEM-specific actions for this resour…
57 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
95 …operties contained in this object shall conform to the Redfish Specification-described requirement…
106 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
177 …operties contained in this object shall conform to the Redfish Specification-described requirement…
214 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/
H A DProcessor.v1_20_1.json4 "$schema": "http://redfish.dmtf.org/schemas/v1/redfish-schema-v1.json",
5 …"copyright": "Copyright 2014-2024 DMTF. For the full DMTF copyright policy, see http://www.dmtf.or…
12 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
34 "description": "The available OEM-specific actions for this resource.",
35 …"longDescription": "This property shall contain the available OEM-specific actions for this resour…
57 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
95 …operties contained in this object shall conform to the Redfish Specification-described requirement…
106 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
177 …operties contained in this object shall conform to the Redfish Specification-described requirement…
214 "^([a-zA-Z_][a-zA-Z0-9_]*)?@(odata|Redfish|Message)\\.[a-zA-Z_][a-zA-Z0-9_]*$": {
[all …]
/openbmc/linux/drivers/net/wireless/intel/iwlwifi/fw/api/
H A Dmac.h1 /* SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause */
3 * Copyright (C) 2012-2014, 2018-2022 Intel Corporation
11 * AUX indices follows - 1 for non-CDB, 2 for CDB.
31 * enum iwl_mac_protection_flags - MAC context flags
50 * enum iwl_mac_types - Supported MAC types
54 * @FW_MAC_TYPE_PIBSS: Pseudo-IBSS
78 * enum iwl_tsf_id - TSF hw timer ID
94 * struct iwl_mac_data_ap - configuration data for AP MAC context
117 * struct iwl_mac_data_ibss - configuration data for IBSS MAC context
133 * enum iwl_mac_data_policy - policy of the data path for this MAC
[all …]
/openbmc/phosphor-net-ipmid/command/
H A Drakp12.cpp13 #include <phosphor-logging/lg2.hpp>
45 if (inPayload.size() < (sizeof(*request) - userNameMaxLen)) in RAKP12()
55 if (endian::from_ipmi(request->managedSystemSessionID) == in RAKP12()
59 response->rmcpStatusCode = in RAKP12()
68 endian::from_ipmi(request->managedSystemSessionID)); in RAKP12()
73 response->rmcpStatusCode = in RAKP12()
79 sizeof(RAKP1request) - (userNameMaxLen - request->user_name_len); in RAKP12()
83 if (request->user_name_len > userNameMaxLen || in RAKP12()
86 response->rmcpStatusCode = in RAKP12()
92 session->userName.assign(request->user_name, request->user_name_len); in RAKP12()
[all …]
/openbmc/linux/tools/perf/pmu-events/arch/powerpc/power10/
H A Dmarked.json60 …n which the marked instruction is the oldest in the pipeline (next-to-finish or next-to-complete)."
65 …"BriefDescription": "An instruction was marked at decode time. Random Instruction Sampling (RIS) o…
110 …on": "An instruction was marked. Includes both Random Instruction Sampling (RIS) at decode time an…
120 …"BriefDescription": "Data ERAT Miss (Data TLB Access) page size 64K for a marked instruction. When…
190 …": "Marked store completed and sent to nest. Note that this count excludes cache-inhibited stores."
200 …"BriefDescription": "Marked Erat Miss (Data TLB Access) All page sizes. When MMCR1[16]=0 this even…
235 …"BriefDescription": "Data ERAT Miss (Data TLB Access) page size 1G for a marked instruction. When …
250 …"BriefDescription": "Data ERAT Miss (Data TLB Access) page size 2M for a marked instruction. When …
/openbmc/linux/arch/mips/kvm/
H A Dstats.c6 * KVM/MIPS: COP0 access histogram
16 "Random",
54 kvm_info("\nKVM VCPU[%d] COP0 Access Profile:\n", vcpu->vcpu_id); in kvm_mips_dump_stats()
57 if (vcpu->arch.cop0.stat[i][j]) in kvm_mips_dump_stats()
59 vcpu->arch.cop0.stat[i][j]); in kvm_mips_dump_stats()
/openbmc/linux/arch/x86/coco/
H A Dcore.c1 // SPDX-License-Identifier: GPL-2.0-only
14 #include <linux/random.h>
37 * Handle the SEV-SNP vTOM case where sme_me_mask is zero, and
38 * the other levels of SME/SEV functionality, including C-bit
39 * based SEV-SNP, are not enabled.
59 * paging is activated, SME will access all memory as decrypted, but SEV
60 * will access all memory as encrypted. So, when APs are being brought
87 * but SEV-ES supports them through the #VC handler. in amd_cc_platform_has()
123 * - for AMD, bit *set* means the page is encrypted in cc_mkenc()
124 * - for AMD with vTOM and for Intel, *clear* means encrypted in cc_mkenc()
[all …]
/openbmc/linux/tools/testing/selftests/cachestat/
H A Dtest_cachestat.c1 // SPDX-License-Identifier: GPL-2.0
32 cs->nr_cache, cs->nr_dirty, cs->nr_writeback, in print_cachestat()
33 cs->nr_evicted, cs->nr_recently_evicted); in print_cachestat()
44 ksft_print_msg("Unable to access urandom.\n"); in write_exactly()
68 remained -= read_len; in write_exactly()
72 /* write random data to fd */ in write_exactly()
79 ksft_print_msg("Unable write random data to file.\n"); in write_exactly()
84 remained -= write_len; in write_exactly()
112 * Open/create the file at filename, (optionally) write random data to it
131 if (fd == -1) { in test_cachestat()
[all …]

12345678910>>...30