Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 819) sorted by relevance

12345678910>>...33

/openbmc/u-boot/include/
H A Dhash.h25 const char *name; /* Name of algorithm */
35 * @output: Checksum result (length depends on algorithm)
81 * hash_command: Process a hash command for a particular algorithm
85 * @algo_name: Hash algorithm being used (lower case!)
96 * hash_block() - Hash a block according to the requested algorithm
98 * The caller probably knows the hash length for the chosen algorithm, but
102 * @algo_name: Hash algorithm to use
110 * since the caller is selecting the algorithm.
111 * @return 0 if ok, -ve on error: -EPROTONOSUPPORT for an unknown algorithm,
120 * hash_lookup_algo() - Look up the hash_algo struct for an algorithm
[all …]
/openbmc/phosphor-net-ipmid/
H A Dsession.hpp145 throw std::runtime_error("Authentication Algorithm Empty"); in getAuthAlgo()
155 * @brief Get Session's Integrity Algorithm
157 * @return pointer to the integrity algorithm
167 throw std::runtime_error("Integrity Algorithm Empty"); in getIntegrityAlgo()
172 * @brief Set Session's Integrity Algorithm
174 * @param[in] integrityAlgo - unique pointer to integrity algorithm
183 /** @brief Check if integrity algorithm is enabled for this session.
185 * @return true if integrity algorithm is enabled else false.
193 * @brief Get Session's Confidentiality Algorithm
195 * @return pointer to the confidentiality algorithm
[all …]
H A Dintegrity_algo.hpp18 * The Integrity Algorithm Number specifies the algorithm used to generate the
21 * Integrity Algorithm is none the AuthCode value is not calculated and the
38 * Unless otherwise specified, the integrity algorithm is applied to the packet
69 * using integrity algorithm on the packet data, false otherwise
88 * @brief Check if the Integrity algorithm is supported
90 * @param[in] algo - integrity algorithm
92 * @return true if algorithm is supported else false
113 * state whether this is the integrity algorithm or the authentication
114 * algorithm. Other implementations of the RMCP+ algorithm (ipmitool
136 * AuthCode field length varies based on the integrity algorithm, for
[all …]
H A Dauth_algo.hpp36 // Reserved used to indicate an invalid authentication algorithm
44 * The Authentication Algorithm specifies the type of authentication “handshake”
46 * signature algorithm that is used as part of the process.
98 * @brief Check if the Authentication algorithm is supported
100 * @param[in] algo - authentication algorithm
102 * @return true if algorithm is supported else false
131 * Integrity Algorithm is activated and set in the session data only
133 * integrity algorithm is negotiated in the Open Session Request command
134 * . So the integrity algorithm successfully negotiated is stored
135 * in the authentication algorithm's instance.
[all …]
H A Dcrypt_algo.hpp17 * The Confidentiality Algorithm Number specifies the encryption/decryption
18 * algorithm field that is used for encrypted payload data under the session.
24 * particular confidentiality algorithm. Based on security recommendations
30 AES_CBC_128, /**< AES-CBC-128 Algorithm (mandatory option) */
31 xRC4_128, /**< xRC4-128 Algorithm (optional option) */
32 xRC4_40, /**< xRC4-40 Algorithm (optional option) */
80 * @brief Check if the Confidentiality algorithm is supported
82 * @param[in] algo - confidentiality algorithm
84 * @return true if algorithm is supported else false
111 * @brief Implementation of the AES-CBC-128 Confidentiality algorithm
[all …]
H A Dintegrity_algo.cpp34 // AuthCode field length is based on the integrity algorithm. So we are in generateHMAC()
70 // Generated Kn for the integrity algorithm with the additional key keyed in generateKn()
76 "algorithm failed"); in generateKn()
100 // AuthCode field length is based on the integrity algorithm. So we are in generateHMAC()
136 // Generated Kn for the integrity algorithm with the additional key keyed in generateKn()
142 "algorithm HMAC_SHA256 failed"); in generateKn()
H A Dcomm_module.hpp19 INVALID_AUTH_ALGO, //!< Invalid authentication algorithm
20 INVALID_INTEGRITY_ALGO, //!< Invalid integrity algorithm
31 INVALID_CONF_ALGO, //!< Invalid confidentiality algorithm
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libalgorithm/
H A Dlibalgorithm-diff-perl_1.15.bb1 SUMMARY = "Algorithm::Diff - Compute 'intelligent' differences between two \
5 algorithm similar to (or identical to) the one used by the Unix `diff' \
10 HOMEPAGE = "https://metacpan.org/release/NEDKONZ/Algorithm-Diff-1.15"
13 LIC_FILES_CHKSUM = "file://lib/Algorithm/Diff.pm;beginline=406;endline=409;md5=d393b8ad3b8994b9d0ae…
15 SRC_URI = "${CPAN_MIRROR}/authors/id/N/NE/NEDKONZ/Algorithm-Diff-${PV}.tar.gz"
18 S = "${WORKDIR}/Algorithm-Diff-${PV}"
/openbmc/u-boot/lib/
H A DKconfig6 Enables software based BCH ECC algorithm present in lib/bch.c
173 bool "Support the AES algorithm"
176 (Advanced Encryption Standard). This algorithm uses a symetric key
178 supported by the algorithm but only a 128-bit key is supported at
237 This option enables support of hashing using SHA1 algorithm.
239 The SHA1 algorithm produces a 160-bit (20-byte) hash value
245 This option enables support of hashing using SHA256 algorithm.
247 The SHA256 algorithm produces a 256-bit (32-byte) hash value
251 bool "Enable SHA512 algorithm"
253 This option enables support of internal SHA512 algorithm.
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D082.out58 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
61 encrypt.hash-alg=<str> - Name of encryption hash algorithm
63 encrypt.ivgen-alg=<str> - Name of IV generator algorithm
64 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm
84 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
87 encrypt.hash-alg=<str> - Name of encryption hash algorithm
89 encrypt.ivgen-alg=<str> - Name of IV generator algorithm
90 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm
110 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
113 encrypt.hash-alg=<str> - Name of encryption hash algorithm
[all …]
/openbmc/qemu/include/crypto/
H A Divgen.h105 * @alg: the initialization vector generation algorithm
106 * @cipheralg: the cipher algorithm or 0
107 * @hash: the hash algorithm or 0
112 * the algorithm @alg. Whether the remaining parameters
166 * Get the algorithm used by this IV generator
168 * Returns: the IV generator algorithm
177 * Get the cipher algorithm used by this IV generator (if
180 * Returns: the cipher algorithm
189 * Get the hash algorithm used by this IV generator (if
192 * Returns: the hash algorithm
H A Dpbkdf.h27 * This module provides an interface to the PBKDF2 algorithm
88 * @hash: the hash algorithm
90 * Determine if the current build supports the PBKDF2 algorithm
100 * @hash: the hash algorithm to use
110 * Apply the PBKDF2 algorithm to derive an encryption
112 * @salt parameter is used to perturb the algorithm.
116 * should be large enough such that the algorithm takes
131 * @hash: the hash algorithm to use
139 * Time the PBKDF2 algorithm to determine how many
H A Dcipher.h37 * algorithm used. It further isolates the calling code from the
88 * @alg: the cipher algorithm
91 * Determine if @alg cipher algorithm in @mode is supported by the
94 * Returns: true if the algorithm is supported, false otherwise
101 * @alg: the cipher algorithm
114 * @alg: the cipher algorithm
125 * @alg: the cipher algorithm
139 * @alg: the cipher algorithm
146 * data with the algorithm @alg in the usage mode @mode.
150 * specifies the length of @key in bytes. Each algorithm has
H A Dhash.h47 * @alg: the hash algorithm
49 * Determine if @alg hash algorithm is supported by the
52 * Returns: true if the algorithm is supported, false otherwise
59 * @alg: the hash algorithm
69 * @alg: the hash algorithm
101 * @alg: the hash algorithm
133 * @alg: the hash algorithm
254 * @alg: the hash algorithm
257 * Creates a new hashing context for the chosen algorithm for
260 * Returns: New hash object with the given algorithm, or NULL on error.
[all …]
/openbmc/ipmitool/src/plugins/lanplus/
H A Dlanplus_strings.c10 { IPMI_RAKP_STATUS_INVALID_AUTHENTICATION_ALGORITHM, "invalid authentication algorithm" },
11 { IPMI_RAKP_STATUS_INVALID_INTEGRITTY_ALGORITHM, "invalid integrity algorithm" },
12 { IPMI_RAKP_STATUS_NO_MATCHING_AUTHENTICATION_PAYLOAD, "no matching authentication algorithm"},
22 { IPMI_RAKP_STATUS_INVALID_CONFIDENTIALITY_ALGORITHM, "invalid confidentiality algorithm" },
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Control/
H A DPowerSupplyRedundancy.interface.yaml17 Rotation algorithm use for cold redundancy. 0 is BMC Specific, 1 is
27 Rotation Period for cold redundancy. If rotation algorithm is BMC
47 Rotation algorithm use for cold redundancy.
51 With BMC Specific algorithm, when rotation happen, BMC will add
56 With User Specific algorithm, user need to set the
/openbmc/u-boot/lib/libavb/
H A Davb_vbmeta_image.c21 const AvbAlgorithmData* algorithm; in avb_vbmeta_image_verify() local
135 /* Ensure algorithm field is supported. */ in avb_vbmeta_image_verify()
136 algorithm = avb_get_algorithm_data(h.algorithm_type); in avb_vbmeta_image_verify()
137 if (!algorithm) { in avb_vbmeta_image_verify()
138 avb_error("Invalid or unknown algorithm.\n"); in avb_vbmeta_image_verify()
142 /* Bail if the embedded hash size doesn't match the chosen algorithm. */ in avb_vbmeta_image_verify()
143 if (h.hash_size != algorithm->hash_len) { in avb_vbmeta_image_verify()
180 avb_error("Unknown algorithm.\n"); in avb_vbmeta_image_verify()
199 algorithm->padding, in avb_vbmeta_image_verify()
200 algorithm->padding_len); in avb_vbmeta_image_verify()
H A Davb_crypto.h44 * verification. An algorithm consists of a hash type and a signature
55 * Each algorithm type is described below:
96 /* Holds algorithm-specific data. The |padding| is needed by avb_rsa_verify. */
103 /* Provides algorithm-specific data for a given |algorithm|. Returns NULL if
104 * |algorithm| is invalid.
106 const AvbAlgorithmData* avb_get_algorithm_data(AvbAlgorithmType algorithm)
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_cipher.robot39 Run Keyword And Expect Error *invalid * algorithm*
86 [Template] Verify Cipher ID and Supported Algorithm For Channel
153 Verify Algorithm by Cipher Suite For Channel
168 Verify Supported Algorithm For Channel
182 Verify Cipher ID and Supported Algorithm For Channel
183 [Documentation] Verify Cipher ID and Supported Algorithm on given channel.
189 # index_value 0x80 for list algorithm by cipher suite.
205 Verify Algorithm by Cipher Suite For Channel ${resp} ${channel_num}
207 Verify Supported Algorithm For Channel ${resp} ${channel_num}
/openbmc/phosphor-fan-presence/presence/example/
H A Dexample.yaml46 detection methods are provided a redundancy algorithm must be specified
49 Note that the redundancy policy algorithm may or may not factor the order
52 The fallback algorithm falls back to subsequently listed detection methods
70 The anyof algorithm reports true if any redundancy set component sensors
H A Dconfig.json45 "provided a redundancy algorithm must be specified with the rpolicy",
46 "attribute. Note that the redundancy policy algorithm may or may not",
48 "fallback algorithm falls back to subsequently listed detection methods",
72 "Example fan with anyof redundancy policy. The anyof algorithm reports",
/openbmc/u-boot/lib/rsa/
H A DKconfig7 RSA support. This enables the RSA algorithm used for FIT image
10 The Modular Exponentiation algorithm in RSA is implemented using
27 algorithm used in FIT image verification. It required RSA Key as
/openbmc/u-boot/cmd/
H A Dhash.c31 /* Move forward to 'algorithm' parameter */ in do_hash()
48 "algorithm address count [[*]hash_dest]\n"
51 "\nhash -v algorithm address count [*]hash\n"
/openbmc/qemu/block/
H A Dcrypto.h59 .help = "Name of encryption cipher algorithm", \
73 .help = "Name of IV generator algorithm", \
80 .help = "Name of IV generator hash algorithm", \
87 .help = "Name of encryption hash algorithm", \
/openbmc/docs/designs/
H A Dvirtual-sensors.md39 - capability to read a algorithm string from config file and use the same
40 algorithm in calculating value for new virtual sensor
47 There is a JSON configuration file for name, old path and algorithm. For
101 Expression: An algorithm to be used to calculate sensor value

12345678910>>...33