| /openbmc/u-boot/include/ |
| H A D | hash.h | 25 const char *name; /* Name of algorithm */ 35 * @output: Checksum result (length depends on algorithm) 81 * hash_command: Process a hash command for a particular algorithm 85 * @algo_name: Hash algorithm being used (lower case!) 96 * hash_block() - Hash a block according to the requested algorithm 98 * The caller probably knows the hash length for the chosen algorithm, but 102 * @algo_name: Hash algorithm to use 110 * since the caller is selecting the algorithm. 111 * @return 0 if ok, -ve on error: -EPROTONOSUPPORT for an unknown algorithm, 120 * hash_lookup_algo() - Look up the hash_algo struct for an algorithm [all …]
|
| /openbmc/phosphor-net-ipmid/ |
| H A D | session.hpp | 145 throw std::runtime_error("Authentication Algorithm Empty"); in getAuthAlgo() 155 * @brief Get Session's Integrity Algorithm 157 * @return pointer to the integrity algorithm 167 throw std::runtime_error("Integrity Algorithm Empty"); in getIntegrityAlgo() 172 * @brief Set Session's Integrity Algorithm 174 * @param[in] integrityAlgo - unique pointer to integrity algorithm 183 /** @brief Check if integrity algorithm is enabled for this session. 185 * @return true if integrity algorithm is enabled else false. 193 * @brief Get Session's Confidentiality Algorithm 195 * @return pointer to the confidentiality algorithm [all …]
|
| H A D | integrity_algo.hpp | 18 * The Integrity Algorithm Number specifies the algorithm used to generate the 21 * Integrity Algorithm is none the AuthCode value is not calculated and the 38 * Unless otherwise specified, the integrity algorithm is applied to the packet 69 * using integrity algorithm on the packet data, false otherwise 88 * @brief Check if the Integrity algorithm is supported 90 * @param[in] algo - integrity algorithm 92 * @return true if algorithm is supported else false 113 * state whether this is the integrity algorithm or the authentication 114 * algorithm. Other implementations of the RMCP+ algorithm (ipmitool 136 * AuthCode field length varies based on the integrity algorithm, for [all …]
|
| H A D | auth_algo.hpp | 36 // Reserved used to indicate an invalid authentication algorithm 44 * The Authentication Algorithm specifies the type of authentication “handshake” 46 * signature algorithm that is used as part of the process. 98 * @brief Check if the Authentication algorithm is supported 100 * @param[in] algo - authentication algorithm 102 * @return true if algorithm is supported else false 131 * Integrity Algorithm is activated and set in the session data only 133 * integrity algorithm is negotiated in the Open Session Request command 134 * . So the integrity algorithm successfully negotiated is stored 135 * in the authentication algorithm's instance. [all …]
|
| H A D | crypt_algo.hpp | 17 * The Confidentiality Algorithm Number specifies the encryption/decryption 18 * algorithm field that is used for encrypted payload data under the session. 24 * particular confidentiality algorithm. Based on security recommendations 30 AES_CBC_128, /**< AES-CBC-128 Algorithm (mandatory option) */ 31 xRC4_128, /**< xRC4-128 Algorithm (optional option) */ 32 xRC4_40, /**< xRC4-40 Algorithm (optional option) */ 80 * @brief Check if the Confidentiality algorithm is supported 82 * @param[in] algo - confidentiality algorithm 84 * @return true if algorithm is supported else false 111 * @brief Implementation of the AES-CBC-128 Confidentiality algorithm [all …]
|
| H A D | integrity_algo.cpp | 34 // AuthCode field length is based on the integrity algorithm. So we are in generateHMAC() 70 // Generated Kn for the integrity algorithm with the additional key keyed in generateKn() 76 "algorithm failed"); in generateKn() 100 // AuthCode field length is based on the integrity algorithm. So we are in generateHMAC() 136 // Generated Kn for the integrity algorithm with the additional key keyed in generateKn() 142 "algorithm HMAC_SHA256 failed"); in generateKn()
|
| H A D | comm_module.hpp | 19 INVALID_AUTH_ALGO, //!< Invalid authentication algorithm 20 INVALID_INTEGRITY_ALGO, //!< Invalid integrity algorithm 31 INVALID_CONF_ALGO, //!< Invalid confidentiality algorithm
|
| /openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libalgorithm/ |
| H A D | libalgorithm-diff-perl_1.15.bb | 1 SUMMARY = "Algorithm::Diff - Compute 'intelligent' differences between two \ 5 algorithm similar to (or identical to) the one used by the Unix `diff' \ 10 HOMEPAGE = "https://metacpan.org/release/NEDKONZ/Algorithm-Diff-1.15" 13 LIC_FILES_CHKSUM = "file://lib/Algorithm/Diff.pm;beginline=406;endline=409;md5=d393b8ad3b8994b9d0ae… 15 SRC_URI = "${CPAN_MIRROR}/authors/id/N/NE/NEDKONZ/Algorithm-Diff-${PV}.tar.gz" 18 S = "${WORKDIR}/Algorithm-Diff-${PV}"
|
| /openbmc/u-boot/lib/ |
| H A D | Kconfig | 6 Enables software based BCH ECC algorithm present in lib/bch.c 173 bool "Support the AES algorithm" 176 (Advanced Encryption Standard). This algorithm uses a symetric key 178 supported by the algorithm but only a 128-bit key is supported at 237 This option enables support of hashing using SHA1 algorithm. 239 The SHA1 algorithm produces a 160-bit (20-byte) hash value 245 This option enables support of hashing using SHA256 algorithm. 247 The SHA256 algorithm produces a 256-bit (32-byte) hash value 251 bool "Enable SHA512 algorithm" 253 This option enables support of internal SHA512 algorithm. [all …]
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | 082.out | 58 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm 61 encrypt.hash-alg=<str> - Name of encryption hash algorithm 63 encrypt.ivgen-alg=<str> - Name of IV generator algorithm 64 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm 84 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm 87 encrypt.hash-alg=<str> - Name of encryption hash algorithm 89 encrypt.ivgen-alg=<str> - Name of IV generator algorithm 90 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm 110 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm 113 encrypt.hash-alg=<str> - Name of encryption hash algorithm [all …]
|
| /openbmc/qemu/include/crypto/ |
| H A D | ivgen.h | 105 * @alg: the initialization vector generation algorithm 106 * @cipheralg: the cipher algorithm or 0 107 * @hash: the hash algorithm or 0 112 * the algorithm @alg. Whether the remaining parameters 166 * Get the algorithm used by this IV generator 168 * Returns: the IV generator algorithm 177 * Get the cipher algorithm used by this IV generator (if 180 * Returns: the cipher algorithm 189 * Get the hash algorithm used by this IV generator (if 192 * Returns: the hash algorithm
|
| H A D | pbkdf.h | 27 * This module provides an interface to the PBKDF2 algorithm 88 * @hash: the hash algorithm 90 * Determine if the current build supports the PBKDF2 algorithm 100 * @hash: the hash algorithm to use 110 * Apply the PBKDF2 algorithm to derive an encryption 112 * @salt parameter is used to perturb the algorithm. 116 * should be large enough such that the algorithm takes 131 * @hash: the hash algorithm to use 139 * Time the PBKDF2 algorithm to determine how many
|
| H A D | cipher.h | 37 * algorithm used. It further isolates the calling code from the 88 * @alg: the cipher algorithm 91 * Determine if @alg cipher algorithm in @mode is supported by the 94 * Returns: true if the algorithm is supported, false otherwise 101 * @alg: the cipher algorithm 114 * @alg: the cipher algorithm 125 * @alg: the cipher algorithm 139 * @alg: the cipher algorithm 146 * data with the algorithm @alg in the usage mode @mode. 150 * specifies the length of @key in bytes. Each algorithm has
|
| H A D | hash.h | 47 * @alg: the hash algorithm 49 * Determine if @alg hash algorithm is supported by the 52 * Returns: true if the algorithm is supported, false otherwise 59 * @alg: the hash algorithm 69 * @alg: the hash algorithm 101 * @alg: the hash algorithm 133 * @alg: the hash algorithm 254 * @alg: the hash algorithm 257 * Creates a new hashing context for the chosen algorithm for 260 * Returns: New hash object with the given algorithm, or NULL on error. [all …]
|
| /openbmc/ipmitool/src/plugins/lanplus/ |
| H A D | lanplus_strings.c | 10 { IPMI_RAKP_STATUS_INVALID_AUTHENTICATION_ALGORITHM, "invalid authentication algorithm" }, 11 { IPMI_RAKP_STATUS_INVALID_INTEGRITTY_ALGORITHM, "invalid integrity algorithm" }, 12 { IPMI_RAKP_STATUS_NO_MATCHING_AUTHENTICATION_PAYLOAD, "no matching authentication algorithm"}, 22 { IPMI_RAKP_STATUS_INVALID_CONFIDENTIALITY_ALGORITHM, "invalid confidentiality algorithm" },
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Control/ |
| H A D | PowerSupplyRedundancy.interface.yaml | 17 Rotation algorithm use for cold redundancy. 0 is BMC Specific, 1 is 27 Rotation Period for cold redundancy. If rotation algorithm is BMC 47 Rotation algorithm use for cold redundancy. 51 With BMC Specific algorithm, when rotation happen, BMC will add 56 With User Specific algorithm, user need to set the
|
| /openbmc/u-boot/lib/libavb/ |
| H A D | avb_vbmeta_image.c | 21 const AvbAlgorithmData* algorithm; in avb_vbmeta_image_verify() local 135 /* Ensure algorithm field is supported. */ in avb_vbmeta_image_verify() 136 algorithm = avb_get_algorithm_data(h.algorithm_type); in avb_vbmeta_image_verify() 137 if (!algorithm) { in avb_vbmeta_image_verify() 138 avb_error("Invalid or unknown algorithm.\n"); in avb_vbmeta_image_verify() 142 /* Bail if the embedded hash size doesn't match the chosen algorithm. */ in avb_vbmeta_image_verify() 143 if (h.hash_size != algorithm->hash_len) { in avb_vbmeta_image_verify() 180 avb_error("Unknown algorithm.\n"); in avb_vbmeta_image_verify() 199 algorithm->padding, in avb_vbmeta_image_verify() 200 algorithm->padding_len); in avb_vbmeta_image_verify()
|
| H A D | avb_crypto.h | 44 * verification. An algorithm consists of a hash type and a signature 55 * Each algorithm type is described below: 96 /* Holds algorithm-specific data. The |padding| is needed by avb_rsa_verify. */ 103 /* Provides algorithm-specific data for a given |algorithm|. Returns NULL if 104 * |algorithm| is invalid. 106 const AvbAlgorithmData* avb_get_algorithm_data(AvbAlgorithmType algorithm)
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_cipher.robot | 39 Run Keyword And Expect Error *invalid * algorithm* 86 [Template] Verify Cipher ID and Supported Algorithm For Channel 153 Verify Algorithm by Cipher Suite For Channel 168 Verify Supported Algorithm For Channel 182 Verify Cipher ID and Supported Algorithm For Channel 183 [Documentation] Verify Cipher ID and Supported Algorithm on given channel. 189 # index_value 0x80 for list algorithm by cipher suite. 205 Verify Algorithm by Cipher Suite For Channel ${resp} ${channel_num} 207 Verify Supported Algorithm For Channel ${resp} ${channel_num}
|
| /openbmc/phosphor-fan-presence/presence/example/ |
| H A D | example.yaml | 46 detection methods are provided a redundancy algorithm must be specified 49 Note that the redundancy policy algorithm may or may not factor the order 52 The fallback algorithm falls back to subsequently listed detection methods 70 The anyof algorithm reports true if any redundancy set component sensors
|
| H A D | config.json | 45 "provided a redundancy algorithm must be specified with the rpolicy", 46 "attribute. Note that the redundancy policy algorithm may or may not", 48 "fallback algorithm falls back to subsequently listed detection methods", 72 "Example fan with anyof redundancy policy. The anyof algorithm reports",
|
| /openbmc/u-boot/lib/rsa/ |
| H A D | Kconfig | 7 RSA support. This enables the RSA algorithm used for FIT image 10 The Modular Exponentiation algorithm in RSA is implemented using 27 algorithm used in FIT image verification. It required RSA Key as
|
| /openbmc/u-boot/cmd/ |
| H A D | hash.c | 31 /* Move forward to 'algorithm' parameter */ in do_hash() 48 "algorithm address count [[*]hash_dest]\n" 51 "\nhash -v algorithm address count [*]hash\n"
|
| /openbmc/qemu/block/ |
| H A D | crypto.h | 59 .help = "Name of encryption cipher algorithm", \ 73 .help = "Name of IV generator algorithm", \ 80 .help = "Name of IV generator hash algorithm", \ 87 .help = "Name of encryption hash algorithm", \
|
| /openbmc/docs/designs/ |
| H A D | virtual-sensors.md | 39 - capability to read a algorithm string from config file and use the same 40 algorithm in calculating value for new virtual sensor 47 There is a JSON configuration file for name, old path and algorithm. For 101 Expression: An algorithm to be used to calculate sensor value
|