Home
last modified time | relevance | path

Searched full:hash (Results 1 – 25 of 959) sorted by relevance

12345678910>>...39

/openbmc/qemu/include/crypto/
H A Dhash.h2 * QEMU Crypto hash algorithms
47 * @alg: the hash algorithm
49 * Determine if @alg hash algorithm is supported by the
59 * @alg: the hash algorithm
61 * Determine the size of the hash digest in bytes
69 * @alg: the hash algorithm
70 * @iov: the array of memory regions to hash
72 * @result: pointer to hold output hash
76 * Computes the hash across all the memory regions
81 * @result_len match the size of the hash output. The digest will
[all …]
/openbmc/qemu/crypto/
H A Dhash-gnutls.c2 * QEMU Crypto hash algorithms
25 #include "crypto/hash.h"
59 QCryptoHash *hash; in qcrypto_gnutls_hash_new() local
62 hash = g_new(QCryptoHash, 1); in qcrypto_gnutls_hash_new()
63 hash->alg = alg; in qcrypto_gnutls_hash_new()
64 hash->opaque = g_new(gnutls_hash_hd_t, 1); in qcrypto_gnutls_hash_new()
66 ret = gnutls_hash_init(hash->opaque, qcrypto_hash_alg_map[alg]); in qcrypto_gnutls_hash_new()
69 "Unable to initialize hash algorithm: %s", in qcrypto_gnutls_hash_new()
71 g_free(hash->opaque); in qcrypto_gnutls_hash_new()
72 g_free(hash); in qcrypto_gnutls_hash_new()
[all …]
H A Dhash-gcrypt.c2 * QEMU Crypto hash algorithms
25 #include "crypto/hash.h"
54 QCryptoHash *hash; in qcrypto_gcrypt_hash_new() local
57 hash = g_new(QCryptoHash, 1); in qcrypto_gcrypt_hash_new()
58 hash->alg = alg; in qcrypto_gcrypt_hash_new()
59 hash->opaque = g_new(gcry_md_hd_t, 1); in qcrypto_gcrypt_hash_new()
61 ret = gcry_md_open((gcry_md_hd_t *) hash->opaque, in qcrypto_gcrypt_hash_new()
65 "Unable to initialize hash algorithm: %s", in qcrypto_gcrypt_hash_new()
67 g_free(hash->opaque); in qcrypto_gcrypt_hash_new()
68 g_free(hash); in qcrypto_gcrypt_hash_new()
[all …]
H A Dhash.c2 * QEMU Crypto hash algorithms
25 #include "crypto/hash.h"
81 int qcrypto_hash_updatev(QCryptoHash *hash, in qcrypto_hash_updatev() argument
86 QCryptoHashDriver *drv = hash->driver; in qcrypto_hash_updatev()
88 return drv->hash_update(hash, iov, niov, errp); in qcrypto_hash_updatev()
91 int qcrypto_hash_update(QCryptoHash *hash, in qcrypto_hash_update() argument
98 return qcrypto_hash_updatev(hash, &iov, 1, errp); in qcrypto_hash_update()
103 QCryptoHash *hash = NULL; in qcrypto_hash_new() local
106 error_setg(errp, "Unsupported hash algorithm %s", in qcrypto_hash_new()
112 hash = qcrypto_hash_afalg_driver.hash_new(alg, NULL); in qcrypto_hash_new()
[all …]
H A Dhash-glib.c2 * QEMU Crypto hash algorithms
24 #include "crypto/hash.h"
51 QCryptoHash *hash; in qcrypto_glib_hash_new() local
53 hash = g_new(QCryptoHash, 1); in qcrypto_glib_hash_new()
54 hash->alg = alg; in qcrypto_glib_hash_new()
55 hash->opaque = g_checksum_new(qcrypto_hash_alg_map[alg]); in qcrypto_glib_hash_new()
57 return hash; in qcrypto_glib_hash_new()
61 void qcrypto_glib_hash_free(QCryptoHash *hash) in qcrypto_glib_hash_free() argument
63 if (hash->opaque) { in qcrypto_glib_hash_free()
64 g_checksum_free(hash->opaque); in qcrypto_glib_hash_free()
[all …]
H A Dhash-nettle.c2 * QEMU Crypto hash algorithms
24 #include "crypto/hash.h"
124 QCryptoHash *hash; in qcrypto_nettle_hash_new() local
126 hash = g_new(QCryptoHash, 1); in qcrypto_nettle_hash_new()
127 hash->alg = alg; in qcrypto_nettle_hash_new()
128 hash->opaque = g_new(union qcrypto_hash_ctx, 1); in qcrypto_nettle_hash_new()
130 qcrypto_hash_alg_map[alg].init(hash->opaque); in qcrypto_nettle_hash_new()
131 return hash; in qcrypto_nettle_hash_new()
135 void qcrypto_nettle_hash_free(QCryptoHash *hash) in qcrypto_nettle_hash_free() argument
137 union qcrypto_hash_ctx *ctx = hash->opaque; in qcrypto_nettle_hash_free()
[all …]
H A Dhash-afalg.c2 * QEMU Crypto af_alg-backend hash/hmac support
18 #include "crypto/hash.h"
55 error_setg(errp, "Unsupported hash algorithm %d", alg); in qcrypto_afalg_hash_format_name()
120 /* Check if hash algorithm is supported */ in qcrypto_afalg_hash_new()
122 QCryptoHash *hash; in qcrypto_afalg_hash_new() local
125 error_setg(errp, "Unknown hash algorithm %d", alg); in qcrypto_afalg_hash_new()
131 hash = g_new(QCryptoHash, 1); in qcrypto_afalg_hash_new()
132 hash->alg = alg; in qcrypto_afalg_hash_new()
133 hash->opaque = qcrypto_afalg_hash_ctx_new(alg, errp); in qcrypto_afalg_hash_new()
134 if (!hash->opaque) { in qcrypto_afalg_hash_new()
[all …]
H A Dpbkdf-gnutls.c26 bool qcrypto_pbkdf2_supports(QCryptoHashAlgo hash) in qcrypto_pbkdf2_supports() argument
28 switch (hash) { in qcrypto_pbkdf2_supports()
36 return qcrypto_hash_supports(hash); in qcrypto_pbkdf2_supports()
42 int qcrypto_pbkdf2(QCryptoHashAlgo hash, in qcrypto_pbkdf2() argument
69 if (hash >= G_N_ELEMENTS(hash_map) || in qcrypto_pbkdf2()
70 hash_map[hash] == GNUTLS_DIG_UNKNOWN) { in qcrypto_pbkdf2()
72 "PBKDF does not support hash algorithm %s", in qcrypto_pbkdf2()
73 QCryptoHashAlgo_str(hash)); in qcrypto_pbkdf2()
77 ret = gnutls_pbkdf2(hash_map[hash], in qcrypto_pbkdf2()
H A Dpbkdf-gcrypt.c26 bool qcrypto_pbkdf2_supports(QCryptoHashAlgo hash) in qcrypto_pbkdf2_supports() argument
28 switch (hash) { in qcrypto_pbkdf2_supports()
39 return qcrypto_hash_supports(hash); in qcrypto_pbkdf2_supports()
45 int qcrypto_pbkdf2(QCryptoHashAlgo hash, in qcrypto_pbkdf2() argument
73 if (hash >= G_N_ELEMENTS(hash_map) || in qcrypto_pbkdf2()
74 hash_map[hash] == GCRY_MD_NONE) { in qcrypto_pbkdf2()
76 "PBKDF does not support hash algorithm %s", in qcrypto_pbkdf2()
77 QCryptoHashAlgo_str(hash)); in qcrypto_pbkdf2()
82 hash_map[hash], in qcrypto_pbkdf2()
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/postfix/files/
H A Dmain.cf14 virtual_mailbox_maps = hash:/etc/postfix/virtual
15 virtual_alias_maps = hash:/etc/postfix/virtual_alias
17 alias_maps = hash:/etc/aliases
73 # check_sender_access hash:/etc/postfix/access_domains,
85 # check_client_access hash:/etc/postfix/maps/access_client,
86 # check_client_access hash:/etc/postfix/maps/exceptions_client,
87 # check_helo_access hash:/etc/postfix/maps/access_helo,
88 # check_helo_access hash:/etc/postfix/maps/verify_helo,
89 # check_sender_access hash:/etc/postfix/maps/access_sender,
90 # check_sender_access hash:/etc/postfix/maps/verify_sender,
[all …]
/openbmc/qemu/include/qemu/
H A Dqht.h33 * An entry is a pointer-hash pair.
56 * @n_elems: number of entries the hash table should be optimized for.
71 * qht_insert - Insert a pointer into the hash table
74 * @hash: hash corresponding to @p
78 * Inserting the same pointer @p with different @hash values is a bug.
81 * inserted into the hash table.
85 * (i.e. ht->cmp matches and the hash is the same) to @p-@h. If @existing
88 bool qht_insert(struct qht *ht, void *p, uint32_t hash, void **existing);
94 * @hash: hash of the pointer to be looked up
107 void *qht_lookup_custom(const struct qht *ht, const void *userp, uint32_t hash,
[all …]
/openbmc/sdbusplus/src/server/
H A Dtransaction.cpp23 details::id = std::hash<details::Transaction>{}(t); in get_id()
37 set_id(std::hash<Transaction>{}(t)); in set_id()
47 size_t hash<sdbusplus::bus_t>::operator()(sdbusplus::bus_t& b) const in operator ()()
50 return std::hash<std::string>{}(name); in operator ()()
53 size_t hash<sdbusplus::message_t>::operator()(sdbusplus::message_t& m) const in operator ()()
62 return std::hash<uint64_t>{}(m.get_reply_cookie()); in operator ()()
66 return std::hash<uint64_t>{}(m.get_cookie()); in operator ()()
70 return std::hash<uint64_t>{}( in operator ()()
73 throw std::runtime_error("hash message: Unknown message type"); in operator ()()
77 size_t hash<sdbusplus::server::transaction::Transaction>::operator()( in operator ()()
[all …]
/openbmc/u-boot/doc/uImage.FIT/
H A Dhowto.txt98 Hash algo: crc32
99 Hash value: 2ae2bb40
100 Hash algo: sha1
101 Hash value: 3c200f34e2c226ddc789240cca0c59fc54a67cf4
143 Hash algo: crc32
144 Hash value: 2ae2bb40
145 Hash algo: sha1
146 Hash value: 3c200f34e2c226ddc789240cca0c59fc54a67cf4
165 Hash algo: crc32
166 Hash value: 2ae2bb40
[all …]
H A Dbeaglebone_vboot.txt141 hash-1 {
151 hash-1 {
224 Hash algo: sha1
225 Hash value: c94364646427e10f423837e559898ef02c97b988
233 Hash algo: sha1
234 Hash value: cb09202f889d824f23b8e4404b781be5ad38a68d
252 Verifying Hash Integrity ... sha1,rsa2048:dev+
255 Verifying Hash Integrity ...
269 Hash algo: sha1
270 Hash value: c94364646427e10f423837e559898ef02c97b988
[all …]
/openbmc/u-boot/include/
H A Dhash.h64 * hash_finish: Write the hash result to the given buffer
81 * hash_command: Process a hash command for a particular algorithm
83 * This common function is used to implement specific hash commands.
85 * @algo_name: Hash algorithm being used (lower case!)
96 * hash_block() - Hash a block according to the requested algorithm
98 * The caller probably knows the hash length for the chosen algorithm, but
102 * @algo_name: Hash algorithm to use
103 * @data: Data to hash
104 * @len: Lengh of data to hash in bytes
105 * @output: Place to put hash value
[all …]
/openbmc/openbmc/meta-security/recipes-ids/suricata/files/
H A DCVE-2024-37151.patch8 is mean to tell the hash cleanup code to recyle the tracker and to let
13 1. there are sufficient frag trackers to make sure the hash table is
18 4. during the lookup, the frag for X2 hashes to a hash row that holds
20 5. as the trackers in hash row are evaluated, it finds the tracker for
27 trackers in the hash row.
35 src/defrag-hash.c | 2 +-
38 diff --git a/src/defrag-hash.c b/src/defrag-hash.c
40 --- a/src/defrag-hash.c
41 +++ b/src/defrag-hash.c
49 * hash list -- this rewards active trackers */
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/freediameter/files/
H A DReplace-murmurhash-algorithm-with-Robert-Jenkin-s-ha.patch1 Replace murmurhash algorithm with Robert Jenkin's hash algorithm
6 processor, so replace it with Robert Jenkin's hash which has worked
22 -/* Hash function -- credits to Austin Appleby, thank you ^^ */
29 + * Robert Jenkin's hash function.
30 + * http://burtleburtle.net/bob/hash/evahash.html
48 - uint32_t hash = len;
59 - /* Mix 4 bytes at a time into the hash */
62 - _HASH_MIX(hash, k, m);
70 - case 3: hash ^= data[2] << 16;
71 - case 2: hash ^= data[1] << 8;
[all …]
/openbmc/qemu/docs/devel/
H A Debpf_rss.rst8 by calculating packet hash. Usually every queue is processed then by a specific guest CPU core.
18 of rx virtqueue based on lookup table built according to calculated symmetric hash
20 If steering BPF is set for TUN the BPF code calculates the hash of packet header and
27 queue_index = indirection_table[hash(<packet data>)%<indirection_table size>]
30 Not for all packets, the hash can/should be calculated.
32 Note: currently, eBPF RSS does not support hash reporting.
38 tap,vhost=off & virtio-net-pci,rss=on,hash=off
42 tap,vhost=on & virtio-net-pci,rss=on,hash=off
46 tap,vhost=off & virtio-net-pci,rss=on,hash=on
48 - eBPF is used, hash population feature is not reported to the guest:
[all …]
/openbmc/u-boot/fs/jffs2/
H A Djffs2_nand_private.h103 /* Name hashing routines. Initial hash value */
104 /* Hash courtesy of the R5 hash in reiserfs modulo sign bits */
107 /* partial hash update function. Assume roughly 4 bits per character */
118 static inline unsigned long end_name_hash(unsigned long hash) in end_name_hash() argument
120 return (unsigned int) hash; in end_name_hash()
123 /* Compute the hash for a name string. */
127 unsigned long hash = init_name_hash(); in full_name_hash() local
129 hash = partial_name_hash(*name++, hash); in full_name_hash()
130 return end_name_hash(hash); in full_name_hash()
/openbmc/qemu/tests/qemu-iotests/
H A D207.out43 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "wrong", "mode": "hash", "typ…
45 Job failed: remote host key fingerprint 'md5:HASH' does not match host_key_check 'md5:wrong'
49 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "HASH", "mode": "hash", "type…
60 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "wrong", "mode": "hash", "typ…
62 Job failed: remote host key fingerprint 'sha1:HASH' does not match host_key_check 'sha1:wrong'
66 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "HASH", "mode": "hash", "type…
77 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "wrong", "mode": "hash", "typ…
79 Job failed: remote host key fingerprint 'sha256:HASH' does not match host_key_check 'sha256:wrong'
83 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "HASH", "mode": "hash", "type…
/openbmc/openbmc/meta-security/recipes-ids/samhain/files/
H A D0001-Hash-fix-for-MIPS64-and-AARCH64.patch4 Subject: [PATCH] Hash fix for MIPS64 and AARCH64
6 Samhain uses the addresses of local variables in generating hash
8 For MIPS64 when a 64-bit address is passed in the resulting hash
11 32-bits of the address and use that in generating hash values.
30 /* Calculate the hash table entry for a chunk */
33 +#define hash(p) ((((unsigned long) p) & 0x7fffffff) >> 7)
35 +#define hash(p) ((((unsigned long) p - (unsigned long) startheap) & 0x7fffffff) >> 7)
39 #define hash(p) (((unsigned long) p) >> 7)
41 #define hash(p) (((unsigned long) p - (unsigned long) startheap) >> 7)
/openbmc/phosphor-host-ipmid/oem/nvidia/
H A Dbiosconfigcommands.cpp43 std::array<uint8_t, biosPasswordMaxHashSize> hash) in ipmiSetBiosPassword() argument
66 EVP_sha256(), SHA256_DIGEST_LENGTH, hash.data()); in ipmiSetBiosPassword()
68 json[keyAdminPwdHash] = hash; in ipmiSetBiosPassword()
73 json[keyAdminPwdHash] = hash; in ipmiSetBiosPassword()
78 json[keyAdminPwdHash] = hash; in ipmiSetBiosPassword()
87 // initializing with 0 as user password hash field in ipmiSetBiosPassword()
110 std::array<uint8_t, biosPasswordMaxHashSize> // hash
116 std::array<uint8_t, biosPasswordMaxHashSize> hash = {0}; in ipmiGetBiosPassword() local
127 return ipmi::responseSuccess(action, salt, hash); in ipmiGetBiosPassword()
146 return ipmi::responseSuccess(action, salt, hash); in ipmiGetBiosPassword()
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/autofs/autofs/
H A D0009-hash.h-include-sys-reg.h-instead-of-bits-reg.h.patch4 Subject: [PATCH] hash.h: include <sys/reg.h> instead of <bits/reg.h>
9 ../include/hash.h:27:2: error: #error Wordsize not 32 or 64
17 include/hash.h | 2 +-
20 diff --git a/include/hash.h b/include/hash.h
22 --- a/include/hash.h
23 +++ b/include/hash.h
/openbmc/u-boot/fs/ubifs/
H A Dkey.h21 * 4KiB offset in case of inode node, and direntry hash in case of a direntry
22 * node. We use "r5" hash borrowed from reiserfs.
29 * key_mask_hash - mask a valid hash value.
32 * We use hash values as offset in directories, so values %0 and %1 are
36 static inline uint32_t key_mask_hash(uint32_t hash) in key_mask_hash() argument
38 hash &= UBIFS_S_KEY_HASH_MASK; in key_mask_hash()
39 if (unlikely(hash <= 2)) in key_mask_hash()
40 hash += 3; in key_mask_hash()
41 return hash; in key_mask_hash()
45 * key_r5_hash - R5 hash function (borrowed from reiserfs).
[all …]
/openbmc/openbmc/meta-security/docs/
H A Ddm-verity-systemd-hash-x86-64.txt1 dm-verity and x86-64 and systemd - separate hash device
8 Also, you'll need to point at the hash specific WKS file:
10 WKS_FILES += " systemd-bootdisk-dmverity-hash.wks.in"
13 storage of the hash data -- instead of "hiding" it beyond the filesystem
18 The example hash.wks file added here essentially adds a hash-only partition
26 Generating the separate root hash image is driven off enabling this:
37 the root node hash value as per the systemd "autodetect" proposed standard.

12345678910>>...39