/openbmc/qemu/include/crypto/ |
H A D | hash.h | 2 * QEMU Crypto hash algorithms 47 * @alg: the hash algorithm 49 * Determine if @alg hash algorithm is supported by the 59 * @alg: the hash algorithm 61 * Determine the size of the hash digest in bytes 69 * @alg: the hash algorithm 70 * @iov: the array of memory regions to hash 72 * @result: pointer to hold output hash 76 * Computes the hash across all the memory regions 81 * @result_len match the size of the hash output. The digest will [all …]
|
/openbmc/qemu/crypto/ |
H A D | hash-gnutls.c | 2 * QEMU Crypto hash algorithms 25 #include "crypto/hash.h" 59 QCryptoHash *hash; in qcrypto_gnutls_hash_new() local 62 hash = g_new(QCryptoHash, 1); in qcrypto_gnutls_hash_new() 63 hash->alg = alg; in qcrypto_gnutls_hash_new() 64 hash->opaque = g_new(gnutls_hash_hd_t, 1); in qcrypto_gnutls_hash_new() 66 ret = gnutls_hash_init(hash->opaque, qcrypto_hash_alg_map[alg]); in qcrypto_gnutls_hash_new() 69 "Unable to initialize hash algorithm: %s", in qcrypto_gnutls_hash_new() 71 g_free(hash->opaque); in qcrypto_gnutls_hash_new() 72 g_free(hash); in qcrypto_gnutls_hash_new() [all …]
|
H A D | hash-gcrypt.c | 2 * QEMU Crypto hash algorithms 25 #include "crypto/hash.h" 54 QCryptoHash *hash; in qcrypto_gcrypt_hash_new() local 57 hash = g_new(QCryptoHash, 1); in qcrypto_gcrypt_hash_new() 58 hash->alg = alg; in qcrypto_gcrypt_hash_new() 59 hash->opaque = g_new(gcry_md_hd_t, 1); in qcrypto_gcrypt_hash_new() 61 ret = gcry_md_open((gcry_md_hd_t *) hash->opaque, in qcrypto_gcrypt_hash_new() 65 "Unable to initialize hash algorithm: %s", in qcrypto_gcrypt_hash_new() 67 g_free(hash->opaque); in qcrypto_gcrypt_hash_new() 68 g_free(hash); in qcrypto_gcrypt_hash_new() [all …]
|
H A D | hash.c | 2 * QEMU Crypto hash algorithms 25 #include "crypto/hash.h" 81 int qcrypto_hash_updatev(QCryptoHash *hash, in qcrypto_hash_updatev() argument 86 QCryptoHashDriver *drv = hash->driver; in qcrypto_hash_updatev() 88 return drv->hash_update(hash, iov, niov, errp); in qcrypto_hash_updatev() 91 int qcrypto_hash_update(QCryptoHash *hash, in qcrypto_hash_update() argument 98 return qcrypto_hash_updatev(hash, &iov, 1, errp); in qcrypto_hash_update() 103 QCryptoHash *hash = NULL; in qcrypto_hash_new() local 106 error_setg(errp, "Unsupported hash algorithm %s", in qcrypto_hash_new() 112 hash = qcrypto_hash_afalg_driver.hash_new(alg, NULL); in qcrypto_hash_new() [all …]
|
H A D | hash-glib.c | 2 * QEMU Crypto hash algorithms 24 #include "crypto/hash.h" 51 QCryptoHash *hash; in qcrypto_glib_hash_new() local 53 hash = g_new(QCryptoHash, 1); in qcrypto_glib_hash_new() 54 hash->alg = alg; in qcrypto_glib_hash_new() 55 hash->opaque = g_checksum_new(qcrypto_hash_alg_map[alg]); in qcrypto_glib_hash_new() 57 return hash; in qcrypto_glib_hash_new() 61 void qcrypto_glib_hash_free(QCryptoHash *hash) in qcrypto_glib_hash_free() argument 63 if (hash->opaque) { in qcrypto_glib_hash_free() 64 g_checksum_free(hash->opaque); in qcrypto_glib_hash_free() [all …]
|
H A D | hash-nettle.c | 2 * QEMU Crypto hash algorithms 24 #include "crypto/hash.h" 124 QCryptoHash *hash; in qcrypto_nettle_hash_new() local 126 hash = g_new(QCryptoHash, 1); in qcrypto_nettle_hash_new() 127 hash->alg = alg; in qcrypto_nettle_hash_new() 128 hash->opaque = g_new(union qcrypto_hash_ctx, 1); in qcrypto_nettle_hash_new() 130 qcrypto_hash_alg_map[alg].init(hash->opaque); in qcrypto_nettle_hash_new() 131 return hash; in qcrypto_nettle_hash_new() 135 void qcrypto_nettle_hash_free(QCryptoHash *hash) in qcrypto_nettle_hash_free() argument 137 union qcrypto_hash_ctx *ctx = hash->opaque; in qcrypto_nettle_hash_free() [all …]
|
H A D | hash-afalg.c | 2 * QEMU Crypto af_alg-backend hash/hmac support 18 #include "crypto/hash.h" 55 error_setg(errp, "Unsupported hash algorithm %d", alg); in qcrypto_afalg_hash_format_name() 120 /* Check if hash algorithm is supported */ in qcrypto_afalg_hash_new() 122 QCryptoHash *hash; in qcrypto_afalg_hash_new() local 125 error_setg(errp, "Unknown hash algorithm %d", alg); in qcrypto_afalg_hash_new() 131 hash = g_new(QCryptoHash, 1); in qcrypto_afalg_hash_new() 132 hash->alg = alg; in qcrypto_afalg_hash_new() 133 hash->opaque = qcrypto_afalg_hash_ctx_new(alg, errp); in qcrypto_afalg_hash_new() 134 if (!hash->opaque) { in qcrypto_afalg_hash_new() [all …]
|
H A D | pbkdf-gnutls.c | 26 bool qcrypto_pbkdf2_supports(QCryptoHashAlgo hash) in qcrypto_pbkdf2_supports() argument 28 switch (hash) { in qcrypto_pbkdf2_supports() 36 return qcrypto_hash_supports(hash); in qcrypto_pbkdf2_supports() 42 int qcrypto_pbkdf2(QCryptoHashAlgo hash, in qcrypto_pbkdf2() argument 69 if (hash >= G_N_ELEMENTS(hash_map) || in qcrypto_pbkdf2() 70 hash_map[hash] == GNUTLS_DIG_UNKNOWN) { in qcrypto_pbkdf2() 72 "PBKDF does not support hash algorithm %s", in qcrypto_pbkdf2() 73 QCryptoHashAlgo_str(hash)); in qcrypto_pbkdf2() 77 ret = gnutls_pbkdf2(hash_map[hash], in qcrypto_pbkdf2()
|
H A D | pbkdf-gcrypt.c | 26 bool qcrypto_pbkdf2_supports(QCryptoHashAlgo hash) in qcrypto_pbkdf2_supports() argument 28 switch (hash) { in qcrypto_pbkdf2_supports() 39 return qcrypto_hash_supports(hash); in qcrypto_pbkdf2_supports() 45 int qcrypto_pbkdf2(QCryptoHashAlgo hash, in qcrypto_pbkdf2() argument 73 if (hash >= G_N_ELEMENTS(hash_map) || in qcrypto_pbkdf2() 74 hash_map[hash] == GCRY_MD_NONE) { in qcrypto_pbkdf2() 76 "PBKDF does not support hash algorithm %s", in qcrypto_pbkdf2() 77 QCryptoHashAlgo_str(hash)); in qcrypto_pbkdf2() 82 hash_map[hash], in qcrypto_pbkdf2()
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/postfix/files/ |
H A D | main.cf | 14 virtual_mailbox_maps = hash:/etc/postfix/virtual 15 virtual_alias_maps = hash:/etc/postfix/virtual_alias 17 alias_maps = hash:/etc/aliases 73 # check_sender_access hash:/etc/postfix/access_domains, 85 # check_client_access hash:/etc/postfix/maps/access_client, 86 # check_client_access hash:/etc/postfix/maps/exceptions_client, 87 # check_helo_access hash:/etc/postfix/maps/access_helo, 88 # check_helo_access hash:/etc/postfix/maps/verify_helo, 89 # check_sender_access hash:/etc/postfix/maps/access_sender, 90 # check_sender_access hash:/etc/postfix/maps/verify_sender, [all …]
|
/openbmc/qemu/include/qemu/ |
H A D | qht.h | 33 * An entry is a pointer-hash pair. 56 * @n_elems: number of entries the hash table should be optimized for. 71 * qht_insert - Insert a pointer into the hash table 74 * @hash: hash corresponding to @p 78 * Inserting the same pointer @p with different @hash values is a bug. 81 * inserted into the hash table. 85 * (i.e. ht->cmp matches and the hash is the same) to @p-@h. If @existing 88 bool qht_insert(struct qht *ht, void *p, uint32_t hash, void **existing); 94 * @hash: hash of the pointer to be looked up 107 void *qht_lookup_custom(const struct qht *ht, const void *userp, uint32_t hash, [all …]
|
/openbmc/sdbusplus/src/server/ |
H A D | transaction.cpp | 23 details::id = std::hash<details::Transaction>{}(t); in get_id() 37 set_id(std::hash<Transaction>{}(t)); in set_id() 47 size_t hash<sdbusplus::bus_t>::operator()(sdbusplus::bus_t& b) const in operator ()() 50 return std::hash<std::string>{}(name); in operator ()() 53 size_t hash<sdbusplus::message_t>::operator()(sdbusplus::message_t& m) const in operator ()() 62 return std::hash<uint64_t>{}(m.get_reply_cookie()); in operator ()() 66 return std::hash<uint64_t>{}(m.get_cookie()); in operator ()() 70 return std::hash<uint64_t>{}( in operator ()() 73 throw std::runtime_error("hash message: Unknown message type"); in operator ()() 77 size_t hash<sdbusplus::server::transaction::Transaction>::operator()( in operator ()() [all …]
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | howto.txt | 98 Hash algo: crc32 99 Hash value: 2ae2bb40 100 Hash algo: sha1 101 Hash value: 3c200f34e2c226ddc789240cca0c59fc54a67cf4 143 Hash algo: crc32 144 Hash value: 2ae2bb40 145 Hash algo: sha1 146 Hash value: 3c200f34e2c226ddc789240cca0c59fc54a67cf4 165 Hash algo: crc32 166 Hash value: 2ae2bb40 [all …]
|
H A D | beaglebone_vboot.txt | 141 hash-1 { 151 hash-1 { 224 Hash algo: sha1 225 Hash value: c94364646427e10f423837e559898ef02c97b988 233 Hash algo: sha1 234 Hash value: cb09202f889d824f23b8e4404b781be5ad38a68d 252 Verifying Hash Integrity ... sha1,rsa2048:dev+ 255 Verifying Hash Integrity ... 269 Hash algo: sha1 270 Hash value: c94364646427e10f423837e559898ef02c97b988 [all …]
|
/openbmc/u-boot/include/ |
H A D | hash.h | 64 * hash_finish: Write the hash result to the given buffer 81 * hash_command: Process a hash command for a particular algorithm 83 * This common function is used to implement specific hash commands. 85 * @algo_name: Hash algorithm being used (lower case!) 96 * hash_block() - Hash a block according to the requested algorithm 98 * The caller probably knows the hash length for the chosen algorithm, but 102 * @algo_name: Hash algorithm to use 103 * @data: Data to hash 104 * @len: Lengh of data to hash in bytes 105 * @output: Place to put hash value [all …]
|
/openbmc/openbmc/meta-security/recipes-ids/suricata/files/ |
H A D | CVE-2024-37151.patch | 8 is mean to tell the hash cleanup code to recyle the tracker and to let 13 1. there are sufficient frag trackers to make sure the hash table is 18 4. during the lookup, the frag for X2 hashes to a hash row that holds 20 5. as the trackers in hash row are evaluated, it finds the tracker for 27 trackers in the hash row. 35 src/defrag-hash.c | 2 +- 38 diff --git a/src/defrag-hash.c b/src/defrag-hash.c 40 --- a/src/defrag-hash.c 41 +++ b/src/defrag-hash.c 49 * hash list -- this rewards active trackers */
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/freediameter/files/ |
H A D | Replace-murmurhash-algorithm-with-Robert-Jenkin-s-ha.patch | 1 Replace murmurhash algorithm with Robert Jenkin's hash algorithm 6 processor, so replace it with Robert Jenkin's hash which has worked 22 -/* Hash function -- credits to Austin Appleby, thank you ^^ */ 29 + * Robert Jenkin's hash function. 30 + * http://burtleburtle.net/bob/hash/evahash.html 48 - uint32_t hash = len; 59 - /* Mix 4 bytes at a time into the hash */ 62 - _HASH_MIX(hash, k, m); 70 - case 3: hash ^= data[2] << 16; 71 - case 2: hash ^= data[1] << 8; [all …]
|
/openbmc/qemu/docs/devel/ |
H A D | ebpf_rss.rst | 8 by calculating packet hash. Usually every queue is processed then by a specific guest CPU core. 18 of rx virtqueue based on lookup table built according to calculated symmetric hash 20 If steering BPF is set for TUN the BPF code calculates the hash of packet header and 27 queue_index = indirection_table[hash(<packet data>)%<indirection_table size>] 30 Not for all packets, the hash can/should be calculated. 32 Note: currently, eBPF RSS does not support hash reporting. 38 tap,vhost=off & virtio-net-pci,rss=on,hash=off 42 tap,vhost=on & virtio-net-pci,rss=on,hash=off 46 tap,vhost=off & virtio-net-pci,rss=on,hash=on 48 - eBPF is used, hash population feature is not reported to the guest: [all …]
|
/openbmc/u-boot/fs/jffs2/ |
H A D | jffs2_nand_private.h | 103 /* Name hashing routines. Initial hash value */ 104 /* Hash courtesy of the R5 hash in reiserfs modulo sign bits */ 107 /* partial hash update function. Assume roughly 4 bits per character */ 118 static inline unsigned long end_name_hash(unsigned long hash) in end_name_hash() argument 120 return (unsigned int) hash; in end_name_hash() 123 /* Compute the hash for a name string. */ 127 unsigned long hash = init_name_hash(); in full_name_hash() local 129 hash = partial_name_hash(*name++, hash); in full_name_hash() 130 return end_name_hash(hash); in full_name_hash()
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 207.out | 43 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "wrong", "mode": "hash", "typ… 45 Job failed: remote host key fingerprint 'md5:HASH' does not match host_key_check 'md5:wrong' 49 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "HASH", "mode": "hash", "type… 60 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "wrong", "mode": "hash", "typ… 62 Job failed: remote host key fingerprint 'sha1:HASH' does not match host_key_check 'sha1:wrong' 66 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "HASH", "mode": "hash", "type… 77 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "wrong", "mode": "hash", "typ… 79 Job failed: remote host key fingerprint 'sha256:HASH' does not match host_key_check 'sha256:wrong' 83 …"options": {"driver": "ssh", "location": {"host-key-check": {"hash": "HASH", "mode": "hash", "type…
|
/openbmc/openbmc/meta-security/recipes-ids/samhain/files/ |
H A D | 0001-Hash-fix-for-MIPS64-and-AARCH64.patch | 4 Subject: [PATCH] Hash fix for MIPS64 and AARCH64 6 Samhain uses the addresses of local variables in generating hash 8 For MIPS64 when a 64-bit address is passed in the resulting hash 11 32-bits of the address and use that in generating hash values. 30 /* Calculate the hash table entry for a chunk */ 33 +#define hash(p) ((((unsigned long) p) & 0x7fffffff) >> 7) 35 +#define hash(p) ((((unsigned long) p - (unsigned long) startheap) & 0x7fffffff) >> 7) 39 #define hash(p) (((unsigned long) p) >> 7) 41 #define hash(p) (((unsigned long) p - (unsigned long) startheap) >> 7)
|
/openbmc/phosphor-host-ipmid/oem/nvidia/ |
H A D | biosconfigcommands.cpp | 43 std::array<uint8_t, biosPasswordMaxHashSize> hash) in ipmiSetBiosPassword() argument 66 EVP_sha256(), SHA256_DIGEST_LENGTH, hash.data()); in ipmiSetBiosPassword() 68 json[keyAdminPwdHash] = hash; in ipmiSetBiosPassword() 73 json[keyAdminPwdHash] = hash; in ipmiSetBiosPassword() 78 json[keyAdminPwdHash] = hash; in ipmiSetBiosPassword() 87 // initializing with 0 as user password hash field in ipmiSetBiosPassword() 110 std::array<uint8_t, biosPasswordMaxHashSize> // hash 116 std::array<uint8_t, biosPasswordMaxHashSize> hash = {0}; in ipmiGetBiosPassword() local 127 return ipmi::responseSuccess(action, salt, hash); in ipmiGetBiosPassword() 146 return ipmi::responseSuccess(action, salt, hash); in ipmiGetBiosPassword() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/autofs/autofs/ |
H A D | 0009-hash.h-include-sys-reg.h-instead-of-bits-reg.h.patch | 4 Subject: [PATCH] hash.h: include <sys/reg.h> instead of <bits/reg.h> 9 ../include/hash.h:27:2: error: #error Wordsize not 32 or 64 17 include/hash.h | 2 +- 20 diff --git a/include/hash.h b/include/hash.h 22 --- a/include/hash.h 23 +++ b/include/hash.h
|
/openbmc/u-boot/fs/ubifs/ |
H A D | key.h | 21 * 4KiB offset in case of inode node, and direntry hash in case of a direntry 22 * node. We use "r5" hash borrowed from reiserfs. 29 * key_mask_hash - mask a valid hash value. 32 * We use hash values as offset in directories, so values %0 and %1 are 36 static inline uint32_t key_mask_hash(uint32_t hash) in key_mask_hash() argument 38 hash &= UBIFS_S_KEY_HASH_MASK; in key_mask_hash() 39 if (unlikely(hash <= 2)) in key_mask_hash() 40 hash += 3; in key_mask_hash() 41 return hash; in key_mask_hash() 45 * key_r5_hash - R5 hash function (borrowed from reiserfs). [all …]
|
/openbmc/openbmc/meta-security/docs/ |
H A D | dm-verity-systemd-hash-x86-64.txt | 1 dm-verity and x86-64 and systemd - separate hash device 8 Also, you'll need to point at the hash specific WKS file: 10 WKS_FILES += " systemd-bootdisk-dmverity-hash.wks.in" 13 storage of the hash data -- instead of "hiding" it beyond the filesystem 18 The example hash.wks file added here essentially adds a hash-only partition 26 Generating the separate root hash image is driven off enabling this: 37 the root node hash value as per the systemd "autodetect" proposed standard.
|