| /openbmc/phosphor-dbus-monitor/src/test/ |
| H A D | propertywatchgentest.cpp | 19 {Index::key_type{0, 0, 0}, 0}, 20 {Index::key_type{0, 1, 0}, 1}, 21 {Index::key_type{1, 0, 0}, 2}, 22 {Index::key_type{1, 1, 0}, 3}, 23 {Index::key_type{2, 0, 0}, 4}, 24 {Index::key_type{2, 1, 0}, 5}, 25 {Index::key_type{3, 0, 0}, 6}, 26 {Index::key_type{3, 1, 0}, 7}, 29 {Index::key_type{2, 2, 1}, 8}, 30 {Index::key_type{2, 2, 2}, 9}, [all …]
|
| H A D | propertywatchtest.cpp | 34 {PropertyIndex::key_type{paths[0], interfaces[0], properties[0]}, 36 {PropertyIndex::key_type{paths[0], interfaces[1], properties[1]}, 38 {PropertyIndex::key_type{paths[1], interfaces[0], properties[0]}, 40 {PropertyIndex::key_type{paths[1], interfaces[1], properties[1]}, 42 {PropertyIndex::key_type{paths[2], interfaces[0], properties[0]}, 44 {PropertyIndex::key_type{paths[2], interfaces[1], properties[1]}, 46 {PropertyIndex::key_type{paths[3], interfaces[0], properties[0]}, 48 {PropertyIndex::key_type{paths[3], interfaces[1], properties[1]},
|
| /openbmc/qemu/tests/unit/ |
| H A D | test-crypto-akcipher.c | 664 QCryptoAkCipherKeyType key_type; member 695 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, 703 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, 711 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, 719 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, 727 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, 734 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, 741 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, 748 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE, 755 .key_type = QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC, [all …]
|
| /openbmc/phosphor-hwmon/ |
| H A D | sensor.hpp | 20 using TimedoutMap = std::map<SensorSet::key_type, std::future<int64_t>>; 62 explicit Sensor(const SensorSet::key_type& sensor, 184 SensorSet::key_type _sensor; 243 const SensorSet::key_type& sensorSetKey,
|
| H A D | env.hpp | 58 inline std::string getEnv(const char* prefix, const SensorSet::key_type& sensor, in getEnv() 83 SensorSet::key_type sensor{type, id}; in getEnv() 98 const SensorSet::key_type& sensor) in getIndirectID()
|
| H A D | sensorset.hpp | 26 using key_type = container_t::key_type; typedef in SensorSet
|
| H A D | mainloop.hpp | 89 using SensorState = std::map<SensorSet::key_type, mapped_type>; 126 std::map<SensorSet::key_type, std::unique_ptr<sensor::Sensor>> 134 std::map<SensorSet::key_type, SensorSet::mapped_type> _rmSensors;
|
| H A D | util.hpp | 29 inline bool isAverageEnvSet(const SensorSet::key_type& sensor) in isAverageEnvSet()
|
| H A D | average.hpp | 16 using averageKey = SensorSet::key_type;
|
| H A D | sensor.cpp | 31 Sensor::Sensor(const SensorSet::key_type& sensor, in Sensor() 316 const SensorSet::key_type& sensorSetKey, in asyncRead()
|
| H A D | targets.hpp | 68 std::shared_ptr<T> addTarget(const SensorSet::key_type& sensor, in addTarget()
|
| /openbmc/u-boot/fs/ubifs/ |
| H A D | gc.c | 128 ubifs_assert(key_type(c, &sa->key) == UBIFS_DATA_KEY); in data_nodes_cmp() 129 ubifs_assert(key_type(c, &sb->key) == UBIFS_DATA_KEY); in data_nodes_cmp() 172 ubifs_assert(key_type(c, &sa->key) != UBIFS_DATA_KEY && in nondata_nodes_cmp() 173 key_type(c, &sb->key) != UBIFS_DATA_KEY); in nondata_nodes_cmp() 186 ubifs_assert(key_type(c, &sa->key) == UBIFS_DENT_KEY || in nondata_nodes_cmp() 187 key_type(c, &sa->key) == UBIFS_XENT_KEY); in nondata_nodes_cmp() 188 ubifs_assert(key_type(c, &sb->key) == UBIFS_DENT_KEY || in nondata_nodes_cmp() 189 key_type(c, &sb->key) == UBIFS_XENT_KEY); in nondata_nodes_cmp() 263 ubifs_assert(key_type(c, &snod->key) == UBIFS_DATA_KEY || in sort_nodes() 264 key_type(c, &snod->key) == UBIFS_INO_KEY || in sort_nodes() [all …]
|
| H A D | tnc_misc.c | 315 switch (key_type(c, &zbr->key)) { in read_znode() 323 i, key_type(c, &zbr->key)); in read_znode() 331 type = key_type(c, &zbr->key); in read_znode() 453 int err, type = key_type(c, key); in ubifs_tnc_read_node()
|
| H A D | replay.c | 230 switch (key_type(c, &r->key)) { in apply_replay_entry() 446 int key_type = key_type_flash(c, dent->key); in ubifs_validate_entry() local 454 ubifs_err(c, "bad %s node", key_type == UBIFS_DENT_KEY ? in ubifs_validate_entry() 459 if (key_type != UBIFS_DENT_KEY && key_type != UBIFS_XENT_KEY) { in ubifs_validate_entry() 460 ubifs_err(c, "bad key type %d", key_type); in ubifs_validate_entry()
|
| H A D | key.h | 315 static inline int key_type(const struct ubifs_info *c, in key_type() function 517 int type = key_type(c, key); in is_hash_key()
|
| H A D | tnc.c | 488 ret = try_read_node(c, node, key_type(c, key), zbr->len, zbr->lnum, in fallible_read_node() 1161 ubifs_assert(key_type(c, key) < UBIFS_INVALID_KEY); in ubifs_lookup_level0() 1545 key_type(c, key) != UBIFS_DATA_KEY) { in ubifs_tnc_get_bu_keys() 2001 if (znode->level == 0 && key_type(c, key) == UBIFS_DATA_KEY) { in tnc_insert() 2006 key_type(c, key1) == UBIFS_DATA_KEY) in tnc_insert() 2017 key_type(c, key1) == UBIFS_DATA_KEY) { in tnc_insert() 2020 key_type(c, key1) != UBIFS_DATA_KEY) { in tnc_insert() 2751 int n, err, type = key_type(c, key); in ubifs_tnc_next_ent() 2810 key_type(c, dkey) != type) { in ubifs_tnc_next_ent() 2977 ubifs_assert(key_type(c, key) < UBIFS_INVALID_KEY); in lookup_znode()
|
| /openbmc/phosphor-psu-code-mgmt/tools/ |
| H A D | generate-psu-tar | 211 key_type="${private_key_name%.*}" 212 echo KeyType="${key_type}" >> $manifest_location
|
| /openbmc/openpower-pnor-code-mgmt/ |
| H A D | generate-tar | 291 key_type="${private_key_name%.*}" 292 echo KeyType="${key_type}" >> $manifest_location
|
| /openbmc/phosphor-bmc-code-mgmt/bmc/ |
| H A D | gen-bios-tar | 206 key_type="${private_key_name%.*}" 207 echo KeyType="${key_type}" >> $manifest_location
|
| /openbmc/phosphor-dbus-monitor/src/test/templates/ |
| H A D | propertywatchgentest.mako.hpp | 7 {Index::key_type{${i[0]}, ${i[2]}, ${i[3]}}, ${i[5]}},
|
| H A D | callbackgentest.mako.hpp | 7 {Index::key_type{${i[0]}, ${i[2]}, ${i[3]}}, ${i[5]}},
|
| /openbmc/telemetry/src/utils/ |
| H A D | messanger_service.hpp | 13 using key_type = MessangerService; typedef in utils::MessangerService
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/psa-adac/ |
| H A D | 0003-Fix-psa_key_handle_t-initialization.patch | 21 @@ -198,7 +198,7 @@ psa_status_t psa_adac_verify_mac(uint8_t key_type,
|
| /openbmc/u-boot/cmd/ |
| H A D | otp.c | 137 unsigned int key_type; member 1371 int key_id, key_offset, key_type, key_length, exp_length; in _otp_print_key() local 1377 key_type = (header >> 14) & 0xf; in _otp_print_key() 1385 if (key_type == key_info_array[i].value) { in _otp_print_key() 1396 if (key_info.key_type == OTP_KEY_TYPE_HMAC) { in _otp_print_key() 1412 } else if (key_info.key_type == OTP_KEY_TYPE_RSA_PRIV || in _otp_print_key() 1413 key_info.key_type == OTP_KEY_TYPE_RSA_PUB) { in _otp_print_key() 1440 if (key_info.key_type == OTP_KEY_TYPE_HMAC) { in _otp_print_key() 1442 } else if (key_info.key_type == OTP_KEY_TYPE_AES) { in _otp_print_key() 1450 } else if (key_info.key_type == OTP_KEY_TYPE_VAULT) { in _otp_print_key() [all …]
|
| /openbmc/phosphor-dbus-monitor/src/templates/ |
| H A D | generated.mako.hpp | 160 PropertyIndex::key_type in get()
|