Home
last modified time | relevance | path

Searched refs:key (Results 51 – 75 of 396) sorted by relevance

12345678910>>...16

/qemu/net/
H A Dfilter-rewriter.c73 Packet *pkt, ConnectionKey *key) in handle_primary_tcp_pkt() argument
126 g_hash_table_remove(rf->connection_track_table, key); in handle_primary_tcp_pkt()
169 g_hash_table_remove(rf->connection_track_table, key); in handle_primary_tcp_pkt()
179 Packet *pkt, ConnectionKey *key) in handle_secondary_tcp_pkt() argument
261 ConnectionKey key; in colo_rewriter_receive_iov() local
282 fill_connection_key(pkt, &key, sender == nf->netdev); in colo_rewriter_receive_iov()
286 !connection_has_tracked(s->connection_track_table, &key)) { in colo_rewriter_receive_iov()
291 &key, in colo_rewriter_receive_iov()
296 if (!handle_primary_tcp_pkt(s, conn, pkt, &key)) { in colo_rewriter_receive_iov()
309 if (!handle_secondary_tcp_pkt(s, conn, pkt, &key)) { in colo_rewriter_receive_iov()
[all …]
H A Dcolo.h93 void extract_ip_and_port(uint32_t tmp_ports, ConnectionKey *key,
95 void fill_connection_key(Packet *pkt, ConnectionKey *key, bool reverse);
96 Connection *connection_new(ConnectionKey *key);
99 ConnectionKey *key,
102 ConnectionKey *key);
/qemu/include/hw/xen/
H A Dxen-bus-helper.h23 const char *node, const char *key, Error **errp,
27 const char *node, const char *key, Error **errp,
33 const char *node, const char *key, Error **errp,
37 const char *node, const char *key, Error **errp,
43 const char *key, xs_watch_fn fn,
/qemu/crypto/
H A Dakcipher-nettle.c.inc55 const uint8_t *key, size_t keylen,
85 const uint8_t *key,
90 QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE, key, keylen, errp);
108 error_setg(errp, "Failed to check RSA key");
122 error_setg(errp, "Failed to check RSA key");
135 const uint8_t *key,
140 QCRYPTO_AKCIPHER_KEY_TYPE_PUBLIC, key, keylen, errp);
149 error_setg(errp, "Failed to check RSA key");
181 "key size: %zu", enc_len, rsa->pub.size);
388 const uint8_t *key, size_t keylen,
[all …]
H A Drsakey-nettle.c.inc59 const uint8_t *key, size_t keylen, Error **errp)
67 if (asn1_der_iterator_first(&i, keylen, key) != ASN1_ITERATOR_CONSTRUCTED ||
108 error_setg(errp, "Failed to parse RSA private key");
120 const uint8_t *key, size_t keylen, Error **errp)
126 if (asn1_der_iterator_first(&i, keylen, key) != ASN1_ITERATOR_CONSTRUCTED ||
138 error_setg(errp, "Failed to parse RSA public key");
144 QCryptoAkCipherKeyType type, const uint8_t *key,
149 return qcrypto_nettle_rsa_private_key_parse(key, keylen, errp);
152 return qcrypto_nettle_rsa_public_key_parse(key, keylen, errp);
155 error_setg(errp, "Unknown key type: %d", type);
H A Drsakey-builtin.c.inc70 const uint8_t *key, size_t keylen, Error **errp)
77 decode_ret = qcrypto_der_decode_seq(&key, &keylen,
91 error_setg(errp, "Invalid RSA public key");
117 const uint8_t *key, size_t keylen, Error **errp)
125 decode_ret = qcrypto_der_decode_seq(&key, &keylen, extract_seq_content,
170 error_setg(errp, "Invalid RSA private key");
182 QCryptoAkCipherKeyType type, const uint8_t *key,
187 return qcrypto_builtin_rsa_private_key_parse(key, keylen, errp);
190 return qcrypto_builtin_rsa_public_key_parse(key, keylen, errp);
193 error_setg(errp, "Unknown key type: %d", type);
H A Dtlscredspsk.c35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument
55 key->data = (unsigned char *) g_strdup(&lines[i][ulen + 1]); in lookup_key()
56 key->size = strlen(lines[i]) - ulen - 1; in lookup_key()
79 gnutls_datum_t key = { .data = NULL }; in qcrypto_tls_creds_psk_load() local
132 if (lookup_key(pskfile, username, &key, errp) != 0) { in qcrypto_tls_creds_psk_load()
144 username, &key, GNUTLS_PSK_KEY_HEX); in qcrypto_tls_creds_psk_load()
154 g_free(key.data); in qcrypto_tls_creds_psk_load()
/qemu/hw/mips/
H A Dfw_cfg.c19 const char *fw_cfg_arch_key_name(uint16_t key) in fw_cfg_arch_key_name() argument
22 uint16_t key; in fw_cfg_arch_key_name() member
30 if (fw_cfg_arch_wellknown_keys[i].key == key) { in fw_cfg_arch_key_name()
/qemu/docs/system/devices/
H A Dusb-u2f.rst9 protocol. In case of a USB U2F security key, it is a USB HID device
12 QEMU supports both pass-through of a host U2F key device to a VM,
13 and software emulation of a U2F key.
19 U2F key on your host to a guest VM. All requests made from the guest
20 are passed through to the physical security key connected to the
24 U2F security key with several guest VMs, which is not possible with a
27 You can specify the host U2F key to use with the ``hidraw``
45 for the U2F key emulation. libu2f-emu
52 * ec private key
77 * ``private-key.pem``: ec private key
/qemu/hw/nvram/
H A Dtrace-events8 fw_cfg_select(void *s, uint16_t key_value, const char *key_name, int ret) "%p key 0x%04" PRIx16 " '…
10 fw_cfg_add_bytes(uint16_t key_value, const char *key_name, size_t len) "key 0x%04" PRIx16 " '%s', %…
12 fw_cfg_add_string(uint16_t key_value, const char *key_name, const char *value) "key 0x%04" PRIx16 "…
13 fw_cfg_add_i16(uint16_t key_value, const char *key_name, uint16_t value) "key 0x%04" PRIx16 " '%s',…
14 fw_cfg_add_i32(uint16_t key_value, const char *key_name, uint32_t value) "key 0x%04" PRIx16 " '%s',…
15 fw_cfg_add_i64(uint16_t key_value, const char *key_name, uint64_t value) "key 0x%04" PRIx16 " '%s',…
/qemu/hw/ppc/
H A Dfw_cfg.c19 const char *fw_cfg_arch_key_name(uint16_t key) in fw_cfg_arch_key_name() argument
22 uint16_t key; in fw_cfg_arch_key_name() member
40 if (fw_cfg_arch_wellknown_keys[i].key == key) { in fw_cfg_arch_key_name()
/qemu/include/crypto/
H A Daes.h21 AES_KEY *key);
23 AES_KEY *key);
26 const AES_KEY *key);
28 const AES_KEY *key);
/qemu/util/
H A Diova-tree.c89 static gboolean iova_tree_find_address_iterator(gpointer key, gpointer value, in iova_tree_find_address_iterator() argument
92 const DMAMap *map = key; in iova_tree_find_address_iterator()
96 g_assert(key == value); in iova_tree_find_address_iterator()
151 static gboolean iova_tree_traverse(gpointer key, gpointer value, in iova_tree_traverse() argument
155 DMAMap *map = key; in iova_tree_traverse()
157 g_assert(key == value); in iova_tree_traverse()
223 static gboolean iova_tree_alloc_traverse(gpointer key, gpointer value, in iova_tree_alloc_traverse() argument
229 assert(key == value); in iova_tree_alloc_traverse()
/qemu/tests/qemu-iotests/
H A D294.out5 == test that key 0 opens the image ==
17 == test that key 0 doesn't open the image ==
24 == test that key 0 still doesn't open the image (key material is erased) ==
27 == test that key 1 still works ==
H A D149.out5 … -v luksFormat --type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha1 --key-slot 0 --key
123 …luksFormat --type luks1 --cipher twofish-xts-plain64 --key-size 512 --hash sha1 --key-slot 0 --key
241 …luksFormat --type luks1 --cipher serpent-xts-plain64 --key-size 512 --hash sha1 --key-slot 0 --key
359 …v luksFormat --type luks1 --cipher cast5-cbc-plain64 --key-size 128 --hash sha1 --key-slot 0 --key
478 …-q -v luksFormat --type luks1 --cipher aes-cbc-plain --key-size 256 --hash sha1 --key-slot 0 --key
596 … -v luksFormat --type luks1 --cipher aes-cbc-plain64 --key-size 256 --hash sha1 --key-slot 0 --key
1543 …-v luksFormat --type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha224 --key-slot 0 --ke…
1661 …-v luksFormat --type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha256 --key-slot 0 --ke…
1779 …-v luksFormat --type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha384 --key-slot 0 --ke…
1897 …-v luksFormat --type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha512 --key-slot 0 --ke…
[all …]
/qemu/hw/m68k/
H A Dnext-kbd.c103 int key = 0; in kbd_read_long() local
114 key = q->data[q->rptr]; in kbd_read_long()
122 key |= s->shift; in kbd_read_long()
125 if (key & 0x80) { in kbd_read_long()
128 return 0x10000000 | KD_VALID | key; in kbd_read_long()
198 int key = code & KD_KEYMASK; in queue_code() local
229 q->data[q->wptr] = next_keycodes[key] | release; in queue_code()
/qemu/docs/system/
H A Dsecrets.rst9 unlock key material, remote desktop services require an access password.
87 possible to configure a second secret as an AES key to use for decrypting
90 The secret used as the AES key must always be configured using the file based
100 The contents of this file will by used as an AES-256 key to encrypt the
136 and also encryption with a master key:
146 It is recommended for production deployments to use a master key secret, and
147 then pass all subsequent inline secrets encrypted with the master key.
152 the key file must have access control rules applied that restrict access to
154 keyring can be used to pass the master key to QEMU.
157 with this master key.
[all …]
/qemu/hw/usb/
H A Du2f.h48 void (*recv_from_guest)(U2FKeyState *key,
50 void (*realize)(U2FKeyState *key, Error **errp);
51 void (*unrealize)(U2FKeyState *key);
73 void u2f_send_to_guest(U2FKeyState *key,
/qemu/python/qemu/qmp/
H A Dmessage.py83 def __getitem__(self, key: str) -> object:
84 return self._object[key]
86 def __setitem__(self, key: str, value: object) -> None:
87 self._object[key] = value
90 def __delitem__(self, key: str) -> None:
91 del self._object[key]
/qemu/qapi/
H A Dcrypto.json142 # key
190 'data': { '*key-secret': 'str' }}
204 'data': { '*key-secret': 'str' }}
289 # @active: whether the key slot is currently in use
291 # @key-offset: offset to the key material in bytes
303 'key-offset': 'int' } }
318 # @hash-alg: the master key hash algorithm
324 # @master-key-iters: number of PBKDF2 iterations for key material
328 # @slots: information about each key slot
340 'master-key-iters': 'int',
[all …]
/qemu/hw/input/
H A Dps2.c128 switch (key) { in ps2_modifier_bit()
316 InputKeyEvent *key = evt->u.key.data; in ps2_keyboard_event() local
328 qcode = qemu_input_key_value_to_qcode(key->key); in ps2_keyboard_event()
333 if (key->down) { in ps2_keyboard_event()
342 if (key->down) { in ps2_keyboard_event()
349 if (key->down) { in ps2_keyboard_event()
360 if (key->down) { in ps2_keyboard_event()
370 if (key->down) { in ps2_keyboard_event()
385 if (key->down) { in ps2_keyboard_event()
393 if (key->down) { in ps2_keyboard_event()
[all …]
/qemu/tests/unit/
H A Dtest-crypto-ivgen.c32 const uint8_t *key; member
98 .key = (const uint8_t *)"\x00\x01\x02\x03\x04\x05\x06\x07"
112 .key = (const uint8_t *)"\x00\x01\x02\x03\x04\x05\x06\x07"
126 .key = (const uint8_t *)"\x00\x01\x02\x03\x04\x05\x06\x07"
151 data->key, in test_ivgen()
/qemu/hw/xen/
H A Dxen-bus.c122 char **key; in xen_bus_backend_create() local
136 if (!key) { in xen_bus_backend_create()
152 if (!strcmp(key[i], "state") || in xen_bus_backend_create()
153 !strcmp(key[i], "online") || in xen_bus_backend_create()
154 !strcmp(key[i], "frontend") || in xen_bus_backend_create()
155 !strcmp(key[i], "frontend-id") || in xen_bus_backend_create()
156 !strcmp(key[i], "hotplug-status")) in xen_bus_backend_create()
161 qdict_put_str(opts, key[i], val); in xen_bus_backend_create()
166 free(key); in xen_bus_backend_create()
366 g_free(key); in xen_bus_realize()
[all …]
/qemu/tests/qapi-schema/
H A Dduplicate-key.err1 duplicate-key.json:3:10: duplicate key 'key'
H A Dduplicate-key.json1 # Cannot include the same key more than once in any {}
2 { 'key': 'value',
3 'key': 'value' }

12345678910>>...16