Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 153) sorted by relevance

1234567

/qemu/tests/qemu-iotests/
H A D082.out58 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
61 encrypt.hash-alg=<str> - Name of encryption hash algorithm
63 encrypt.ivgen-alg=<str> - Name of IV generator algorithm
64 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm
84 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
87 encrypt.hash-alg=<str> - Name of encryption hash algorithm
89 encrypt.ivgen-alg=<str> - Name of IV generator algorithm
90 encrypt.ivgen-hash-alg=<str> - Name of IV generator hash algorithm
110 encrypt.cipher-alg=<str> - Name of encryption cipher algorithm
113 encrypt.hash-alg=<str> - Name of encryption hash algorithm
[all …]
/qemu/include/crypto/
H A Divgen.h105 * @alg: the initialization vector generation algorithm
106 * @cipheralg: the cipher algorithm or 0
107 * @hash: the hash algorithm or 0
112 * the algorithm @alg. Whether the remaining parameters
166 * Get the algorithm used by this IV generator
168 * Returns: the IV generator algorithm
177 * Get the cipher algorithm used by this IV generator (if
180 * Returns: the cipher algorithm
189 * Get the hash algorithm used by this IV generator (if
192 * Returns: the hash algorithm
H A Dhash.h47 * @alg: the hash algorithm
49 * Determine if @alg hash algorithm is supported by the
52 * Returns: true if the algorithm is supported, false otherwise
59 * @alg: the hash algorithm
69 * @alg: the hash algorithm
101 * @alg: the hash algorithm
133 * @alg: the hash algorithm
254 * @alg: the hash algorithm
257 * Creates a new hashing context for the chosen algorithm for
260 * Returns: New hash object with the given algorithm, or NULL on error.
[all …]
H A Dpbkdf.h27 * This module provides an interface to the PBKDF2 algorithm
88 * @hash: the hash algorithm
90 * Determine if the current build supports the PBKDF2 algorithm
100 * @hash: the hash algorithm to use
110 * Apply the PBKDF2 algorithm to derive an encryption
112 * @salt parameter is used to perturb the algorithm.
116 * should be large enough such that the algorithm takes
131 * @hash: the hash algorithm to use
139 * Time the PBKDF2 algorithm to determine how many
H A Dcipher.h37 * algorithm used. It further isolates the calling code from the
88 * @alg: the cipher algorithm
91 * Determine if @alg cipher algorithm in @mode is supported by the
94 * Returns: true if the algorithm is supported, false otherwise
101 * @alg: the cipher algorithm
114 * @alg: the cipher algorithm
125 * @alg: the cipher algorithm
139 * @alg: the cipher algorithm
146 * data with the algorithm @alg in the usage mode @mode.
150 * specifies the length of @key in bytes. Each algorithm has
H A Dhmac.h26 * @alg: the hmac algorithm
28 * Determine if @alg hmac algorithm is supported by
32 * true if the algorithm is supported, false otherwise
38 * @alg: the hmac algorithm
43 * Creates a new hmac object with the algorithm @alg
H A Dblock.h105 * or IV generator algorithm that is not supported,
148 * or IV generator algorithm that is not supported,
285 * Get the hash algorithm used with the key derivation
288 * Returns: the hash algorithm
H A Dafsplit.h92 * @hash: the hash algorithm to use for data expansion
114 * @hash: the hash algorithm to use for data compression
H A Dakcipher.h31 * @opts: the asymmetric key algorithm and related options
42 * @opts: specify the algorithm and the related arguments
/qemu/block/
H A Dcrypto.h59 .help = "Name of encryption cipher algorithm", \
73 .help = "Name of IV generator algorithm", \
80 .help = "Name of IV generator hash algorithm", \
87 .help = "Name of encryption hash algorithm", \
/qemu/include/system/
H A Dcryptodev.h56 * @cipher_alg: algorithm type of CIPHER
58 * @hash_alg: algorithm type of HASH/MAC
65 * @alg_chain_order: order of algorithm chaining (CIPHER then HASH,
125 * algorithm chain
128 * algorithm chain
130 * operation will be computed, only used for algorithm chain
132 * operation will be computed, only used for algorithm chain
/qemu/crypto/
H A Divgen.c38 ivgen->algorithm = alg; in qcrypto_ivgen_new()
53 error_setg(errp, "Unknown block IV generator algorithm %d", alg); in qcrypto_ivgen_new()
78 return ivgen->algorithm; in qcrypto_ivgen_get_algorithm()
H A Dakcipher-nettle.c.inc68 error_setg(errp, "Unsupported algorithm: %u", opts->alg);
242 error_setg(errp, "Unknown padding algorithm: %d", rsa->padding_alg);
257 * The RSA algorithm cannot be used for signature/verification
296 error_setg(errp, "Unknown hash algorithm: %d", rsa->hash_alg);
324 * The RSA algorithm cannot be used for signature/verification
361 error_setg(errp, "Unsupported hash algorithm: %d", rsa->hash_alg);
H A Dhash-afalg.c55 error_setg(errp, "Unsupported hash algorithm %d", alg); in qcrypto_afalg_hash_format_name()
120 /* Check if hash algorithm is supported */ in qcrypto_afalg_hash_new()
125 error_setg(errp, "Unknown hash algorithm %d", alg); in qcrypto_afalg_hash_new()
H A Dcipher-stub.c.inc27 "Unsupported cipher algorithm %s, no crypto library enabled in build",
/qemu/qapi/
H A Dcrypto.json206 # @cipher-alg: the cipher algorithm for data encryption. Currently
218 # @hash-alg: the master key hash algorithm. Currently defaults to
302 # @cipher-alg: the cipher algorithm for data encryption
310 # @hash-alg: the master key hash algorithm
552 # @rsa: RSA algorithm
576 # The padding algorithm for RSA.
590 # Specific parameters for RSA algorithm.
608 # @alg: encryption cipher algorithm
/qemu/docs/devel/migration/
H A Ddirty-limit.rst5 introduced in the 8.1 QEMU release that uses a new algorithm based on the KVM
8 The algorithm framework is as follows:
69 algorithm will restrict virtual CPUs as needed to keep their dirty page
/qemu/tests/unit/
H A Dtest-crypto-block.c427 return "Algorithm '' with key size 32 bytes not supported"; in luks_bad_cipher_name_empty()
434 return "Algorithm 'aess' with key size 32 bytes not supported"; in luks_bad_cipher_name_unknown()
449 return "Algorithm 'aes' with key size 33 bytes not supported"; in luks_bad_cipher_cbc_size()
491 return "Hash algorithm '' not supported"; in luks_bad_ivgen_hash_empty()
498 return "Hash algorithm 'sha257' not supported"; in luks_bad_ivgen_hash_unknown()
505 return "Hash algorithm '' not supported"; in luks_bad_hash_spec_empty()
512 return "Hash algorithm 'sha2566' not supported"; in luks_bad_hash_spec_unknown()
/qemu/docs/system/
H A Dqemu-block-drivers.rst.inc101 Name of the cipher algorithm and key length. Currently defaults
111 Name of the initialization vector generator algorithm. Currently defaults
116 Name of the hash algorithm to use with the initialization vector generator
121 Name of the hash algorithm to use for PBKDF algorithm
126 Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
260 Name of the cipher algorithm and key length. Currently defaults
269 Name of the initialization vector generator algorithm. Currently defaults
274 Name of the hash algorithm to use with the initialization vector generator
279 Name of the hash algorithm to use for PBKDF algorithm
284 Amount of time, in milliseconds, to use for PBKDF algorithm per key slot.
/qemu/include/qemu/
H A Dxxhash.h2 * xxHash - Fast Hash algorithm
134 * Component parts of the XXH64 algorithm from
137 * The complete algorithm looks like
H A Dcrc-ccitt.h2 * CRC16 (CCITT) Checksum Algorithm
H A Dcrc32c.h2 * Castagnoli CRC32C Checksum Algorithm
/qemu/docs/system/arm/
H A Demulation.rst103 - FEAT_PACIMP (Pointer authentication - IMPLEMENTATION DEFINED algorithm)
104 - FEAT_PACQARMA3 (Pointer authentication - QARMA3 algorithm)
105 - FEAT_PACQARMA5 (Pointer authentication - QARMA5 algorithm)
H A Dcpu-features.rst217 When ``pauth`` is enabled, select the QEMU implementation defined algorithm.
220 When ``pauth`` is enabled, select the architected QARMA3 algorithm.
223 When ``pauth`` is enabled, select the architected QARMA5 algorithm.
226 the QEMU impdef algorithm is used. The architected QARMA5
228 be quite slow to emulate. The impdef algorithm used by QEMU is
/qemu/docs/
H A Dthrottle.txt218 The Leaky Bucket algorithm
220 I/O limits in QEMU are implemented using the leaky bucket algorithm
223 This algorithm uses the analogy of a bucket that leaks water
254 Also, due to the way the algorithm works, longer burst can be done at

1234567