| /qemu/tests/bench/ |
| A D | qtree-bench.c | 81 size_t *keys = g_malloc_n(n_elems, sizeof(*keys)); in init_empty_tree_and_keys() local 83 keys[i] = i; in init_empty_tree_and_keys() 99 *ret_keys = keys; in init_empty_tree_and_keys() 126 size_t *keys; in run_benchmark() local 133 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 136 q_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 166 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 169 q_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 180 g_tree_remove(tree, &keys[i]); in run_benchmark() 183 q_tree_remove(tree, &keys[i]); in run_benchmark() [all …]
|
| A D | qht-bench.c | 54 static long *keys; variable 169 p = &keys[r & (lookup_range - 1)]; in do_rw() 178 p = &keys[r & (update_range - 1)]; in do_rw() 323 keys = g_malloc(sizeof(*keys) * n); in htable_init() 327 keys[i] = precompute_hash ? h(val) : hval(val); in htable_init() 358 p = &keys[r & (init_range - 1)]; in htable_init()
|
| /qemu/ui/ |
| A D | kbd-state.c | 15 DECLARE_BITMAP(keys, Q_KEY_CODE__MAX); 23 if (test_bit(qcode1, kbd->keys) || test_bit(qcode2, kbd->keys)) { in qkbd_state_modifier_update() 37 return test_bit(qcode, kbd->keys); in qkbd_state_key_get() 42 bool state = test_bit(qcode, kbd->keys); in qkbd_state_key_event() 62 set_bit(qcode, kbd->keys); in qkbd_state_key_event() 64 clear_bit(qcode, kbd->keys); in qkbd_state_key_event() 114 if (test_bit(qcode, kbd->keys)) { in qkbd_state_lift_all_keys()
|
| A D | ui-hmp-cmds.c | 354 const char *keys = qdict_get_str(qdict, "keys"); in hmp_sendkey() local 364 separator = qemu_strchrnul(keys, '-'); in hmp_sendkey() 365 keyname_len = separator - keys; in hmp_sendkey() 368 if (keys[0] == '<' && keyname_len == 1) { in hmp_sendkey() 369 keys = "less"; in hmp_sendkey() 375 if (strstart(keys, "0x", NULL)) { in hmp_sendkey() 379 if (qemu_strtoi(keys, &endp, 0, &value) < 0) { in hmp_sendkey() 382 assert(endp <= keys + keyname_len); in hmp_sendkey() 383 if (endp != keys + keyname_len) { in hmp_sendkey() 389 int idx = index_from_key(keys, keyname_len); in hmp_sendkey() [all …]
|
| /qemu/hw/s390x/ |
| A D | s390-skeys.c | 59 uint64_t count, uint8_t *keys) in s390_skeys_get() argument 64 rc = kc->get_skeys(ks, start_gfn, count, keys); in s390_skeys_get() 72 uint64_t count, uint8_t *keys) in s390_skeys_set() argument 77 rc = kc->set_skeys(ks, start_gfn, count, keys); in s390_skeys_set() 91 uint8_t acc = (*keys & 0xF0) >> 4; in write_keys() 92 int fp = (*keys & 0x08); in write_keys() 93 int ref = (*keys & 0x04); in write_keys() 94 int ch = (*keys & 0x02); in write_keys() 95 int res = (*keys & 0x01); in write_keys() 100 keys++; in write_keys() [all …]
|
| A D | s390-skeys-kvm.c | 32 uint64_t count, uint8_t *keys) in kvm_s390_skeys_get() argument 37 .skeydata_addr = (__u64)keys in kvm_s390_skeys_get() 44 uint64_t count, uint8_t *keys) in kvm_s390_skeys_set() argument 49 .skeydata_addr = (__u64)keys in kvm_s390_skeys_set()
|
| /qemu/scripts/ |
| A D | cpu-x86-uarch-abi.py | 127 for name in models.keys(): 146 for name in models.keys(): 163 for name in models.keys(): 173 for name in models.keys(): 177 delta = set(models[name]["features"].keys()) - set(commonfeatures) 183 for name in models.keys():
|
| A D | mtest2make.py | 69 all_targets = ' '.join((f'{prefix}-{k}' for k in suites.keys())) 70 all_xml = ' '.join((f'{prefix}-report-{k}.junit.xml' for k in suites.keys()))
|
| A D | decodetree.py | 112 - set(data.keys())) 181 for n in sorted(fields.keys()): 1001 arg = Arguments(name, flds.keys(), ['int'] * len(flds), False) 1169 for f in flds.keys(): 1196 for f in flds.keys(): 1199 if f in fmt.fields.keys(): 1202 if f not in flds.keys() and f not in fmt.fields.keys(): 1466 lens = sorted(bins.keys()) 1591 for n in sorted(arguments.keys()): 1623 for n in sorted(formats.keys()): [all …]
|
| /qemu/include/hw/s390x/ |
| A D | storage-keys.h | 80 uint8_t *keys); 98 uint8_t *keys); 118 uint64_t count, uint8_t *keys); 123 uint64_t count, uint8_t *keys);
|
| /qemu/qga/ |
| A D | commands-posix-ssh.c | 85 write_authkeys(const char *path, const GStrv keys, in write_authkeys() argument 91 contents = g_strjoinv("\n", keys); in write_authkeys() 113 qmp_guest_ssh_add_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_add_authorized_keys() argument 126 if (!check_openssh_pub_keys(keys, &nkeys, errp)) { in qmp_guest_ssh_add_authorized_keys() 152 for (k = keys; k != NULL; k = k->next) { in qmp_guest_ssh_add_authorized_keys() 163 qmp_guest_ssh_remove_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_remove_authorized_keys() argument 173 if (!check_openssh_pub_keys(keys, NULL, errp)) { in qmp_guest_ssh_remove_authorized_keys() 196 for (k = keys; k != NULL; k = k->next) { in qmp_guest_ssh_remove_authorized_keys() 239 QAPI_LIST_PREPEND(ret->keys, g_strdup(authkeys[i])); in qmp_guest_ssh_get_authorized_keys() 418 for (len = 0, k = ret->keys; k != NULL; k = k->next) { in test_get_keys()
|
| A D | commands-windows-ssh.c | 557 GuestAuthorizedKeys *keys = NULL; in qmp_guest_ssh_get_authorized_keys() local 581 QAPI_LIST_PREPEND(ret->keys, g_strdup(authKeys[i])); in qmp_guest_ssh_get_authorized_keys() 588 keys = g_steal_pointer(&ret); in qmp_guest_ssh_get_authorized_keys() 589 return keys; in qmp_guest_ssh_get_authorized_keys() 603 void qmp_guest_ssh_add_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_add_authorized_keys() argument 612 if (!check_openssh_pub_keys(keys, &nkeys, errp)) { in qmp_guest_ssh_add_authorized_keys() 644 for (k = keys; k != NULL; k = k->next) { in qmp_guest_ssh_add_authorized_keys() 665 void qmp_guest_ssh_remove_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_remove_authorized_keys() argument 676 if (!check_openssh_pub_keys(keys, NULL, errp)) { in qmp_guest_ssh_remove_authorized_keys() 697 for (k = keys; k != NULL; k = k->next) { in qmp_guest_ssh_remove_authorized_keys()
|
| A D | commands-common-ssh.c | 23 bool check_openssh_pub_keys(strList *keys, size_t *nkeys, Error **errp) in check_openssh_pub_keys() argument 28 for (k = keys; k != NULL; k = k->next) { in check_openssh_pub_keys()
|
| /qemu/tests/qapi-schema/ |
| A D | bad-if-keys.err | 1 bad-if-keys.json: In struct 'TestIfStruct': 2 bad-if-keys.json:2: 'if' condition of struct has conflicting keys
|
| A D | unknown-expr-key.err | 2 unknown-expr-key.json:2: struct has unknown keys 'bogus', 'phony' 3 Valid keys are 'base', 'data', 'features', 'if', 'struct'.
|
| /qemu/linux-user/aarch64/ |
| A D | target_prctl.h | 125 ret |= qemu_guest_getrandom(&env->keys.apia, in do_prctl_reset_keys() 129 ret |= qemu_guest_getrandom(&env->keys.apib, in do_prctl_reset_keys() 133 ret |= qemu_guest_getrandom(&env->keys.apda, in do_prctl_reset_keys() 137 ret |= qemu_guest_getrandom(&env->keys.apdb, in do_prctl_reset_keys() 141 ret |= qemu_guest_getrandom(&env->keys.apga, in do_prctl_reset_keys()
|
| /qemu/qapi/ |
| A D | crypto.json | 70 # @aes-128: AES with 128 bit / 16 byte keys 72 # @aes-192: AES with 192 bit / 24 byte keys 74 # @aes-256: AES with 256 bit / 32 byte keys 81 # @cast5-128: Cast5 with 128 bit / 16 byte keys 83 # @serpent-128: Serpent with 128 bit / 16 byte keys 85 # @serpent-192: Serpent with 192 bit / 24 byte keys 87 # @serpent-256: Serpent with 256 bit / 32 byte keys 89 # @twofish-128: Twofish with 128 bit / 16 byte keys 91 # @twofish-192: Twofish with 192 bit / 24 byte keys 93 # @twofish-256: Twofish with 256 bit / 32 byte keys [all …]
|
| /qemu/tests/qtest/libqos/ |
| A D | qgraph.c | 708 GList *keys = g_hash_table_get_keys(node_table); in qos_graph_node_set_availability() local 710 for (l = keys; l != NULL; l = l->next) { in qos_graph_node_set_availability() 731 g_list_free(keys); in qos_graph_node_set_availability() 811 GList *keys; in qos_dump_graph() local 818 keys = g_hash_table_get_keys(edge_table); in qos_dump_graph() 819 for (l = keys; l != NULL; l = l->next) { in qos_dump_graph() 833 g_list_free(keys); in qos_dump_graph() 837 keys = g_hash_table_get_keys(node_table); in qos_dump_graph() 838 for (l = keys; l != NULL; l = l->next) { in qos_dump_graph() 850 g_list_free(keys); in qos_dump_graph()
|
| /qemu/hw/input/ |
| A D | hid.c | 313 for (i = hs->kbd.keys - 1; i >= 0; i--) { in hid_keyboard_process_keycode() 315 hs->kbd.key[i] = hs->kbd.key[-- hs->kbd.keys]; in hid_keyboard_process_keycode() 316 hs->kbd.key[hs->kbd.keys] = 0x00; in hid_keyboard_process_keycode() 324 for (i = hs->kbd.keys - 1; i >= 0; i--) { in hid_keyboard_process_keycode() 330 if (hs->kbd.keys < sizeof(hs->kbd.key)) { in hid_keyboard_process_keycode() 331 hs->kbd.key[hs->kbd.keys++] = hid_code; in hid_keyboard_process_keycode() 452 if (hs->kbd.keys > 6) { in hid_keyboard_poll() 491 hs->kbd.keys = 0; in hid_reset() 621 VMSTATE_INT32(kbd.keys, HIDState),
|
| /qemu/crypto/ |
| A D | cipher-nettle.c.inc | 295 const struct aes128_ctx *keys = ctx; 296 aes128_encrypt(&keys[0], length, dst, src); 302 const struct aes128_ctx *keys = ctx; 321 const struct aes192_ctx *keys = ctx; 328 const struct aes192_ctx *keys = ctx; 347 const struct aes256_ctx *keys = ctx; 354 const struct aes256_ctx *keys = ctx; 441 struct sm4_ctx *keys = ctx; 442 sm4_crypt(&keys[0], length, dst, src); 448 struct sm4_ctx *keys = ctx; [all …]
|
| /qemu/tests/qemu-iotests/ |
| A D | 207 | 121 keys = subprocess.check_output( variable 131 for key in keys: 148 for key in keys:
|
| /qemu/tests/tcg/multiarch/gdbstub/ |
| A D | registers.py | 64 report(total_regs == len(reg_map.keys()), 88 total_regs = len(reg_map.keys()) 133 for x_key in reg_map.keys():
|
| /qemu/target/arm/tcg/ |
| A D | pauth_helper.c | 497 return pauth_addpac(env, x, y, &env->keys.apia, false); in HELPER() 507 return pauth_addpac(env, x, y, &env->keys.apib, false); in HELPER() 517 return pauth_addpac(env, x, y, &env->keys.apda, true); in HELPER() 527 return pauth_addpac(env, x, y, &env->keys.apdb, true); in HELPER() 535 pac = pauth_computepac(env, x, y, env->keys.apga); in HELPER() 548 return pauth_auth(env, x, y, &env->keys.apia, false, 0, ra, is_combined); in pauth_autia() 569 return pauth_auth(env, x, y, &env->keys.apib, false, 1, ra, is_combined); in pauth_autib() 590 return pauth_auth(env, x, y, &env->keys.apda, true, 0, ra, is_combined); in pauth_autda() 611 return pauth_auth(env, x, y, &env->keys.apdb, true, 1, ra, is_combined); in pauth_autdb()
|
| /qemu/pc-bios/keymaps/ |
| A D | sv | 14 # Translate Super to Windows keys. 86 # Esc and Function keys 121 # Arrow keys 174 # Inhibited keys
|
| /qemu/docs/system/ |
| A D | tls.rst | 13 At a high level, QEMU requires certificates and private keys to be 19 used to easily generate certificates and keys in the required format 74 be used for signing other keys. The generated ``ca-cert.pem`` file 308 Use the GnuTLS ``psktool`` program to generate a ``keys.psk`` file 309 containing one or more usernames and random keys:: 311 mkdir -m 0700 /tmp/keys 312 psktool -u rich -p /tmp/keys/keys.psk 318 --object tls-creds-psk,id=tls0,endpoint=server,dir=/tmp/keys \ 323 containing ``keys.psk`` and an optional username (defaults to "qemu"):: 326 --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=rich,endpoint=client \
|