/linux-6.3-rc2/drivers/input/keyboard/ |
A D | ipaq-micro-keys.c | 50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 59 keys->micro->key_data = keys; in micro_key_start() 75 micro_key_start(keys); in micro_key_open() 84 micro_key_stop(keys); in micro_key_close() 93 keys = devm_kzalloc(&pdev->dev, sizeof(*keys), GFP_KERNEL); in micro_key_probe() 94 if (!keys) in micro_key_probe() 100 if (!keys->input) in micro_key_probe() 106 keys->input->keycodesize * keys->input->keycodemax, in micro_key_probe() 108 keys->input->keycode = keys->codes; in micro_key_probe() 117 input_set_drvdata(keys->input, keys); in micro_key_probe() [all …]
|
A D | mtk-pmic-keys.c | 213 info->keys = keys; in mtk_pmic_key_setup() 254 if (keys->keys[index].wakeup) { in mtk_pmic_keys_suspend() 256 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_suspend() 270 if (keys->keys[index].wakeup) { in mtk_pmic_keys_resume() 272 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_resume() 349 keys->keys[index].irq = in mtk_pmic_keys_probe() 351 if (keys->keys[index].irq < 0) { in mtk_pmic_keys_probe() 353 return keys->keys[index].irq; in mtk_pmic_keys_probe() 362 return keys->keys[index].irq_r; in mtk_pmic_keys_probe() 377 keys->keys[index].wakeup = true; in mtk_pmic_keys_probe() [all …]
|
A D | Makefile | 8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 30 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 31 obj-$(CONFIG_KEYBOARD_IQS62X) += iqs62x-keys.o 40 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 47 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o 67 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
/linux-6.3-rc2/tools/testing/selftests/bpf/progs/ |
A D | bpf_flow.c | 78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 182 keys->is_encap = true; in parse_ip_proto() 188 keys->is_encap = true; in parse_ip_proto() 210 keys->is_encap = true; in parse_ip_proto() 237 keys->sport = tcp->source; in parse_ip_proto() 238 keys->dport = tcp->dest; in parse_ip_proto() 246 keys->sport = udp->source; in parse_ip_proto() 247 keys->dport = udp->dest; in parse_ip_proto() 301 keys->is_frag = true; in PROG() 312 if (!(keys->flags & in PROG() [all …]
|
/linux-6.3-rc2/arch/arm64/include/asm/ |
A D | pointer_auth.h | 53 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 61 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel() 70 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user() 71 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user() 72 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user() 82 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_user() 83 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init_user() 84 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init_user() 85 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_keys_init_user() 89 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_keys_init_user() [all …]
|
/linux-6.3-rc2/tools/testing/selftests/net/ |
A D | tcp_fastopen_backup_key.c | 62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 80 keys[6], keys[7]); in set_keys() 83 keys[0], keys[1], keys[2], keys[3]); in set_keys() 96 uint32_t keys[8]; in build_rcv_fd() local 122 keys[i] = rand(); in build_rcv_fd() 215 uint32_t keys[8]; in rotate_key() local 225 get_keys(fd, keys); in rotate_key() 227 set_keys(fd, keys); in rotate_key() [all …]
|
/linux-6.3-rc2/tools/testing/selftests/bpf/map_tests/ |
A D | htab_map_batch_ops.c | 29 keys[i] = i + 1; in map_batch_update() 62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local 98 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch() 124 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 143 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 154 &batch, keys + total, in __test_map_lookup_and_delete_batch() 189 keys + total, in __test_map_lookup_and_delete_batch() 209 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 217 &batch, keys + total, in __test_map_lookup_and_delete_batch() [all …]
|
A D | array_map_batch_ops.c | 15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 26 keys[i] = i; in map_batch_update() 52 CHECK(keys[i] + j + 1 != value, in map_batch_verify() 55 j, keys[i], value); in map_batch_verify() 58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify() 72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local 92 keys = calloc(max_entries, sizeof(*keys)); in __test_map_lookup_and_update_batch() 103 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_update_batch() 114 &batch, keys + total, in __test_map_lookup_and_update_batch() [all …]
|
A D | lpm_trie_map_batch_ops.c | 23 struct test_lpm_key *keys, int *values) in map_batch_update() argument 34 keys[i].prefix = 32; in map_batch_update() 36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update() 45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument 53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify() 69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local 94 map_batch_update(map_fd, max_entries, keys, values); in test_lpm_trie_map_batch_ops() 95 map_batch_verify(visited, max_entries, keys, values); in test_lpm_trie_map_batch_ops() 96 memset(keys, 0, max_entries * sizeof(*keys)); in test_lpm_trie_map_batch_ops() 107 keys + total, values + total, &count, &opts); in test_lpm_trie_map_batch_ops() [all …]
|
/linux-6.3-rc2/arch/arm64/kernel/ |
A D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys() 46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys() 67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument 78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys() [all …]
|
/linux-6.3-rc2/drivers/md/bcache/ |
A D | btree.c | 1296 for (t = b->keys.set; t <= &b->keys.set[b->keys.nsets]; t++) in btree_gc_mark_node() 1308 if ((keys - good_keys) * 2 > keys) in btree_gc_mark_node() 1344 keys += r[nodes++].keys; in btree_gc_coalesce() 1404 keys = n2->keys; in btree_gc_coalesce() 1419 n1->keys += keys; in btree_gc_coalesce() 1420 r[i].keys = n1->keys; in btree_gc_coalesce() 1427 n2->keys -= keys; in btree_gc_coalesce() 2248 btree_bset_first(n2)->keys = btree_bset_first(n1)->keys - keys; in btree_split() 2249 btree_bset_first(n1)->keys = keys; in btree_split() 2446 op.keys = keys; in bch_btree_insert() [all …]
|
A D | debug.c | 45 inmemory = b->keys.set->data; in bch_btree_verify() 50 v->keys.ops = b->keys.ops; in bch_btree_verify() 65 sorted = v->keys.set->data; in bch_btree_verify() 67 if (inmemory->keys != sorted->keys || in bch_btree_verify() 78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 164 struct keybuf keys; member 201 bch_keybuf_del(&i->keys, w); in bch_dump_read() [all …]
|
/linux-6.3-rc2/drivers/net/ethernet/cisco/enic/ |
A D | enic_clsf.c | 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 174 struct flow_keys keys; in enic_rx_flow_steer() local 181 res = skb_flow_dissect_flow_keys(skb, &keys, 0); in enic_rx_flow_steer() 183 (keys.basic.ip_proto != IPPROTO_TCP && in enic_rx_flow_steer() 184 keys.basic.ip_proto != IPPROTO_UDP)) in enic_rx_flow_steer() 214 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer() 267 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer() [all …]
|
/linux-6.3-rc2/drivers/mfd/ |
A D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 55 keys.buttons = buttons; in ucb1x00_assabet_add() 56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 57 keys.poll_interval = 50; in ucb1x00_assabet_add() 58 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
/linux-6.3-rc2/security/keys/ |
A D | Kconfig | 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 60 bool "Large payload keys" 76 keys in the kernel. Trusted keys are random number symmetric keys, 83 source "security/keys/trusted-keys/Kconfig" 97 in the kernel. Encrypted keys are instantiated using kernel 106 bool "Allow encrypted keys with user decrypted data" 116 bool "Diffie-Hellman operations on retained keys" 123 public keys and shared secrets using values stored as keys [all …]
|
/linux-6.3-rc2/drivers/md/persistent-data/ |
A D | dm-btree.c | 104 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 402 if (rkey != keys[level]) { in dm_btree_lookup() 513 memcpy(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in copy_entries() 527 memmove(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in move_entries() 779 pn->keys[middle_index] = rn->keys[0]; in split_two_into_three() 865 memcpy(ln->keys, pn->keys, nr_left * sizeof(pn->keys[0])); in btree_split_beneath() 882 memcpy(rn->keys, pn->keys + nr_left, nr_right * sizeof(pn->keys[0])); in btree_split_beneath() 897 pn->keys[0] = ln->keys[0]; in btree_split_beneath() 902 pn->keys[1] = rn->keys[0]; in btree_split_beneath() 1231 (le64_to_cpu(node->keys[index]) != keys[level])); in need_insert() [all …]
|
A D | dm-btree.h | 111 uint64_t *keys, void *value_le); 118 uint64_t *keys, uint64_t *rkey, void *value_le); 124 uint64_t *keys, void *value, dm_block_t *new_root) 133 uint64_t *keys, void *value, dm_block_t *new_root, 143 uint64_t *keys, dm_block_t *new_root); 152 uint64_t *keys, uint64_t end_key, 177 int (*fn)(void *context, uint64_t *keys, void *leaf),
|
/linux-6.3-rc2/net/core/ |
A D | flow_dissector.c | 1650 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1654 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1668 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1697 struct flow_keys *keys, in ___skb_get_hash() argument 1737 struct flow_keys keys; in __skb_get_hash_symmetric() local 1741 memset(&keys, 0, sizeof(keys)); in __skb_get_hash_symmetric() 1743 &keys, NULL, 0, 0, 0, in __skb_get_hash_symmetric() 1761 struct flow_keys keys; in __skb_get_hash() local 1775 struct flow_keys keys; in skb_get_hash_perturb() local 1843 struct flow_keys_basic keys; in skb_get_poff() local [all …]
|
/linux-6.3-rc2/fs/xfs/ |
A D | xfs_fsmap.c | 174 const struct xfs_fsmap *keys, 407 const struct xfs_fsmap *keys, in xfs_getfsmap_logdev() argument 436 if (keys[0].fmr_physical > 0) in xfs_getfsmap_logdev() 476 const struct xfs_fsmap *keys, in __xfs_getfsmap_rtdev() argument 488 if (keys[0].fmr_physical >= eofs) in __xfs_getfsmap_rtdev() 562 const struct xfs_fsmap *keys, in xfs_getfsmap_rtdev_rtbitmap() argument 575 const struct xfs_fsmap *keys, in __xfs_getfsmap_datadev() argument 594 if (keys[0].fmr_physical >= eofs) in __xfs_getfsmap_datadev() 631 keys[1].fmr_offset); in __xfs_getfsmap_datadev() 724 const struct xfs_fsmap *keys, in xfs_getfsmap_datadev_rmapbt() argument [all …]
|
/linux-6.3-rc2/security/integrity/ |
A D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 74 be added. This keyring shall contain just MOK keys. Unlike keys 75 in the platform keyring, keys contained in the .machine keyring will 89 bool "Enable loading of platform and blacklisted keys for POWER" [all …]
|
/linux-6.3-rc2/drivers/crypto/nx/ |
A D | nx-aes-xcbc.c | 64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 79 len = sizeof(keys); in nx_xcbc_empty() 81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 84 if (len != sizeof(keys)) in nx_xcbc_empty() 90 if (len != sizeof(keys)) in nx_xcbc_empty() 102 keys[1][0] ^= 0x80; in nx_xcbc_empty() 104 len = sizeof(keys[1]); in nx_xcbc_empty() 107 memcpy(csbcpb->cpb.aes_ecb.key, keys[0], AES_BLOCK_SIZE); in nx_xcbc_empty() [all …]
|
/linux-6.3-rc2/lib/ |
A D | test_static_keys.c | 55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 61 if (previous != keys[i].key) { in invert_keys() 62 invert_key(keys[i].key); in invert_keys() 63 previous = keys[i].key; in invert_keys() 68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 74 ret = static_key_enabled(keys[i].key); in verify_keys() 75 init = keys[i].init_state; in verify_keys() 78 ret = keys[i].test_key(); in verify_keys() 79 if (static_key_enabled(keys[i].key)) { in verify_keys()
|
/linux-6.3-rc2/Documentation/devicetree/bindings/input/ |
A D | mediatek,pmic-keys.yaml | 4 $id: http://devicetree.org/schemas/input/mediatek,pmic-keys.yaml# 27 - mediatek,mt6323-keys 28 - mediatek,mt6331-keys 29 - mediatek,mt6357-keys 30 - mediatek,mt6358-keys 31 - mediatek,mt6397-keys 101 keys { 102 compatible = "mediatek,mt6397-keys";
|
/linux-6.3-rc2/fs/xfs/libxfs/ |
A D | xfs_iext_tree.c | 281 if (node->keys[n] > offset) in xfs_iext_key_cmp() 414 node->keys[0] = prev->keys[0]; in xfs_iext_grow() 472 new->keys[i] = node->keys[nr_keep + i]; in xfs_iext_split_node() 525 node->keys[i] = node->keys[i - 1]; in xfs_iext_insert_node() 528 node->keys[pos] = offset; in xfs_iext_insert_node() 532 offset = new->keys[0]; in xfs_iext_insert_node() 692 prev->keys[nr_prev + i] = node->keys[i]; in xfs_iext_rebalance_node() 710 node->keys[nr_entries + i] = next->keys[i]; in xfs_iext_rebalance_node() 740 offset = node->keys[0]; in xfs_iext_remove_node() 742 node->keys[i] = node->keys[i + 1]; in xfs_iext_remove_node() [all …]
|
/linux-6.3-rc2/security/keys/trusted-keys/ |
A D | Kconfig | 2 bool "TPM-based trusted keys" 14 backend. Trusted keys are random number symmetric keys, 16 The TPM only unseals the keys, if the boot PCRs and other 20 bool "TEE-based trusted keys" 28 bool "CAAM-based trusted keys"
|