| /linux/drivers/input/keyboard/ |
| A D | ep93xx_keypad.c | 75 int key2; member 87 int keycode, key1, key2; in ep93xx_keypad_irq_handler() local 95 key2 = keypad->keycodes[keycode]; in ep93xx_keypad_irq_handler() 101 if (keypad->key2 && key1 != keypad->key2 && key2 != keypad->key2) in ep93xx_keypad_irq_handler() 102 input_report_key(input_dev, keypad->key2, 0); in ep93xx_keypad_irq_handler() 105 input_report_key(input_dev, key2, 1); in ep93xx_keypad_irq_handler() 108 keypad->key2 = key2; in ep93xx_keypad_irq_handler() 114 if (keypad->key2 && key1 != keypad->key2) in ep93xx_keypad_irq_handler() 120 keypad->key2 = 0; in ep93xx_keypad_irq_handler() 124 input_report_key(input_dev, keypad->key2, 0); in ep93xx_keypad_irq_handler() [all …]
|
| /linux/kernel/futex/ |
| A D | requeue.c | 89 q->key = *key2; in requeue_futex() 328 requeue_pi_wake_futex(top_waiter, key2, hb2); in futex_proxy_trylock_atomic() 439 if (requeue_pi && futex_match(&key1, &key2)) in futex_requeue() 443 hb2 = futex_hash(&key2); in futex_requeue() 485 &key2, &pi_state, in futex_requeue() 596 requeue_futex(this, hb1, hb2, &key2); in futex_requeue() 640 requeue_pi_wake_futex(this, &key2, hb2); in futex_requeue() 644 requeue_futex(this, hb1, hb2, &key2); in futex_requeue() 769 union futex_key key2 = FUTEX_KEY_INIT; in futex_wait_requeue_pi() local 798 q.requeue_pi_key = &key2; in futex_wait_requeue_pi() [all …]
|
| A D | futex.h | 140 static inline int futex_match(union futex_key *key1, union futex_key *key2) in futex_match() argument 142 return (key1 && key2 in futex_match() 143 && key1->both.word == key2->both.word in futex_match() 144 && key1->both.ptr == key2->both.ptr in futex_match() 145 && key1->both.offset == key2->both.offset); in futex_match()
|
| A D | waitwake.c | 241 union futex_key key1 = FUTEX_KEY_INIT, key2 = FUTEX_KEY_INIT; in futex_wake_op() local 251 ret = get_futex_key(uaddr2, flags & FLAGS_SHARED, &key2, FUTEX_WRITE); in futex_wake_op() 256 hb2 = futex_hash(&key2); in futex_wake_op() 301 if (futex_match (&this->key, &key2)) { in futex_wake_op()
|
| /linux/fs/befs/ |
| A D | btree.c | 120 const void *key2, int keylen2); 713 const void *key2, int keylen2) in befs_compare_strings() argument 716 int result = strncmp(key1, key2, len); in befs_compare_strings() 727 return *(int32_t *) key1 - *(int32_t *) key2; 732 const void *key2, int keylen2) 734 if (*(u_int32_t *) key1 == *(u_int32_t *) key2) 744 if (*(int64_t *) key1 == *(int64_t *) key2) 746 else if (*(int64_t *) key1 > *(int64_t *) key2) 754 const void *key2, int keylen2) 756 if (*(u_int64_t *) key1 == *(u_int64_t *) key2) [all …]
|
| /linux/arch/arm/crypto/ |
| A D | aes-ce-core.S | 28 enc_round q0, \key2 33 dec_round q0, \key2 38 aese.8 q0, \key2 44 aesd.8 q0, \key2 75 aese.8 q0, \key2 76 aese.8 q1, \key2 77 aese.8 q2, \key2 78 aese.8 q3, \key2 90 aesd.8 q0, \key2 91 aesd.8 q1, \key2 [all …]
|
| A D | aes-ce-glue.c | 147 struct crypto_aes_ctx __aligned(8) key2; 162 ret = ce_aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 488 ctx->key2.key_enc, first); in xts_encrypt() 510 ctx->key2.key_enc, first); in xts_encrypt() 560 ctx->key2.key_enc, first); in xts_decrypt() 582 ctx->key2.key_enc, first); in xts_decrypt()
|
| /linux/fs/ubifs/ |
| A D | key.h | 480 const union ubifs_key *key2) in keys_cmp() argument 482 if (key1->u32[0] < key2->u32[0]) in keys_cmp() 484 if (key1->u32[0] > key2->u32[0]) in keys_cmp() 486 if (key1->u32[1] < key2->u32[1]) in keys_cmp() 488 if (key1->u32[1] > key2->u32[1]) in keys_cmp() 505 const union ubifs_key *key2) in keys_eq() argument 507 if (key1->u32[0] != key2->u32[0]) in keys_eq() 509 if (key1->u32[1] != key2->u32[1]) in keys_eq()
|
| A D | tnc_misc.c | 369 const union ubifs_key *key1, *key2; in read_znode() local 372 key2 = &znode->zbranch[i + 1].key; in read_znode() 374 cmp = keys_cmp(c, key1, key2); in read_znode()
|
| /linux/net/mptcp/ |
| A D | crypto_test.c | 37 u64 key1, key2; in mptcp_crypto_test_basic() local 44 key2 = be64_to_cpu(*((__be64 *)&tests[i].key[8])); in mptcp_crypto_test_basic() 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
|
| A D | crypto.c | 44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument 55 put_unaligned_be64(key2, key2be); in mptcp_crypto_hmac_sha()
|
| /linux/security/selinux/ss/ |
| A D | symtab.c | 26 static int symcmp(const void *key1, const void *key2) in symcmp() argument 31 keyp2 = key2; in symcmp()
|
| /linux/drivers/crypto/vmx/ |
| A D | aesp8-ppc.h | 28 const struct aes_key *key1, const struct aes_key *key2, u8 *iv); 30 const struct aes_key *key1, const struct aes_key *key2, u8 *iv);
|
| A D | aesp8-ppc.pl | 1970 my $taillen = $key2; 2008 lwz $rounds,240($key2) 2013 lvx $rndkey0,0,$key2 2014 lvx $rndkey1,$idx,$key2 2018 lvx $rndkey0,$idx,$key2 2025 lvx $rndkey1,$idx,$key2 2029 lvx $rndkey0,$idx,$key2 2035 lvx $rndkey1,$idx,$key2 2222 lwz $rounds,240($key2) 2227 lvx $rndkey0,0,$key2 [all …]
|
| /linux/arch/arm64/crypto/ |
| A D | aes-glue.c | 114 struct crypto_aes_ctx __aligned(8) key2; 119 struct crypto_aes_ctx __aligned(8) key2; 153 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 172 return aes_expandkey(&ctx->key2, digest, sizeof(digest)); in essiv_cbc_set_key() 418 req->iv, ctx->key2.key_enc); in essiv_cbc_encrypt() 440 req->iv, ctx->key2.key_enc); in essiv_cbc_decrypt() 532 ctx->key2.key_enc, walk.iv, first); in xts_encrypt() 554 ctx->key2.key_enc, walk.iv, first); in xts_encrypt() 604 ctx->key2.key_enc, walk.iv, first); in xts_decrypt() 627 ctx->key2.key_enc, walk.iv, first); in xts_decrypt()
|
| /linux/kernel/bpf/ |
| A D | local_storage.c | 43 const struct bpf_cgroup_storage_key *key2 = _key2; in bpf_cgroup_storage_key_cmp() local 45 if (key1->cgroup_inode_id < key2->cgroup_inode_id) in bpf_cgroup_storage_key_cmp() 47 else if (key1->cgroup_inode_id > key2->cgroup_inode_id) in bpf_cgroup_storage_key_cmp() 49 else if (key1->attach_type < key2->attach_type) in bpf_cgroup_storage_key_cmp() 51 else if (key1->attach_type > key2->attach_type) in bpf_cgroup_storage_key_cmp()
|
| /linux/tools/lib/bpf/ |
| A D | strset.c | 30 static bool strset_equal_fn(const void *key1, const void *key2, void *ctx) in strset_equal_fn() argument 34 const char *str2 = s->strs_data + (long)key2; in strset_equal_fn()
|
| /linux/fs/hfs/ |
| A D | catalog.c | 171 int hfs_cat_keycmp(const btree_key *key1, const btree_key *key2) in hfs_cat_keycmp() argument 176 k2p = key2->cat.ParID; in hfs_cat_keycmp() 182 key2->cat.CName.name, key2->cat.CName.len); in hfs_cat_keycmp()
|
| A D | extent.c | 50 int hfs_ext_keycmp(const btree_key *key1, const btree_key *key2) in hfs_ext_keycmp() argument 56 fnum2 = key2->ext.FNum; in hfs_ext_keycmp() 59 if (key1->ext.FkType != key2->ext.FkType) in hfs_ext_keycmp() 60 return key1->ext.FkType < key2->ext.FkType ? -1 : 1; in hfs_ext_keycmp() 63 block2 = key2->ext.FABN; in hfs_ext_keycmp()
|
| /linux/drivers/infiniband/sw/rxe/ |
| A D | rxe_verbs.h | 17 static inline int pkey_match(u16 key1, u16 key2) in pkey_match() argument 20 ((key1 & 0x7fff) == (key2 & 0x7fff)) && in pkey_match() 21 ((key1 & 0x8000) || (key2 & 0x8000))) ? 1 : 0; in pkey_match()
|
| /linux/tools/perf/Documentation/ |
| A D | perf-kmem.txt | 45 -s <key[,key2...]>:: 46 --sort=<key[,key2...]>::
|
| /linux/tools/bootconfig/samples/ |
| A D | escaped.bconf | 2 key2 = '\'\''
|
| A D | good-single.bconf | 3 key2 = 2
|
| /linux/drivers/net/wireless/ath/ |
| A D | key.c | 134 u32 key0, key1, key2, key3, key4; in ath_hw_set_keycache_entry() local 186 key2 = get_unaligned_le32(k->kv_val + 6); in ath_hw_set_keycache_entry() 212 REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ath_hw_set_keycache_entry() 323 REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2); in ath_hw_set_keycache_entry()
|
| /linux/tools/testing/selftests/wireguard/ |
| A D | netns.sh | 81 key2="$(pp wg genkey)" 85 pub2="$(pp wg pubkey <<<"$key2")" 89 [[ -n $key1 && -n $key2 && -n $psk ]] 105 private-key <(echo "$key2") \ 246 n2 wg set wg0 private-key <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") a… 259 n2 wg set wg0 private-key <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") a… 589 n0 wg set wg0 private-key <(echo "$key2")
|