| /linux/drivers/input/keyboard/ |
| A D | ipaq-micro-keys.c | 50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 59 keys->micro->key_data = keys; in micro_key_start() 75 micro_key_start(keys); in micro_key_open() 84 micro_key_stop(keys); in micro_key_close() 93 keys = devm_kzalloc(&pdev->dev, sizeof(*keys), GFP_KERNEL); in micro_key_probe() 94 if (!keys) in micro_key_probe() 100 if (!keys->input) in micro_key_probe() 106 keys->input->keycodesize * keys->input->keycodemax, in micro_key_probe() 108 if (!keys->codes) in micro_key_probe() 111 keys->input->keycode = keys->codes; in micro_key_probe() [all …]
|
| A D | mtk-pmic-keys.c | 213 info->keys = keys; in mtk_pmic_key_setup() 254 if (keys->keys[index].wakeup) { in mtk_pmic_keys_suspend() 256 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_suspend() 270 if (keys->keys[index].wakeup) { in mtk_pmic_keys_resume() 272 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_resume() 349 keys->keys[index].irq = in mtk_pmic_keys_probe() 351 if (keys->keys[index].irq < 0) { in mtk_pmic_keys_probe() 353 return keys->keys[index].irq; in mtk_pmic_keys_probe() 362 return keys->keys[index].irq_r; in mtk_pmic_keys_probe() 377 keys->keys[index].wakeup = true; in mtk_pmic_keys_probe() [all …]
|
| A D | Makefile | 8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 30 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 31 obj-$(CONFIG_KEYBOARD_IQS62X) += iqs62x-keys.o 41 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 47 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o 66 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
| /linux/tools/testing/selftests/bpf/progs/ |
| A D | bpf_flow.c | 78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 182 keys->is_encap = true; in parse_ip_proto() 188 keys->is_encap = true; in parse_ip_proto() 210 keys->is_encap = true; in parse_ip_proto() 237 keys->sport = tcp->source; in parse_ip_proto() 238 keys->dport = tcp->dest; in parse_ip_proto() 247 keys->dport = udp->dest; in parse_ip_proto() 301 keys->is_frag = true; in PROG() 312 if (!(keys->flags & in PROG() 340 if (keys->flow_label && keys->flags & BPF_FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL) in PROG() [all …]
|
| /linux/fs/bcachefs/ |
| A D | btree_journal_iter.c | 139 size_t gap_end = keys->gap + (keys->size - keys->nr); in journal_iters_fix() 201 idx -= keys->size - keys->nr; in bch2_journal_key_insert_take() 205 if (keys->nr == keys->size) { in bch2_journal_key_insert_take() 229 keys->gap = keys->nr; in bch2_journal_key_insert_take() 237 keys->data[keys->gap++] = n; in bch2_journal_key_insert_take() 516 move_gap(keys, keys->nr); in bch2_journal_keys_put() 524 keys->nr = keys->gap = keys->size = 0; in bch2_journal_keys_put() 595 keys->gap = keys->nr; in bch2_journal_keys_sort() 608 move_gap(keys, keys->nr); in bch2_shoot_down_journal_keys() 617 keys->nr = keys->gap = dst; in bch2_shoot_down_journal_keys() [all …]
|
| A D | btree_write_buffer.c | 225 if (!wb->inc.keys.nr) in move_keys_from_inc_to_flushing() 231 darray_resize(&wb->flushing.keys, min_t(size_t, 1U << 20, wb->flushing.keys.nr + wb->inc.keys.nr)); in move_keys_from_inc_to_flushing() 234 if (!wb->flushing.keys.nr && wb->sorted.size >= wb->inc.keys.nr) { in move_keys_from_inc_to_flushing() 235 swap(wb->flushing.keys, wb->inc.keys); in move_keys_from_inc_to_flushing() 249 sizeof(wb->inc.keys.data[0]) * (wb->inc.keys.nr - nr)); in move_keys_from_inc_to_flushing() 252 wb->inc.keys.nr -= nr; in move_keys_from_inc_to_flushing() 254 if (!wb->inc.keys.nr) in move_keys_from_inc_to_flushing() 470 wb->flushing.keys.nr = dst - wb->flushing.keys.data; in bch2_btree_write_buffer_flush_locked() 510 *did_work |= wb->inc.keys.nr || wb->flushing.keys.nr; in btree_write_buffer_flush_seq() 693 dst->wb->keys.nr++; in bch2_journal_key_to_wb_slowpath() [all …]
|
| /linux/arch/arm64/include/asm/ |
| A D | pointer_auth.h | 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 68 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel() 77 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user() 78 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user() 79 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user() 89 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_user() 90 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init_user() 91 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init_user() 92 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_keys_init_user() 96 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_keys_init_user() [all …]
|
| /linux/tools/testing/selftests/net/ |
| A D | tcp_fastopen_backup_key.c | 62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 80 keys[6], keys[7]); in set_keys() 83 keys[0], keys[1], keys[2], keys[3]); in set_keys() 96 uint32_t keys[8]; in build_rcv_fd() local 122 keys[i] = rand(); in build_rcv_fd() 215 uint32_t keys[8]; in rotate_key() local 225 get_keys(fd, keys); in rotate_key() 227 set_keys(fd, keys); in rotate_key() [all …]
|
| /linux/tools/testing/selftests/bpf/map_tests/ |
| A D | htab_map_batch_ops.c | 29 keys[i] = i + 1; in map_batch_update() 62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local 98 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch() 124 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 143 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 154 &batch, keys + total, in __test_map_lookup_and_delete_batch() 189 keys + total, in __test_map_lookup_and_delete_batch() 209 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 217 &batch, keys + total, in __test_map_lookup_and_delete_batch() [all …]
|
| A D | array_map_batch_ops.c | 15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 26 keys[i] = i; in map_batch_update() 52 CHECK(keys[i] + j + 1 != value, in map_batch_verify() 55 j, keys[i], value); in map_batch_verify() 58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify() 72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local 92 keys = calloc(max_entries, sizeof(*keys)); in __test_map_lookup_and_update_batch() 103 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_update_batch() 114 &batch, keys + total, in __test_map_lookup_and_update_batch() [all …]
|
| A D | lpm_trie_map_batch_ops.c | 23 struct test_lpm_key *keys, int *values) in map_batch_update() argument 34 keys[i].prefix = 32; in map_batch_update() 36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update() 45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument 53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify() 69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local 94 map_batch_update(map_fd, max_entries, keys, values); in test_lpm_trie_map_batch_ops() 95 map_batch_verify(visited, max_entries, keys, values); in test_lpm_trie_map_batch_ops() 96 memset(keys, 0, max_entries * sizeof(*keys)); in test_lpm_trie_map_batch_ops() 107 keys + total, values + total, &count, &opts); in test_lpm_trie_map_batch_ops() [all …]
|
| /linux/arch/arm64/kernel/ |
| A D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys() 46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys() 67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument 78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys() [all …]
|
| /linux/drivers/md/bcache/ |
| A D | btree.c | 1333 for (t = b->keys.set; t <= &b->keys.set[b->keys.nsets]; t++) in btree_gc_mark_node() 1345 if ((keys - good_keys) * 2 > keys) in btree_gc_mark_node() 1381 keys += r[nodes++].keys; in btree_gc_coalesce() 1441 keys = n2->keys; in btree_gc_coalesce() 1456 n1->keys += keys; in btree_gc_coalesce() 1457 r[i].keys = n1->keys; in btree_gc_coalesce() 1464 n2->keys -= keys; in btree_gc_coalesce() 2310 btree_bset_first(n2)->keys = btree_bset_first(n1)->keys - keys; in btree_split() 2311 btree_bset_first(n1)->keys = keys; in btree_split() 2508 op.keys = keys; in bch_btree_insert() [all …]
|
| A D | debug.c | 45 inmemory = b->keys.set->data; in bch_btree_verify() 50 v->keys.ops = b->keys.ops; in bch_btree_verify() 65 sorted = v->keys.set->data; in bch_btree_verify() 67 if (inmemory->keys != sorted->keys || in bch_btree_verify() 78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 164 struct keybuf keys; member 201 bch_keybuf_del(&i->keys, w); in bch_dump_read() [all …]
|
| /linux/drivers/net/ethernet/cisco/enic/ |
| A D | enic_clsf.c | 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 174 struct flow_keys keys; in enic_rx_flow_steer() local 181 res = skb_flow_dissect_flow_keys(skb, &keys, 0); in enic_rx_flow_steer() 183 (keys.basic.ip_proto != IPPROTO_TCP && in enic_rx_flow_steer() 184 keys.basic.ip_proto != IPPROTO_UDP)) in enic_rx_flow_steer() 214 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer() 267 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer() [all …]
|
| /linux/drivers/mfd/ |
| A D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 55 keys.buttons = buttons; in ucb1x00_assabet_add() 56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 57 keys.poll_interval = 50; in ucb1x00_assabet_add() 58 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
| /linux/security/integrity/ |
| A D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 73 be added. This keyring shall contain just MOK keys. Unlike keys 86 other MOK keys load into the platform keyring. 89 bool "Only CA keys without DigitialSignature usage set" [all …]
|
| /linux/drivers/md/persistent-data/ |
| A D | dm-btree.c | 104 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 402 if (rkey != keys[level]) { in dm_btree_lookup() 513 memcpy(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in copy_entries() 527 memmove(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in move_entries() 779 pn->keys[middle_index] = rn->keys[0]; in split_two_into_three() 865 memcpy(ln->keys, pn->keys, nr_left * sizeof(pn->keys[0])); in btree_split_beneath() 882 memcpy(rn->keys, pn->keys + nr_left, nr_right * sizeof(pn->keys[0])); in btree_split_beneath() 897 pn->keys[0] = ln->keys[0]; in btree_split_beneath() 902 pn->keys[1] = rn->keys[0]; in btree_split_beneath() 1231 (le64_to_cpu(node->keys[index]) != keys[level])); in need_insert() [all …]
|
| /linux/security/keys/ |
| A D | Kconfig | 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 60 bool "Large payload keys" 76 keys in the kernel. Trusted keys are random number symmetric keys, 83 source "security/keys/trusted-keys/Kconfig" 97 in the kernel. Encrypted keys are instantiated using kernel 106 bool "Allow encrypted keys with user decrypted data" 116 bool "Diffie-Hellman operations on retained keys" 123 public keys and shared secrets using values stored as keys [all …]
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| A D | key-management.c | 427 struct test_key *keys; member 488 free(collection.keys); in init_default_key_collection() 489 collection.keys = NULL; in init_default_key_collection() 501 collection.keys = reallocarray(collection.keys, nr_keys, key_sz); in init_default_key_collection() 502 if (!collection.keys) in init_default_key_collection() 688 if (!keys) in verify_keys() 692 keys->get_all = 1; in verify_keys() 695 free(keys); in verify_keys() 724 dump_key = lookup_key(keys, keys->nkeys, sndid, rcvid); in verify_keys() 790 free(keys); in verify_keys() [all …]
|
| /linux/net/core/ |
| A D | flow_dissector.c | 1765 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1769 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1783 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1819 struct flow_keys *keys, in ___skb_get_hash() argument 1859 struct flow_keys keys; in __skb_get_hash_symmetric_net() local 1863 memset(&keys, 0, sizeof(keys)); in __skb_get_hash_symmetric_net() 1883 struct flow_keys keys; in __skb_get_hash_net() local 1886 memset(&keys, 0, sizeof(keys)); in __skb_get_hash_net() 1889 &keys, NULL, 0, 0, 0, in __skb_get_hash_net() 1903 struct flow_keys keys; in skb_get_hash_perturb() local [all …]
|
| /linux/drivers/crypto/nx/ |
| A D | nx-aes-xcbc.c | 64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 79 len = sizeof(keys); in nx_xcbc_empty() 81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 84 if (len != sizeof(keys)) in nx_xcbc_empty() 90 if (len != sizeof(keys)) in nx_xcbc_empty() 102 keys[1][0] ^= 0x80; in nx_xcbc_empty() 104 len = sizeof(keys[1]); in nx_xcbc_empty() 107 memcpy(csbcpb->cpb.aes_ecb.key, keys[0], AES_BLOCK_SIZE); in nx_xcbc_empty() [all …]
|
| /linux/lib/ |
| A D | test_static_keys.c | 55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 61 if (previous != keys[i].key) { in invert_keys() 62 invert_key(keys[i].key); in invert_keys() 63 previous = keys[i].key; in invert_keys() 68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 74 ret = static_key_enabled(keys[i].key); in verify_keys() 75 init = keys[i].init_state; in verify_keys() 78 ret = keys[i].test_key(); in verify_keys() 79 if (static_key_enabled(keys[i].key)) { in verify_keys()
|
| /linux/security/keys/trusted-keys/ |
| A D | Kconfig | 5 bool "TPM-based trusted keys" 18 backend. Trusted keys are random number symmetric keys, 20 The TPM only unseals the keys, if the boot PCRs and other 24 bool "TEE-based trusted keys" 33 bool "CAAM-based trusted keys" 43 bool "DCP-based trusted keys"
|
| /linux/certs/ |
| A D | Kconfig | 39 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem, 45 bool "Provide system-wide ring of trusted keys" 53 userspace may only add extra keys if those keys can be verified by 54 keys already in the keyring. 59 string "Additional X.509 keys for default system keyring" 100 If set, only certificates signed by keys on the builtin trusted 106 linking code signing keys with imputed trust to the secondary 110 bool "Provide system-wide ring of blacklisted keys" 113 Provide a system keyring to which blacklisted keys can be added. 148 bool "Allow root to add signed blacklist keys" [all …]
|