Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 1171) sorted by relevance

12345678910>>...47

/linux/drivers/input/keyboard/
A Dipaq-micro-keys.c50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive()
59 keys->micro->key_data = keys; in micro_key_start()
75 micro_key_start(keys); in micro_key_open()
84 micro_key_stop(keys); in micro_key_close()
93 keys = devm_kzalloc(&pdev->dev, sizeof(*keys), GFP_KERNEL); in micro_key_probe()
94 if (!keys) in micro_key_probe()
100 if (!keys->input) in micro_key_probe()
106 keys->input->keycodesize * keys->input->keycodemax, in micro_key_probe()
108 if (!keys->codes) in micro_key_probe()
111 keys->input->keycode = keys->codes; in micro_key_probe()
[all …]
A Dmtk-pmic-keys.c213 info->keys = keys; in mtk_pmic_key_setup()
254 if (keys->keys[index].wakeup) { in mtk_pmic_keys_suspend()
256 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_suspend()
270 if (keys->keys[index].wakeup) { in mtk_pmic_keys_resume()
272 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_resume()
349 keys->keys[index].irq = in mtk_pmic_keys_probe()
351 if (keys->keys[index].irq < 0) { in mtk_pmic_keys_probe()
353 return keys->keys[index].irq; in mtk_pmic_keys_probe()
362 return keys->keys[index].irq_r; in mtk_pmic_keys_probe()
377 keys->keys[index].wakeup = true; in mtk_pmic_keys_probe()
[all …]
A DMakefile8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o
9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o
10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o
11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o
30 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o
31 obj-$(CONFIG_KEYBOARD_IQS62X) += iqs62x-keys.o
41 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o
47 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o
66 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
/linux/tools/testing/selftests/bpf/progs/
A Dbpf_flow.c78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys()
182 keys->is_encap = true; in parse_ip_proto()
188 keys->is_encap = true; in parse_ip_proto()
210 keys->is_encap = true; in parse_ip_proto()
237 keys->sport = tcp->source; in parse_ip_proto()
238 keys->dport = tcp->dest; in parse_ip_proto()
247 keys->dport = udp->dest; in parse_ip_proto()
301 keys->is_frag = true; in PROG()
312 if (!(keys->flags & in PROG()
340 if (keys->flow_label && keys->flags & BPF_FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL) in PROG()
[all …]
/linux/fs/bcachefs/
A Dbtree_journal_iter.c139 size_t gap_end = keys->gap + (keys->size - keys->nr); in journal_iters_fix()
201 idx -= keys->size - keys->nr; in bch2_journal_key_insert_take()
205 if (keys->nr == keys->size) { in bch2_journal_key_insert_take()
229 keys->gap = keys->nr; in bch2_journal_key_insert_take()
237 keys->data[keys->gap++] = n; in bch2_journal_key_insert_take()
516 move_gap(keys, keys->nr); in bch2_journal_keys_put()
524 keys->nr = keys->gap = keys->size = 0; in bch2_journal_keys_put()
595 keys->gap = keys->nr; in bch2_journal_keys_sort()
608 move_gap(keys, keys->nr); in bch2_shoot_down_journal_keys()
617 keys->nr = keys->gap = dst; in bch2_shoot_down_journal_keys()
[all …]
A Dbtree_write_buffer.c225 if (!wb->inc.keys.nr) in move_keys_from_inc_to_flushing()
231 darray_resize(&wb->flushing.keys, min_t(size_t, 1U << 20, wb->flushing.keys.nr + wb->inc.keys.nr)); in move_keys_from_inc_to_flushing()
234 if (!wb->flushing.keys.nr && wb->sorted.size >= wb->inc.keys.nr) { in move_keys_from_inc_to_flushing()
235 swap(wb->flushing.keys, wb->inc.keys); in move_keys_from_inc_to_flushing()
249 sizeof(wb->inc.keys.data[0]) * (wb->inc.keys.nr - nr)); in move_keys_from_inc_to_flushing()
252 wb->inc.keys.nr -= nr; in move_keys_from_inc_to_flushing()
254 if (!wb->inc.keys.nr) in move_keys_from_inc_to_flushing()
470 wb->flushing.keys.nr = dst - wb->flushing.keys.data; in bch2_btree_write_buffer_flush_locked()
510 *did_work |= wb->inc.keys.nr || wb->flushing.keys.nr; in btree_write_buffer_flush_seq()
693 dst->wb->keys.nr++; in bch2_journal_key_to_wb_slowpath()
[all …]
/linux/arch/arm64/include/asm/
A Dpointer_auth.h60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel()
68 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel()
77 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user()
78 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user()
79 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user()
89 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_user()
90 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init_user()
91 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init_user()
92 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_keys_init_user()
96 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_keys_init_user()
[all …]
/linux/tools/testing/selftests/net/
A Dtcp_fastopen_backup_key.c62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys()
63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys()
79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys()
80 keys[6], keys[7]); in set_keys()
83 keys[0], keys[1], keys[2], keys[3]); in set_keys()
96 uint32_t keys[8]; in build_rcv_fd() local
122 keys[i] = rand(); in build_rcv_fd()
215 uint32_t keys[8]; in rotate_key() local
225 get_keys(fd, keys); in rotate_key()
227 set_keys(fd, keys); in rotate_key()
[all …]
/linux/tools/testing/selftests/bpf/map_tests/
A Dhtab_map_batch_ops.c29 keys[i] = i + 1; in map_batch_update()
62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify()
81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local
98 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch()
124 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch()
143 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch()
154 &batch, keys + total, in __test_map_lookup_and_delete_batch()
189 keys + total, in __test_map_lookup_and_delete_batch()
209 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch()
217 &batch, keys + total, in __test_map_lookup_and_delete_batch()
[all …]
A Darray_map_batch_ops.c15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument
26 keys[i] = i; in map_batch_update()
52 CHECK(keys[i] + j + 1 != value, in map_batch_verify()
55 j, keys[i], value); in map_batch_verify()
58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify()
59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify()
72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local
92 keys = calloc(max_entries, sizeof(*keys)); in __test_map_lookup_and_update_batch()
103 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_update_batch()
114 &batch, keys + total, in __test_map_lookup_and_update_batch()
[all …]
A Dlpm_trie_map_batch_ops.c23 struct test_lpm_key *keys, int *values) in map_batch_update() argument
34 keys[i].prefix = 32; in map_batch_update()
36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update()
45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument
53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify()
69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local
94 map_batch_update(map_fd, max_entries, keys, values); in test_lpm_trie_map_batch_ops()
95 map_batch_verify(visited, max_entries, keys, values); in test_lpm_trie_map_batch_ops()
96 memset(keys, 0, max_entries * sizeof(*keys)); in test_lpm_trie_map_batch_ops()
107 keys + total, values + total, &count, &opts); in test_lpm_trie_map_batch_ops()
[all …]
/linux/arch/arm64/kernel/
A Dpointer_auth.c13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local
25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys()
37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys()
39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys()
41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys()
43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys()
45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys()
46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys()
67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument
78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys()
[all …]
/linux/drivers/md/bcache/
A Dbtree.c1333 for (t = b->keys.set; t <= &b->keys.set[b->keys.nsets]; t++) in btree_gc_mark_node()
1345 if ((keys - good_keys) * 2 > keys) in btree_gc_mark_node()
1381 keys += r[nodes++].keys; in btree_gc_coalesce()
1441 keys = n2->keys; in btree_gc_coalesce()
1456 n1->keys += keys; in btree_gc_coalesce()
1457 r[i].keys = n1->keys; in btree_gc_coalesce()
1464 n2->keys -= keys; in btree_gc_coalesce()
2310 btree_bset_first(n2)->keys = btree_bset_first(n1)->keys - keys; in btree_split()
2311 btree_bset_first(n1)->keys = keys; in btree_split()
2508 op.keys = keys; in bch_btree_insert()
[all …]
A Ddebug.c45 inmemory = b->keys.set->data; in bch_btree_verify()
50 v->keys.ops = b->keys.ops; in bch_btree_verify()
65 sorted = v->keys.set->data; in bch_btree_verify()
67 if (inmemory->keys != sorted->keys || in bch_btree_verify()
78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify()
81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify()
88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify()
94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify()
164 struct keybuf keys; member
201 bch_keybuf_del(&i->keys, w); in bch_dump_read()
[all …]
/linux/drivers/net/ethernet/cisco/enic/
A Denic_clsf.c26 switch (keys->basic.ip_proto) { in enic_addfltr_5t()
40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t()
41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t()
164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search()
174 struct flow_keys keys; in enic_rx_flow_steer() local
181 res = skb_flow_dissect_flow_keys(skb, &keys, 0); in enic_rx_flow_steer()
183 (keys.basic.ip_proto != IPPROTO_TCP && in enic_rx_flow_steer()
184 keys.basic.ip_proto != IPPROTO_UDP)) in enic_rx_flow_steer()
214 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer()
267 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer()
[all …]
/linux/drivers/mfd/
A Ducb1x00-assabet.c41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local
46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add()
55 keys.buttons = buttons; in ucb1x00_assabet_add()
56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add()
57 keys.poll_interval = 50; in ucb1x00_assabet_add()
58 keys.name = "ucb1x00"; in ucb1x00_assabet_add()
61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
/linux/security/integrity/
A DKconfig29 to "lock" certain keyring to prevent adding new keys.
30 This is useful for evm and module keyrings, when keys are
34 bool "Enable asymmetric keys support"
43 asymmetric keys.
46 bool "Require all keys on the integrity keyrings be signed"
51 This option requires that all keys added to the .ima and
56 bool "Provide keyring for platform/firmware trusted keys"
73 be added. This keyring shall contain just MOK keys. Unlike keys
86 other MOK keys load into the platform keyring.
89 bool "Only CA keys without DigitialSignature usage set"
[all …]
/linux/drivers/md/persistent-data/
A Ddm-btree.c104 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at()
402 if (rkey != keys[level]) { in dm_btree_lookup()
513 memcpy(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in copy_entries()
527 memmove(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in move_entries()
779 pn->keys[middle_index] = rn->keys[0]; in split_two_into_three()
865 memcpy(ln->keys, pn->keys, nr_left * sizeof(pn->keys[0])); in btree_split_beneath()
882 memcpy(rn->keys, pn->keys + nr_left, nr_right * sizeof(pn->keys[0])); in btree_split_beneath()
897 pn->keys[0] = ln->keys[0]; in btree_split_beneath()
902 pn->keys[1] = rn->keys[0]; in btree_split_beneath()
1231 (le64_to_cpu(node->keys[index]) != keys[level])); in need_insert()
[all …]
/linux/security/keys/
A DKconfig11 access keys in the kernel.
13 It also includes provision of methods by which such keys might be
18 a searchable sequence of keys. Each process is equipped with access
60 bool "Large payload keys"
76 keys in the kernel. Trusted keys are random number symmetric keys,
83 source "security/keys/trusted-keys/Kconfig"
97 in the kernel. Encrypted keys are instantiated using kernel
106 bool "Allow encrypted keys with user decrypted data"
116 bool "Diffie-Hellman operations on retained keys"
123 public keys and shared secrets using values stored as keys
[all …]
/linux/tools/testing/selftests/net/tcp_ao/
A Dkey-management.c427 struct test_key *keys; member
488 free(collection.keys); in init_default_key_collection()
489 collection.keys = NULL; in init_default_key_collection()
501 collection.keys = reallocarray(collection.keys, nr_keys, key_sz); in init_default_key_collection()
502 if (!collection.keys) in init_default_key_collection()
688 if (!keys) in verify_keys()
692 keys->get_all = 1; in verify_keys()
695 free(keys); in verify_keys()
724 dump_key = lookup_key(keys, keys->nkeys, sndid, rcvid); in verify_keys()
790 free(keys); in verify_keys()
[all …]
/linux/net/core/
A Dflow_dissector.c1765 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify()
1769 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify()
1783 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify()
1819 struct flow_keys *keys, in ___skb_get_hash() argument
1859 struct flow_keys keys; in __skb_get_hash_symmetric_net() local
1863 memset(&keys, 0, sizeof(keys)); in __skb_get_hash_symmetric_net()
1883 struct flow_keys keys; in __skb_get_hash_net() local
1886 memset(&keys, 0, sizeof(keys)); in __skb_get_hash_net()
1889 &keys, NULL, 0, 0, 0, in __skb_get_hash_net()
1903 struct flow_keys keys; in skb_get_hash_perturb() local
[all …]
/linux/drivers/crypto/nx/
A Dnx-aes-xcbc.c64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local
76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty()
77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty()
79 len = sizeof(keys); in nx_xcbc_empty()
81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty()
84 if (len != sizeof(keys)) in nx_xcbc_empty()
90 if (len != sizeof(keys)) in nx_xcbc_empty()
102 keys[1][0] ^= 0x80; in nx_xcbc_empty()
104 len = sizeof(keys[1]); in nx_xcbc_empty()
107 memcpy(csbcpb->cpb.aes_ecb.key, keys[0], AES_BLOCK_SIZE); in nx_xcbc_empty()
[all …]
/linux/lib/
A Dtest_static_keys.c55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument
61 if (previous != keys[i].key) { in invert_keys()
62 invert_key(keys[i].key); in invert_keys()
63 previous = keys[i].key; in invert_keys()
68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument
74 ret = static_key_enabled(keys[i].key); in verify_keys()
75 init = keys[i].init_state; in verify_keys()
78 ret = keys[i].test_key(); in verify_keys()
79 if (static_key_enabled(keys[i].key)) { in verify_keys()
/linux/security/keys/trusted-keys/
A DKconfig5 bool "TPM-based trusted keys"
18 backend. Trusted keys are random number symmetric keys,
20 The TPM only unseals the keys, if the boot PCRs and other
24 bool "TEE-based trusted keys"
33 bool "CAAM-based trusted keys"
43 bool "DCP-based trusted keys"
/linux/certs/
A DKconfig39 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,
45 bool "Provide system-wide ring of trusted keys"
53 userspace may only add extra keys if those keys can be verified by
54 keys already in the keyring.
59 string "Additional X.509 keys for default system keyring"
100 If set, only certificates signed by keys on the builtin trusted
106 linking code signing keys with imputed trust to the secondary
110 bool "Provide system-wide ring of blacklisted keys"
113 Provide a system keyring to which blacklisted keys can be added.
148 bool "Allow root to add signed blacklist keys"
[all …]

Completed in 55 milliseconds

12345678910>>...47