/Linux-v6.1/Documentation/driver-api/nvdimm/ |
D | security.rst | 6 --------------- 11 "unlock unit", "freeze lock", "secure erase", and "overwrite". A security_ops 16 ------------------ 28 update <old_keyid> <new_keyid> - enable or update passphrase. 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. [all …]
|
/Linux-v6.1/Documentation/devicetree/bindings/input/ |
D | adi,adp5588.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Nuno Sá <nuno.sa@analog.com> 14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf 17 - $ref: matrix-keymap.yaml# 18 - $ref: input.yaml# 23 - adi,adp5587 24 - adi,adp5588 29 vcc-supply: [all …]
|
/Linux-v6.1/drivers/input/keyboard/ |
D | adp5588-keys.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 8 * Copyright (C) 2008-2010 Analog Devices Inc. 24 #include <linux/pinctrl/pinconf-generic.h> 46 #define UNLOCK1 0x0F /* Unlock Key1 */ 47 #define UNLOCK2 0x10 /* Unlock Key2 */ 126 * 128 so it fits matrix-keymap maximum number of keys when the full 158 #define ADP5588_ROWS_MAX (GPI_PIN_ROW7 - GPI_PIN_ROW0 + 1) 159 #define ADP5588_COLS_MAX (GPI_PIN_COL9 - GPI_PIN_COL0 + 1) 161 #define ADP5588_GPIMAPSIZE_MAX (GPI_PIN_END - GPI_PIN_BASE + 1) 167 #define KP_SEL(x) (BIT(x) - 1) /* 2^x-1 */ [all …]
|
/Linux-v6.1/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only) 2 /* Copyright(c) 2014 - 2020 Intel Corporation */ 18 #include <linux/dma-mapping.h> 43 (GET_HW_DATA(accel_dev)->accel_capabilities_mask & \ 78 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */ 106 return -EFAULT; in qat_get_inter_state_size() 108 return -EFAULT; in qat_get_inter_state_size() 116 SHASH_DESC_ON_STACK(shash, ctx->hash_tfm); in qat_alg_do_precomputes() 117 int block_size = crypto_shash_blocksize(ctx->hash_tfm); in qat_alg_do_precomputes() 118 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes() [all …]
|
/Linux-v6.1/net/sched/ |
D | act_pedit.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 5 * Authors: Jamal Hadi Salim (2002-4) 42 int err = -EINVAL; in tcf_pedit_keys_ex_parse() 50 return ERR_PTR(-ENOMEM); in tcf_pedit_keys_ex_parse() 58 err = -EINVAL; in tcf_pedit_keys_ex_parse() 61 n--; in tcf_pedit_keys_ex_parse() 64 err = -EINVAL; in tcf_pedit_keys_ex_parse() 76 err = -EINVAL; in tcf_pedit_keys_ex_parse() 80 k->htype = nla_get_u16(tb[TCA_PEDIT_KEY_EX_HTYPE]); in tcf_pedit_keys_ex_parse() 81 k->cmd = nla_get_u16(tb[TCA_PEDIT_KEY_EX_CMD]); in tcf_pedit_keys_ex_parse() [all …]
|
/Linux-v6.1/drivers/net/ethernet/mellanox/mlxsw/ |
D | spectrum_acl_bloom_filter.c | 1 // SPDX-License-Identifier: BSD-3-Clause OR GPL-2.0 19 /* Bloom filter uses a crc-16 hash over chunks of data which contain 4 key 20 * blocks, eRP ID and region ID. In Spectrum-2 and above, region key is combined 25 * +-------------------------+------------------------+------------------------+ 26 * | Chunk 2 Key blocks 11-8 | Chunk 1 Key blocks 7-4 | Chunk 0 Key blocks 3-0 | 27 * +-------------------------+------------------------+------------------------+ 31 /* Spectrum-2 and Spectrum-3 chunks */ 39 * +---------+----------------------+-----------------------------------+ 41 * +---------+-----------+----------+-----------------------------------+ 43 * +---------+-----------+----------+-----------------------------------+ [all …]
|
/Linux-v6.1/fs/crypto/ |
D | keysetup.c | 1 // SPDX-License-Identifier: GPL-2.0 18 .friendly_name = "AES-256-XTS", 26 .friendly_name = "AES-256-CTS-CBC", 33 .friendly_name = "AES-128-CBC-ESSIV", 41 .friendly_name = "AES-128-CTS-CBC", 56 .friendly_name = "AES-256-HCTR2", 72 if (S_ISREG(inode->i_mode)) in select_encryption_mode() 75 if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode)) in select_encryption_mode() 79 inode->i_ino, (inode->i_mode & S_IFMT)); in select_encryption_mode() 80 return ERR_PTR(-EINVAL); in select_encryption_mode() [all …]
|
D | fscrypt_private.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 17 #include <linux/blk-crypto.h> 19 #define CONST_STRLEN(str) (sizeof(str) - 1) 25 * if ciphers with a 256-bit security strength are used. This is just the 26 * absolute minimum, which applies when only 128-bit encryption is used. 56 * fscrypt_context - the encryption context of an inode 58 * This is the on-disk equivalent of an fscrypt_policy, stored alongside each 77 switch (ctx->version) { in fscrypt_context_size() 79 BUILD_BUG_ON(sizeof(ctx->v1) != 28); in fscrypt_context_size() 80 return sizeof(ctx->v1); in fscrypt_context_size() [all …]
|
/Linux-v6.1/drivers/net/ethernet/fungible/funeth/ |
D | funeth_main.c | 1 // SPDX-License-Identifier: (GPL-2.0-only OR BSD-3-Clause) 43 const int *keys, const u64 *data) in fun_port_write_cmds() argument 55 return -EINVAL; in fun_port_write_cmds() 61 fp->netdev->dev_port); in fun_port_write_cmds() 64 FUN_ADMIN_WRITE48_REQ_INIT(keys[i], data[i]); in fun_port_write_cmds() 66 return fun_submit_admin_sync_cmd(fp->fdev, &cmd.req.common, in fun_port_write_cmds() 77 const int *keys, u64 *data) in fun_port_read_cmds() argument 91 return -EINVAL; in fun_port_read_cmds() 97 fp->netdev->dev_port); in fun_port_read_cmds() 99 cmd.req.u.read.read48[i] = FUN_ADMIN_READ48_REQ_INIT(keys[i]); in fun_port_read_cmds() [all …]
|
/Linux-v6.1/include/linux/input/ |
D | adp5589.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright 2010-2011 Analog Devices Inc. 47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1) 76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1) 114 * ---------------- BIT ------------------ 131 * ---- BIT -- ----------- 154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */ 155 unsigned char unlock_key2; /* Unlock Key 2 (ADP5589 only) */ 156 …unsigned char unlock_timer; /* Time in seconds [0..7] between the two unlock keys 0=disable (ADP55… 166 unsigned pullup_en_100k; /* Pull-Up 100k Enable Mask */ [all …]
|
/Linux-v6.1/security/keys/ |
D | keyctl.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 4 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved. 24 #include <keys/request_key_auth-type.h> 55 return -EINVAL; in key_get_type_from_user() 57 return -EPERM; in key_get_type_from_user() 58 type[len - 1] = '\0'; in key_get_type_from_user() 85 ret = -EINVAL; in SYSCALL_DEFINE5() 86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5() 106 ret = -EPERM; in SYSCALL_DEFINE5() 115 ret = -ENOMEM; in SYSCALL_DEFINE5() [all …]
|
/Linux-v6.1/net/batman-adv/ |
D | hash.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 22 * keys 38 * struct batadv_hashtable - Wrapper of simple hlist based hashtable 65 * batadv_hash_add() - adds data to the hashtable 73 * and -1 on error. 82 int ret = -1; in batadv_hash_add() 90 index = choose(data, hash->size); in batadv_hash_add() 91 head = &hash->table[index]; in batadv_hash_add() 92 list_lock = &hash->list_locks[index]; in batadv_hash_add() 101 goto unlock; in batadv_hash_add() [all …]
|
/Linux-v6.1/security/integrity/evm/ |
D | evm_crypto.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2005-2010 IBM Corporation 19 #include <keys/encrypted-type.h> 24 #define EVMKEY "evm-key" 41 * evm_set_key() - set EVM HMAC key from the kernel 46 * without using the "encrypted" key subsystem keys. It can be used 48 * keys. 56 rc = -EBUSY; in evm_set_key() 59 rc = -EINVAL; in evm_set_key() 84 return ERR_PTR(-ENOKEY); in init_desc() [all …]
|
/Linux-v6.1/net/bluetooth/ |
D | mgmt.c | 2 BlueZ - Bluetooth protocol stack for Linux 5 Copyright (C) 2011-2012 Intel Corporation 291 case -EPERM: in mgmt_errno_status() 293 case -EINVAL: in mgmt_errno_status() 295 case -EOPNOTSUPP: in mgmt_errno_status() 297 case -EBUSY: in mgmt_errno_status() 299 case -ETIMEDOUT: in mgmt_errno_status() 301 case -ENOMEM: in mgmt_errno_status() 303 case -EISCONN: in mgmt_errno_status() 305 case -ENOTCONN: in mgmt_errno_status() [all …]
|
/Linux-v6.1/include/net/netfilter/ |
D | nf_flow_table.h | 7 #include <linux/rhashtable-types.h> 87 return flowtable->flags & NF_FLOWTABLE_HW_OFFLOAD; in nf_flowtable_hw_offload() 129 /* All members above are keys for lookups, see flow_offload_hash(). */ 190 return (__s32)(timeout - nf_flowtable_time_stamp); in nf_flow_timeout_delta() 222 struct flow_block *block = &flow_table->flow_block; in nf_flow_table_offload_add_cb() 226 down_write(&flow_table->flow_block_lock); in nf_flow_table_offload_add_cb() 229 err = -EEXIST; in nf_flow_table_offload_add_cb() 230 goto unlock; in nf_flow_table_offload_add_cb() 236 goto unlock; in nf_flow_table_offload_add_cb() 239 list_add_tail(&block_cb->list, &block->cb_list); in nf_flow_table_offload_add_cb() [all …]
|
/Linux-v6.1/drivers/gpu/drm/i915/pxp/ |
D | intel_pxp.c | 1 // SPDX-License-Identifier: MIT 21 * Objects can opt-in to PXP encryption at creation time via the 49 return pxp->ce; in intel_pxp_is_enabled() 54 return pxp->arb_is_valid; in intel_pxp_is_active() 64 intel_uncore_write(gt->uncore, KCR_INIT, in kcr_pxp_enable() 70 intel_uncore_write(gt->uncore, KCR_INIT, in kcr_pxp_disable() 87 engine = gt->engine_class[VIDEO_DECODE_CLASS][i]; in create_vcs_context() 89 GEM_BUG_ON(!engine || engine->class != VIDEO_DECODE_CLASS); in create_vcs_context() 91 ce = intel_engine_create_pinned_context(engine, engine->gt->vm, SZ_4K, in create_vcs_context() 95 drm_err(>->i915->drm, "failed to create VCS ctx for PXP\n"); in create_vcs_context() [all …]
|
/Linux-v6.1/drivers/md/bcache/ |
D | btree.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 8 * At a high level, bcache's btree is relatively standard b+ tree. All keys and 13 * the key is the highest key in the child node - except that the highest key in 15 * of the child node - this would allow us to have variable sized btree nodes 21 * overlapping extents - when we read in a btree node from disk, the first thing 22 * we do is resort all the sets of keys with a mergesort, and in the same pass 35 * disk if necessary. This function is almost never called directly though - the 37 * unlock the node after the function returns. 39 * The root is special cased - it's taken out of the cache's lru (thus pinning 43 * points to - the btree_root() macro handles this. [all …]
|
D | btree.c | 1 // SPDX-License-Identifier: GPL-2.0 18 * as keys are inserted we only sort the pages that have not yet been written. 21 * All configuration is done via sysfs; see Documentation/admin-guide/bcache.rst. 52 * Check for bad keys in replay 100 (((k)->ptr[0] >> c->bucket_bits) | PTR_GEN(k, 0)) 104 #define insert_lock(s, b) ((b)->level <= (s)->lock) 109 return ((void *) btree_bset_first(b)) + b->written * block_bytes(b->c->cache); in write_block() 115 if (b->level && b->keys.nsets) in bch_btree_init_next() 116 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 118 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() [all …]
|
/Linux-v6.1/drivers/nvdimm/ |
D | security.c | 1 // SPDX-License-Identifier: GPL-2.0 12 #include <linux/key-type.h> 13 #include <keys/user-type.h> 14 #include <keys/encrypted-type.h> 15 #include "nd-core.h" 31 lockdep_assert_held_read(&key->sem); in key_data() 33 return epayload->decrypted_data; in key_data() 41 up_read(&key->sem); in nvdimm_put_key() 55 struct device *dev = &nvdimm->dev; in nvdimm_request_key() 57 sprintf(desc, "%s%s", NVDIMM_PREFIX, nvdimm->dimm_id); in nvdimm_request_key() [all …]
|
/Linux-v6.1/drivers/hid/ |
D | hid-wiimote-modules.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 4 * Copyright (c) 2011-2013 David Herrmann <dh.herrmann@gmail.com> 19 * re-detection which causes all modules to be unloaded and then reload the 22 * wdata->input is a shared input device. It is always initialized prior to 37 #include "hid-wiimote.h" 40 * Keys 62 static void wiimod_keys_in_keys(struct wiimote_data *wdata, const __u8 *keys) in wiimod_keys_in_keys() argument 64 input_report_key(wdata->input, wiimod_keys_map[WIIPROTO_KEY_LEFT], in wiimod_keys_in_keys() 65 !!(keys[0] & 0x01)); in wiimod_keys_in_keys() 66 input_report_key(wdata->input, wiimod_keys_map[WIIPROTO_KEY_RIGHT], in wiimod_keys_in_keys() [all …]
|
/Linux-v6.1/Documentation/security/keys/ |
D | core.rst | 5 This service allows cryptographic keys, authentication tokens, cross-domain 10 other keys. Processes each have three standard keyring subscriptions that a 11 kernel service can search for relevant keys. 25 In this context, keys represent units of cryptographic data, authentication 30 - A serial number. 31 - A type. 32 - A description (for matching a key in a search). 33 - Access control information. 34 - An expiry time. 35 - A payload. [all …]
|
/Linux-v6.1/kernel/trace/ |
D | bpf_trace.c | 1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright (c) 2011-2015 PLUMgrid, http://plumgrid.com 17 #include <linux/error-injection.h> 59 for (i = 0; i < btm->module->num_bpf_raw_events; ++i) { in bpf_get_raw_tracepoint_module() 60 btp = &btm->module->bpf_raw_events[i]; in bpf_get_raw_tracepoint_module() 61 if (!strcmp(btp->tp->name, name)) { in bpf_get_raw_tracepoint_module() 62 if (try_module_get(btm->module)) in bpf_get_raw_tracepoint_module() 89 * trace_call_bpf - invoke BPF program 98 * 0 - return from kprobe (event is filtered out) 99 * 1 - store kprobe event into ring buffer [all …]
|
/Linux-v6.1/arch/powerpc/include/asm/ |
D | 8xx_immap.h | 10 * functional files.....but anyone else is welcome to try. -- Dan 95 /*----------------------------------------------------------------------- 96 * BR - Memory Controller: Base Register 16-9 112 /*----------------------------------------------------------------------- 113 * OR - Memory Controller: Option Register 16-11 200 /* System Integration Timers keys. 218 /* Clocks and reset keys. 227 /* The key to unlock registers maintained by keep-alive power. 396 uint fec_grp_hash_table_high; /* upper 32-bits of hash table */ 397 uint fec_grp_hash_table_low; /* lower 32-bits of hash table */ [all …]
|
/Linux-v6.1/fs/reiserfs/ |
D | tail_conversion.c | 1 // SPDX-License-Identifier: GPL-2.0 19 * tail. -ENOSPC if no disk space for conversion 29 struct super_block *sb = inode->i_sb; in direct2indirect() 48 BUG_ON(!th->t_trans_id); in direct2indirect() 50 REISERFS_SB(sb)->s_direct2indirect++; in direct2indirect() 52 blk_size = sb->s_blocksize; in direct2indirect() 67 reiserfs_error(sb, "PAP-14030", in direct2indirect() 71 return -EIO; in direct2indirect() 76 unfm_ptr = cpu_to_le32(unbh->b_blocknr); in direct2indirect() 96 * note: from here there are two keys which have matching first in direct2indirect() [all …]
|
/Linux-v6.1/kernel/futex/ |
D | waitwake.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 46 * unlock(hash_bucket(futex)); 63 * smp_mb(); (A) <-- paired with -. 72 * `--------> smp_mb(); (B) 75 * unlock(hash_bucket(futex)); 79 * waiters--; (b) unlock(hash_bucket(futex)); 103 * acquiring the lock. It then decrements them again after releasing it - 117 struct task_struct *p = q->task; in futex_wake_mark() 119 if (WARN(q->pi_state || q->rt_waiter, "refusing to wake PI futex\n")) in futex_wake_mark() 125 * The waiting task can free the futex_q as soon as q->lock_ptr = NULL in futex_wake_mark() [all …]
|