Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 665) sorted by relevance

12345678910>>...27

/Linux-v4.19/drivers/input/keyboard/
Dipaq-micro-keys.c46 struct ipaq_micro_keys *keys = data; in micro_key_receive() local
53 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive()
54 input_sync(keys->input); in micro_key_receive()
58 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument
60 spin_lock(&keys->micro->lock); in micro_key_start()
61 keys->micro->key = micro_key_receive; in micro_key_start()
62 keys->micro->key_data = keys; in micro_key_start()
63 spin_unlock(&keys->micro->lock); in micro_key_start()
66 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument
68 spin_lock(&keys->micro->lock); in micro_key_stop()
[all …]
Dmtk-pmic-keys.c88 struct mtk_pmic_keys *keys; member
99 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member
108 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument
114 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup()
119 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
123 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup()
130 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
133 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
138 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
141 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
[all …]
DMakefile8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o
9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o
10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o
11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o
29 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o
37 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o
43 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o
62 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
/Linux-v4.19/drivers/input/misc/
Ddm355evm_keys.c106 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local
119 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq()
127 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq()
156 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq()
158 dev_dbg(keys->dev, in dm355evm_keys_irq()
163 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq()
164 input_sync(keys->input); in dm355evm_keys_irq()
165 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq()
166 input_sync(keys->input); in dm355evm_keys_irq()
176 struct dm355evm_keys *keys; in dm355evm_keys_probe() local
[all …]
/Linux-v4.19/drivers/md/bcache/
Dbtree.c171 if (b->level && b->keys.nsets) in bch_btree_init_next()
172 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next()
174 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next()
177 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next()
215 iter->b = &b->keys; in bch_btree_node_read_done()
222 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done()
250 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done()
260 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done()
262 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done()
265 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done()
[all …]
Ddebug.c44 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify()
45 inmemory = b->keys.set->data; in bch_btree_verify()
50 v->keys.ops = b->keys.ops; in bch_btree_verify()
65 sorted = v->keys.set->data; in bch_btree_verify()
67 if (inmemory->keys != sorted->keys || in bch_btree_verify()
78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify()
81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify()
88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify()
94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify()
163 struct keybuf keys; member
[all …]
/Linux-v4.19/drivers/net/ethernet/cisco/enic/
Denic_clsf.c21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument
26 switch (keys->basic.ip_proto) { in enic_addfltr_5t()
37 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t()
38 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t()
39 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t()
40 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t()
161 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search()
162 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search()
163 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search()
164 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search()
[all …]
/Linux-v4.19/net/core/
Dflow_dissector.c1151 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument
1155 switch (keys->control.addr_type) { in __flow_hash_consistentify()
1157 addr_diff = (__force u32)keys->addrs.v4addrs.dst - in __flow_hash_consistentify()
1158 (__force u32)keys->addrs.v4addrs.src; in __flow_hash_consistentify()
1161 ((__force u16)keys->ports.dst < in __flow_hash_consistentify()
1162 (__force u16)keys->ports.src))) { in __flow_hash_consistentify()
1163 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify()
1164 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify()
1168 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify()
1169 &keys->addrs.v6addrs.src, in __flow_hash_consistentify()
[all …]
/Linux-v4.19/drivers/mfd/
Ducb1x00-assabet.c44 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local
49 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add()
58 keys.buttons = buttons; in ucb1x00_assabet_add()
59 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add()
60 keys.poll_interval = 50; in ucb1x00_assabet_add()
61 keys.name = "ucb1x00"; in ucb1x00_assabet_add()
64 &keys, sizeof(keys)); in ucb1x00_assabet_add()
/Linux-v4.19/drivers/md/persistent-data/
Ddm-btree.c47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch()
101 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at()
368 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw()
375 uint64_t *keys, void *value_le) in dm_btree_lookup() argument
397 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup()
402 if (rkey != keys[level]) { in dm_btree_lookup()
462 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single()
471 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument
480 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next()
486 if (*rkey != keys[level]) { in dm_btree_lookup_next()
[all …]
Ddm-btree.h110 uint64_t *keys, void *value_le);
117 uint64_t *keys, uint64_t *rkey, void *value_le);
123 uint64_t *keys, void *value, dm_block_t *new_root)
132 uint64_t *keys, void *value, dm_block_t *new_root,
142 uint64_t *keys, dm_block_t *new_root);
151 uint64_t *keys, uint64_t end_key,
176 int (*fn)(void *context, uint64_t *keys, void *leaf),
/Linux-v4.19/fs/xfs/
Dxfs_fsmap.c177 struct xfs_fsmap *keys,
399 struct xfs_fsmap *keys, in xfs_getfsmap_logdev() argument
407 info->low.rm_startblock = XFS_BB_TO_FSBT(mp, keys[0].fmr_physical); in xfs_getfsmap_logdev()
408 info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset); in xfs_getfsmap_logdev()
409 error = xfs_fsmap_owner_to_rmap(&info->low, keys); in xfs_getfsmap_logdev()
413 xfs_getfsmap_set_irec_flags(&info->low, &keys[0]); in xfs_getfsmap_logdev()
415 error = xfs_fsmap_owner_to_rmap(&info->high, keys + 1); in xfs_getfsmap_logdev()
428 if (keys[0].fmr_physical > 0) in xfs_getfsmap_logdev()
468 struct xfs_fsmap *keys, in __xfs_getfsmap_rtdev() argument
480 if (keys[0].fmr_physical >= eofs) in __xfs_getfsmap_rtdev()
[all …]
/Linux-v4.19/security/keys/
DKconfig10 access keys in the kernel.
12 It also includes provision of methods by which such keys might be
17 a searchable sequence of keys. Each process is equipped with access
45 bool "Large payload keys"
52 This option provides support for holding large keys within the kernel
67 keys in the kernel. Trusted keys are random number symmetric keys,
68 generated and RSA-sealed by the TPM. The TPM only unseals the keys,
84 This option provides support for create/encrypting/decrypting keys
85 in the kernel. Encrypted keys are kernel generated random numbers,
93 bool "Diffie-Hellman operations on retained keys"
[all …]
/Linux-v4.19/drivers/crypto/nx/
Dnx-aes-xcbc.c76 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local
88 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty()
89 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty()
91 len = sizeof(keys); in nx_xcbc_empty()
93 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty()
96 if (len != sizeof(keys)) in nx_xcbc_empty()
99 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty()
102 if (len != sizeof(keys)) in nx_xcbc_empty()
115 keys[1][0] ^= 0x80; in nx_xcbc_empty()
117 len = sizeof(keys[1]); in nx_xcbc_empty()
[all …]
/Linux-v4.19/lib/
Dtest_static_keys.c63 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument
69 if (previous != keys[i].key) { in invert_keys()
70 invert_key(keys[i].key); in invert_keys()
71 previous = keys[i].key; in invert_keys()
76 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument
82 ret = static_key_enabled(keys[i].key); in verify_keys()
83 init = keys[i].init_state; in verify_keys()
86 ret = keys[i].test_key(); in verify_keys()
87 if (static_key_enabled(keys[i].key)) { in verify_keys()
/Linux-v4.19/fs/xfs/libxfs/
Dxfs_iext_tree.c121 uint64_t keys[KEYS_PER_NODE]; member
285 if (node->keys[n] > offset) in xfs_iext_key_cmp()
287 if (node->keys[n] < offset) in xfs_iext_key_cmp()
370 if (node->keys[i] == XFS_IEXT_KEY_INVALID) in xfs_iext_node_nr_entries()
411 node->keys[0] = xfs_iext_leaf_key(prev, 0); in xfs_iext_grow()
418 node->keys[0] = prev->keys[0]; in xfs_iext_grow()
423 node->keys[i] = XFS_IEXT_KEY_INVALID; in xfs_iext_grow()
444 if (node->keys[i] == old_offset) in xfs_iext_update_node()
445 node->keys[i] = new_offset; in xfs_iext_update_node()
476 new->keys[i] = node->keys[nr_keep + i]; in xfs_iext_split_node()
[all …]
/Linux-v4.19/certs/
DKconfig19 bool "Provide system-wide ring of trusted keys"
23 Provide a system keyring to which trusted keys can be added. Keys in
26 userspace may only add extra keys if those keys can be verified by
27 keys already in the keyring.
32 string "Additional X.509 keys for default system keyring"
40 NOTE: If you previously provided keys for the system keyring in the
61 bool "Provide a keyring to which extra trustable keys may be added"
64 If set, provide a keyring to which extra keys may be added, provided
65 those keys are not blacklisted and are vouched for by a key built
69 bool "Provide system-wide ring of blacklisted keys"
[all …]
/Linux-v4.19/Documentation/devicetree/bindings/input/
Dinput-reset.txt3 A simple binding to represent a set of keys as described in
4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the
5 sysrq driver. Upon holding the keys for a specified amount of time (if
8 Key sequences are global to the system but all the keys in a set must be coming
12 a set of keys.
18 timeout-ms: duration keys must be pressed together in milliseconds before
Dadc-keys.txt5 - compatible: "adc-keys"
8 - keyup-threshold-microvolt: Voltage at which all the keys are considered up.
15 Each button (key) is represented as a sub-node of "adc-keys":
26 adc-keys {
27 compatible = "adc-keys";
Dmtk-pmic-keys.txt12 - compatible: "mediatek,mt6397-keys" or "mediatek,mt6323-keys"
13 - linux,keycodes: See Documentation/devicetree/bindings/input/keys.txt
19 - power-off-time-sec: See Documentation/devicetree/bindings/input/keys.txt
29 compatible = "mediatek,mt6397-keys";
/Linux-v4.19/drivers/input/
Dmatrix-keymap.c84 u32 *keys; in matrix_keypad_parse_keymap() local
105 keys = kmalloc_array(size, sizeof(u32), GFP_KERNEL); in matrix_keypad_parse_keymap()
106 if (!keys) in matrix_keypad_parse_keymap()
109 retval = device_property_read_u32_array(dev, propname, keys, size); in matrix_keypad_parse_keymap()
118 row_shift, keys[i])) { in matrix_keypad_parse_keymap()
127 kfree(keys); in matrix_keypad_parse_keymap()
/Linux-v4.19/crypto/
Dauthenc.c51 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument
65 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys()
70 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys()
73 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys()
74 keys->authkey = key; in crypto_authenc_extractkeys()
75 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys()
87 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local
90 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey()
96 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
106 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
[all …]
/Linux-v4.19/include/trace/events/
Dbcache.h248 __field(unsigned, keys )
254 __entry->keys = b->keys.set[b->keys.nsets].data->keys;
344 TP_PROTO(struct btree *b, unsigned keys),
345 TP_ARGS(b, keys),
349 __field(unsigned, keys )
354 __entry->keys = keys;
357 TP_printk("bucket %zu keys %u", __entry->bucket, __entry->keys)
361 TP_PROTO(struct btree *b, unsigned keys),
362 TP_ARGS(b, keys)
366 TP_PROTO(struct btree *b, unsigned keys),
[all …]
/Linux-v4.19/Documentation/security/keys/
Dtrusted-encrypted.rst6 key ring service. Both of these new types are variable length symmetric keys,
7 and in both cases all keys are created in the kernel, and user space sees,
13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
17 (future) PCR values, so keys are easily migrated to new pcr values, such as
21 By default, trusted keys are sealed under the SRK, which has the default
53 TPM_STORED_DATA format. The key length for new keys are always in bytes.
57 Encrypted keys do not depend on a TPM, and are faster, as they use AES for
58 encryption/decryption. New keys are created from kernel generated random
61 disadvantage of encrypted keys is that if they are not rooted in a trusted key,
66 The decrypted portion of encrypted keys can contain either a simple symmetric
[all …]
/Linux-v4.19/security/keys/encrypted-keys/
DMakefile6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o
8 encrypted-keys-y := encrypted.o ecryptfs_format.o
11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)

12345678910>>...27