/Linux-v4.19/drivers/input/keyboard/ |
D | ipaq-micro-keys.c | 46 struct ipaq_micro_keys *keys = data; in micro_key_receive() local 53 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 54 input_sync(keys->input); in micro_key_receive() 58 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument 60 spin_lock(&keys->micro->lock); in micro_key_start() 61 keys->micro->key = micro_key_receive; in micro_key_start() 62 keys->micro->key_data = keys; in micro_key_start() 63 spin_unlock(&keys->micro->lock); in micro_key_start() 66 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument 68 spin_lock(&keys->micro->lock); in micro_key_stop() [all …]
|
D | mtk-pmic-keys.c | 88 struct mtk_pmic_keys *keys; member 99 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member 108 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument 114 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 119 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 123 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 130 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 133 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 138 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 141 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() [all …]
|
D | Makefile | 8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 29 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 37 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 43 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o 62 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
/Linux-v4.19/drivers/input/misc/ |
D | dm355evm_keys.c | 106 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local 119 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq() 127 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq() 156 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq() 158 dev_dbg(keys->dev, in dm355evm_keys_irq() 163 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq() 164 input_sync(keys->input); in dm355evm_keys_irq() 165 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq() 166 input_sync(keys->input); in dm355evm_keys_irq() 176 struct dm355evm_keys *keys; in dm355evm_keys_probe() local [all …]
|
/Linux-v4.19/drivers/md/bcache/ |
D | btree.c | 171 if (b->level && b->keys.nsets) in bch_btree_init_next() 172 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 174 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() 177 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next() 215 iter->b = &b->keys; in bch_btree_node_read_done() 222 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done() 250 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done() 260 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done() 262 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done() 265 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done() [all …]
|
D | debug.c | 44 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify() 45 inmemory = b->keys.set->data; in bch_btree_verify() 50 v->keys.ops = b->keys.ops; in bch_btree_verify() 65 sorted = v->keys.set->data; in bch_btree_verify() 67 if (inmemory->keys != sorted->keys || in bch_btree_verify() 78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 163 struct keybuf keys; member [all …]
|
/Linux-v4.19/drivers/net/ethernet/cisco/enic/ |
D | enic_clsf.c | 21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 37 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t() 38 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t() 39 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 40 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 161 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search() 162 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search() 163 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 164 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search() [all …]
|
/Linux-v4.19/net/core/ |
D | flow_dissector.c | 1151 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument 1155 switch (keys->control.addr_type) { in __flow_hash_consistentify() 1157 addr_diff = (__force u32)keys->addrs.v4addrs.dst - in __flow_hash_consistentify() 1158 (__force u32)keys->addrs.v4addrs.src; in __flow_hash_consistentify() 1161 ((__force u16)keys->ports.dst < in __flow_hash_consistentify() 1162 (__force u16)keys->ports.src))) { in __flow_hash_consistentify() 1163 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1164 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1168 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify() 1169 &keys->addrs.v6addrs.src, in __flow_hash_consistentify() [all …]
|
/Linux-v4.19/drivers/mfd/ |
D | ucb1x00-assabet.c | 44 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 49 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 58 keys.buttons = buttons; in ucb1x00_assabet_add() 59 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 60 keys.poll_interval = 50; in ucb1x00_assabet_add() 61 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 64 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
/Linux-v4.19/drivers/md/persistent-data/ |
D | dm-btree.c | 47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch() 101 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 368 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw() 375 uint64_t *keys, void *value_le) in dm_btree_lookup() argument 397 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup() 402 if (rkey != keys[level]) { in dm_btree_lookup() 462 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single() 471 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument 480 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next() 486 if (*rkey != keys[level]) { in dm_btree_lookup_next() [all …]
|
D | dm-btree.h | 110 uint64_t *keys, void *value_le); 117 uint64_t *keys, uint64_t *rkey, void *value_le); 123 uint64_t *keys, void *value, dm_block_t *new_root) 132 uint64_t *keys, void *value, dm_block_t *new_root, 142 uint64_t *keys, dm_block_t *new_root); 151 uint64_t *keys, uint64_t end_key, 176 int (*fn)(void *context, uint64_t *keys, void *leaf),
|
/Linux-v4.19/fs/xfs/ |
D | xfs_fsmap.c | 177 struct xfs_fsmap *keys, 399 struct xfs_fsmap *keys, in xfs_getfsmap_logdev() argument 407 info->low.rm_startblock = XFS_BB_TO_FSBT(mp, keys[0].fmr_physical); in xfs_getfsmap_logdev() 408 info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset); in xfs_getfsmap_logdev() 409 error = xfs_fsmap_owner_to_rmap(&info->low, keys); in xfs_getfsmap_logdev() 413 xfs_getfsmap_set_irec_flags(&info->low, &keys[0]); in xfs_getfsmap_logdev() 415 error = xfs_fsmap_owner_to_rmap(&info->high, keys + 1); in xfs_getfsmap_logdev() 428 if (keys[0].fmr_physical > 0) in xfs_getfsmap_logdev() 468 struct xfs_fsmap *keys, in __xfs_getfsmap_rtdev() argument 480 if (keys[0].fmr_physical >= eofs) in __xfs_getfsmap_rtdev() [all …]
|
/Linux-v4.19/security/keys/ |
D | Kconfig | 10 access keys in the kernel. 12 It also includes provision of methods by which such keys might be 17 a searchable sequence of keys. Each process is equipped with access 45 bool "Large payload keys" 52 This option provides support for holding large keys within the kernel 67 keys in the kernel. Trusted keys are random number symmetric keys, 68 generated and RSA-sealed by the TPM. The TPM only unseals the keys, 84 This option provides support for create/encrypting/decrypting keys 85 in the kernel. Encrypted keys are kernel generated random numbers, 93 bool "Diffie-Hellman operations on retained keys" [all …]
|
/Linux-v4.19/drivers/crypto/nx/ |
D | nx-aes-xcbc.c | 76 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 88 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 89 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 91 len = sizeof(keys); in nx_xcbc_empty() 93 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 96 if (len != sizeof(keys)) in nx_xcbc_empty() 99 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty() 102 if (len != sizeof(keys)) in nx_xcbc_empty() 115 keys[1][0] ^= 0x80; in nx_xcbc_empty() 117 len = sizeof(keys[1]); in nx_xcbc_empty() [all …]
|
/Linux-v4.19/lib/ |
D | test_static_keys.c | 63 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 69 if (previous != keys[i].key) { in invert_keys() 70 invert_key(keys[i].key); in invert_keys() 71 previous = keys[i].key; in invert_keys() 76 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 82 ret = static_key_enabled(keys[i].key); in verify_keys() 83 init = keys[i].init_state; in verify_keys() 86 ret = keys[i].test_key(); in verify_keys() 87 if (static_key_enabled(keys[i].key)) { in verify_keys()
|
/Linux-v4.19/fs/xfs/libxfs/ |
D | xfs_iext_tree.c | 121 uint64_t keys[KEYS_PER_NODE]; member 285 if (node->keys[n] > offset) in xfs_iext_key_cmp() 287 if (node->keys[n] < offset) in xfs_iext_key_cmp() 370 if (node->keys[i] == XFS_IEXT_KEY_INVALID) in xfs_iext_node_nr_entries() 411 node->keys[0] = xfs_iext_leaf_key(prev, 0); in xfs_iext_grow() 418 node->keys[0] = prev->keys[0]; in xfs_iext_grow() 423 node->keys[i] = XFS_IEXT_KEY_INVALID; in xfs_iext_grow() 444 if (node->keys[i] == old_offset) in xfs_iext_update_node() 445 node->keys[i] = new_offset; in xfs_iext_update_node() 476 new->keys[i] = node->keys[nr_keep + i]; in xfs_iext_split_node() [all …]
|
/Linux-v4.19/certs/ |
D | Kconfig | 19 bool "Provide system-wide ring of trusted keys" 23 Provide a system keyring to which trusted keys can be added. Keys in 26 userspace may only add extra keys if those keys can be verified by 27 keys already in the keyring. 32 string "Additional X.509 keys for default system keyring" 40 NOTE: If you previously provided keys for the system keyring in the 61 bool "Provide a keyring to which extra trustable keys may be added" 64 If set, provide a keyring to which extra keys may be added, provided 65 those keys are not blacklisted and are vouched for by a key built 69 bool "Provide system-wide ring of blacklisted keys" [all …]
|
/Linux-v4.19/Documentation/devicetree/bindings/input/ |
D | input-reset.txt | 3 A simple binding to represent a set of keys as described in 4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the 5 sysrq driver. Upon holding the keys for a specified amount of time (if 8 Key sequences are global to the system but all the keys in a set must be coming 12 a set of keys. 18 timeout-ms: duration keys must be pressed together in milliseconds before
|
D | adc-keys.txt | 5 - compatible: "adc-keys" 8 - keyup-threshold-microvolt: Voltage at which all the keys are considered up. 15 Each button (key) is represented as a sub-node of "adc-keys": 26 adc-keys { 27 compatible = "adc-keys";
|
D | mtk-pmic-keys.txt | 12 - compatible: "mediatek,mt6397-keys" or "mediatek,mt6323-keys" 13 - linux,keycodes: See Documentation/devicetree/bindings/input/keys.txt 19 - power-off-time-sec: See Documentation/devicetree/bindings/input/keys.txt 29 compatible = "mediatek,mt6397-keys";
|
/Linux-v4.19/drivers/input/ |
D | matrix-keymap.c | 84 u32 *keys; in matrix_keypad_parse_keymap() local 105 keys = kmalloc_array(size, sizeof(u32), GFP_KERNEL); in matrix_keypad_parse_keymap() 106 if (!keys) in matrix_keypad_parse_keymap() 109 retval = device_property_read_u32_array(dev, propname, keys, size); in matrix_keypad_parse_keymap() 118 row_shift, keys[i])) { in matrix_keypad_parse_keymap() 127 kfree(keys); in matrix_keypad_parse_keymap()
|
/Linux-v4.19/crypto/ |
D | authenc.c | 51 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument 65 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 70 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 73 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 74 keys->authkey = key; in crypto_authenc_extractkeys() 75 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 87 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local 90 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey() 96 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 106 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey() [all …]
|
/Linux-v4.19/include/trace/events/ |
D | bcache.h | 248 __field(unsigned, keys ) 254 __entry->keys = b->keys.set[b->keys.nsets].data->keys; 344 TP_PROTO(struct btree *b, unsigned keys), 345 TP_ARGS(b, keys), 349 __field(unsigned, keys ) 354 __entry->keys = keys; 357 TP_printk("bucket %zu keys %u", __entry->bucket, __entry->keys) 361 TP_PROTO(struct btree *b, unsigned keys), 362 TP_ARGS(b, keys) 366 TP_PROTO(struct btree *b, unsigned keys), [all …]
|
/Linux-v4.19/Documentation/security/keys/ |
D | trusted-encrypted.rst | 6 key ring service. Both of these new types are variable length symmetric keys, 7 and in both cases all keys are created in the kernel, and user space sees, 13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 17 (future) PCR values, so keys are easily migrated to new pcr values, such as 21 By default, trusted keys are sealed under the SRK, which has the default 53 TPM_STORED_DATA format. The key length for new keys are always in bytes. 57 Encrypted keys do not depend on a TPM, and are faster, as they use AES for 58 encryption/decryption. New keys are created from kernel generated random 61 disadvantage of encrypted keys is that if they are not rooted in a trusted key, 66 The decrypted portion of encrypted keys can contain either a simple symmetric [all …]
|
/Linux-v4.19/security/keys/encrypted-keys/ |
D | Makefile | 6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 8 encrypted-keys-y := encrypted.o ecryptfs_format.o 11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|