Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 751) sorted by relevance

12345678910>>...31

/Linux-v5.4/drivers/input/keyboard/
Dipaq-micro-keys.c43 struct ipaq_micro_keys *keys = data; in micro_key_receive() local
50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive()
51 input_sync(keys->input); in micro_key_receive()
55 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument
57 spin_lock(&keys->micro->lock); in micro_key_start()
58 keys->micro->key = micro_key_receive; in micro_key_start()
59 keys->micro->key_data = keys; in micro_key_start()
60 spin_unlock(&keys->micro->lock); in micro_key_start()
63 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument
65 spin_lock(&keys->micro->lock); in micro_key_stop()
[all …]
Dmtk-pmic-keys.c78 struct mtk_pmic_keys *keys; member
89 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member
98 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument
104 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup()
109 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
113 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup()
120 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
123 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
128 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
131 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
[all …]
DMakefile8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o
9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o
10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o
11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o
30 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o
38 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o
44 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o
64 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
/Linux-v5.4/tools/testing/selftests/bpf/progs/
Dbpf_flow.c74 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, in export_flow_keys() argument
77 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys()
80 memcpy(&val, keys, sizeof(val)); in export_flow_keys()
117 struct bpf_flow_keys *keys = skb->flow_keys; in parse_eth_proto() local
136 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto()
139 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto()
145 struct bpf_flow_keys *keys = skb->flow_keys; in _dissect() local
147 return parse_eth_proto(skb, keys->n_proto); in _dissect()
153 struct bpf_flow_keys *keys = skb->flow_keys; in parse_ip_proto() local
165 return export_flow_keys(keys, BPF_DROP); in parse_ip_proto()
[all …]
/Linux-v5.4/tools/testing/selftests/net/
Dtcp_fastopen_backup_key.c51 static void get_keys(int fd, uint32_t *keys) in get_keys() argument
57 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) in get_keys()
64 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys()
65 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys()
69 static void set_keys(int fd, uint32_t *keys) in set_keys() argument
74 if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, in set_keys()
81 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys()
82 keys[6], keys[7]); in set_keys()
85 keys[0], keys[1], keys[2], keys[3]); in set_keys()
98 uint32_t keys[8]; in build_rcv_fd() local
[all …]
/Linux-v5.4/arch/arm64/include/asm/
Dpointer_auth.h33 static inline void ptrauth_keys_init(struct ptrauth_keys *keys) in ptrauth_keys_init() argument
36 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init()
37 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init()
38 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init()
39 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_keys_init()
43 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_keys_init()
53 static inline void ptrauth_keys_switch(struct ptrauth_keys *keys) in ptrauth_keys_switch() argument
56 __ptrauth_key_install(APIA, keys->apia); in ptrauth_keys_switch()
57 __ptrauth_key_install(APIB, keys->apib); in ptrauth_keys_switch()
58 __ptrauth_key_install(APDA, keys->apda); in ptrauth_keys_switch()
[all …]
/Linux-v5.4/arch/arm64/kernel/
Dpointer_auth.c12 struct ptrauth_keys *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local
21 ptrauth_keys_init(keys); in ptrauth_prctl_reset_keys()
22 ptrauth_keys_switch(keys); in ptrauth_prctl_reset_keys()
34 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys()
36 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys()
38 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys()
40 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys()
42 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys()
44 ptrauth_keys_switch(keys); in ptrauth_prctl_reset_keys()
/Linux-v5.4/drivers/input/misc/
Ddm355evm_keys.c102 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local
115 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq()
123 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq()
152 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq()
154 dev_dbg(keys->dev, in dm355evm_keys_irq()
159 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq()
160 input_sync(keys->input); in dm355evm_keys_irq()
161 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq()
162 input_sync(keys->input); in dm355evm_keys_irq()
172 struct dm355evm_keys *keys; in dm355evm_keys_probe() local
[all …]
/Linux-v5.4/drivers/md/bcache/
Dbtree.c171 if (b->level && b->keys.nsets) in bch_btree_init_next()
172 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next()
174 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next()
177 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next()
220 iter->b = &b->keys; in bch_btree_node_read_done()
227 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done()
255 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done()
265 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done()
267 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done()
270 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done()
[all …]
Ddebug.c44 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify()
45 inmemory = b->keys.set->data; in bch_btree_verify()
50 v->keys.ops = b->keys.ops; in bch_btree_verify()
65 sorted = v->keys.set->data; in bch_btree_verify()
67 if (inmemory->keys != sorted->keys || in bch_btree_verify()
78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify()
81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify()
88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify()
94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify()
163 struct keybuf keys; member
[all …]
/Linux-v5.4/drivers/net/ethernet/cisco/enic/
Denic_clsf.c21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument
26 switch (keys->basic.ip_proto) { in enic_addfltr_5t()
38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t()
39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t()
40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t()
41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t()
162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search()
163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search()
164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search()
165 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search()
[all …]
/Linux-v5.4/drivers/mfd/
Ducb1x00-assabet.c41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local
46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add()
55 keys.buttons = buttons; in ucb1x00_assabet_add()
56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add()
57 keys.poll_interval = 50; in ucb1x00_assabet_add()
58 keys.name = "ucb1x00"; in ucb1x00_assabet_add()
61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
/Linux-v5.4/drivers/md/persistent-data/
Ddm-btree.c47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch()
101 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at()
368 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw()
375 uint64_t *keys, void *value_le) in dm_btree_lookup() argument
397 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup()
402 if (rkey != keys[level]) { in dm_btree_lookup()
462 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single()
471 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument
480 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next()
486 if (*rkey != keys[level]) { in dm_btree_lookup_next()
[all …]
Ddm-btree.h110 uint64_t *keys, void *value_le);
117 uint64_t *keys, uint64_t *rkey, void *value_le);
123 uint64_t *keys, void *value, dm_block_t *new_root)
132 uint64_t *keys, void *value, dm_block_t *new_root,
142 uint64_t *keys, dm_block_t *new_root);
151 uint64_t *keys, uint64_t end_key,
176 int (*fn)(void *context, uint64_t *keys, void *leaf),
/Linux-v5.4/net/core/
Dflow_dissector.c1415 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument
1419 switch (keys->control.addr_type) { in __flow_hash_consistentify()
1421 addr_diff = (__force u32)keys->addrs.v4addrs.dst - in __flow_hash_consistentify()
1422 (__force u32)keys->addrs.v4addrs.src; in __flow_hash_consistentify()
1425 ((__force u16)keys->ports.dst < in __flow_hash_consistentify()
1426 (__force u16)keys->ports.src))) { in __flow_hash_consistentify()
1427 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify()
1428 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify()
1432 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify()
1433 &keys->addrs.v6addrs.src, in __flow_hash_consistentify()
[all …]
/Linux-v5.4/fs/xfs/
Dxfs_fsmap.c173 struct xfs_fsmap *keys,
395 struct xfs_fsmap *keys, in xfs_getfsmap_logdev() argument
403 info->low.rm_startblock = XFS_BB_TO_FSBT(mp, keys[0].fmr_physical); in xfs_getfsmap_logdev()
404 info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset); in xfs_getfsmap_logdev()
405 error = xfs_fsmap_owner_to_rmap(&info->low, keys); in xfs_getfsmap_logdev()
409 xfs_getfsmap_set_irec_flags(&info->low, &keys[0]); in xfs_getfsmap_logdev()
411 error = xfs_fsmap_owner_to_rmap(&info->high, keys + 1); in xfs_getfsmap_logdev()
424 if (keys[0].fmr_physical > 0) in xfs_getfsmap_logdev()
464 struct xfs_fsmap *keys, in __xfs_getfsmap_rtdev() argument
476 if (keys[0].fmr_physical >= eofs) in __xfs_getfsmap_rtdev()
[all …]
/Linux-v5.4/drivers/crypto/nx/
Dnx-aes-xcbc.c64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local
76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty()
77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty()
79 len = sizeof(keys); in nx_xcbc_empty()
81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty()
84 if (len != sizeof(keys)) in nx_xcbc_empty()
87 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty()
90 if (len != sizeof(keys)) in nx_xcbc_empty()
102 keys[1][0] ^= 0x80; in nx_xcbc_empty()
104 len = sizeof(keys[1]); in nx_xcbc_empty()
[all …]
/Linux-v5.4/lib/
Dtest_static_keys.c55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument
61 if (previous != keys[i].key) { in invert_keys()
62 invert_key(keys[i].key); in invert_keys()
63 previous = keys[i].key; in invert_keys()
68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument
74 ret = static_key_enabled(keys[i].key); in verify_keys()
75 init = keys[i].init_state; in verify_keys()
78 ret = keys[i].test_key(); in verify_keys()
79 if (static_key_enabled(keys[i].key)) { in verify_keys()
/Linux-v5.4/security/keys/
DKconfig11 access keys in the kernel.
13 It also includes provision of methods by which such keys might be
18 a searchable sequence of keys. Each process is equipped with access
64 bool "Large payload keys"
71 This option provides support for holding large keys within the kernel
86 keys in the kernel. Trusted keys are random number symmetric keys,
87 generated and RSA-sealed by the TPM. The TPM only unseals the keys,
103 This option provides support for create/encrypting/decrypting keys
104 in the kernel. Encrypted keys are kernel generated random numbers,
112 bool "Diffie-Hellman operations on retained keys"
[all …]
/Linux-v5.4/fs/xfs/libxfs/
Dxfs_iext_tree.c117 uint64_t keys[KEYS_PER_NODE]; member
281 if (node->keys[n] > offset) in xfs_iext_key_cmp()
283 if (node->keys[n] < offset) in xfs_iext_key_cmp()
366 if (node->keys[i] == XFS_IEXT_KEY_INVALID) in xfs_iext_node_nr_entries()
407 node->keys[0] = xfs_iext_leaf_key(prev, 0); in xfs_iext_grow()
414 node->keys[0] = prev->keys[0]; in xfs_iext_grow()
419 node->keys[i] = XFS_IEXT_KEY_INVALID; in xfs_iext_grow()
440 if (node->keys[i] == old_offset) in xfs_iext_update_node()
441 node->keys[i] = new_offset; in xfs_iext_update_node()
472 new->keys[i] = node->keys[nr_keep + i]; in xfs_iext_split_node()
[all …]
/Linux-v5.4/Documentation/devicetree/bindings/input/
Dinput-reset.txt3 A simple binding to represent a set of keys as described in
4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the
5 sysrq driver. Upon holding the keys for a specified amount of time (if
8 Key sequences are global to the system but all the keys in a set must be coming
12 a set of keys.
18 timeout-ms: duration keys must be pressed together in milliseconds before
/Linux-v5.4/certs/
DKconfig19 bool "Provide system-wide ring of trusted keys"
23 Provide a system keyring to which trusted keys can be added. Keys in
26 userspace may only add extra keys if those keys can be verified by
27 keys already in the keyring.
32 string "Additional X.509 keys for default system keyring"
40 NOTE: If you previously provided keys for the system keyring in the
61 bool "Provide a keyring to which extra trustable keys may be added"
64 If set, provide a keyring to which extra keys may be added, provided
65 those keys are not blacklisted and are vouched for by a key built
69 bool "Provide system-wide ring of blacklisted keys"
[all …]
/Linux-v5.4/include/trace/events/
Dbcache.h225 TP_PROTO(struct bio *bio, u32 keys),
226 TP_ARGS(bio, keys),
240 __entry->nr_keys = keys;
269 __field(unsigned, keys )
275 __entry->keys = b->keys.set[b->keys.nsets].data->keys;
365 TP_PROTO(struct btree *b, unsigned keys),
366 TP_ARGS(b, keys),
370 __field(unsigned, keys )
375 __entry->keys = keys;
378 TP_printk("bucket %zu keys %u", __entry->bucket, __entry->keys)
[all …]
/Linux-v5.4/tools/testing/selftests/bpf/prog_tests/
Dflow_dissector.c97 struct bpf_flow_keys keys; member
115 .keys = {
135 .keys = {
157 .keys = {
179 .keys = {
202 .keys = {
228 .keys = {
249 .keys = {
275 .keys = {
297 .keys = {
[all …]
/Linux-v5.4/security/integrity/
DKconfig29 to "lock" certain keyring to prevent adding new keys.
30 This is useful for evm and module keyrings, when keys are
34 bool "Enable asymmetric keys support"
43 asymmetric keys.
46 bool "Require all keys on the integrity keyrings be signed"
51 This option requires that all keys added to the .ima and
56 bool "Provide keyring for platform/firmware trusted keys"
60 Provide a separate, distinct keyring for platform trusted keys, which

12345678910>>...31