Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 1039) sorted by relevance

12345678910>>...42

/Linux-v6.1/drivers/input/keyboard/
Dipaq-micro-keys.c43 struct ipaq_micro_keys *keys = data; in micro_key_receive() local
50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive()
51 input_sync(keys->input); in micro_key_receive()
55 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument
57 spin_lock(&keys->micro->lock); in micro_key_start()
58 keys->micro->key = micro_key_receive; in micro_key_start()
59 keys->micro->key_data = keys; in micro_key_start()
60 spin_unlock(&keys->micro->lock); in micro_key_start()
63 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument
65 spin_lock(&keys->micro->lock); in micro_key_stop()
[all …]
Dmtk-pmic-keys.c107 struct mtk_pmic_keys *keys; member
119 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member
128 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument
136 kregs_home = keys->keys[MTK_PMIC_HOMEKEY_INDEX].regs; in mtk_pmic_keys_lp_reset_setup()
137 kregs_pwr = keys->keys[MTK_PMIC_PWRKEY_INDEX].regs; in mtk_pmic_keys_lp_reset_setup()
139 error = of_property_read_u32(keys->dev->of_node, "power-off-time-sec", in mtk_pmic_keys_lp_reset_setup()
147 error = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup()
171 regmap_update_bits(keys->regmap, regs->pmic_rst_reg, mask, value); in mtk_pmic_keys_lp_reset_setup()
179 regmap_read(info->keys->regmap, info->regs->deb_reg, &key_deb); in mtk_pmic_keys_irq_handler_thread()
185 input_report_key(info->keys->input_dev, info->keycode, pressed); in mtk_pmic_keys_irq_handler_thread()
[all …]
DMakefile8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o
9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o
10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o
11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o
31 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o
32 obj-$(CONFIG_KEYBOARD_IQS62X) += iqs62x-keys.o
41 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o
48 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o
69 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
/Linux-v6.1/tools/testing/selftests/bpf/progs/
Dbpf_flow.c75 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, in export_flow_keys() argument
78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys()
81 memcpy(&val, keys, sizeof(val)); in export_flow_keys()
118 struct bpf_flow_keys *keys = skb->flow_keys; in parse_eth_proto() local
137 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto()
140 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto()
146 struct bpf_flow_keys *keys = skb->flow_keys; in _dissect() local
148 if (keys->n_proto == bpf_htons(ETH_P_IP)) { in _dissect()
161 return parse_eth_proto(skb, keys->n_proto); in _dissect()
167 struct bpf_flow_keys *keys = skb->flow_keys; in parse_ip_proto() local
[all …]
/Linux-v6.1/arch/arm64/include/asm/
Dpointer_auth.h50 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_init_kernel() argument
53 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel()
56 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_switch_kernel() argument
61 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel()
67 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys) in ptrauth_keys_install_user() argument
70 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user()
71 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user()
72 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user()
76 __ptrauth_key_install_nosync(APGA, keys->apga); in ptrauth_keys_install_user()
79 static inline void ptrauth_keys_init_user(struct ptrauth_keys_user *keys) in ptrauth_keys_init_user() argument
[all …]
/Linux-v6.1/tools/testing/selftests/net/
Dtcp_fastopen_backup_key.c49 static void get_keys(int fd, uint32_t *keys) in get_keys() argument
55 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) in get_keys()
62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys()
63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys()
67 static void set_keys(int fd, uint32_t *keys) in set_keys() argument
72 if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, in set_keys()
79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys()
80 keys[6], keys[7]); in set_keys()
83 keys[0], keys[1], keys[2], keys[3]); in set_keys()
96 uint32_t keys[8]; in build_rcv_fd() local
[all …]
/Linux-v6.1/tools/testing/selftests/bpf/map_tests/
Dhtab_map_batch_ops.c14 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument
29 keys[i] = i + 1; in map_batch_update()
37 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update()
42 int *keys, void *values, bool is_pcpu) in map_batch_verify() argument
56 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j), in map_batch_verify()
59 i, j, keys[i], bpf_percpu(v[i], j)); in map_batch_verify()
62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify()
64 "error: i %d key %d value %d\n", i, keys[i], in map_batch_verify()
81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local
98 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch()
[all …]
Darray_map_batch_ops.c15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument
26 keys[i] = i; in map_batch_update()
36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update()
40 static void map_batch_verify(int *visited, __u32 max_entries, int *keys, in map_batch_verify() argument
52 CHECK(keys[i] + j + 1 != value, in map_batch_verify()
55 j, keys[i], value); in map_batch_verify()
58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify()
59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify()
72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local
92 keys = calloc(max_entries, sizeof(*keys)); in __test_map_lookup_and_update_batch()
[all …]
Dlpm_trie_map_batch_ops.c23 struct test_lpm_key *keys, int *values) in map_batch_update() argument
34 keys[i].prefix = 32; in map_batch_update()
36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update()
40 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update()
45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument
53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify()
69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local
86 keys = malloc(max_entries * sizeof(struct test_lpm_key)); in test_lpm_trie_map_batch_ops()
89 CHECK(!keys || !values || !visited, "malloc()", "error:%s\n", in test_lpm_trie_map_batch_ops()
94 map_batch_update(map_fd, max_entries, keys, values); in test_lpm_trie_map_batch_ops()
[all …]
/Linux-v6.1/arch/arm64/kernel/
Dpointer_auth.c13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local
25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys()
37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys()
39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys()
41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys()
43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys()
45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys()
46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys()
67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument
78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys()
[all …]
/Linux-v6.1/drivers/input/misc/
Ddm355evm_keys.c102 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local
115 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq()
123 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq()
152 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq()
154 dev_dbg(keys->dev, in dm355evm_keys_irq()
159 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq()
160 input_sync(keys->input); in dm355evm_keys_irq()
161 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq()
162 input_sync(keys->input); in dm355evm_keys_irq()
172 struct dm355evm_keys *keys; in dm355evm_keys_probe() local
[all …]
/Linux-v6.1/drivers/md/bcache/
Dbtree.c115 if (b->level && b->keys.nsets) in bch_btree_init_next()
116 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next()
118 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next()
121 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next()
164 iter->b = &b->keys; in bch_btree_node_read_done()
171 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done()
199 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done()
209 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done()
211 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done()
214 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done()
[all …]
Ddebug.c44 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify()
45 inmemory = b->keys.set->data; in bch_btree_verify()
50 v->keys.ops = b->keys.ops; in bch_btree_verify()
65 sorted = v->keys.set->data; in bch_btree_verify()
67 if (inmemory->keys != sorted->keys || in bch_btree_verify()
78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify()
81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify()
88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify()
94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify()
164 struct keybuf keys; member
[all …]
/Linux-v6.1/drivers/net/ethernet/cisco/enic/
Denic_clsf.c21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument
26 switch (keys->basic.ip_proto) { in enic_addfltr_5t()
38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t()
39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t()
40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t()
41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t()
162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search()
163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search()
164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search()
165 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search()
[all …]
/Linux-v6.1/drivers/mfd/
Ducb1x00-assabet.c41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local
46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add()
55 keys.buttons = buttons; in ucb1x00_assabet_add()
56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add()
57 keys.poll_interval = 50; in ucb1x00_assabet_add()
58 keys.name = "ucb1x00"; in ucb1x00_assabet_add()
61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
/Linux-v6.1/drivers/md/persistent-data/
Ddm-btree.c47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch()
101 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at()
364 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw()
372 uint64_t *keys, void *value_le) in dm_btree_lookup() argument
394 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup()
399 if (rkey != keys[level]) { in dm_btree_lookup()
459 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single()
468 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument
477 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next()
483 if (*rkey != keys[level]) { in dm_btree_lookup_next()
[all …]
Ddm-btree.h110 uint64_t *keys, void *value_le);
117 uint64_t *keys, uint64_t *rkey, void *value_le);
123 uint64_t *keys, void *value, dm_block_t *new_root)
132 uint64_t *keys, void *value, dm_block_t *new_root,
142 uint64_t *keys, dm_block_t *new_root);
151 uint64_t *keys, uint64_t end_key,
176 int (*fn)(void *context, uint64_t *keys, void *leaf),
/Linux-v6.1/security/keys/
DKconfig11 access keys in the kernel.
13 It also includes provision of methods by which such keys might be
18 a searchable sequence of keys. Each process is equipped with access
60 bool "Large payload keys"
65 This option provides support for holding large keys within the kernel
76 keys in the kernel. Trusted keys are random number symmetric keys,
83 source "security/keys/trusted-keys/Kconfig"
96 This option provides support for create/encrypting/decrypting keys
97 in the kernel. Encrypted keys are instantiated using kernel
106 bool "Allow encrypted keys with user decrypted data"
[all …]
/Linux-v6.1/net/core/
Dflow_dissector.c1640 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument
1644 switch (keys->control.addr_type) { in __flow_hash_consistentify()
1646 if ((__force u32)keys->addrs.v4addrs.dst < in __flow_hash_consistentify()
1647 (__force u32)keys->addrs.v4addrs.src) in __flow_hash_consistentify()
1648 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify()
1650 if ((__force u16)keys->ports.dst < in __flow_hash_consistentify()
1651 (__force u16)keys->ports.src) { in __flow_hash_consistentify()
1652 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify()
1656 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify()
1657 &keys->addrs.v6addrs.src, in __flow_hash_consistentify()
[all …]
/Linux-v6.1/fs/xfs/
Dxfs_fsmap.c174 const struct xfs_fsmap *keys,
407 const struct xfs_fsmap *keys, in xfs_getfsmap_logdev() argument
415 info->low.rm_startblock = XFS_BB_TO_FSBT(mp, keys[0].fmr_physical); in xfs_getfsmap_logdev()
416 info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset); in xfs_getfsmap_logdev()
417 error = xfs_fsmap_owner_to_rmap(&info->low, keys); in xfs_getfsmap_logdev()
421 xfs_getfsmap_set_irec_flags(&info->low, &keys[0]); in xfs_getfsmap_logdev()
423 error = xfs_fsmap_owner_to_rmap(&info->high, keys + 1); in xfs_getfsmap_logdev()
436 if (keys[0].fmr_physical > 0) in xfs_getfsmap_logdev()
476 const struct xfs_fsmap *keys, in __xfs_getfsmap_rtdev() argument
488 if (keys[0].fmr_physical >= eofs) in __xfs_getfsmap_rtdev()
[all …]
/Linux-v6.1/security/integrity/
DKconfig29 to "lock" certain keyring to prevent adding new keys.
30 This is useful for evm and module keyrings, when keys are
34 bool "Enable asymmetric keys support"
43 asymmetric keys.
46 bool "Require all keys on the integrity keyrings be signed"
51 This option requires that all keys added to the .ima and
56 bool "Provide keyring for platform/firmware trusted keys"
60 Provide a separate, distinct keyring for platform trusted keys, which
74 be added. This keyring shall contain just MOK keys. Unlike keys
75 in the platform keyring, keys contained in the .machine keyring will
[all …]
/Linux-v6.1/drivers/crypto/nx/
Dnx-aes-xcbc.c64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local
76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty()
77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty()
79 len = sizeof(keys); in nx_xcbc_empty()
81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty()
84 if (len != sizeof(keys)) in nx_xcbc_empty()
87 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty()
90 if (len != sizeof(keys)) in nx_xcbc_empty()
102 keys[1][0] ^= 0x80; in nx_xcbc_empty()
104 len = sizeof(keys[1]); in nx_xcbc_empty()
[all …]
/Linux-v6.1/lib/
Dtest_static_keys.c55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument
61 if (previous != keys[i].key) { in invert_keys()
62 invert_key(keys[i].key); in invert_keys()
63 previous = keys[i].key; in invert_keys()
68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument
74 ret = static_key_enabled(keys[i].key); in verify_keys()
75 init = keys[i].init_state; in verify_keys()
78 ret = keys[i].test_key(); in verify_keys()
79 if (static_key_enabled(keys[i].key)) { in verify_keys()
/Linux-v6.1/fs/xfs/libxfs/
Dxfs_iext_tree.c117 uint64_t keys[KEYS_PER_NODE]; member
281 if (node->keys[n] > offset) in xfs_iext_key_cmp()
283 if (node->keys[n] < offset) in xfs_iext_key_cmp()
366 if (node->keys[i] == XFS_IEXT_KEY_INVALID) in xfs_iext_node_nr_entries()
407 node->keys[0] = xfs_iext_leaf_key(prev, 0); in xfs_iext_grow()
414 node->keys[0] = prev->keys[0]; in xfs_iext_grow()
419 node->keys[i] = XFS_IEXT_KEY_INVALID; in xfs_iext_grow()
440 if (node->keys[i] == old_offset) in xfs_iext_update_node()
441 node->keys[i] = new_offset; in xfs_iext_update_node()
472 new->keys[i] = node->keys[nr_keep + i]; in xfs_iext_split_node()
[all …]
/Linux-v6.1/security/keys/trusted-keys/
DKconfig2 bool "TPM-based trusted keys"
14 backend. Trusted keys are random number symmetric keys,
16 The TPM only unseals the keys, if the boot PCRs and other
20 bool "TEE-based trusted keys"
28 bool "CAAM-based trusted keys"

12345678910>>...42