| /Linux-v5.15/drivers/input/keyboard/ | 
| D | ipaq-micro-keys.c | 43 	struct ipaq_micro_keys *keys = data;  in micro_key_receive()  local50 		input_report_key(keys->input, keys->codes[key], down);  in micro_key_receive()
 51 		input_sync(keys->input);  in micro_key_receive()
 55 static void micro_key_start(struct ipaq_micro_keys *keys)  in micro_key_start()  argument
 57 	spin_lock(&keys->micro->lock);  in micro_key_start()
 58 	keys->micro->key = micro_key_receive;  in micro_key_start()
 59 	keys->micro->key_data = keys;  in micro_key_start()
 60 	spin_unlock(&keys->micro->lock);  in micro_key_start()
 63 static void micro_key_stop(struct ipaq_micro_keys *keys)  in micro_key_stop()  argument
 65 	spin_lock(&keys->micro->lock);  in micro_key_stop()
 [all …]
 
 | 
| D | mtk-pmic-keys.c | 78 	struct mtk_pmic_keys *keys;  member89 	struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT];  member
 98 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys,  in mtk_pmic_keys_lp_reset_setup()  argument
 104 	ret = of_property_read_u32(keys->dev->of_node,  in mtk_pmic_keys_lp_reset_setup()
 109 	regmap_update_bits(keys->regmap, pmic_rst_reg,  in mtk_pmic_keys_lp_reset_setup()
 113 	ret = of_property_read_u32(keys->dev->of_node,  in mtk_pmic_keys_lp_reset_setup()
 120 		regmap_update_bits(keys->regmap, pmic_rst_reg,  in mtk_pmic_keys_lp_reset_setup()
 123 		regmap_update_bits(keys->regmap, pmic_rst_reg,  in mtk_pmic_keys_lp_reset_setup()
 128 		regmap_update_bits(keys->regmap, pmic_rst_reg,  in mtk_pmic_keys_lp_reset_setup()
 131 		regmap_update_bits(keys->regmap, pmic_rst_reg,  in mtk_pmic_keys_lp_reset_setup()
 [all …]
 
 | 
| /Linux-v5.15/tools/testing/selftests/bpf/progs/ | 
| D | bpf_flow.c | 74 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys,  in export_flow_keys()  argument77 	__u32 key = (__u32)(keys->sport) << 16 | keys->dport;  in export_flow_keys()
 80 	memcpy(&val, keys, sizeof(val));  in export_flow_keys()
 117 	struct bpf_flow_keys *keys = skb->flow_keys;  in parse_eth_proto()  local
 136 		return export_flow_keys(keys, BPF_DROP);  in parse_eth_proto()
 139 	return export_flow_keys(keys, BPF_DROP);  in parse_eth_proto()
 145 	struct bpf_flow_keys *keys = skb->flow_keys;  in _dissect()  local
 147 	return parse_eth_proto(skb, keys->n_proto);  in _dissect()
 153 	struct bpf_flow_keys *keys = skb->flow_keys;  in parse_ip_proto()  local
 165 			return export_flow_keys(keys, BPF_DROP);  in parse_ip_proto()
 [all …]
 
 | 
| /Linux-v5.15/arch/arm64/include/asm/ | 
| D | pointer_auth.h | 26  * We give each process its own keys, which are shared by all threads. The keys50 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys)  in ptrauth_keys_init_kernel()  argument
 53 		get_random_bytes(&keys->apia, sizeof(keys->apia));  in ptrauth_keys_init_kernel()
 56 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys)  in ptrauth_keys_switch_kernel()  argument
 61 	__ptrauth_key_install_nosync(APIA, keys->apia);  in ptrauth_keys_switch_kernel()
 67 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys)  in ptrauth_keys_install_user()  argument
 70 		__ptrauth_key_install_nosync(APIB, keys->apib);  in ptrauth_keys_install_user()
 71 		__ptrauth_key_install_nosync(APDA, keys->apda);  in ptrauth_keys_install_user()
 72 		__ptrauth_key_install_nosync(APDB, keys->apdb);  in ptrauth_keys_install_user()
 76 		__ptrauth_key_install_nosync(APGA, keys->apga);  in ptrauth_keys_install_user()
 [all …]
 
 | 
| /Linux-v5.15/security/keys/ | 
| D | Kconfig | 6 config KEYS  config11 	  access keys in the kernel.
 13 	  It also includes provision of methods by which such keys might be
 18 	  a searchable sequence of keys. Each process is equipped with access
 26 	depends on KEYS
 44 	depends on KEYS
 60 	bool "Large payload keys"
 61 	depends on KEYS
 65 	  This option provides support for holding large keys within the kernel
 72 	tristate "TRUSTED KEYS"
 [all …]
 
 | 
| D | gc.c | 10 #include <keys/keyring-type.h>19  * Reaper for unused keys.
 25  * Reaper for links from keyrings to dead keys.
 80  * reaper to go through a cycle finding expired keys.
 90  * Reap keys of dead type.
 93  * collector: the first to mark keys of that type as being dead, the second to
 94  * collect dead links and the third to clean up the dead keys.  We have to be
 120  * Garbage collect a list of unreferenced, detached keys
 122 static noinline void key_gc_unused_keys(struct list_head *keys)  in key_gc_unused_keys()  argument
 124 	while (!list_empty(keys)) {  in key_gc_unused_keys()
 [all …]
 
 | 
| /Linux-v5.15/tools/testing/selftests/net/ | 
| D | tcp_fastopen_backup_key.c | 5  * New keys are 'rotated' in two steps:7  * 2) Make new key the primary by swapping the backup and primary keys
 51 static void get_keys(int fd, uint32_t *keys)  in get_keys()  argument
 57 		if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len))  in get_keys()
 64 	if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2,  in get_keys()
 65 	    keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8)  in get_keys()
 69 static void set_keys(int fd, uint32_t *keys)  in set_keys()  argument
 74 		if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys,  in set_keys()
 81 			 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5],  in set_keys()
 82 			 keys[6], keys[7]);  in set_keys()
 [all …]
 
 | 
| /Linux-v5.15/certs/ | 
| D | Kconfig | 39 	 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem,45 	bool "Provide system-wide ring of trusted keys"
 46 	depends on KEYS
 49 	  Provide a system keyring to which trusted keys can be added.  Keys in
 50 	  the keyring are considered to be trusted.  Keys may be added at will
 52 	  userspace may only add extra keys if those keys can be verified by
 53 	  keys already in the keyring.
 55 	  Keys in this keyring are used by module signature checking.
 58 	string "Additional X.509 keys for default system keyring"
 66 	  NOTE: If you previously provided keys for the system keyring in the
 [all …]
 
 | 
| /Linux-v5.15/arch/arm64/kernel/ | 
| D | pointer_auth.c | 13 	struct ptrauth_keys_user *keys = &tsk->thread.keys_user;  in ptrauth_prctl_reset_keys()  local25 		ptrauth_keys_init_user(keys);  in ptrauth_prctl_reset_keys()
 37 		get_random_bytes(&keys->apia, sizeof(keys->apia));  in ptrauth_prctl_reset_keys()
 39 		get_random_bytes(&keys->apib, sizeof(keys->apib));  in ptrauth_prctl_reset_keys()
 41 		get_random_bytes(&keys->apda, sizeof(keys->apda));  in ptrauth_prctl_reset_keys()
 43 		get_random_bytes(&keys->apdb, sizeof(keys->apdb));  in ptrauth_prctl_reset_keys()
 45 		get_random_bytes(&keys->apga, sizeof(keys->apga));  in ptrauth_prctl_reset_keys()
 46 	ptrauth_keys_install_user(keys);  in ptrauth_prctl_reset_keys()
 67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys,  in ptrauth_set_enabled_keys()  argument
 78 	if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys))  in ptrauth_set_enabled_keys()
 [all …]
 
 | 
| /Linux-v5.15/tools/testing/selftests/bpf/map_tests/ | 
| D | htab_map_batch_ops.c | 13 static void map_batch_update(int map_fd, __u32 max_entries, int *keys,  in map_batch_update()  argument28 		keys[i] = i + 1;  in map_batch_update()
 36 	err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts);  in map_batch_update()
 41 			     int *keys, void *values, bool is_pcpu)  in map_batch_verify()  argument
 55 				CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j),  in map_batch_verify()
 58 				      i, j, keys[i], bpf_percpu(v[i],  j));  in map_batch_verify()
 61 			CHECK(keys[i] + 1 != ((int *)values)[i],  in map_batch_verify()
 63 			      "error: i %d key %d value %d\n", i, keys[i],  in map_batch_verify()
 72 		      "error: keys array at index %d missing\n", i);  in map_batch_verify()
 80 	int map_fd, *keys, *visited, key;  in __test_map_lookup_and_delete_batch()  local
 [all …]
 
 | 
| D | array_map_batch_ops.c | 14 static void map_batch_update(int map_fd, __u32 max_entries, int *keys,  in map_batch_update()  argument25 		keys[i] = i;  in map_batch_update()
 35 	err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts);  in map_batch_update()
 39 static void map_batch_verify(int *visited, __u32 max_entries, int *keys,  in map_batch_verify()  argument
 51 				CHECK(keys[i] + j + 1 != value,  in map_batch_verify()
 54 				      j, keys[i], value);  in map_batch_verify()
 57 			CHECK(keys[i] + 1 != values[i], "key/value checking",  in map_batch_verify()
 58 			      "error: i %d key %d value %lld\n", i, keys[i],  in map_batch_verify()
 65 		      "error: keys array at index %d missing\n", i);  in map_batch_verify()
 78 	int map_fd, *keys, *visited;  in __test_map_lookup_and_update_batch()  local
 [all …]
 
 | 
| D | lpm_trie_map_batch_ops.c | 22 			     struct test_lpm_key *keys, int *values)  in map_batch_update()  argument33 		keys[i].prefix = 32;  in map_batch_update()
 35 		inet_pton(AF_INET, buff, &keys[i].ipv4);  in map_batch_update()
 39 	err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts);  in map_batch_update()
 44 			     struct test_lpm_key *keys, int *values)  in map_batch_verify()  argument
 52 		inet_ntop(AF_INET, &keys[i].ipv4, buff, 32);  in map_batch_verify()
 61 		      "error: keys array at index %d missing\n", i);  in map_batch_verify()
 74 	struct test_lpm_key *keys, key;  in test_lpm_trie_map_batch_ops()  local
 90 	keys = malloc(max_entries * sizeof(struct test_lpm_key));  in test_lpm_trie_map_batch_ops()
 93 	CHECK(!keys || !values || !visited, "malloc()", "error:%s\n",  in test_lpm_trie_map_batch_ops()
 [all …]
 
 | 
| /Linux-v5.15/lib/ | 
| D | test_static_keys.c | 3  * Kernel module for testing static keys.14 /* old keys */
 55 static void invert_keys(struct test_key *keys, int size)  in invert_keys()  argument
 61 		if (previous != keys[i].key) {  in invert_keys()
 62 			invert_key(keys[i].key);  in invert_keys()
 63 			previous = keys[i].key;  in invert_keys()
 68 static int verify_keys(struct test_key *keys, int size, bool invert)  in verify_keys()  argument
 74 		ret = static_key_enabled(keys[i].key);  in verify_keys()
 75 		init = keys[i].init_state;  in verify_keys()
 78 		ret = keys[i].test_key();  in verify_keys()
 [all …]
 
 | 
| /Linux-v5.15/Documentation/security/keys/ | 
| D | trusted-encrypted.rst | 2 Trusted and Encrypted Keys5 Trusted and Encrypted Keys are two new key types added to the existing kernel
 6 key ring service.  Both of these new types are variable length symmetric keys,
 7 and in both cases all keys are created in the kernel, and user space sees,
 8 stores, and loads only encrypted blobs.  Trusted Keys require the availability
 9 of a Trust Source for greater security, while Encrypted Keys can be used on any
 17 A trust source provides the source of security for Trusted Keys.  This
 23 consumer of the Trusted Keys to determine if the trust source is sufficiently
 53          Keys can be optionally sealed to specified PCR (integrity measurement)
 56          (future) PCR values, so keys are easily migrated to new PCR values,
 [all …]
 
 | 
| D | core.rst | 5 This service allows cryptographic keys, authentication tokens, cross-domain10 other keys. Processes each have three standard keyring subscriptions that a
 11 kernel service can search for relevant keys.
 25 In this context, keys represent units of cryptographic data, authentication
 47      kernel by a kernel service (such as a filesystem) before keys of that type
 53      Should a type be removed from the system, all the keys of that type will
 65      instantiation function. Keys can also be immortal.
 68      actual "key". In the case of a keyring, this is a list of keys to which
 86      	 Keys being requested from userspace will be in this state.
 96       *  Expired. Keys can have lifetimes set. If their lifetime is exceeded,
 [all …]
 
 | 
| /Linux-v5.15/drivers/md/bcache/ | 
| D | btree.c | 18  * as keys are inserted we only sort the pages that have not yet been written.52  *   Check for bad keys in replay
 115 	if (b->level && b->keys.nsets)  in bch_btree_init_next()
 116 		bch_btree_sort(&b->keys, &b->c->sort);  in bch_btree_init_next()
 118 		bch_btree_sort_lazy(&b->keys, &b->c->sort);  in bch_btree_init_next()
 121 		bch_bset_init_next(&b->keys, write_block(b),  in bch_btree_init_next()
 164 	iter->b = &b->keys;  in bch_btree_node_read_done()
 171 	     b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq;  in bch_btree_node_read_done()
 199 		if (i != b->keys.set[0].data && !i->keys)  in bch_btree_node_read_done()
 209 	     bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key);  in bch_btree_node_read_done()
 [all …]
 
 | 
| D | debug.c | 44 	sorted = b->c->verify_data->keys.set->data;  in bch_btree_verify()45 	inmemory = b->keys.set->data;  in bch_btree_verify()
 50 	v->keys.ops = b->keys.ops;  in bch_btree_verify()
 65 	sorted = v->keys.set->data;  in bch_btree_verify()
 67 	if (inmemory->keys != sorted->keys ||  in bch_btree_verify()
 78 		bch_dump_bset(&b->keys, inmemory, 0);  in bch_btree_verify()
 81 		bch_dump_bset(&v->keys, sorted, 0);  in bch_btree_verify()
 88 			bch_dump_bset(&b->keys, i, block);  in bch_btree_verify()
 94 		for (j = 0; j < inmemory->keys; j++)  in bch_btree_verify()
 163 	struct keybuf		keys;  member
 [all …]
 
 | 
| /Linux-v5.15/drivers/net/ethernet/cisco/enic/ | 
| D | enic_clsf.c | 15  *	@keys: flow_keys of ipv4 5tuple21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq)  in enic_addfltr_5t()  argument
 26 	switch (keys->basic.ip_proto) {  in enic_addfltr_5t()
 38 	data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src);  in enic_addfltr_5t()
 39 	data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst);  in enic_addfltr_5t()
 40 	data.u.ipv4.src_port = ntohs(keys->ports.src);  in enic_addfltr_5t()
 41 	data.u.ipv4.dst_port = ntohs(keys->ports.dst);  in enic_addfltr_5t()
 162 		if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src &&  in htbl_key_search()
 163 		    tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst &&  in htbl_key_search()
 164 		    tpos->keys.ports.ports == k->ports.ports &&  in htbl_key_search()
 [all …]
 
 | 
| /Linux-v5.15/security/integrity/ | 
| D | Kconfig | 22 	select KEYS29 	  to "lock" certain keyring to prevent adding new keys.
 30 	  This is useful for evm and module keyrings, when keys are
 34 	bool "Enable asymmetric keys support"
 43 	  asymmetric keys.
 46 	bool "Require all keys on the integrity keyrings be signed"
 51 	   This option requires that all keys added to the .ima and
 56         bool "Provide keyring for platform/firmware trusted keys"
 60          Provide a separate, distinct keyring for platform trusted keys, which
 76 	bool "Enable loading of platform and blacklisted keys for POWER"
 [all …]
 
 | 
| /Linux-v5.15/drivers/mfd/ | 
| D | ucb1x00-assabet.c | 41 	struct gpio_keys_platform_data keys;  in ucb1x00_assabet_add()  local46 	memset(&keys, 0, sizeof(keys));  in ucb1x00_assabet_add()
 55 	keys.buttons = buttons;  in ucb1x00_assabet_add()
 56 	keys.nbuttons = ARRAY_SIZE(buttons);  in ucb1x00_assabet_add()
 57 	keys.poll_interval = 50;  in ucb1x00_assabet_add()
 58 	keys.name = "ucb1x00";  in ucb1x00_assabet_add()
 60 	pdev = platform_device_register_data(&ucb->dev, "gpio-keys", -1,  in ucb1x00_assabet_add()
 61 		&keys, sizeof(keys));  in ucb1x00_assabet_add()
 
 | 
| /Linux-v5.15/net/core/ | 
| D | flow_dissector.c | 899  * @flow_dissector: list of keys to dissect908  * The function will try to retrieve individual keys into target specified
 1514 static inline void __flow_hash_consistentify(struct flow_keys *keys)  in __flow_hash_consistentify()  argument
 1518 	switch (keys->control.addr_type) {  in __flow_hash_consistentify()
 1520 		addr_diff = (__force u32)keys->addrs.v4addrs.dst -  in __flow_hash_consistentify()
 1521 			    (__force u32)keys->addrs.v4addrs.src;  in __flow_hash_consistentify()
 1523 			swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst);  in __flow_hash_consistentify()
 1525 		if ((__force u16)keys->ports.dst <  in __flow_hash_consistentify()
 1526 		    (__force u16)keys->ports.src) {  in __flow_hash_consistentify()
 1527 			swap(keys->ports.src, keys->ports.dst);  in __flow_hash_consistentify()
 [all …]
 
 | 
| /Linux-v5.15/fs/xfs/ | 
| D | xfs_fsmap.c | 174 				      const struct xfs_fsmap *keys,407 	const struct xfs_fsmap		*keys,  in xfs_getfsmap_logdev()  argument
 414 	/* Set up search keys */  in xfs_getfsmap_logdev()
 415 	info->low.rm_startblock = XFS_BB_TO_FSBT(mp, keys[0].fmr_physical);  in xfs_getfsmap_logdev()
 416 	info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset);  in xfs_getfsmap_logdev()
 417 	error = xfs_fsmap_owner_to_rmap(&info->low, keys);  in xfs_getfsmap_logdev()
 421 	xfs_getfsmap_set_irec_flags(&info->low, &keys[0]);  in xfs_getfsmap_logdev()
 423 	error = xfs_fsmap_owner_to_rmap(&info->high, keys + 1);  in xfs_getfsmap_logdev()
 436 	if (keys[0].fmr_physical > 0)  in xfs_getfsmap_logdev()
 476 	const struct xfs_fsmap		*keys,  in __xfs_getfsmap_rtdev()  argument
 [all …]
 
 | 
| /Linux-v5.15/drivers/input/misc/ | 
| D | dm355evm_keys.c | 102 	struct dm355evm_keys *keys = _keys;  in dm355evm_keys_irq()  local115 			dev_dbg(keys->dev, "input high err %d\n",  in dm355evm_keys_irq()
 123 			dev_dbg(keys->dev, "input low err %d\n",  in dm355evm_keys_irq()
 152 		ke = sparse_keymap_entry_from_scancode(keys->input, event);  in dm355evm_keys_irq()
 154 		dev_dbg(keys->dev,  in dm355evm_keys_irq()
 159 		input_report_key(keys->input, keycode, 1);  in dm355evm_keys_irq()
 160 		input_sync(keys->input);  in dm355evm_keys_irq()
 161 		input_report_key(keys->input, keycode, 0);  in dm355evm_keys_irq()
 162 		input_sync(keys->input);  in dm355evm_keys_irq()
 172 	struct dm355evm_keys	*keys;  in dm355evm_keys_probe()  local
 [all …]
 
 | 
| /Linux-v5.15/include/trace/events/ | 
| D | bcache.h | 225 	TP_PROTO(struct bio *bio, u32 keys),226 	TP_ARGS(bio, keys),
 240 		__entry->nr_keys	= keys;
 244 	TP_printk("%d,%d  %s %llu + %u keys %u",
 269 		__field(unsigned,	keys			)
 275 		__entry->keys	= b->keys.set[b->keys.nsets].data->keys;
 279 		__entry->bucket, __entry->block, __entry->keys)
 366 	TP_PROTO(struct btree *b, unsigned keys),
 367 	TP_ARGS(b, keys),
 371 		__field(unsigned,	keys			)
 [all …]
 
 | 
| /Linux-v5.15/security/integrity/ima/ | 
| D | ima_queue_keys.c | 8  *       Enables deferred processing of keys13 #include <keys/asymmetric-type.h>
 23  * To synchronize access to the list of keys that need to be measured
 29  * If custom IMA policy is not loaded then keys queued up
 39  * This worker function frees keys that may still be
 49  * This function sets up a worker to free queued keys in case
 128  * ima_process_queued_keys() - process keys queued for measurement
 130  * This function sets ima_process_keys to true and processes queued keys.
 131  * From here on keys will be processed right away (not queued).
 145 	 * process the queued keys.  in ima_process_queued_keys()
 
 |