/linux/drivers/input/keyboard/ |
H A D | ipaq-micro-keys.c | 50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 59 keys->micro->key_data = keys; in micro_key_start() 75 micro_key_start(keys); in micro_key_open() 84 micro_key_stop(keys); in micro_key_close() 93 keys = devm_kzalloc(&pdev->dev, sizeof(*keys), GFP_KERNEL); in micro_key_probe() 94 if (!keys) in micro_key_probe() 100 if (!keys->input) in micro_key_probe() 106 keys->input->keycodesize * keys->input->keycodemax, in micro_key_probe() 108 if (!keys->codes) in micro_key_probe() 111 keys->input->keycode = keys->codes; in micro_key_probe() [all …]
|
H A D | mtk-pmic-keys.c | 213 info->keys = keys; in mtk_pmic_key_setup() 254 if (keys->keys[index].wakeup) { in mtk_pmic_keys_suspend() 256 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_suspend() 270 if (keys->keys[index].wakeup) { in mtk_pmic_keys_resume() 272 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_resume() 349 keys->keys[index].irq = in mtk_pmic_keys_probe() 351 if (keys->keys[index].irq < 0) { in mtk_pmic_keys_probe() 353 return keys->keys[index].irq; in mtk_pmic_keys_probe() 362 return keys->keys[index].irq_r; in mtk_pmic_keys_probe() 377 keys->keys[index].wakeup = true; in mtk_pmic_keys_probe() [all …]
|
H A D | Makefile | 8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 30 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 31 obj-$(CONFIG_KEYBOARD_IQS62X) += iqs62x-keys.o 40 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 47 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o 67 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | bpf_flow.c | 78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 182 keys->is_encap = true; in parse_ip_proto() 188 keys->is_encap = true; in parse_ip_proto() 210 keys->is_encap = true; in parse_ip_proto() 237 keys->sport = tcp->source; in parse_ip_proto() 238 keys->dport = tcp->dest; in parse_ip_proto() 247 keys->dport = udp->dest; in parse_ip_proto() 301 keys->is_frag = true; in PROG() 312 if (!(keys->flags & in PROG() 340 if (keys->flow_label && keys->flags & BPF_FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL) in PROG() [all …]
|
/linux/fs/bcachefs/ |
H A D | btree_journal_iter.c | 154 size_t gap_end = keys->gap + (keys->size - keys->nr); in journal_iters_fix() 216 idx -= keys->size - keys->nr; in bch2_journal_key_insert_take() 220 if (keys->nr == keys->size) { in bch2_journal_key_insert_take() 244 keys->gap = keys->nr; in bch2_journal_key_insert_take() 252 keys->data[keys->gap++] = n; in bch2_journal_key_insert_take() 531 move_gap(keys, keys->nr); in bch2_journal_keys_put() 539 keys->nr = keys->gap = keys->size = 0; in bch2_journal_keys_put() 602 keys->gap = keys->nr; in bch2_journal_keys_sort() 615 move_gap(keys, keys->nr); in bch2_shoot_down_journal_keys() 624 keys->nr = keys->gap = dst; in bch2_shoot_down_journal_keys() [all …]
|
H A D | btree_write_buffer.c | 210 if (!wb->inc.keys.nr) in move_keys_from_inc_to_flushing() 216 darray_resize(&wb->flushing.keys, min_t(size_t, 1U << 20, wb->flushing.keys.nr + wb->inc.keys.nr)); in move_keys_from_inc_to_flushing() 219 if (!wb->flushing.keys.nr && wb->sorted.size >= wb->inc.keys.nr) { in move_keys_from_inc_to_flushing() 220 swap(wb->flushing.keys, wb->inc.keys); in move_keys_from_inc_to_flushing() 233 wb->inc.keys.data + nr, in move_keys_from_inc_to_flushing() 234 sizeof(wb->inc.keys.data[0]) * (wb->inc.keys.nr - nr)); in move_keys_from_inc_to_flushing() 237 wb->inc.keys.nr -= nr; in move_keys_from_inc_to_flushing() 239 if (!wb->inc.keys.nr) in move_keys_from_inc_to_flushing() 543 dst->wb->keys.nr++; in bch2_journal_key_to_wb_slowpath() 585 if (!dst->wb->keys.nr) in bch2_journal_keys_to_write_buffer_end() [all …]
|
H A D | btree_write_buffer.h | 11 return wb->inc.keys.nr + wb->flushing.keys.nr > wb->inc.keys.size / 4; in bch2_btree_write_buffer_should_flush() 18 return wb->inc.keys.nr > wb->inc.keys.size * 3 / 4; in bch2_btree_write_buffer_must_wait() 45 struct btree_write_buffered_key *wb_k = &darray_top(dst->wb->keys); in bch2_journal_key_to_wb() 49 dst->wb->keys.nr++; in bch2_journal_key_to_wb()
|
/linux/arch/arm64/include/asm/ |
H A D | pointer_auth.h | 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 68 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel() 77 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user() 78 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user() 79 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user() 89 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_user() 90 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init_user() 91 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init_user() 92 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_keys_init_user() 96 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_keys_init_user() [all …]
|
/linux/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 80 keys[6], keys[7]); in set_keys() 83 keys[0], keys[1], keys[2], keys[3]); in set_keys() 96 uint32_t keys[8]; in build_rcv_fd() local 122 keys[i] = rand(); in build_rcv_fd() 215 uint32_t keys[8]; in rotate_key() local 225 get_keys(fd, keys); in rotate_key() 227 set_keys(fd, keys); in rotate_key() [all …]
|
/linux/tools/testing/selftests/bpf/map_tests/ |
H A D | htab_map_batch_ops.c | 29 keys[i] = i + 1; in map_batch_update() 62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local 98 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch() 124 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 143 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 154 &batch, keys + total, in __test_map_lookup_and_delete_batch() 189 keys + total, in __test_map_lookup_and_delete_batch() 209 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 217 &batch, keys + total, in __test_map_lookup_and_delete_batch() [all …]
|
H A D | array_map_batch_ops.c | 15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 26 keys[i] = i; in map_batch_update() 52 CHECK(keys[i] + j + 1 != value, in map_batch_verify() 55 j, keys[i], value); in map_batch_verify() 58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify() 72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local 92 keys = calloc(max_entries, sizeof(*keys)); in __test_map_lookup_and_update_batch() 103 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_update_batch() 114 &batch, keys + total, in __test_map_lookup_and_update_batch() [all …]
|
H A D | lpm_trie_map_batch_ops.c | 23 struct test_lpm_key *keys, int *values) in map_batch_update() argument 34 keys[i].prefix = 32; in map_batch_update() 36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update() 45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument 53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify() 69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local 94 map_batch_update(map_fd, max_entries, keys, values); in test_lpm_trie_map_batch_ops() 95 map_batch_verify(visited, max_entries, keys, values); in test_lpm_trie_map_batch_ops() 96 memset(keys, 0, max_entries * sizeof(*keys)); in test_lpm_trie_map_batch_ops() 107 keys + total, values + total, &count, &opts); in test_lpm_trie_map_batch_ops() [all …]
|
/linux/arch/arm64/kernel/ |
H A D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys() 46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys() 67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument 78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys() [all …]
|
/linux/drivers/md/bcache/ |
H A D | btree.c | 1331 for (t = b->keys.set; t <= &b->keys.set[b->keys.nsets]; t++) in btree_gc_mark_node() 1343 if ((keys - good_keys) * 2 > keys) in btree_gc_mark_node() 1379 keys += r[nodes++].keys; in btree_gc_coalesce() 1439 keys = n2->keys; in btree_gc_coalesce() 1454 n1->keys += keys; in btree_gc_coalesce() 1455 r[i].keys = n1->keys; in btree_gc_coalesce() 1462 n2->keys -= keys; in btree_gc_coalesce() 2300 btree_bset_first(n2)->keys = btree_bset_first(n1)->keys - keys; in btree_split() 2301 btree_bset_first(n1)->keys = keys; in btree_split() 2498 op.keys = keys; in bch_btree_insert() [all …]
|
H A D | debug.c | 45 inmemory = b->keys.set->data; in bch_btree_verify() 50 v->keys.ops = b->keys.ops; in bch_btree_verify() 65 sorted = v->keys.set->data; in bch_btree_verify() 67 if (inmemory->keys != sorted->keys || in bch_btree_verify() 78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 164 struct keybuf keys; member 201 bch_keybuf_del(&i->keys, w); in bch_dump_read() [all …]
|
/linux/drivers/net/ethernet/cisco/enic/ |
H A D | enic_clsf.c | 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 174 struct flow_keys keys; in enic_rx_flow_steer() local 181 res = skb_flow_dissect_flow_keys(skb, &keys, 0); in enic_rx_flow_steer() 183 (keys.basic.ip_proto != IPPROTO_TCP && in enic_rx_flow_steer() 184 keys.basic.ip_proto != IPPROTO_UDP)) in enic_rx_flow_steer() 214 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer() 267 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer() [all …]
|
/linux/drivers/mfd/ |
H A D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 55 keys.buttons = buttons; in ucb1x00_assabet_add() 56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 57 keys.poll_interval = 50; in ucb1x00_assabet_add() 58 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
/linux/security/integrity/ |
H A D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 73 be added. This keyring shall contain just MOK keys. Unlike keys 86 other MOK keys load into the platform keyring. 89 bool "Only CA keys without DigitialSignature usage set" [all …]
|
/linux/security/keys/ |
H A D | Kconfig | 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 60 bool "Large payload keys" 76 keys in the kernel. Trusted keys are random number symmetric keys, 83 source "security/keys/trusted-keys/Kconfig" 97 in the kernel. Encrypted keys are instantiated using kernel 106 bool "Allow encrypted keys with user decrypted data" 116 bool "Diffie-Hellman operations on retained keys" 123 public keys and shared secrets using values stored as keys [all …]
|
/linux/drivers/md/persistent-data/ |
H A D | dm-btree.c | 104 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 402 if (rkey != keys[level]) { in dm_btree_lookup() 513 memcpy(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in copy_entries() 527 memmove(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in move_entries() 779 pn->keys[middle_index] = rn->keys[0]; in split_two_into_three() 865 memcpy(ln->keys, pn->keys, nr_left * sizeof(pn->keys[0])); in btree_split_beneath() 882 memcpy(rn->keys, pn->keys + nr_left, nr_right * sizeof(pn->keys[0])); in btree_split_beneath() 897 pn->keys[0] = ln->keys[0]; in btree_split_beneath() 902 pn->keys[1] = rn->keys[0]; in btree_split_beneath() 1231 (le64_to_cpu(node->keys[index]) != keys[level])); in need_insert() [all …]
|
/linux/net/core/ |
H A D | flow_dissector.c | 1749 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1753 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1767 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1796 struct flow_keys *keys, in ___skb_get_hash() argument 1836 struct flow_keys keys; in __skb_get_hash_symmetric() local 1840 memset(&keys, 0, sizeof(keys)); in __skb_get_hash_symmetric() 1842 &keys, NULL, 0, 0, 0, 0); in __skb_get_hash_symmetric() 1859 struct flow_keys keys; in __skb_get_hash() local 1873 struct flow_keys keys; in skb_get_hash_perturb() local 1941 struct flow_keys_basic keys; in skb_get_poff() local [all …]
|
/linux/drivers/crypto/nx/ |
H A D | nx-aes-xcbc.c | 64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 79 len = sizeof(keys); in nx_xcbc_empty() 81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 84 if (len != sizeof(keys)) in nx_xcbc_empty() 90 if (len != sizeof(keys)) in nx_xcbc_empty() 102 keys[1][0] ^= 0x80; in nx_xcbc_empty() 104 len = sizeof(keys[1]); in nx_xcbc_empty() 107 memcpy(csbcpb->cpb.aes_ecb.key, keys[0], AES_BLOCK_SIZE); in nx_xcbc_empty() [all …]
|
/linux/tools/testing/selftests/net/tcp_ao/ |
H A D | key-management.c | 427 struct test_key *keys; member 488 free(collection.keys); in init_default_key_collection() 489 collection.keys = NULL; in init_default_key_collection() 501 collection.keys = reallocarray(collection.keys, nr_keys, key_sz); in init_default_key_collection() 502 if (!collection.keys) in init_default_key_collection() 688 if (!keys) in verify_keys() 692 keys->get_all = 1; in verify_keys() 695 free(keys); in verify_keys() 724 dump_key = lookup_key(keys, keys->nkeys, sndid, rcvid); in verify_keys() 790 free(keys); in verify_keys() [all …]
|
/linux/lib/ |
H A D | test_static_keys.c | 55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 61 if (previous != keys[i].key) { in invert_keys() 62 invert_key(keys[i].key); in invert_keys() 63 previous = keys[i].key; in invert_keys() 68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 74 ret = static_key_enabled(keys[i].key); in verify_keys() 75 init = keys[i].init_state; in verify_keys() 78 ret = keys[i].test_key(); in verify_keys() 79 if (static_key_enabled(keys[i].key)) { in verify_keys()
|
/linux/security/keys/trusted-keys/ |
H A D | Kconfig | 5 bool "TPM-based trusted keys" 18 backend. Trusted keys are random number symmetric keys, 20 The TPM only unseals the keys, if the boot PCRs and other 24 bool "TEE-based trusted keys" 33 bool "CAAM-based trusted keys" 43 bool "DCP-based trusted keys"
|