Home
last modified time | relevance | path

Searched full:keys (Results 1 – 25 of 1053) sorted by relevance

12345678910>>...43

/openbmc/qemu/include/hw/s390x/
H A Dstorage-keys.h33 * Check whether storage keys are enabled. If not enabled, they were not
39 * storage keys and should not lazily enable it.
50 * Lazily enable storage keys. If this function is not implemented,
51 * setting a storage key will lazily enable storage keys implicitly
53 * if storage keys were not enabled before this call.
65 * Get storage keys for the given PFN range. This call will fail if
66 * storage keys have not been lazily enabled yet.
71 * @start_gfn: the start GFN to get storage keys for
72 * @count: the number of storage keys to get
73 * @keys: the byte array where storage keys will be stored to
[all …]
/openbmc/qemu/tests/bench/
H A Dqtree-bench.c81 size_t *keys = g_malloc_n(n_elems, sizeof(*keys)); in init_empty_tree_and_keys() local
83 keys[i] = i; in init_empty_tree_and_keys()
99 *ret_keys = keys; in init_empty_tree_and_keys()
126 size_t *keys; in run_benchmark() local
128 init_empty_tree_and_keys(impl, &tree, &keys, n_elems); in run_benchmark()
133 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark()
136 q_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark()
151 value = g_tree_lookup(tree, &keys[i]); in run_benchmark()
154 value = q_tree_lookup(tree, &keys[i]); in run_benchmark()
166 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark()
[all …]
/openbmc/qemu/hw/s390x/
H A Ds390-skeys.c17 #include "hw/s390x/storage-keys.h"
29 #define S390_SKEYS_BUFFER_SIZE (128 * KiB) /* Room for 128k storage keys */
60 uint64_t count, uint8_t *keys) in s390_skeys_get() argument
65 rc = kc->get_skeys(ks, start_gfn, count, keys); in s390_skeys_get()
73 uint64_t count, uint8_t *keys) in s390_skeys_set() argument
78 rc = kc->set_skeys(ks, start_gfn, count, keys); in s390_skeys_set()
85 static void write_keys(FILE *f, uint8_t *keys, uint64_t startgfn, in write_keys() argument
92 uint8_t acc = (*keys & 0xF0) >> 4; in write_keys()
93 int fp = (*keys & 0x08); in write_keys()
94 int ref = (*keys & 0x04); in write_keys()
[all …]
H A Ds390-skeys-kvm.c13 #include "hw/s390x/storage-keys.h"
32 uint64_t count, uint8_t *keys) in kvm_s390_skeys_get() argument
37 .skeydata_addr = (__u64)keys in kvm_s390_skeys_get()
44 uint64_t count, uint8_t *keys) in kvm_s390_skeys_set() argument
49 .skeydata_addr = (__u64)keys in kvm_s390_skeys_set()
/openbmc/u-boot/drivers/input/
H A Dcros_ec_keyb.c18 KBC_MAX_KEYS = 8, /* Maximum keys held down at once */
37 * @param keys List of keys that we have detected
38 * @param max_count Maximum number of keys to return
40 * @return number of pressed keys, 0 for none, -EIO on error
42 static int check_for_keys(struct udevice *dev, struct key_matrix_key *keys, in check_for_keys() argument
75 key = keys + num_keys++; in check_for_keys()
88 * Check the keyboard, and send any keys that are pressed.
102 struct key_matrix_key keys[KBC_MAX_KEYS]; in cros_ec_kbc_check() local
111 * will always return non-zero if keys have been pressed. in cros_ec_kbc_check()
115 * may return 0 before all keys have been read from the EC. in cros_ec_kbc_check()
[all …]
H A Dkey_matrix.c18 * We figure this out by seeing if we have two or more keys in the same
19 * column, as well as two or more keys in the same row.
22 * @param keys List of keys to check
26 static int has_ghosting(struct key_matrix *config, struct key_matrix_key *keys, in has_ghosting() argument
37 * Find 2 keys such that one key is in the same row in has_ghosting()
41 if (keys[j].col == keys[i].col) in has_ghosting()
43 if (keys[j].row == keys[i].row) in has_ghosting()
54 int key_matrix_decode(struct key_matrix *config, struct key_matrix_key keys[], in key_matrix_decode() argument
64 struct key_matrix_key *key = &keys[upto]; in key_matrix_decode()
81 if (has_ghosting(config, keys, valid)) { in key_matrix_decode()
/openbmc/libpldm/scripts/
H A Dabi-dump-formatter13 my @Keys = keys(%{$Hash});
14 return [] if($#Keys<0);
15 if($Keys[0]=~/\A\d+\Z/)
17 return [sort {$a<=>$b} @Keys];
21 return [sort {$a cmp $b} @Keys];
/openbmc/u-boot/include/
H A Dkey_matrix.h18 int key_count; /* number of keys in the matrix (= rows * cols) */
38 * Decode a set of pressed keys into key codes
40 * Given a list of keys that are pressed, this converts this list into
41 * a list of key codes. Each of the keys has a valid flag, which can be
47 * If key ghosting is detected, we simply ignore the keys and return 0.
50 * @param keys List of keys to process (each is row, col)
51 * @param num_keys Number of keys to process
56 int key_matrix_decode(struct key_matrix *config, struct key_matrix_key *keys,
H A Dinput.h44 uchar flags; /* active state keys (FLAGS_...) */
48 int prev_keycodes[INPUT_BUFFER_LEN]; /* keys held last time */
49 int num_prev_keycodes; /* number of prev keys */
56 * @return 0 if no keys read, otherwise number of keys read, or 1 if
83 * internal list of depressed keys is maintained by the input library. Then
87 * This function looks after maintenance of the list of active keys, and calls
112 * Test if keys are available to be read
115 * @return 0 if no keys available, 1 if keys are available
149 * Generally the input library handles processing of a list of scanned keys.
150 * Repeated keys need to be generated based on a timer in this case, since all
[all …]
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/
H A Dpkgdata.py132 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output)
133 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output)
139 self.assertIn('libz1', list(files.keys()), "listed pkgs. files: %s" %result.output)
140 self.assertIn('libz-dev', list(files.keys()), "listed pkgs. files: %s" %result.output)
153 self.assertIn('zlib-dbg', list(files.keys()), "listed pkgs. files: %s" %result.output)
154 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output)
155 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output)
156 self.assertIn('zlib-staticdev', list(files.keys()), "listed pkgs. files: %s" %result.output)
157 self.assertIn('zlib', list(files.keys()), "listed pkgs. files: %s" %result.output)
158 self.assertNotIn('zlib-locale', list(files.keys()), "listed pkgs. files: %s" %result.output)
[all …]
/openbmc/u-boot/doc/
H A Dmkimage.1137 This can be used to sign images with additional keys after initial image
146 Specifies the directory containing keys to use for signing. This directory
166 Specifies that keys used to sign the FIT are required. This means that they
189 Create FIT image with compressed kernel and sign it with keys in the
190 /public/signing-keys directory. Add corresponding public keys into u-boot.dtb,
191 skipping those for which keys cannot be found. Also add a comment.
193 .B mkimage -f kernel.its -k /public/signing-keys -K u-boot.dtb \\\\
199 Update an existing FIT image, signing it with additional keys.
200 Add corresponding public keys into u-boot.dtb. This will resign all images
201 with keys that are available in the new directory. Images that request signing
[all …]
/openbmc/qemu/ui/
H A Dkbd-state.c15 DECLARE_BITMAP(keys, Q_KEY_CODE__MAX);
23 if (test_bit(qcode1, kbd->keys) || test_bit(qcode2, kbd->keys)) { in qkbd_state_modifier_update()
37 return test_bit(qcode, kbd->keys); in qkbd_state_key_get()
42 bool state = test_bit(qcode, kbd->keys); in qkbd_state_key_event()
54 * Note that key-down events on already pressed keys are *not* in qkbd_state_key_event()
62 set_bit(qcode, kbd->keys); in qkbd_state_key_event()
64 clear_bit(qcode, kbd->keys); in qkbd_state_key_event()
114 if (test_bit(qcode, kbd->keys)) { in qkbd_state_lift_all_keys()
/openbmc/openbmc/meta-security/meta-integrity/recipes-security/ima-evm-keys/
H A Dima-evm-keys_1.0.bb1 SUMMARY = "IMA/EMV public keys"
12 install -d ${D}/${sysconfdir}/keys
13 install "${IMA_EVM_X509}" ${D}${sysconfdir}/keys/x509_evm.der
14 ln -rs ${D}${sysconfdir}/keys/x509_evm.der ${D}${sysconfdir}/keys/x509_ima.der
/openbmc/ipmitool/lib/
H A Dipmi_sensor.c71 req_data[0] = sensor->cmn.keys.sensor_num; in ipmi_sensor_get_sensor_reading_factors()
76 req.msg.lun = sensor->cmn.keys.lun; in ipmi_sensor_get_sensor_reading_factors()
85 id, sensor->cmn.keys.sensor_num); in ipmi_sensor_get_sensor_reading_factors()
199 sr->s_id, sensor->keys.sensor_num); in ipmi_sensor_print_fc_discrete()
266 sensor->keys.sensor_num, sensor->keys.owner_id, in ipmi_sensor_print_fc_threshold()
267 sensor->keys.lun, sensor->keys.channel); in ipmi_sensor_print_fc_threshold()
312 sr->s_id, sensor->keys.sensor_num); in ipmi_sensor_print_fc_threshold()
381 sensor->keys. in ipmi_sensor_print_fc_threshold()
386 sensor->keys.owner_id, in ipmi_sensor_print_fc_threshold()
387 sensor->keys.lun, in ipmi_sensor_print_fc_threshold()
[all …]
/openbmc/openbmc/poky/bitbake/lib/bb/
H A DCOW.py40 keys = set(cls.__dict__.keys()) - ignored_keys
41 return "<COWDict Level: %i Current Keys: %i>" % (cls.__count__, len(keys))
132 if type == "keys":
150 return cls.iter("keys")
166 keys = set(cls.__dict__.keys()) - ignored_keys
167 return "<COWSet Level: %i Current Keys: %i>" % (cls.__count__, len(keys))
187 raise TypeError("sets don't have keys")
H A Ddata.py66 def keys(d): function
67 """Return a list of keys in d"""
68 return d.keys()
102 for s in savedenv.keys():
183 keys = sorted((key for key in d.keys() if not key.startswith("__")), key=isfunc)
184 grouped = groupby(keys, isfunc)
185 for isfunc, keys in grouped:
186 for key in sorted(keys):
190 return (key for key in d.keys() if not key.startswith('__') and
209keys = (key for key in d.keys() if not key.startswith("__") and not d.getVarFlag(key, "func", Fals…
[all …]
/openbmc/openbmc/meta-ibm/recipes-bsp/u-boot/
H A Du-boot-aspeed-sdk_2019.04.bbappend4 SRC_URI:append:p10bmc = " file://ibm.json file://ips.json file://keys/"
8 OTPTOOL_KEY_DIR:p10bmc = "${UNPACKDIR}/keys/"
20 # otptool needs access to the public and private socsec signing keys in the keys/ directory
21 openssl rsa -in ${SOCSEC_SIGN_KEY} -pubout > ${UNPACKDIR}/keys/rsa_pub_oem_dss_key.pem
/openbmc/openbmc/meta-google/recipes-google/ssh/
H A Dauthorized-keys-comp.bb9 file://authorized-keys-comp.service \
10 file://authorized-keys-comp.sh \
18 SYSTEMD_SERVICE:${PN} += "authorized-keys-comp.service"
26 install -m0755 authorized-keys-comp.sh ${D}${libexecdir}/
29 install -m0644 authorized-keys-comp.service ${D}${systemd_system_unitdir}/
/openbmc/qemu/qga/
H A Dcommands-windows-ssh.c2 * QEMU Guest Agent win32-specific command implementations for SSH keys.
421 * Writes the specified keys to the authenticated keys file.
424 * authkeys: Array of keys to write to disk
547 * Gets the list of authorized keys for a user.
550 * username -> Username to retrieve the keys for.
552 * returns: List of keys associated with the user.
557 GuestAuthorizedKeys *keys = NULL; in qmp_guest_ssh_get_authorized_keys() local
573 /* Set the GuestAuthorizedKey struct with keys from the file */ in qmp_guest_ssh_get_authorized_keys()
581 QAPI_LIST_PREPEND(ret->keys, g_strdup(authKeys[i])); in qmp_guest_ssh_get_authorized_keys()
588 keys = g_steal_pointer(&ret); in qmp_guest_ssh_get_authorized_keys()
[all …]
/openbmc/phosphor-fan-presence/presence/config_files/p10bmc/com.ibm.Hardware.Chassis.Model.Rainier2U/
H A Dconfig.json10 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
29 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
48 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
67 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
86 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
105 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
/openbmc/phosphor-fan-presence/presence/config_files/p10bmc/com.ibm.Hardware.Chassis.Model.Rainier4U/
H A Dconfig.json10 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
29 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
48 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
67 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
86 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
105 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
/openbmc/phosphor-logging/extensions/openpower-pels/
H A Ddevice_callouts.hpp16 * The code will extract the search keys from the sysfs path to
147 * @brief Looks up the callouts in the JSON using the I2C keys.
169 * @brief Pulls the fields out of the I2C device path to use as search keys
172 * The keys are the I2C bus and address.
176 * @return std::tuple<size_t, uint8_t> - The I2C bus and address keys
181 * @brief Pulls the fields out of the FSI device path to use as search keys
195 * search keys in the JSON.
197 * The keys are the FSI link string and the I2C bus and address.
208 * @brief Pulls the fields out of the SPI device path to use as search keys
221 * search keys in the JSON.
[all …]
/openbmc/qemu/tests/qapi-schema/
H A Dbad-if-keys.err1 bad-if-keys.json: In struct 'TestIfStruct':
2 bad-if-keys.json:2: 'if' condition of struct has conflicting keys
/openbmc/openbmc/meta-openembedded/meta-oe/classes/
H A Dsigning.bbclass7 # This class provides a common workflow to use asymmetric (i.e. RSA) keys to
8 # sign artifacts. Usually, the keys are either stored as simple files in the
16 # Many software projects support signing using PKCS #11 keys, but configuring
20 # the recipe level. For cases where the keys are available as files (i.e. test
21 # keys in CI), they are imported into SoftHSM (a HSM emulation library).
23 # Recipes access the available keys via a specific role. So, depending on
25 # refer to different keys.
27 # the user to select one of multiple keys for a role when needed.
35 # Examples for defining roles and importing keys:
37 # meta-code-signing/recipes-security/signing-keys/dummy-rsa-key-native.bb
[all …]
/openbmc/openbmc/poky/meta/conf/
H A Dimage-fitimage.conf16 # Generate keys for signing Kernel fitImage
19 # Size of private keys in number of bits
47 # Keys used to sign individually image nodes.
48 # The keys to sign image nodes must be different from those used to sign
53 # UBOOT_SIGN_IMG_KEYNAME = "dev2" # keys name in keydir (eg. "dev2.crt", "dev2.key")

12345678910>>...43