/openbmc/linux/drivers/input/keyboard/ |
H A D | ipaq-micro-keys.c | 43 struct ipaq_micro_keys *keys = data; in micro_key_receive() local 50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 51 input_sync(keys->input); in micro_key_receive() 55 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument 57 spin_lock(&keys->micro->lock); in micro_key_start() 58 keys->micro->key = micro_key_receive; in micro_key_start() 59 keys->micro->key_data = keys; in micro_key_start() 60 spin_unlock(&keys->micro->lock); in micro_key_start() 63 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument 65 spin_lock(&keys->micro->lock); in micro_key_stop() [all …]
|
H A D | mtk-pmic-keys.c | 121 struct mtk_pmic_keys *keys; member 133 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member 142 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument 150 kregs_home = keys->keys[MTK_PMIC_HOMEKEY_INDEX].regs; in mtk_pmic_keys_lp_reset_setup() 151 kregs_pwr = keys->keys[MTK_PMIC_PWRKEY_INDEX].regs; in mtk_pmic_keys_lp_reset_setup() 153 error = of_property_read_u32(keys->dev->of_node, "power-off-time-sec", in mtk_pmic_keys_lp_reset_setup() 161 error = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 185 regmap_update_bits(keys->regmap, regs->pmic_rst_reg, mask, value); in mtk_pmic_keys_lp_reset_setup() 193 regmap_read(info->keys->regmap, info->regs->deb_reg, &key_deb); in mtk_pmic_keys_irq_handler_thread() 199 input_report_key(info->keys->input_dev, info->keycode, pressed); in mtk_pmic_keys_irq_handler_thread() [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | bpf_flow.c | 75 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, in export_flow_keys() argument 78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 81 memcpy(&val, keys, sizeof(val)); in export_flow_keys() 118 struct bpf_flow_keys *keys = skb->flow_keys; in parse_eth_proto() local 137 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 140 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 146 struct bpf_flow_keys *keys = skb->flow_keys; in _dissect() local 148 if (keys->n_proto == bpf_htons(ETH_P_IP)) { in _dissect() 161 return parse_eth_proto(skb, keys->n_proto); in _dissect() 167 struct bpf_flow_keys *keys = skb->flow_keys; in parse_ip_proto() local [all …]
|
/openbmc/linux/security/keys/ |
H A D | Kconfig | 6 config KEYS config 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 26 depends on KEYS 44 depends on KEYS 60 bool "Large payload keys" 61 depends on KEYS 65 This option provides support for holding large keys within the kernel 72 tristate "TRUSTED KEYS" [all …]
|
H A D | gc.c | 10 #include <keys/keyring-type.h> 19 * Reaper for unused keys. 25 * Reaper for links from keyrings to dead keys. 93 * reaper to go through a cycle finding expired keys. 103 * Reap keys of dead type. 106 * collector: the first to mark keys of that type as being dead, the second to 107 * collect dead links and the third to clean up the dead keys. We have to be 133 * Garbage collect a list of unreferenced, detached keys 135 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument 137 while (!list_empty(keys)) { in key_gc_unused_keys() [all …]
|
/openbmc/linux/arch/arm64/include/asm/ |
H A D | pointer_auth.h | 33 * We give each process its own keys, which are shared by all threads. The keys 57 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_init_kernel() argument 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 63 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_switch_kernel() argument 68 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel() 74 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys) in ptrauth_keys_install_user() argument 77 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user() 78 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user() 79 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user() 83 __ptrauth_key_install_nosync(APGA, keys->apga); in ptrauth_keys_install_user() [all …]
|
/openbmc/linux/security/integrity/ |
H A D | Kconfig | 22 select KEYS 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which 66 bool "Provide a keyring to which Machine Owner Keys may be added" [all …]
|
/openbmc/qemu/include/hw/s390x/ |
H A D | storage-keys.h | 35 * Check whether storage keys are enabled. If not enabled, they were not 41 * storage keys and should not lazily enable it. 52 * Lazily enable storage keys. If this function is not implemented, 53 * setting a storage key will lazily enable storage keys implicitly 55 * if storage keys were not enabled before this call. 67 * Get storage keys for the given PFN range. This call will fail if 68 * storage keys have not been lazily enabled yet. 73 * @start_gfn: the start GFN to get storage keys for 74 * @count: the number of storage keys to get 75 * @keys: the byte array where storage keys will be stored to [all …]
|
/openbmc/linux/certs/ |
H A D | Kconfig | 37 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem, 43 bool "Provide system-wide ring of trusted keys" 44 depends on KEYS 48 Provide a system keyring to which trusted keys can be added. Keys in 49 the keyring are considered to be trusted. Keys may be added at will 51 userspace may only add extra keys if those keys can be verified by 52 keys already in the keyring. 54 Keys in this keyring are used by module signature checking. 57 string "Additional X.509 keys for default system keyring" 65 NOTE: If you previously provided keys for the system keyring in the [all …]
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 5 * New keys are 'rotated' in two steps: 7 * 2) Make new key the primary by swapping the backup and primary keys 49 static void get_keys(int fd, uint32_t *keys) in get_keys() argument 55 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) in get_keys() 62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 67 static void set_keys(int fd, uint32_t *keys) in set_keys() argument 72 if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, in set_keys() 79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 80 keys[6], keys[7]); in set_keys() [all …]
|
/openbmc/linux/arch/arm64/kernel/ |
H A D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys() 46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys() 67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument 78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys() [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/map_tests/ |
H A D | htab_map_batch_ops.c | 14 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 29 keys[i] = i + 1; in map_batch_update() 37 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 42 int *keys, void *values, bool is_pcpu) in map_batch_verify() argument 56 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j), in map_batch_verify() 59 i, j, keys[i], bpf_percpu(v[i], j)); in map_batch_verify() 62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 64 "error: i %d key %d value %d\n", i, keys[i], in map_batch_verify() 73 "error: keys array at index %d missing\n", i); in map_batch_verify() 81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local [all …]
|
H A D | array_map_batch_ops.c | 15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 26 keys[i] = i; in map_batch_update() 36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 40 static void map_batch_verify(int *visited, __u32 max_entries, int *keys, in map_batch_verify() argument 52 CHECK(keys[i] + j + 1 != value, in map_batch_verify() 55 j, keys[i], value); in map_batch_verify() 58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify() 66 "error: keys array at index %d missing\n", i); in map_batch_verify() 72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local [all …]
|
H A D | lpm_trie_map_batch_ops.c | 23 struct test_lpm_key *keys, int *values) in map_batch_update() argument 34 keys[i].prefix = 32; in map_batch_update() 36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update() 40 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument 53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify() 62 "error: keys array at index %d missing\n", i); in map_batch_verify() 69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local 86 keys = malloc(max_entries * sizeof(struct test_lpm_key)); in test_lpm_trie_map_batch_ops() 89 CHECK(!keys || !values || !visited, "malloc()", "error:%s\n", in test_lpm_trie_map_batch_ops() [all …]
|
/openbmc/linux/lib/ |
H A D | test_static_keys.c | 3 * Kernel module for testing static keys. 14 /* old keys */ 55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 61 if (previous != keys[i].key) { in invert_keys() 62 invert_key(keys[i].key); in invert_keys() 63 previous = keys[i].key; in invert_keys() 68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 74 ret = static_key_enabled(keys[i].key); in verify_keys() 75 init = keys[i].init_state; in verify_keys() 78 ret = keys[i].test_key(); in verify_keys() [all …]
|
/openbmc/linux/Documentation/security/keys/ |
H A D | trusted-encrypted.rst | 2 Trusted and Encrypted Keys 5 Trusted and Encrypted Keys are two new key types added to the existing kernel 6 key ring service. Both of these new types are variable length symmetric keys, 7 and in both cases all keys are created in the kernel, and user space sees, 8 stores, and loads only encrypted blobs. Trusted Keys require the availability 9 of a Trust Source for greater security, while Encrypted Keys can be used on any 17 A trust source provides the source of security for Trusted Keys. This 23 consumer of the Trusted Keys to determine if the trust source is sufficiently 64 Keys can be optionally sealed to specified PCR (integrity measurement) 67 (future) PCR values, so keys are easily migrated to new PCR values, [all …]
|
/openbmc/linux/drivers/md/bcache/ |
H A D | btree.c | 18 * as keys are inserted we only sort the pages that have not yet been written. 52 * Check for bad keys in replay 115 if (b->level && b->keys.nsets) in bch_btree_init_next() 116 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 118 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() 121 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next() 164 iter->b = &b->keys; in bch_btree_node_read_done() 171 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done() 199 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done() 209 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done() [all …]
|
/openbmc/linux/drivers/net/ethernet/cisco/enic/ |
H A D | enic_clsf.c | 15 * @keys: flow_keys of ipv4 5tuple 21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t() 39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search() 163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() [all …]
|
/openbmc/qemu/tests/bench/ |
H A D | qtree-bench.c | 81 size_t *keys = g_malloc_n(n_elems, sizeof(*keys)); in init_empty_tree_and_keys() local 83 keys[i] = i; in init_empty_tree_and_keys() 99 *ret_keys = keys; in init_empty_tree_and_keys() 126 size_t *keys; in run_benchmark() local 128 init_empty_tree_and_keys(impl, &tree, &keys, n_elems); in run_benchmark() 133 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 136 q_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 151 value = g_tree_lookup(tree, &keys[i]); in run_benchmark() 154 value = q_tree_lookup(tree, &keys[i]); in run_benchmark() 166 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() [all …]
|
/openbmc/u-boot/drivers/input/ |
H A D | cros_ec_keyb.c | 18 KBC_MAX_KEYS = 8, /* Maximum keys held down at once */ 37 * @param keys List of keys that we have detected 38 * @param max_count Maximum number of keys to return 40 * @return number of pressed keys, 0 for none, -EIO on error 42 static int check_for_keys(struct udevice *dev, struct key_matrix_key *keys, in check_for_keys() argument 75 key = keys + num_keys++; in check_for_keys() 88 * Check the keyboard, and send any keys that are pressed. 102 struct key_matrix_key keys[KBC_MAX_KEYS]; in cros_ec_kbc_check() local 111 * will always return non-zero if keys have been pressed. in cros_ec_kbc_check() 115 * may return 0 before all keys have been read from the EC. in cros_ec_kbc_check() [all …]
|
/openbmc/qemu/hw/s390x/ |
H A D | s390-skeys.c | 16 #include "hw/s390x/storage-keys.h" 28 #define S390_SKEYS_BUFFER_SIZE (128 * KiB) /* Room for 128k storage keys */ 59 uint64_t count, uint8_t *keys) in s390_skeys_get() argument 64 rc = kc->get_skeys(ks, start_gfn, count, keys); in s390_skeys_get() 72 uint64_t count, uint8_t *keys) in s390_skeys_set() argument 77 rc = kc->set_skeys(ks, start_gfn, count, keys); in s390_skeys_set() 84 static void write_keys(FILE *f, uint8_t *keys, uint64_t startgfn, in write_keys() argument 91 uint8_t acc = (*keys & 0xF0) >> 4; in write_keys() 92 int fp = (*keys & 0x08); in write_keys() 93 int ref = (*keys & 0x04); in write_keys() [all …]
|
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/ |
H A D | pkgdata.py | 132 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 133 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output) 139 self.assertIn('libz1', list(files.keys()), "listed pkgs. files: %s" %result.output) 140 self.assertIn('libz-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 153 self.assertIn('zlib-dbg', list(files.keys()), "listed pkgs. files: %s" %result.output) 154 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output) 155 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 156 self.assertIn('zlib-staticdev', list(files.keys()), "listed pkgs. files: %s" %result.output) 157 self.assertIn('zlib', list(files.keys()), "listed pkgs. files: %s" %result.output) 158 self.assertNotIn('zlib-locale', list(files.keys()), "listed pkgs. files: %s" %result.output) [all …]
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_sensor.c | 71 req_data[0] = sensor->cmn.keys.sensor_num; in ipmi_sensor_get_sensor_reading_factors() 76 req.msg.lun = sensor->cmn.keys.lun; in ipmi_sensor_get_sensor_reading_factors() 85 id, sensor->cmn.keys.sensor_num); in ipmi_sensor_get_sensor_reading_factors() 199 sr->s_id, sensor->keys.sensor_num); in ipmi_sensor_print_fc_discrete() 266 sensor->keys.sensor_num, sensor->keys.owner_id, in ipmi_sensor_print_fc_threshold() 267 sensor->keys.lun, sensor->keys.channel); in ipmi_sensor_print_fc_threshold() 312 sr->s_id, sensor->keys.sensor_num); in ipmi_sensor_print_fc_threshold() 381 sensor->keys. in ipmi_sensor_print_fc_threshold() 386 sensor->keys.owner_id, in ipmi_sensor_print_fc_threshold() 387 sensor->keys.lun, in ipmi_sensor_print_fc_threshold() [all …]
|
/openbmc/linux/drivers/mfd/ |
H A D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 55 keys.buttons = buttons; in ucb1x00_assabet_add() 56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 57 keys.poll_interval = 50; in ucb1x00_assabet_add() 58 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 60 pdev = platform_device_register_data(&ucb->dev, "gpio-keys", -1, in ucb1x00_assabet_add() 61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
/openbmc/linux/Documentation/devicetree/bindings/input/ |
H A D | mediatek,pmic-keys.yaml | 4 $id: http://devicetree.org/schemas/input/mediatek,pmic-keys.yaml# 7 title: MediaTek PMIC Keys 27 - mediatek,mt6323-keys 28 - mediatek,mt6331-keys 29 - mediatek,mt6357-keys 30 - mediatek,mt6358-keys 31 - mediatek,mt6397-keys 101 keys { 102 compatible = "mediatek,mt6397-keys";
|