| /openbmc/qemu/include/hw/s390x/ |
| H A D | storage-keys.h | 33 * Check whether storage keys are enabled. If not enabled, they were not 39 * storage keys and should not lazily enable it. 50 * Lazily enable storage keys. If this function is not implemented, 51 * setting a storage key will lazily enable storage keys implicitly 53 * if storage keys were not enabled before this call. 65 * Get storage keys for the given PFN range. This call will fail if 66 * storage keys have not been lazily enabled yet. 71 * @start_gfn: the start GFN to get storage keys for 72 * @count: the number of storage keys to get 73 * @keys: the byte array where storage keys will be stored to [all …]
|
| /openbmc/qemu/tests/bench/ |
| H A D | qtree-bench.c | 81 size_t *keys = g_malloc_n(n_elems, sizeof(*keys)); in init_empty_tree_and_keys() local 83 keys[i] = i; in init_empty_tree_and_keys() 99 *ret_keys = keys; in init_empty_tree_and_keys() 126 size_t *keys; in run_benchmark() local 128 init_empty_tree_and_keys(impl, &tree, &keys, n_elems); in run_benchmark() 133 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 136 q_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 151 value = g_tree_lookup(tree, &keys[i]); in run_benchmark() 154 value = q_tree_lookup(tree, &keys[i]); in run_benchmark() 166 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() [all …]
|
| /openbmc/qemu/hw/s390x/ |
| H A D | s390-skeys.c | 17 #include "hw/s390x/storage-keys.h" 29 #define S390_SKEYS_BUFFER_SIZE (128 * KiB) /* Room for 128k storage keys */ 60 uint64_t count, uint8_t *keys) in s390_skeys_get() argument 65 rc = kc->get_skeys(ks, start_gfn, count, keys); in s390_skeys_get() 73 uint64_t count, uint8_t *keys) in s390_skeys_set() argument 78 rc = kc->set_skeys(ks, start_gfn, count, keys); in s390_skeys_set() 85 static void write_keys(FILE *f, uint8_t *keys, uint64_t startgfn, in write_keys() argument 92 uint8_t acc = (*keys & 0xF0) >> 4; in write_keys() 93 int fp = (*keys & 0x08); in write_keys() 94 int ref = (*keys & 0x04); in write_keys() [all …]
|
| H A D | s390-skeys-kvm.c | 13 #include "hw/s390x/storage-keys.h" 32 uint64_t count, uint8_t *keys) in kvm_s390_skeys_get() argument 37 .skeydata_addr = (__u64)keys in kvm_s390_skeys_get() 44 uint64_t count, uint8_t *keys) in kvm_s390_skeys_set() argument 49 .skeydata_addr = (__u64)keys in kvm_s390_skeys_set()
|
| /openbmc/u-boot/drivers/input/ |
| H A D | cros_ec_keyb.c | 18 KBC_MAX_KEYS = 8, /* Maximum keys held down at once */ 37 * @param keys List of keys that we have detected 38 * @param max_count Maximum number of keys to return 40 * @return number of pressed keys, 0 for none, -EIO on error 42 static int check_for_keys(struct udevice *dev, struct key_matrix_key *keys, in check_for_keys() argument 75 key = keys + num_keys++; in check_for_keys() 88 * Check the keyboard, and send any keys that are pressed. 102 struct key_matrix_key keys[KBC_MAX_KEYS]; in cros_ec_kbc_check() local 111 * will always return non-zero if keys have been pressed. in cros_ec_kbc_check() 115 * may return 0 before all keys have been read from the EC. in cros_ec_kbc_check() [all …]
|
| H A D | key_matrix.c | 18 * We figure this out by seeing if we have two or more keys in the same 19 * column, as well as two or more keys in the same row. 22 * @param keys List of keys to check 26 static int has_ghosting(struct key_matrix *config, struct key_matrix_key *keys, in has_ghosting() argument 37 * Find 2 keys such that one key is in the same row in has_ghosting() 41 if (keys[j].col == keys[i].col) in has_ghosting() 43 if (keys[j].row == keys[i].row) in has_ghosting() 54 int key_matrix_decode(struct key_matrix *config, struct key_matrix_key keys[], in key_matrix_decode() argument 64 struct key_matrix_key *key = &keys[upto]; in key_matrix_decode() 81 if (has_ghosting(config, keys, valid)) { in key_matrix_decode()
|
| /openbmc/libpldm/scripts/ |
| H A D | abi-dump-formatter | 13 my @Keys = keys(%{$Hash}); 14 return [] if($#Keys<0); 15 if($Keys[0]=~/\A\d+\Z/) 17 return [sort {$a<=>$b} @Keys]; 21 return [sort {$a cmp $b} @Keys];
|
| /openbmc/u-boot/include/ |
| H A D | key_matrix.h | 18 int key_count; /* number of keys in the matrix (= rows * cols) */ 38 * Decode a set of pressed keys into key codes 40 * Given a list of keys that are pressed, this converts this list into 41 * a list of key codes. Each of the keys has a valid flag, which can be 47 * If key ghosting is detected, we simply ignore the keys and return 0. 50 * @param keys List of keys to process (each is row, col) 51 * @param num_keys Number of keys to process 56 int key_matrix_decode(struct key_matrix *config, struct key_matrix_key *keys,
|
| H A D | input.h | 44 uchar flags; /* active state keys (FLAGS_...) */ 48 int prev_keycodes[INPUT_BUFFER_LEN]; /* keys held last time */ 49 int num_prev_keycodes; /* number of prev keys */ 56 * @return 0 if no keys read, otherwise number of keys read, or 1 if 83 * internal list of depressed keys is maintained by the input library. Then 87 * This function looks after maintenance of the list of active keys, and calls 112 * Test if keys are available to be read 115 * @return 0 if no keys available, 1 if keys are available 149 * Generally the input library handles processing of a list of scanned keys. 150 * Repeated keys need to be generated based on a timer in this case, since all [all …]
|
| /openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/ |
| H A D | pkgdata.py | 132 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 133 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output) 139 self.assertIn('libz1', list(files.keys()), "listed pkgs. files: %s" %result.output) 140 self.assertIn('libz-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 153 self.assertIn('zlib-dbg', list(files.keys()), "listed pkgs. files: %s" %result.output) 154 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output) 155 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 156 self.assertIn('zlib-staticdev', list(files.keys()), "listed pkgs. files: %s" %result.output) 157 self.assertIn('zlib', list(files.keys()), "listed pkgs. files: %s" %result.output) 158 self.assertNotIn('zlib-locale', list(files.keys()), "listed pkgs. files: %s" %result.output) [all …]
|
| /openbmc/u-boot/doc/ |
| H A D | mkimage.1 | 137 This can be used to sign images with additional keys after initial image 146 Specifies the directory containing keys to use for signing. This directory 166 Specifies that keys used to sign the FIT are required. This means that they 189 Create FIT image with compressed kernel and sign it with keys in the 190 /public/signing-keys directory. Add corresponding public keys into u-boot.dtb, 191 skipping those for which keys cannot be found. Also add a comment. 193 .B mkimage -f kernel.its -k /public/signing-keys -K u-boot.dtb \\\\ 199 Update an existing FIT image, signing it with additional keys. 200 Add corresponding public keys into u-boot.dtb. This will resign all images 201 with keys that are available in the new directory. Images that request signing [all …]
|
| /openbmc/qemu/ui/ |
| H A D | kbd-state.c | 15 DECLARE_BITMAP(keys, Q_KEY_CODE__MAX); 23 if (test_bit(qcode1, kbd->keys) || test_bit(qcode2, kbd->keys)) { in qkbd_state_modifier_update() 37 return test_bit(qcode, kbd->keys); in qkbd_state_key_get() 42 bool state = test_bit(qcode, kbd->keys); in qkbd_state_key_event() 54 * Note that key-down events on already pressed keys are *not* in qkbd_state_key_event() 62 set_bit(qcode, kbd->keys); in qkbd_state_key_event() 64 clear_bit(qcode, kbd->keys); in qkbd_state_key_event() 114 if (test_bit(qcode, kbd->keys)) { in qkbd_state_lift_all_keys()
|
| /openbmc/openbmc/meta-security/meta-integrity/recipes-security/ima-evm-keys/ |
| H A D | ima-evm-keys_1.0.bb | 1 SUMMARY = "IMA/EMV public keys" 12 install -d ${D}/${sysconfdir}/keys 13 install "${IMA_EVM_X509}" ${D}${sysconfdir}/keys/x509_evm.der 14 ln -rs ${D}${sysconfdir}/keys/x509_evm.der ${D}${sysconfdir}/keys/x509_ima.der
|
| /openbmc/ipmitool/lib/ |
| H A D | ipmi_sensor.c | 71 req_data[0] = sensor->cmn.keys.sensor_num; in ipmi_sensor_get_sensor_reading_factors() 76 req.msg.lun = sensor->cmn.keys.lun; in ipmi_sensor_get_sensor_reading_factors() 85 id, sensor->cmn.keys.sensor_num); in ipmi_sensor_get_sensor_reading_factors() 199 sr->s_id, sensor->keys.sensor_num); in ipmi_sensor_print_fc_discrete() 266 sensor->keys.sensor_num, sensor->keys.owner_id, in ipmi_sensor_print_fc_threshold() 267 sensor->keys.lun, sensor->keys.channel); in ipmi_sensor_print_fc_threshold() 312 sr->s_id, sensor->keys.sensor_num); in ipmi_sensor_print_fc_threshold() 381 sensor->keys. in ipmi_sensor_print_fc_threshold() 386 sensor->keys.owner_id, in ipmi_sensor_print_fc_threshold() 387 sensor->keys.lun, in ipmi_sensor_print_fc_threshold() [all …]
|
| /openbmc/openbmc/poky/bitbake/lib/bb/ |
| H A D | COW.py | 40 keys = set(cls.__dict__.keys()) - ignored_keys 41 return "<COWDict Level: %i Current Keys: %i>" % (cls.__count__, len(keys)) 132 if type == "keys": 150 return cls.iter("keys") 166 keys = set(cls.__dict__.keys()) - ignored_keys 167 return "<COWSet Level: %i Current Keys: %i>" % (cls.__count__, len(keys)) 187 raise TypeError("sets don't have keys")
|
| H A D | data.py | 66 def keys(d): function 67 """Return a list of keys in d""" 68 return d.keys() 102 for s in savedenv.keys(): 183 keys = sorted((key for key in d.keys() if not key.startswith("__")), key=isfunc) 184 grouped = groupby(keys, isfunc) 185 for isfunc, keys in grouped: 186 for key in sorted(keys): 190 return (key for key in d.keys() if not key.startswith('__') and 209 …keys = (key for key in d.keys() if not key.startswith("__") and not d.getVarFlag(key, "func", Fals… [all …]
|
| /openbmc/openbmc/meta-ibm/recipes-bsp/u-boot/ |
| H A D | u-boot-aspeed-sdk_2019.04.bbappend | 4 SRC_URI:append:p10bmc = " file://ibm.json file://ips.json file://keys/" 8 OTPTOOL_KEY_DIR:p10bmc = "${UNPACKDIR}/keys/" 20 # otptool needs access to the public and private socsec signing keys in the keys/ directory 21 openssl rsa -in ${SOCSEC_SIGN_KEY} -pubout > ${UNPACKDIR}/keys/rsa_pub_oem_dss_key.pem
|
| /openbmc/openbmc/meta-google/recipes-google/ssh/ |
| H A D | authorized-keys-comp.bb | 9 file://authorized-keys-comp.service \ 10 file://authorized-keys-comp.sh \ 18 SYSTEMD_SERVICE:${PN} += "authorized-keys-comp.service" 26 install -m0755 authorized-keys-comp.sh ${D}${libexecdir}/ 29 install -m0644 authorized-keys-comp.service ${D}${systemd_system_unitdir}/
|
| /openbmc/qemu/qga/ |
| H A D | commands-windows-ssh.c | 2 * QEMU Guest Agent win32-specific command implementations for SSH keys. 421 * Writes the specified keys to the authenticated keys file. 424 * authkeys: Array of keys to write to disk 547 * Gets the list of authorized keys for a user. 550 * username -> Username to retrieve the keys for. 552 * returns: List of keys associated with the user. 557 GuestAuthorizedKeys *keys = NULL; in qmp_guest_ssh_get_authorized_keys() local 573 /* Set the GuestAuthorizedKey struct with keys from the file */ in qmp_guest_ssh_get_authorized_keys() 581 QAPI_LIST_PREPEND(ret->keys, g_strdup(authKeys[i])); in qmp_guest_ssh_get_authorized_keys() 588 keys = g_steal_pointer(&ret); in qmp_guest_ssh_get_authorized_keys() [all …]
|
| /openbmc/phosphor-fan-presence/presence/config_files/p10bmc/com.ibm.Hardware.Chassis.Model.Rainier2U/ |
| H A D | config.json | 10 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 29 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 48 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 67 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 86 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 105 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
|
| /openbmc/phosphor-fan-presence/presence/config_files/p10bmc/com.ibm.Hardware.Chassis.Model.Rainier4U/ |
| H A D | config.json | 10 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 29 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 48 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 67 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 86 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event" 105 "devpath": "/dev/input/by-path/platform-gpio-keys-polled-event"
|
| /openbmc/phosphor-logging/extensions/openpower-pels/ |
| H A D | device_callouts.hpp | 16 * The code will extract the search keys from the sysfs path to 147 * @brief Looks up the callouts in the JSON using the I2C keys. 169 * @brief Pulls the fields out of the I2C device path to use as search keys 172 * The keys are the I2C bus and address. 176 * @return std::tuple<size_t, uint8_t> - The I2C bus and address keys 181 * @brief Pulls the fields out of the FSI device path to use as search keys 195 * search keys in the JSON. 197 * The keys are the FSI link string and the I2C bus and address. 208 * @brief Pulls the fields out of the SPI device path to use as search keys 221 * search keys in the JSON. [all …]
|
| /openbmc/qemu/tests/qapi-schema/ |
| H A D | bad-if-keys.err | 1 bad-if-keys.json: In struct 'TestIfStruct': 2 bad-if-keys.json:2: 'if' condition of struct has conflicting keys
|
| /openbmc/openbmc/meta-openembedded/meta-oe/classes/ |
| H A D | signing.bbclass | 7 # This class provides a common workflow to use asymmetric (i.e. RSA) keys to 8 # sign artifacts. Usually, the keys are either stored as simple files in the 16 # Many software projects support signing using PKCS #11 keys, but configuring 20 # the recipe level. For cases where the keys are available as files (i.e. test 21 # keys in CI), they are imported into SoftHSM (a HSM emulation library). 23 # Recipes access the available keys via a specific role. So, depending on 25 # refer to different keys. 27 # the user to select one of multiple keys for a role when needed. 35 # Examples for defining roles and importing keys: 37 # meta-code-signing/recipes-security/signing-keys/dummy-rsa-key-native.bb [all …]
|
| /openbmc/openbmc/poky/meta/conf/ |
| H A D | image-fitimage.conf | 16 # Generate keys for signing Kernel fitImage 19 # Size of private keys in number of bits 47 # Keys used to sign individually image nodes. 48 # The keys to sign image nodes must be different from those used to sign 53 # UBOOT_SIGN_IMG_KEYNAME = "dev2" # keys name in keydir (eg. "dev2.crt", "dev2.key")
|