Home
last modified time | relevance | path

Searched +full:unlock +full:- +full:keys (Results 1 – 25 of 158) sorted by relevance

1234567

/openbmc/qemu/tests/qemu-iotests/
H A D293.out26 qemu-io: can't open: Invalid password, cannot unlock any keyslot
29 qemu-io: can't open: Invalid password, cannot unlock any keyslot
38 qemu-img: Can't add a keyslot - all keyslots are in use
50 == erase all keys of secret 2==
51 == erase all keys of secret 1==
52 == erase all keys of secret 0==
54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era…
57 qemu-io: can't open: Invalid password, cannot unlock any keyslot
58 qemu-io: can't open: Invalid password, cannot unlock any keyslot
59 qemu-io: can't open: Invalid password, cannot unlock any keyslot
[all …]
/openbmc/linux/Documentation/driver-api/nvdimm/
H A Dsecurity.rst6 ---------------
11 "unlock unit", "freeze lock", "secure erase", and "overwrite". A security_ops
16 ------------------
28 update <old_keyid> <new_keyid> - enable or update passphrase.
29 disable <keyid> - disable enabled security and remove key.
30 freeze - freeze changing of security states.
31 erase <keyid> - delete existing user encryption key.
32 overwrite <keyid> - wipe the entire nvdimm.
33 master_update <keyid> <new_keyid> - enable or update master passphrase.
34 master_erase <keyid> - delete existing user encryption key.
[all …]
/openbmc/linux/Documentation/devicetree/bindings/input/
H A Dadi,adp5588.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Nuno Sá <nuno.sa@analog.com>
14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf
17 - $ref: matrix-keymap.yaml#
18 - $ref: input.yaml#
23 - adi,adp5587
24 - adi,adp5588
29 vcc-supply:
[all …]
/openbmc/linux/drivers/input/keyboard/
H A Dadp5588-keys.c1 // SPDX-License-Identifier: GPL-2.0-or-later
8 * Copyright (C) 2008-2010 Analog Devices Inc.
24 #include <linux/pinctrl/pinconf-generic.h>
46 #define UNLOCK1 0x0F /* Unlock Key1 */
47 #define UNLOCK2 0x10 /* Unlock Key2 */
126 * 128 so it fits matrix-keymap maximum number of keys when the full
158 #define ADP5588_ROWS_MAX (GPI_PIN_ROW7 - GPI_PIN_ROW0 + 1)
159 #define ADP5588_COLS_MAX (GPI_PIN_COL9 - GPI_PIN_COL0 + 1)
161 #define ADP5588_GPIMAPSIZE_MAX (GPI_PIN_END - GPI_PIN_BASE + 1)
167 #define KP_SEL(x) (BIT(x) - 1) /* 2^x-1 */
[all …]
/openbmc/linux/drivers/crypto/intel/qat/qat_common/
H A Dqat_algs.c1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only)
2 /* Copyright(c) 2014 - 2020 Intel Corporation */
18 #include <linux/dma-mapping.h>
44 (GET_HW_DATA(accel_dev)->accel_capabilities_mask & \
79 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */
107 return -EFAULT; in qat_get_inter_state_size()
116 SHASH_DESC_ON_STACK(shash, ctx->hash_tfm); in qat_alg_do_precomputes()
117 int block_size = crypto_shash_blocksize(ctx->hash_tfm); in qat_alg_do_precomputes()
118 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes()
123 memset(ctx->ipad, 0, block_size); in qat_alg_do_precomputes()
[all …]
/openbmc/docs/designs/
H A Destoraged.md1 # eStoraged Design - Encrypted Secondary Storage Management Daemon
13 encapsulating the security functionality and providing a D-Bus interface to
14 manage the encrypted filesystem on the device. Using the D-Bus interface, other
16 encrypted filesystem, wipe its contents, lock/unlock the device, or change the
27 uses the [dm-crypt](https://en.wikipedia.org/wiki/Dm-crypt) kernel subsystem.
28 Dm-crypt provides the encryption and device mapping capability, and Cryptsetup
31 change the password without re-encrypting the entire device.
34 make use of the lock/unlock feature (CMD42) at the eMMC hardware level as an
38 [JEDEC standard JESD84-B51A](https://www.jedec.org/document_search?search_api_views_fulltext=jesd84
40 …ng SD/uSD Card Lock/Unlock Feature in Linux](https://media-www.micron.com/-/media/client/global/do…
[all …]
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/
H A Dspectrum_acl_bloom_filter.c1 // SPDX-License-Identifier: BSD-3-Clause OR GPL-2.0
19 /* Bloom filter uses a crc-16 hash over chunks of data which contain 4 key
20 * blocks, eRP ID and region ID. In Spectrum-2 and above, region key is combined
25 * +-------------------------+------------------------+------------------------+
26 * | Chunk 2 Key blocks 11-8 | Chunk 1 Key blocks 7-4 | Chunk 0 Key blocks 3-0 |
27 * +-------------------------+------------------------+------------------------+
31 /* Spectrum-2 and Spectrum-3 chunks */
39 * +---------+----------------------+-----------------------------------+
41 * +---------+-----------+----------+-----------------------------------+
43 * +---------+-----------+----------+-----------------------------------+
[all …]
/openbmc/linux/crypto/
H A Daf_alg.c1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * af_alg: User-space algorithm interface
5 * This file provides the user-space API for algorithms.
16 #include <linux/key-type.h>
25 #include <keys/user-type.h>
26 #include <keys/trusted-type.h>
27 #include <keys/encrypted-type.h>
45 const struct af_alg_type *type = ERR_PTR(-ENOENT); in alg_get_type()
50 if (strcmp(node->type->name, name)) in alg_get_type()
53 if (try_module_get(node->type->owner)) in alg_get_type()
[all …]
/openbmc/linux/include/linux/input/
H A Dadp5589.h1 /* SPDX-License-Identifier: GPL-2.0-only */
5 * Copyright 2010-2011 Analog Devices Inc.
47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1)
76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1)
114 * ---------------- BIT ------------------
131 * ---- BIT -- -----------
154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */
155 unsigned char unlock_key2; /* Unlock Key 2 (ADP5589 only) */
156 …unsigned char unlock_timer; /* Time in seconds [0..7] between the two unlock keys 0=disable (ADP55…
166 unsigned pullup_en_100k; /* Pull-Up 100k Enable Mask */
[all …]
/openbmc/linux/drivers/net/ethernet/fungible/funeth/
H A Dfuneth_main.c1 // SPDX-License-Identifier: (GPL-2.0-only OR BSD-3-Clause)
43 const int *keys, const u64 *data) in fun_port_write_cmds() argument
55 return -EINVAL; in fun_port_write_cmds()
61 fp->netdev->dev_port); in fun_port_write_cmds()
64 FUN_ADMIN_WRITE48_REQ_INIT(keys[i], data[i]); in fun_port_write_cmds()
66 return fun_submit_admin_sync_cmd(fp->fdev, &cmd.req.common, in fun_port_write_cmds()
77 const int *keys, u64 *data) in fun_port_read_cmds() argument
91 return -EINVAL; in fun_port_read_cmds()
97 fp->netdev->dev_port); in fun_port_read_cmds()
99 cmd.req.u.read.read48[i] = FUN_ADMIN_READ48_REQ_INIT(keys[i]); in fun_port_read_cmds()
[all …]
/openbmc/linux/net/batman-adv/
H A Dhash.h1 /* SPDX-License-Identifier: GPL-2.0 */
22 * keys
38 * struct batadv_hashtable - Wrapper of simple hlist based hashtable
65 * batadv_hash_add() - adds data to the hashtable
73 * and -1 on error.
82 int ret = -1; in batadv_hash_add()
90 index = choose(data, hash->size); in batadv_hash_add()
91 head = &hash->table[index]; in batadv_hash_add()
92 list_lock = &hash->list_locks[index]; in batadv_hash_add()
101 goto unlock; in batadv_hash_add()
[all …]
/openbmc/linux/fs/crypto/
H A Dkeysetup.c1 // SPDX-License-Identifier: GPL-2.0
18 .friendly_name = "AES-256-XTS",
26 .friendly_name = "AES-256-CTS-CBC",
33 .friendly_name = "AES-128-CBC-ESSIV",
41 .friendly_name = "AES-128-CTS-CBC",
48 .friendly_name = "SM4-XTS",
56 .friendly_name = "SM4-CTS-CBC",
71 .friendly_name = "AES-256-HCTR2",
87 if (S_ISREG(inode->i_mode)) in select_encryption_mode()
90 if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode)) in select_encryption_mode()
[all …]
/openbmc/linux/security/keys/
H A Dkeyctl.c1 // SPDX-License-Identifier: GPL-2.0-or-later
4 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
24 #include <keys/request_key_auth-type.h>
55 return -EINVAL; in key_get_type_from_user()
57 return -EPERM; in key_get_type_from_user()
58 type[len - 1] = '\0'; in key_get_type_from_user()
85 ret = -EINVAL; in SYSCALL_DEFINE5()
86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5()
106 ret = -EPERM; in SYSCALL_DEFINE5()
115 ret = -ENOMEM; in SYSCALL_DEFINE5()
[all …]
/openbmc/linux/security/integrity/evm/
H A Devm_crypto.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2005-2010 IBM Corporation
19 #include <keys/encrypted-type.h>
24 #define EVMKEY "evm-key"
41 * evm_set_key() - set EVM HMAC key from the kernel
46 * without using the "encrypted" key subsystem keys. It can be used
48 * keys.
56 rc = -EBUSY; in evm_set_key()
59 rc = -EINVAL; in evm_set_key()
84 return ERR_PTR(-ENOKEY); in init_desc()
[all …]
/openbmc/u-boot/board/nokia/rx51/
H A Drx51.c1 // SPDX-License-Identifier: GPL-2.0+
6 * (C) Copyright 2011-2012
13 * (C) Copyright 2004-2008
20 * Richard Woodruff <r-woodruff2@ti.com>
33 #include <asm/mach-types.h>
47 "Nokia RX-51",
70 OMAP_TAG_WLAN_CX3110X_CONFIG(0x25, 0xff, 87, 42, -1),
84 OMAP_TAG_VERSION_STR_CONFIG("product", "RX-51"),
85 OMAP_TAG_VERSION_STR_CONFIG("hw-build", "2101"),
87 OMAP_TAG_VERSION_STR_CONFIG("boot-mode", "normal"),
[all …]
/openbmc/linux/net/bluetooth/
H A Dmgmt.c2 BlueZ - Bluetooth protocol stack for Linux
5 Copyright (C) 2011-2012 Intel Corporation
291 case -EPERM: in mgmt_errno_status()
293 case -EINVAL: in mgmt_errno_status()
295 case -EOPNOTSUPP: in mgmt_errno_status()
297 case -EBUSY: in mgmt_errno_status()
299 case -ETIMEDOUT: in mgmt_errno_status()
301 case -ENOMEM: in mgmt_errno_status()
303 case -EISCONN: in mgmt_errno_status()
305 case -ENOTCON in mgmt_errno_status()
4167 struct mgmt_cp_set_blocked_keys *keys = data; set_blocked_keys() local
[all...]
/openbmc/linux/include/net/netfilter/
H A Dnf_flow_table.h7 #include <linux/rhashtable-types.h>
90 return flowtable->flags & NF_FLOWTABLE_HW_OFFLOAD; in nf_flowtable_hw_offload()
132 /* All members above are keys for lookups, see flow_offload_hash(). */
195 return (__s32)(timeout - nf_flowtable_time_stamp); in nf_flow_timeout_delta()
227 struct flow_block *block = &flow_table->flow_block; in nf_flow_table_offload_add_cb()
231 down_write(&flow_table->flow_block_lock); in nf_flow_table_offload_add_cb()
234 err = -EEXIST; in nf_flow_table_offload_add_cb()
235 goto unlock; in nf_flow_table_offload_add_cb()
241 goto unlock; in nf_flow_table_offload_add_cb()
244 list_add_tail(&block_cb->list, &block->cb_list); in nf_flow_table_offload_add_cb()
[all …]
/openbmc/linux/drivers/crypto/marvell/octeontx2/
H A Dotx2_cptvf_algs.c1 // SPDX-License-Identifier: GPL-2.0-only
64 return -ENODEV; in get_se_device()
89 req = container_of(cpt_req->areq, struct aead_request, base); in validate_hmac_cipher_null()
92 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null()
93 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null()
95 return -EBADMSG; in validate_hmac_cipher_null()
108 cpt_req = inst_info->req; in otx2_cpt_aead_callback()
115 if (cpt_req->req_type == in otx2_cpt_aead_callback()
117 !cpt_req->is_enc) in otx2_cpt_aead_callback()
120 pdev = inst_info->pdev; in otx2_cpt_aead_callback()
[all …]
/openbmc/webui-vue/src/locales/
H A Den-US.json38 "useCursorKeysToNavigateCalendarDates": "Use cursor keys to navigate calendar dates"
206 "label": "24-hour time",
473 "clearOperatingSystemKeysLabel": "Clear operating system keys",
474 …ratingSystemKeysHelperText": "This indicates OPAL to clear the operating system Secure Boot keys.",
483 "clear": "Clear keys",
484 … "Any encryption keys contained in the selected data will be lost. System will not be able to decr…
488 "selectedKeyClearedError": "Error clearing keys",
489 "selectedKeyClearedSuccess": "Keys cleared successfully"
567 "clickSaveToUnlockAccount": "Click \"Save\" to unlock account",
577 "unlock": "Unlock", string
[all …]
/openbmc/u-boot/arch/powerpc/include/asm/
H A Dimmap_8xx.h10 * functional files.....but anyone else is welcome to try. -- Dan
147 /* System Integration Timers keys.
165 /* Clocks and reset keys.
174 /* The key to unlock registers maintained by keep-alive power.
310 uint fec_hash_table_high; /* upper 32-bits of hash table */
311 uint fec_hash_table_low; /* lower 32-bits of hash table */
326 uint fec_r_bound; /* end of RAM (read-only) */
397 /* Port E - MPC87x/88x only.
405 /* Communications Processor Timing Register -
457 sitk8xx_t im_sitk; /* Sys int timer keys */
[all …]
/openbmc/linux/drivers/md/bcache/
H A Dbtree.h1 /* SPDX-License-Identifier: GPL-2.0 */
8 * At a high level, bcache's btree is relatively standard b+ tree. All keys and
13 * the key is the highest key in the child node - except that the highest key in
15 * of the child node - this would allow us to have variable sized btree nodes
21 * overlapping extents - when we read in a btree node from disk, the first thing
22 * we do is resort all the sets of keys with a mergesort, and in the same pass
35 * disk if necessary. This function is almost never called directly though - the
37 * unlock the node after the function returns.
39 * The root is special cased - it's taken out of the cache's lru (thus pinning
43 * points to - the btree_root() macro handles this.
[all …]
/openbmc/linux/drivers/nvdimm/
H A Dsecurity.c1 // SPDX-License-Identifier: GPL-2.0
12 #include <linux/key-type.h>
13 #include <keys/user-type.h>
14 #include <keys/encrypted-type.h>
15 #include "nd-core.h"
31 lockdep_assert_held_read(&key->sem); in key_data()
33 return epayload->decrypted_data; in key_data()
41 up_read(&key->sem); in nvdimm_put_key()
55 struct device *dev = &nvdimm->dev; in nvdimm_request_key()
57 sprintf(desc, "%s%s", NVDIMM_PREFIX, nvdimm->dimm_id); in nvdimm_request_key()
[all …]
/openbmc/linux/block/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
18 - block device files will become unusable
19 - some filesystems (such as ext3) will become unavailable.
86 support for ZAC/ZBC/ZNS host-managed and host-aware zoned block
101 See Documentation/admin-guide/cgroup-v1/blkio-controller.rst for more information.
128 Enable writeback throttling by default for request-based block devices.
187 depends on KEYS
191 Enabling this option enables users to setup/unlock/lock
197 Build the blk-crypto subsystem. Enabling this lets the
202 bool "Enable crypto API fallback for blk-crypto"
/openbmc/linux/Documentation/security/keys/
H A Dcore.rst5 This service allows cryptographic keys, authentication tokens, cross-domain
10 other keys. Processes each have three standard keyring subscriptions that a
11 kernel service can search for relevant keys.
25 In this context, keys represent units of cryptographic data, authentication
30 - A serial number.
31 - A type.
32 - A description (for matching a key in a search).
33 - Access control information.
34 - An expiry time.
35 - A payload.
[all …]
/openbmc/u-boot/drivers/power/
H A Dtwl4030.c1 // SPDX-License-Identifier: GPL-2.0+
7 * git://git.omapzoom.com/repo/u-boot.git
9 * Copyright (C) 2007-2009 Texas Instruments, Inc.
13 * (C) Copyright 2004-2008
21 * Richard Woodruff <r-woodruff2 at ti.com>
54 /* PM master unlock (CFG and TST keys) */ in twl4030_power_off()
162 mdelay(100); /* ramp-up delay from Linux code */ in twl4030_power_mmc_init()
170 mdelay(100); /* ramp-up delay from Linux code */ in twl4030_power_mmc_init()

1234567