/openbmc/qemu/tests/qemu-iotests/ |
H A D | 293.out | 26 qemu-io: can't open: Invalid password, cannot unlock any keyslot 29 qemu-io: can't open: Invalid password, cannot unlock any keyslot 38 qemu-img: Can't add a keyslot - all keyslots are in use 50 == erase all keys of secret 2== 51 == erase all keys of secret 1== 52 == erase all keys of secret 0== 54 qemu-img: All the active keyslots match the (old) password that was given and erasing them will era… 57 qemu-io: can't open: Invalid password, cannot unlock any keyslot 58 qemu-io: can't open: Invalid password, cannot unlock any keyslot 59 qemu-io: can't open: Invalid password, cannot unlock any keyslot [all …]
|
/openbmc/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 6 --------------- 11 "unlock unit", "freeze lock", "secure erase", and "overwrite". A security_ops 16 ------------------ 28 update <old_keyid> <new_keyid> - enable or update passphrase. 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/input/ |
H A D | adi,adp5588.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Nuno Sá <nuno.sa@analog.com> 14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf 17 - $ref: matrix-keymap.yaml# 18 - $ref: input.yaml# 23 - adi,adp5587 24 - adi,adp5588 29 vcc-supply: [all …]
|
/openbmc/linux/drivers/input/keyboard/ |
H A D | adp5588-keys.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 8 * Copyright (C) 2008-2010 Analog Devices Inc. 24 #include <linux/pinctrl/pinconf-generic.h> 46 #define UNLOCK1 0x0F /* Unlock Key1 */ 47 #define UNLOCK2 0x10 /* Unlock Key2 */ 126 * 128 so it fits matrix-keymap maximum number of keys when the full 158 #define ADP5588_ROWS_MAX (GPI_PIN_ROW7 - GPI_PIN_ROW0 + 1) 159 #define ADP5588_COLS_MAX (GPI_PIN_COL9 - GPI_PIN_COL0 + 1) 161 #define ADP5588_GPIMAPSIZE_MAX (GPI_PIN_END - GPI_PIN_BASE + 1) 167 #define KP_SEL(x) (BIT(x) - 1) /* 2^x-1 */ [all …]
|
/openbmc/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only) 2 /* Copyright(c) 2014 - 2020 Intel Corporation */ 18 #include <linux/dma-mapping.h> 44 (GET_HW_DATA(accel_dev)->accel_capabilities_mask & \ 79 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */ 107 return -EFAULT; in qat_get_inter_state_size() 116 SHASH_DESC_ON_STACK(shash, ctx->hash_tfm); in qat_alg_do_precomputes() 117 int block_size = crypto_shash_blocksize(ctx->hash_tfm); in qat_alg_do_precomputes() 118 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes() 123 memset(ctx->ipad, 0, block_size); in qat_alg_do_precomputes() [all …]
|
/openbmc/docs/designs/ |
H A D | estoraged.md | 1 # eStoraged Design - Encrypted Secondary Storage Management Daemon 13 encapsulating the security functionality and providing a D-Bus interface to 14 manage the encrypted filesystem on the device. Using the D-Bus interface, other 16 encrypted filesystem, wipe its contents, lock/unlock the device, or change the 27 uses the [dm-crypt](https://en.wikipedia.org/wiki/Dm-crypt) kernel subsystem. 28 Dm-crypt provides the encryption and device mapping capability, and Cryptsetup 31 change the password without re-encrypting the entire device. 34 make use of the lock/unlock feature (CMD42) at the eMMC hardware level as an 38 [JEDEC standard JESD84-B51A](https://www.jedec.org/document_search?search_api_views_fulltext=jesd84… 40 …ng SD/uSD Card Lock/Unlock Feature in Linux](https://media-www.micron.com/-/media/client/global/do… [all …]
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum_acl_bloom_filter.c | 1 // SPDX-License-Identifier: BSD-3-Clause OR GPL-2.0 19 /* Bloom filter uses a crc-16 hash over chunks of data which contain 4 key 20 * blocks, eRP ID and region ID. In Spectrum-2 and above, region key is combined 25 * +-------------------------+------------------------+------------------------+ 26 * | Chunk 2 Key blocks 11-8 | Chunk 1 Key blocks 7-4 | Chunk 0 Key blocks 3-0 | 27 * +-------------------------+------------------------+------------------------+ 31 /* Spectrum-2 and Spectrum-3 chunks */ 39 * +---------+----------------------+-----------------------------------+ 41 * +---------+-----------+----------+-----------------------------------+ 43 * +---------+-----------+----------+-----------------------------------+ [all …]
|
/openbmc/linux/crypto/ |
H A D | af_alg.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * af_alg: User-space algorithm interface 5 * This file provides the user-space API for algorithms. 16 #include <linux/key-type.h> 25 #include <keys/user-type.h> 26 #include <keys/trusted-type.h> 27 #include <keys/encrypted-type.h> 45 const struct af_alg_type *type = ERR_PTR(-ENOENT); in alg_get_type() 50 if (strcmp(node->type->name, name)) in alg_get_type() 53 if (try_module_get(node->type->owner)) in alg_get_type() [all …]
|
/openbmc/linux/include/linux/input/ |
H A D | adp5589.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright 2010-2011 Analog Devices Inc. 47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1) 76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1) 114 * ---------------- BIT ------------------ 131 * ---- BIT -- ----------- 154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */ 155 unsigned char unlock_key2; /* Unlock Key 2 (ADP5589 only) */ 156 …unsigned char unlock_timer; /* Time in seconds [0..7] between the two unlock keys 0=disable (ADP55… 166 unsigned pullup_en_100k; /* Pull-Up 100k Enable Mask */ [all …]
|
/openbmc/linux/drivers/net/ethernet/fungible/funeth/ |
H A D | funeth_main.c | 1 // SPDX-License-Identifier: (GPL-2.0-only OR BSD-3-Clause) 43 const int *keys, const u64 *data) in fun_port_write_cmds() argument 55 return -EINVAL; in fun_port_write_cmds() 61 fp->netdev->dev_port); in fun_port_write_cmds() 64 FUN_ADMIN_WRITE48_REQ_INIT(keys[i], data[i]); in fun_port_write_cmds() 66 return fun_submit_admin_sync_cmd(fp->fdev, &cmd.req.common, in fun_port_write_cmds() 77 const int *keys, u64 *data) in fun_port_read_cmds() argument 91 return -EINVAL; in fun_port_read_cmds() 97 fp->netdev->dev_port); in fun_port_read_cmds() 99 cmd.req.u.read.read48[i] = FUN_ADMIN_READ48_REQ_INIT(keys[i]); in fun_port_read_cmds() [all …]
|
/openbmc/linux/net/batman-adv/ |
H A D | hash.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 22 * keys 38 * struct batadv_hashtable - Wrapper of simple hlist based hashtable 65 * batadv_hash_add() - adds data to the hashtable 73 * and -1 on error. 82 int ret = -1; in batadv_hash_add() 90 index = choose(data, hash->size); in batadv_hash_add() 91 head = &hash->table[index]; in batadv_hash_add() 92 list_lock = &hash->list_locks[index]; in batadv_hash_add() 101 goto unlock; in batadv_hash_add() [all …]
|
/openbmc/linux/fs/crypto/ |
H A D | keysetup.c | 1 // SPDX-License-Identifier: GPL-2.0 18 .friendly_name = "AES-256-XTS", 26 .friendly_name = "AES-256-CTS-CBC", 33 .friendly_name = "AES-128-CBC-ESSIV", 41 .friendly_name = "AES-128-CTS-CBC", 48 .friendly_name = "SM4-XTS", 56 .friendly_name = "SM4-CTS-CBC", 71 .friendly_name = "AES-256-HCTR2", 87 if (S_ISREG(inode->i_mode)) in select_encryption_mode() 90 if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode)) in select_encryption_mode() [all …]
|
/openbmc/linux/security/keys/ |
H A D | keyctl.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 4 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved. 24 #include <keys/request_key_auth-type.h> 55 return -EINVAL; in key_get_type_from_user() 57 return -EPERM; in key_get_type_from_user() 58 type[len - 1] = '\0'; in key_get_type_from_user() 85 ret = -EINVAL; in SYSCALL_DEFINE5() 86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5() 106 ret = -EPERM; in SYSCALL_DEFINE5() 115 ret = -ENOMEM; in SYSCALL_DEFINE5() [all …]
|
/openbmc/linux/security/integrity/evm/ |
H A D | evm_crypto.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2005-2010 IBM Corporation 19 #include <keys/encrypted-type.h> 24 #define EVMKEY "evm-key" 41 * evm_set_key() - set EVM HMAC key from the kernel 46 * without using the "encrypted" key subsystem keys. It can be used 48 * keys. 56 rc = -EBUSY; in evm_set_key() 59 rc = -EINVAL; in evm_set_key() 84 return ERR_PTR(-ENOKEY); in init_desc() [all …]
|
/openbmc/u-boot/board/nokia/rx51/ |
H A D | rx51.c | 1 // SPDX-License-Identifier: GPL-2.0+ 6 * (C) Copyright 2011-2012 13 * (C) Copyright 2004-2008 20 * Richard Woodruff <r-woodruff2@ti.com> 33 #include <asm/mach-types.h> 47 "Nokia RX-51", 70 OMAP_TAG_WLAN_CX3110X_CONFIG(0x25, 0xff, 87, 42, -1), 84 OMAP_TAG_VERSION_STR_CONFIG("product", "RX-51"), 85 OMAP_TAG_VERSION_STR_CONFIG("hw-build", "2101"), 87 OMAP_TAG_VERSION_STR_CONFIG("boot-mode", "normal"), [all …]
|
/openbmc/linux/net/bluetooth/ |
H A D | mgmt.c | 2 BlueZ - Bluetooth protocol stack for Linux 5 Copyright (C) 2011-2012 Intel Corporation 291 case -EPERM: in mgmt_errno_status() 293 case -EINVAL: in mgmt_errno_status() 295 case -EOPNOTSUPP: in mgmt_errno_status() 297 case -EBUSY: in mgmt_errno_status() 299 case -ETIMEDOUT: in mgmt_errno_status() 301 case -ENOMEM: in mgmt_errno_status() 303 case -EISCONN: in mgmt_errno_status() 305 case -ENOTCON in mgmt_errno_status() 4167 struct mgmt_cp_set_blocked_keys *keys = data; set_blocked_keys() local [all...] |
/openbmc/linux/include/net/netfilter/ |
H A D | nf_flow_table.h | 7 #include <linux/rhashtable-types.h> 90 return flowtable->flags & NF_FLOWTABLE_HW_OFFLOAD; in nf_flowtable_hw_offload() 132 /* All members above are keys for lookups, see flow_offload_hash(). */ 195 return (__s32)(timeout - nf_flowtable_time_stamp); in nf_flow_timeout_delta() 227 struct flow_block *block = &flow_table->flow_block; in nf_flow_table_offload_add_cb() 231 down_write(&flow_table->flow_block_lock); in nf_flow_table_offload_add_cb() 234 err = -EEXIST; in nf_flow_table_offload_add_cb() 235 goto unlock; in nf_flow_table_offload_add_cb() 241 goto unlock; in nf_flow_table_offload_add_cb() 244 list_add_tail(&block_cb->list, &block->cb_list); in nf_flow_table_offload_add_cb() [all …]
|
/openbmc/linux/drivers/crypto/marvell/octeontx2/ |
H A D | otx2_cptvf_algs.c | 1 // SPDX-License-Identifier: GPL-2.0-only 64 return -ENODEV; in get_se_device() 89 req = container_of(cpt_req->areq, struct aead_request, base); in validate_hmac_cipher_null() 92 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null() 93 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null() 95 return -EBADMSG; in validate_hmac_cipher_null() 108 cpt_req = inst_info->req; in otx2_cpt_aead_callback() 115 if (cpt_req->req_type == in otx2_cpt_aead_callback() 117 !cpt_req->is_enc) in otx2_cpt_aead_callback() 120 pdev = inst_info->pdev; in otx2_cpt_aead_callback() [all …]
|
/openbmc/webui-vue/src/locales/ |
H A D | en-US.json | 38 "useCursorKeysToNavigateCalendarDates": "Use cursor keys to navigate calendar dates" 206 "label": "24-hour time", 473 "clearOperatingSystemKeysLabel": "Clear operating system keys", 474 …ratingSystemKeysHelperText": "This indicates OPAL to clear the operating system Secure Boot keys.", 483 "clear": "Clear keys", 484 … "Any encryption keys contained in the selected data will be lost. System will not be able to decr… 488 "selectedKeyClearedError": "Error clearing keys", 489 "selectedKeyClearedSuccess": "Keys cleared successfully" 567 "clickSaveToUnlockAccount": "Click \"Save\" to unlock account", 577 "unlock": "Unlock", string [all …]
|
/openbmc/u-boot/arch/powerpc/include/asm/ |
H A D | immap_8xx.h | 10 * functional files.....but anyone else is welcome to try. -- Dan 147 /* System Integration Timers keys. 165 /* Clocks and reset keys. 174 /* The key to unlock registers maintained by keep-alive power. 310 uint fec_hash_table_high; /* upper 32-bits of hash table */ 311 uint fec_hash_table_low; /* lower 32-bits of hash table */ 326 uint fec_r_bound; /* end of RAM (read-only) */ 397 /* Port E - MPC87x/88x only. 405 /* Communications Processor Timing Register - 457 sitk8xx_t im_sitk; /* Sys int timer keys */ [all …]
|
/openbmc/linux/drivers/md/bcache/ |
H A D | btree.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 8 * At a high level, bcache's btree is relatively standard b+ tree. All keys and 13 * the key is the highest key in the child node - except that the highest key in 15 * of the child node - this would allow us to have variable sized btree nodes 21 * overlapping extents - when we read in a btree node from disk, the first thing 22 * we do is resort all the sets of keys with a mergesort, and in the same pass 35 * disk if necessary. This function is almost never called directly though - the 37 * unlock the node after the function returns. 39 * The root is special cased - it's taken out of the cache's lru (thus pinning 43 * points to - the btree_root() macro handles this. [all …]
|
/openbmc/linux/drivers/nvdimm/ |
H A D | security.c | 1 // SPDX-License-Identifier: GPL-2.0 12 #include <linux/key-type.h> 13 #include <keys/user-type.h> 14 #include <keys/encrypted-type.h> 15 #include "nd-core.h" 31 lockdep_assert_held_read(&key->sem); in key_data() 33 return epayload->decrypted_data; in key_data() 41 up_read(&key->sem); in nvdimm_put_key() 55 struct device *dev = &nvdimm->dev; in nvdimm_request_key() 57 sprintf(desc, "%s%s", NVDIMM_PREFIX, nvdimm->dimm_id); in nvdimm_request_key() [all …]
|
/openbmc/linux/block/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 18 - block device files will become unusable 19 - some filesystems (such as ext3) will become unavailable. 86 support for ZAC/ZBC/ZNS host-managed and host-aware zoned block 101 See Documentation/admin-guide/cgroup-v1/blkio-controller.rst for more information. 128 Enable writeback throttling by default for request-based block devices. 187 depends on KEYS 191 Enabling this option enables users to setup/unlock/lock 197 Build the blk-crypto subsystem. Enabling this lets the 202 bool "Enable crypto API fallback for blk-crypto"
|
/openbmc/linux/Documentation/security/keys/ |
H A D | core.rst | 5 This service allows cryptographic keys, authentication tokens, cross-domain 10 other keys. Processes each have three standard keyring subscriptions that a 11 kernel service can search for relevant keys. 25 In this context, keys represent units of cryptographic data, authentication 30 - A serial number. 31 - A type. 32 - A description (for matching a key in a search). 33 - Access control information. 34 - An expiry time. 35 - A payload. [all …]
|
/openbmc/u-boot/drivers/power/ |
H A D | twl4030.c | 1 // SPDX-License-Identifier: GPL-2.0+ 7 * git://git.omapzoom.com/repo/u-boot.git 9 * Copyright (C) 2007-2009 Texas Instruments, Inc. 13 * (C) Copyright 2004-2008 21 * Richard Woodruff <r-woodruff2 at ti.com> 54 /* PM master unlock (CFG and TST keys) */ in twl4030_power_off() 162 mdelay(100); /* ramp-up delay from Linux code */ in twl4030_power_mmc_init() 170 mdelay(100); /* ramp-up delay from Linux code */ in twl4030_power_mmc_init()
|