/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | bpf_iter_bpf_hash_map.c | 17 __type(key, struct key_t); 24 __type(key, __u64); 31 __type(key, struct key_t); 48 struct key_t *key = ctx->key; in dump_bpf_hash_map() local 63 if (key == (void *)0 || val == (void *)0) in dump_bpf_hash_map() 70 __builtin_memcpy(&tmp_key, key, sizeof(struct key_t)); in dump_bpf_hash_map() 78 key_sum_a += key->a; in dump_bpf_hash_map() 79 key_sum_b += key->b; in dump_bpf_hash_map() 80 key_sum_c += key->c; in dump_bpf_hash_map() 105 if (key == (void *)0 || val == (void *)0) { in dump_bpf_hash_map() [all …]
|
/openbmc/linux/net/rxrpc/ |
H A D | security.c | 72 struct key *key = call->key; in rxrpc_init_client_call_security() local 75 if (!key) in rxrpc_init_client_call_security() 78 ret = key_validate(key); in rxrpc_init_client_call_security() 101 struct key *key = conn->key; in rxrpc_init_client_conn_security() local 164 struct key *key = ERR_PTR(-EKEYREJECTED); in rxrpc_look_up_server_security() local 191 key = ERR_CAST(kref); in rxrpc_look_up_server_security() 195 key = key_ref_to_ptr(kref); in rxrpc_look_up_server_security() 197 ret = key_validate(key); in rxrpc_look_up_server_security() 199 key_put(key); in rxrpc_look_up_server_security() 200 key = ERR_PTR(ret); in rxrpc_look_up_server_security() [all …]
|
H A D | key.c | 414 static void rxrpc_destroy(struct key *key) in rxrpc_destroy() argument 450 struct key *key; in rxrpc_request_key() local 469 rx->key = key; in rxrpc_request_key() 484 struct key *key; in rxrpc_get_server_data_key() local 516 conn->key = key; in rxrpc_get_server_data_key() 522 key_put(key); in rxrpc_get_server_data_key() 538 struct key *key; in rxrpc_get_null_key() local 545 return key; in rxrpc_get_null_key() 550 key_put(key); in rxrpc_get_null_key() 554 return key; in rxrpc_get_null_key() [all …]
|
/openbmc/linux/samples/bpf/ |
H A D | test_lru_dist.c | 85 unsigned long long key; member 150 node->key = key; in pfect_lru_lookup_or_insert() 289 key, errno); in do_test_lru_dist() 354 for (key = 1; key <= 1000; key++) { in test_lru_loss0() 368 for (key = 1; key <= 1000; key++) { in test_lru_loss0() 370 if (key <= 100) in test_lru_loss0() 372 else if (key <= 900) in test_lru_loss0() 406 for (key = 1; key <= 1000; key++) in test_lru_loss1() 409 for (key = 1; key <= 1000; key++) { in test_lru_loss1() 455 key = stable_base; in do_test_parallel_lru_loss() [all …]
|
/openbmc/linux/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt_wep.c | 28 u8 key[WEP_KEY_LEN + 1]; member 70 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local 103 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt() 107 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 137 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local 147 key[0] = *pos++; in prism2_wep_decrypt() 148 key[1] = *pos++; in prism2_wep_decrypt() 149 key[2] = *pos++; in prism2_wep_decrypt() 157 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 192 memcpy(wep->key, key, len); in prism2_wep_set_key() [all …]
|
H A D | ieee80211_crypt_ccmp.c | 36 u8 key[CCMP_TK_LEN]; member 181 key->tx_pn[i]++; in ieee80211_ccmp_encrypt() 187 *pos++ = key->tx_pn[5]; in ieee80211_ccmp_encrypt() 188 *pos++ = key->tx_pn[4]; in ieee80211_ccmp_encrypt() 191 *pos++ = key->tx_pn[3]; in ieee80211_ccmp_encrypt() 192 *pos++ = key->tx_pn[2]; in ieee80211_ccmp_encrypt() 193 *pos++ = key->tx_pn[1]; in ieee80211_ccmp_encrypt() 194 *pos++ = key->tx_pn[0]; in ieee80211_ccmp_encrypt() 260 if (!key->key_set) { in ieee80211_ccmp_decrypt() 338 memcpy(data->key, key, CCMP_TK_LEN); in ieee80211_ccmp_set_key() [all …]
|
/openbmc/linux/lib/ |
H A D | btree.c | 141 val = key[i]; in dec_key() 142 key[i] = val - 1; in dec_key() 208 unsigned long *key) in btree_last() argument 225 unsigned long *key) in keycmp() argument 235 if (key[i]) in keyzero() 242 unsigned long *key) in btree_lookup_node() argument 264 unsigned long *key) in btree_lookup() argument 321 dec_key(geo, key); in btree_get_prev() 360 unsigned long *key) in getpos() argument 626 unsigned long *key) in btree_remove() argument [all …]
|
/openbmc/linux/tools/perf/ui/tui/ |
H A D | util.c | 28 int key; in popup_menu__run() local 36 switch (key) { in popup_menu__run() 45 key = -1; in popup_menu__run() 49 *keyp = key; in popup_menu__run() 60 return key; in popup_menu__run() 133 while (key != K_TIMER && key != K_ENTER && key != K_ESC) { in ui_browser__input_window() 144 buf[len] = key; in ui_browser__input_window() 155 key = K_ENTER; in ui_browser__input_window() 164 return key; in ui_browser__input_window() 249 int key; in __ui__warning() local [all …]
|
/openbmc/linux/lib/crypto/ |
H A D | poly1305-donna64.c | 13 void poly1305_core_setkey(struct poly1305_core_key *key, in poly1305_core_setkey() argument 22 key->key.r64[0] = t0 & 0xffc0fffffffULL; in poly1305_core_setkey() 23 key->key.r64[1] = ((t0 >> 44) | (t1 << 20)) & 0xfffffc0ffffULL; in poly1305_core_setkey() 24 key->key.r64[2] = ((t1 >> 24)) & 0x00ffffffc0fULL; in poly1305_core_setkey() 27 key->precomputed_s.r64[0] = key->key.r64[1] * 20; in poly1305_core_setkey() 28 key->precomputed_s.r64[1] = key->key.r64[2] * 20; in poly1305_core_setkey() 49 r0 = key->key.r64[0]; in poly1305_core_blocks() 50 r1 = key->key.r64[1]; in poly1305_core_blocks() 51 r2 = key->key.r64[2]; in poly1305_core_blocks() 57 s1 = key->precomputed_s.r64[0]; in poly1305_core_blocks() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
H A D | 0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch | 26 key = pamsshagentauth_key_new(KEY_RSA1); 53 switch (key->type) { 71 if (key->type == KEY_RSA1) { 91 diff --git a/key.c b/key.c 93 --- a/key.c 94 +++ b/key.c 178 if (key->type == KEY_RSA1 && key->rsa != NULL) { 182 bits = BN_num_bits(key->rsa->n); 184 if (write_bignum(f, key->rsa->e) && 215 key = pamsshagentauth_key_new(type); [all …]
|
/openbmc/linux/net/mac80211/ |
H A D | wpa.c | 85 key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY]; in ieee80211_tx_h_michael_mic_add() 161 key = &rx->key->conf.key[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY]; in ieee80211_rx_h_michael_mic_verify() 197 struct ieee80211_key *key = tx->key; in tkip_encrypt_skb() local 269 struct ieee80211_key *key = rx->key; in ieee80211_crypto_tkip_decrypt() local 422 struct ieee80211_key *key = tx->key; in ccmp_encrypt_skb() local 511 struct ieee80211_key *key = rx->key; in ieee80211_crypto_ccmp_decrypt() local 622 struct ieee80211_key *key = tx->key; in gcmp_encrypt_skb() local 708 struct ieee80211_key *key = rx->key; in ieee80211_crypto_gcmp_decrypt() local 825 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_encrypt() local 873 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_256_encrypt() local [all …]
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum1_mr_tcam.c | 35 switch (key->proto) { in mlxsw_sp1_mr_tcam_route_replace() 38 key->vrid, in mlxsw_sp1_mr_tcam_route_replace() 40 ntohl(key->group.addr4), in mlxsw_sp1_mr_tcam_route_replace() 48 key->vrid, in mlxsw_sp1_mr_tcam_route_replace() 50 key->group.addr6, in mlxsw_sp1_mr_tcam_route_replace() 51 key->group_mask.addr6, in mlxsw_sp1_mr_tcam_route_replace() 52 key->source.addr6, in mlxsw_sp1_mr_tcam_route_replace() 53 key->source_mask.addr6, in mlxsw_sp1_mr_tcam_route_replace() 67 switch (key->proto) { in mlxsw_sp1_mr_tcam_route_remove() 133 key, prio); in mlxsw_sp1_mr_tcam_route_create() [all …]
|
/openbmc/linux/include/keys/ |
H A D | big_key-type.h | 17 extern void big_key_revoke(struct key *key); 18 extern void big_key_destroy(struct key *key); 19 extern void big_key_describe(const struct key *big_key, struct seq_file *m); 20 extern long big_key_read(const struct key *key, char *buffer, size_t buflen); 21 extern int big_key_update(struct key *key, struct key_preparsed_payload *prep);
|
/openbmc/linux/fs/btrfs/ |
H A D | root-tree.c | 144 key->objectid, key->type, key->offset, in btrfs_update_root() 177 key, sizeof(*item)); in btrfs_update_root() 215 struct btrfs_key key; in btrfs_find_orphan_roots() local 226 key.offset = 0; in btrfs_find_orphan_roots() 255 key.offset++; in btrfs_find_orphan_roots() 342 struct btrfs_key key; in btrfs_del_root_ref() local 352 key.offset = ref_id; in btrfs_del_root_ref() 382 key.offset = root_id; in btrfs_del_root_ref() 411 struct btrfs_key key; in btrfs_add_root_ref() local 424 key.offset = ref_id; in btrfs_add_root_ref() [all …]
|
/openbmc/openbmc/poky/scripts/ |
H A D | oe-depends-dot | 85 chain.append(key) 113 key = m.group(1) 117 key = key.split('.')[0] 119 if key == dep: 121 if key in depends: 122 if not key in depends[key]: 127 depends[key] = set() 152 if self.args.key not in depends: 157 if self.args.key in depends: 162 key_list = [self.args.key] [all …]
|
/openbmc/linux/net/tipc/ |
H A D | crypto.c | 1156 key = c->key; in tipc_crypto_key_attach() 1181 key.pending = key_next(key.active ?: key.passive); in tipc_crypto_key_attach() 1257 key = rx->key; in tipc_crypto_key_try_align() 1445 key = tx->key; in tipc_crypto_key_revoke() 1551 key = tx->key; in tipc_crypto_timeout() 1570 key = rx->key; in tipc_crypto_timeout() 1575 key.passive = key.active; in tipc_crypto_timeout() 1576 key.active = key.pending; in tipc_crypto_timeout() 1602 key.passive = key.active; in tipc_crypto_timeout() 1824 key = rx->key; in tipc_crypto_rcv() [all …]
|
/openbmc/linux/drivers/tty/ |
H A D | sysrq.c | 103 u8 loglevel = key - '0'; in sysrq_handle_loglevel() 536 switch (key) { in sysrq_key_table_key2index() 538 return key - '0'; in sysrq_key_table_key2index() 540 return key - 'a' + 10; in sysrq_key_table_key2index() 601 op_p->handler(key); in __handle_sysrq() 630 void handle_sysrq(u8 key) in handle_sysrq() argument 680 unsigned short key; in sysrq_parse_reset_sequence() local 685 key = sysrq_reset_seq[i]; in sysrq_parse_reset_sequence() 687 if (key == KEY_RESERVED || key > KEY_MAX) in sysrq_parse_reset_sequence() 760 u32 key; in sysrq_of_get_keyreset_config() local [all …]
|
/openbmc/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_crypto.c | 134 char key[ADF_CFG_MAX_KEY_LEN_IN_BYTES]; in qat_crypto_create_instances() local 164 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_BANK_NUM, i); in qat_crypto_create_instances() 173 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_BANK_NUM, i); in qat_crypto_create_instances() 182 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, i); in qat_crypto_create_instances() 193 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, i); in qat_crypto_create_instances() 204 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_TX, i); in qat_crypto_create_instances() 206 msg_size, key, NULL, 0, &inst->sym_tx); in qat_crypto_create_instances() 211 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_TX, i); in qat_crypto_create_instances() 218 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_RX, i); in qat_crypto_create_instances() 220 msg_size, key, qat_alg_callback, 0, in qat_crypto_create_instances() [all …]
|
/openbmc/skeleton/pystatemgr/ |
H A D | discover_system_state.py | 59 def getInterface(bus, objs, key): argument 61 objs[key]["bus_name"], objs[key]["object_name"], introspect=False 63 return dbus.Interface(obj, objs[key]["interface_name"]) 66 def getProperty(bus, objs, key, prop): argument 68 objs[key]["bus_name"], objs[key]["object_name"], introspect=False 71 return intf.Get(objs[key]["interface_name"], prop) 74 def setProperty(bus, objs, key, prop, prop_value): argument 75 obj = bus.get_object(objs[key]["bus_name"], objs[key]["object_name"]) 77 return intf.Set(objs[key]["interface_name"], prop, prop_value)
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | signing-keys.bb | 27 # Export public key of the rpm signing key 29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'), 33 # Export public key of the ipk signing key 39 # Export public key of the feed signing key 41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'), 49 if [ -f "${B}/rpm-key" ]; then 52 if [ -f "${B}/ipk-key" ]; then 55 if [ -f "${B}/pf-key" ]; then 61 if [ -f "${B}/rpm-key" ]; then 64 if [ -f "${B}/ipk-key" ]; then [all …]
|
/openbmc/linux/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_wep.c | 23 u8 key[WEP_KEY_LEN + 1]; member 63 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local 99 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt() 103 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 132 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local 143 key[0] = *pos++; in prism2_wep_decrypt() 144 key[1] = *pos++; in prism2_wep_decrypt() 145 key[2] = *pos++; in prism2_wep_decrypt() 153 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 187 memcpy(wep->key, key, len); in prism2_wep_set_key() [all …]
|
H A D | rtllib_crypt_ccmp.c | 31 u8 key[CCMP_TK_LEN]; member 170 key->tx_pn[i]++; in rtllib_ccmp_encrypt() 176 *pos++ = key->tx_pn[5]; in rtllib_ccmp_encrypt() 177 *pos++ = key->tx_pn[4]; in rtllib_ccmp_encrypt() 180 *pos++ = key->tx_pn[3]; in rtllib_ccmp_encrypt() 181 *pos++ = key->tx_pn[2]; in rtllib_ccmp_encrypt() 182 *pos++ = key->tx_pn[1]; in rtllib_ccmp_encrypt() 183 *pos++ = key->tx_pn[0]; in rtllib_ccmp_encrypt() 250 if (!key->key_set) { in rtllib_ccmp_decrypt() 324 memcpy(data->key, key, CCMP_TK_LEN); in rtllib_ccmp_set_key() [all …]
|
/openbmc/linux/include/linux/ |
H A D | btree-128.h | 24 u64 key[2] = {k1, k2}; in btree_lookup128() local 31 u64 key[2] = {*k1, *k2}; in btree_get_prev128() local 35 (unsigned long *)&key); in btree_get_prev128() 36 *k1 = key[0]; in btree_get_prev128() 37 *k2 = key[1]; in btree_get_prev128() 44 u64 key[2] = {k1, k2}; in btree_insert128() local 52 u64 key[2] = {k1, k2}; in btree_update128() local 59 u64 key[2] = {k1, k2}; in btree_remove128() local 65 u64 key[2]; in btree_last128() local 70 *k1 = key[0]; in btree_last128() [all …]
|
/openbmc/linux/security/keys/ |
H A D | big_key.c | 165 void big_key_revoke(struct key *key) in big_key_revoke() argument 170 key_payload_reserve(key, 0); in big_key_revoke() 178 void big_key_destroy(struct key *key) in big_key_destroy() argument 194 int big_key_update(struct key *key, struct key_preparsed_payload *prep) in big_key_update() argument 202 if (key_is_positive(key)) in big_key_update() 203 big_key_destroy(key); in big_key_update() 205 return generic_key_instantiate(key, prep); in big_key_update() 211 void big_key_describe(const struct key *key, struct seq_file *m) in big_key_describe() argument 215 seq_puts(m, key->description); in big_key_describe() 217 if (key_is_positive(key)) in big_key_describe() [all …]
|
/openbmc/linux/Documentation/crypto/ |
H A D | asymmetric-keys.rst | 28 key. 33 operations using that key. In such a case, the asymmetric key would then 39 subtype of the key and define the operations that can be done on that key. 50 the opportunity to pre-parse a key and to determine the description the key 54 partial match. The key type may also use other criteria to refer to a key. 105 Note that the key type representation types are required because key 107 instance, PGP generates key identifiers by hashing the key data plus some 123 an asymmetric key to provide or to provide access to the public key:: 125 int verify_signature(const struct key *key, 182 void (*describe)(const struct key *key, struct seq_file *m); [all …]
|