Home
last modified time | relevance | path

Searched refs:key (Results 126 – 150 of 5234) sorted by relevance

12345678910>>...210

/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dbpf_iter_bpf_hash_map.c17 __type(key, struct key_t);
24 __type(key, __u64);
31 __type(key, struct key_t);
48 struct key_t *key = ctx->key; in dump_bpf_hash_map() local
63 if (key == (void *)0 || val == (void *)0) in dump_bpf_hash_map()
70 __builtin_memcpy(&tmp_key, key, sizeof(struct key_t)); in dump_bpf_hash_map()
78 key_sum_a += key->a; in dump_bpf_hash_map()
79 key_sum_b += key->b; in dump_bpf_hash_map()
80 key_sum_c += key->c; in dump_bpf_hash_map()
105 if (key == (void *)0 || val == (void *)0) { in dump_bpf_hash_map()
[all …]
/openbmc/linux/net/rxrpc/
H A Dsecurity.c72 struct key *key = call->key; in rxrpc_init_client_call_security() local
75 if (!key) in rxrpc_init_client_call_security()
78 ret = key_validate(key); in rxrpc_init_client_call_security()
101 struct key *key = conn->key; in rxrpc_init_client_conn_security() local
164 struct key *key = ERR_PTR(-EKEYREJECTED); in rxrpc_look_up_server_security() local
191 key = ERR_CAST(kref); in rxrpc_look_up_server_security()
195 key = key_ref_to_ptr(kref); in rxrpc_look_up_server_security()
197 ret = key_validate(key); in rxrpc_look_up_server_security()
199 key_put(key); in rxrpc_look_up_server_security()
200 key = ERR_PTR(ret); in rxrpc_look_up_server_security()
[all …]
H A Dkey.c414 static void rxrpc_destroy(struct key *key) in rxrpc_destroy() argument
450 struct key *key; in rxrpc_request_key() local
469 rx->key = key; in rxrpc_request_key()
484 struct key *key; in rxrpc_get_server_data_key() local
516 conn->key = key; in rxrpc_get_server_data_key()
522 key_put(key); in rxrpc_get_server_data_key()
538 struct key *key; in rxrpc_get_null_key() local
545 return key; in rxrpc_get_null_key()
550 key_put(key); in rxrpc_get_null_key()
554 return key; in rxrpc_get_null_key()
[all …]
/openbmc/linux/samples/bpf/
H A Dtest_lru_dist.c85 unsigned long long key; member
150 node->key = key; in pfect_lru_lookup_or_insert()
289 key, errno); in do_test_lru_dist()
354 for (key = 1; key <= 1000; key++) { in test_lru_loss0()
368 for (key = 1; key <= 1000; key++) { in test_lru_loss0()
370 if (key <= 100) in test_lru_loss0()
372 else if (key <= 900) in test_lru_loss0()
406 for (key = 1; key <= 1000; key++) in test_lru_loss1()
409 for (key = 1; key <= 1000; key++) { in test_lru_loss1()
455 key = stable_base; in do_test_parallel_lru_loss()
[all …]
/openbmc/linux/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_crypt_wep.c28 u8 key[WEP_KEY_LEN + 1]; member
70 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local
103 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
107 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt()
137 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local
147 key[0] = *pos++; in prism2_wep_decrypt()
148 key[1] = *pos++; in prism2_wep_decrypt()
149 key[2] = *pos++; in prism2_wep_decrypt()
157 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt()
192 memcpy(wep->key, key, len); in prism2_wep_set_key()
[all …]
H A Dieee80211_crypt_ccmp.c36 u8 key[CCMP_TK_LEN]; member
181 key->tx_pn[i]++; in ieee80211_ccmp_encrypt()
187 *pos++ = key->tx_pn[5]; in ieee80211_ccmp_encrypt()
188 *pos++ = key->tx_pn[4]; in ieee80211_ccmp_encrypt()
191 *pos++ = key->tx_pn[3]; in ieee80211_ccmp_encrypt()
192 *pos++ = key->tx_pn[2]; in ieee80211_ccmp_encrypt()
193 *pos++ = key->tx_pn[1]; in ieee80211_ccmp_encrypt()
194 *pos++ = key->tx_pn[0]; in ieee80211_ccmp_encrypt()
260 if (!key->key_set) { in ieee80211_ccmp_decrypt()
338 memcpy(data->key, key, CCMP_TK_LEN); in ieee80211_ccmp_set_key()
[all …]
/openbmc/linux/lib/
H A Dbtree.c141 val = key[i]; in dec_key()
142 key[i] = val - 1; in dec_key()
208 unsigned long *key) in btree_last() argument
225 unsigned long *key) in keycmp() argument
235 if (key[i]) in keyzero()
242 unsigned long *key) in btree_lookup_node() argument
264 unsigned long *key) in btree_lookup() argument
321 dec_key(geo, key); in btree_get_prev()
360 unsigned long *key) in getpos() argument
626 unsigned long *key) in btree_remove() argument
[all …]
/openbmc/linux/tools/perf/ui/tui/
H A Dutil.c28 int key; in popup_menu__run() local
36 switch (key) { in popup_menu__run()
45 key = -1; in popup_menu__run()
49 *keyp = key; in popup_menu__run()
60 return key; in popup_menu__run()
133 while (key != K_TIMER && key != K_ENTER && key != K_ESC) { in ui_browser__input_window()
144 buf[len] = key; in ui_browser__input_window()
155 key = K_ENTER; in ui_browser__input_window()
164 return key; in ui_browser__input_window()
249 int key; in __ui__warning() local
[all …]
/openbmc/linux/lib/crypto/
H A Dpoly1305-donna64.c13 void poly1305_core_setkey(struct poly1305_core_key *key, in poly1305_core_setkey() argument
22 key->key.r64[0] = t0 & 0xffc0fffffffULL; in poly1305_core_setkey()
23 key->key.r64[1] = ((t0 >> 44) | (t1 << 20)) & 0xfffffc0ffffULL; in poly1305_core_setkey()
24 key->key.r64[2] = ((t1 >> 24)) & 0x00ffffffc0fULL; in poly1305_core_setkey()
27 key->precomputed_s.r64[0] = key->key.r64[1] * 20; in poly1305_core_setkey()
28 key->precomputed_s.r64[1] = key->key.r64[2] * 20; in poly1305_core_setkey()
49 r0 = key->key.r64[0]; in poly1305_core_blocks()
50 r1 = key->key.r64[1]; in poly1305_core_blocks()
51 r2 = key->key.r64[2]; in poly1305_core_blocks()
57 s1 = key->precomputed_s.r64[0]; in poly1305_core_blocks()
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/
H A D0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch26 key = pamsshagentauth_key_new(KEY_RSA1);
53 switch (key->type) {
71 if (key->type == KEY_RSA1) {
91 diff --git a/key.c b/key.c
93 --- a/key.c
94 +++ b/key.c
178 if (key->type == KEY_RSA1 && key->rsa != NULL) {
182 bits = BN_num_bits(key->rsa->n);
184 if (write_bignum(f, key->rsa->e) &&
215 key = pamsshagentauth_key_new(type);
[all …]
/openbmc/linux/net/mac80211/
H A Dwpa.c85 key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY]; in ieee80211_tx_h_michael_mic_add()
161 key = &rx->key->conf.key[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY]; in ieee80211_rx_h_michael_mic_verify()
197 struct ieee80211_key *key = tx->key; in tkip_encrypt_skb() local
269 struct ieee80211_key *key = rx->key; in ieee80211_crypto_tkip_decrypt() local
422 struct ieee80211_key *key = tx->key; in ccmp_encrypt_skb() local
511 struct ieee80211_key *key = rx->key; in ieee80211_crypto_ccmp_decrypt() local
622 struct ieee80211_key *key = tx->key; in gcmp_encrypt_skb() local
708 struct ieee80211_key *key = rx->key; in ieee80211_crypto_gcmp_decrypt() local
825 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_encrypt() local
873 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_256_encrypt() local
[all …]
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/
H A Dspectrum1_mr_tcam.c35 switch (key->proto) { in mlxsw_sp1_mr_tcam_route_replace()
38 key->vrid, in mlxsw_sp1_mr_tcam_route_replace()
40 ntohl(key->group.addr4), in mlxsw_sp1_mr_tcam_route_replace()
48 key->vrid, in mlxsw_sp1_mr_tcam_route_replace()
50 key->group.addr6, in mlxsw_sp1_mr_tcam_route_replace()
51 key->group_mask.addr6, in mlxsw_sp1_mr_tcam_route_replace()
52 key->source.addr6, in mlxsw_sp1_mr_tcam_route_replace()
53 key->source_mask.addr6, in mlxsw_sp1_mr_tcam_route_replace()
67 switch (key->proto) { in mlxsw_sp1_mr_tcam_route_remove()
133 key, prio); in mlxsw_sp1_mr_tcam_route_create()
[all …]
/openbmc/linux/include/keys/
H A Dbig_key-type.h17 extern void big_key_revoke(struct key *key);
18 extern void big_key_destroy(struct key *key);
19 extern void big_key_describe(const struct key *big_key, struct seq_file *m);
20 extern long big_key_read(const struct key *key, char *buffer, size_t buflen);
21 extern int big_key_update(struct key *key, struct key_preparsed_payload *prep);
/openbmc/linux/fs/btrfs/
H A Droot-tree.c144 key->objectid, key->type, key->offset, in btrfs_update_root()
177 key, sizeof(*item)); in btrfs_update_root()
215 struct btrfs_key key; in btrfs_find_orphan_roots() local
226 key.offset = 0; in btrfs_find_orphan_roots()
255 key.offset++; in btrfs_find_orphan_roots()
342 struct btrfs_key key; in btrfs_del_root_ref() local
352 key.offset = ref_id; in btrfs_del_root_ref()
382 key.offset = root_id; in btrfs_del_root_ref()
411 struct btrfs_key key; in btrfs_add_root_ref() local
424 key.offset = ref_id; in btrfs_add_root_ref()
[all …]
/openbmc/openbmc/poky/scripts/
H A Doe-depends-dot85 chain.append(key)
113 key = m.group(1)
117 key = key.split('.')[0]
119 if key == dep:
121 if key in depends:
122 if not key in depends[key]:
127 depends[key] = set()
152 if self.args.key not in depends:
157 if self.args.key in depends:
162 key_list = [self.args.key]
[all …]
/openbmc/linux/net/tipc/
H A Dcrypto.c1156 key = c->key; in tipc_crypto_key_attach()
1181 key.pending = key_next(key.active ?: key.passive); in tipc_crypto_key_attach()
1257 key = rx->key; in tipc_crypto_key_try_align()
1445 key = tx->key; in tipc_crypto_key_revoke()
1551 key = tx->key; in tipc_crypto_timeout()
1570 key = rx->key; in tipc_crypto_timeout()
1575 key.passive = key.active; in tipc_crypto_timeout()
1576 key.active = key.pending; in tipc_crypto_timeout()
1602 key.passive = key.active; in tipc_crypto_timeout()
1824 key = rx->key; in tipc_crypto_rcv()
[all …]
/openbmc/linux/drivers/tty/
H A Dsysrq.c103 u8 loglevel = key - '0'; in sysrq_handle_loglevel()
536 switch (key) { in sysrq_key_table_key2index()
538 return key - '0'; in sysrq_key_table_key2index()
540 return key - 'a' + 10; in sysrq_key_table_key2index()
601 op_p->handler(key); in __handle_sysrq()
630 void handle_sysrq(u8 key) in handle_sysrq() argument
680 unsigned short key; in sysrq_parse_reset_sequence() local
685 key = sysrq_reset_seq[i]; in sysrq_parse_reset_sequence()
687 if (key == KEY_RESERVED || key > KEY_MAX) in sysrq_parse_reset_sequence()
760 u32 key; in sysrq_of_get_keyreset_config() local
[all …]
/openbmc/linux/drivers/crypto/intel/qat/qat_common/
H A Dqat_crypto.c134 char key[ADF_CFG_MAX_KEY_LEN_IN_BYTES]; in qat_crypto_create_instances() local
164 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_BANK_NUM, i); in qat_crypto_create_instances()
173 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_BANK_NUM, i); in qat_crypto_create_instances()
182 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, i); in qat_crypto_create_instances()
193 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, i); in qat_crypto_create_instances()
204 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_TX, i); in qat_crypto_create_instances()
206 msg_size, key, NULL, 0, &inst->sym_tx); in qat_crypto_create_instances()
211 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_TX, i); in qat_crypto_create_instances()
218 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_RX, i); in qat_crypto_create_instances()
220 msg_size, key, qat_alg_callback, 0, in qat_crypto_create_instances()
[all …]
/openbmc/skeleton/pystatemgr/
H A Ddiscover_system_state.py59 def getInterface(bus, objs, key): argument
61 objs[key]["bus_name"], objs[key]["object_name"], introspect=False
63 return dbus.Interface(obj, objs[key]["interface_name"])
66 def getProperty(bus, objs, key, prop): argument
68 objs[key]["bus_name"], objs[key]["object_name"], introspect=False
71 return intf.Get(objs[key]["interface_name"], prop)
74 def setProperty(bus, objs, key, prop, prop_value): argument
75 obj = bus.get_object(objs[key]["bus_name"], objs[key]["object_name"])
77 return intf.Set(objs[key]["interface_name"], prop, prop_value)
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dsigning-keys.bb27 # Export public key of the rpm signing key
29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'),
33 # Export public key of the ipk signing key
39 # Export public key of the feed signing key
41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
49 if [ -f "${B}/rpm-key" ]; then
52 if [ -f "${B}/ipk-key" ]; then
55 if [ -f "${B}/pf-key" ]; then
61 if [ -f "${B}/rpm-key" ]; then
64 if [ -f "${B}/ipk-key" ]; then
[all …]
/openbmc/linux/drivers/staging/rtl8192e/
H A Drtllib_crypt_wep.c23 u8 key[WEP_KEY_LEN + 1]; member
63 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local
99 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
103 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt()
132 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local
143 key[0] = *pos++; in prism2_wep_decrypt()
144 key[1] = *pos++; in prism2_wep_decrypt()
145 key[2] = *pos++; in prism2_wep_decrypt()
153 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt()
187 memcpy(wep->key, key, len); in prism2_wep_set_key()
[all …]
H A Drtllib_crypt_ccmp.c31 u8 key[CCMP_TK_LEN]; member
170 key->tx_pn[i]++; in rtllib_ccmp_encrypt()
176 *pos++ = key->tx_pn[5]; in rtllib_ccmp_encrypt()
177 *pos++ = key->tx_pn[4]; in rtllib_ccmp_encrypt()
180 *pos++ = key->tx_pn[3]; in rtllib_ccmp_encrypt()
181 *pos++ = key->tx_pn[2]; in rtllib_ccmp_encrypt()
182 *pos++ = key->tx_pn[1]; in rtllib_ccmp_encrypt()
183 *pos++ = key->tx_pn[0]; in rtllib_ccmp_encrypt()
250 if (!key->key_set) { in rtllib_ccmp_decrypt()
324 memcpy(data->key, key, CCMP_TK_LEN); in rtllib_ccmp_set_key()
[all …]
/openbmc/linux/include/linux/
H A Dbtree-128.h24 u64 key[2] = {k1, k2}; in btree_lookup128() local
31 u64 key[2] = {*k1, *k2}; in btree_get_prev128() local
35 (unsigned long *)&key); in btree_get_prev128()
36 *k1 = key[0]; in btree_get_prev128()
37 *k2 = key[1]; in btree_get_prev128()
44 u64 key[2] = {k1, k2}; in btree_insert128() local
52 u64 key[2] = {k1, k2}; in btree_update128() local
59 u64 key[2] = {k1, k2}; in btree_remove128() local
65 u64 key[2]; in btree_last128() local
70 *k1 = key[0]; in btree_last128()
[all …]
/openbmc/linux/security/keys/
H A Dbig_key.c165 void big_key_revoke(struct key *key) in big_key_revoke() argument
170 key_payload_reserve(key, 0); in big_key_revoke()
178 void big_key_destroy(struct key *key) in big_key_destroy() argument
194 int big_key_update(struct key *key, struct key_preparsed_payload *prep) in big_key_update() argument
202 if (key_is_positive(key)) in big_key_update()
203 big_key_destroy(key); in big_key_update()
205 return generic_key_instantiate(key, prep); in big_key_update()
211 void big_key_describe(const struct key *key, struct seq_file *m) in big_key_describe() argument
215 seq_puts(m, key->description); in big_key_describe()
217 if (key_is_positive(key)) in big_key_describe()
[all …]
/openbmc/linux/Documentation/crypto/
H A Dasymmetric-keys.rst28 key.
33 operations using that key. In such a case, the asymmetric key would then
39 subtype of the key and define the operations that can be done on that key.
50 the opportunity to pre-parse a key and to determine the description the key
54 partial match. The key type may also use other criteria to refer to a key.
105 Note that the key type representation types are required because key
107 instance, PGP generates key identifiers by hashing the key data plus some
123 an asymmetric key to provide or to provide access to the public key::
125 int verify_signature(const struct key *key,
182 void (*describe)(const struct key *key, struct seq_file *m);
[all …]

12345678910>>...210