Home
last modified time | relevance | path

Searched refs:key (Results 251 – 275 of 5234) sorted by relevance

1...<<11121314151617181920>>...210

/openbmc/linux/crypto/asymmetric_keys/
H A DKconfig3 bool "Asymmetric (public-key cryptographic) key type"
6 This option provides support for a key type that holds the data for
7 the asymmetric keys used for public key cryptographic operations such
14 tristate "Asymmetric public-key crypto algorithm subtype"
33 data and provides the ability to instantiate a crypto key from a
34 public key packet found inside the certificate.
37 tristate "PKCS#8 private key parser"
43 private key data and provides the ability to instantiate a crypto key
57 tristate "PKCS#7 testing key type"
60 This option provides a type of key that can be loaded up from a
[all …]
/openbmc/u-boot/lib/
H A Dhashtable.c156 free((void *)ep->key); in hdestroy_r()
232 && strcmp(item.key, htab->table[idx].entry.key) == 0) { in _compare_and_overwrite_entry()
288 hval += item.key[count]; in hsearch_r()
374 htab->table[idx].entry.key = strdup(item.key); in hsearch_r()
439 free((void *)ep->key); in _hdelete()
455 e.key = (char *)key; in hdelete_r()
467 "%s, skipping it!\n", key); in hdelete_r()
534 return (strcmp(e1->key, e2->key)); in cmpkey()
631 totlen += strlen(ep->key); in hexport_r()
694 s = list[i]->key; in hexport_r()
[all …]
/openbmc/linux/drivers/accessibility/speakup/
H A Dkeyhelp.c52 u_short *p_key, key; in build_key_data() local
89 key = (state_tbl[i] << 8) + ch; in build_key_data()
95 *p_key = key; in build_key_data()
100 static void say_key(int key) in say_key() argument
102 int i, state = key >> 8; in say_key()
104 key &= 0xff; in say_key()
109 if ((key > 0) && (key <= num_key_names)) in say_key()
172 if ((type != KT_SPKUP) && (key > 0) && (key <= num_key_names)) { in spk_handle_help()
183 kp = spk_our_keys[key] + 1; in spk_handle_help()
188 key += (state_tbl[i] << 8); in spk_handle_help()
[all …]
/openbmc/linux/arch/riscv/kernel/
H A Dsys_riscv.c95 switch (pair->key) { in hwprobe_arch_id()
194 switch (pair->key) { in hwprobe_one_pair()
224 pair->key = -1; in hwprobe_one_pair()
271 if (get_user(pair.key, &pairs->key)) in do_riscv_hwprobe()
276 ret = put_user(pair.key, &pairs->key); in do_riscv_hwprobe()
295 int key; in init_hwprobe_vdso_data() local
301 for (key = 0; key <= RISCV_HWPROBE_MAX_KEY; key++) { in init_hwprobe_vdso_data()
302 pair.key = key; in init_hwprobe_vdso_data()
305 WARN_ON_ONCE(pair.key < 0); in init_hwprobe_vdso_data()
307 avd->all_cpu_hwprobe_values[key] = pair.value; in init_hwprobe_vdso_data()
[all …]
/openbmc/linux/kernel/bpf/
H A Dhashtab.c128 char key[] __aligned(8); member
310 memcpy(l->key, key, htab->map.key_size); in prealloc_lru_pop()
635 void *key, u32 key_size) in lookup_elem_raw() argument
641 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_elem_raw()
652 u32 hash, void *key, in lookup_nulls_elem_raw() argument
660 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_nulls_elem_raw()
843 if (!key) in htab_map_get_next_key()
1042 memcpy(l_new->key, key, key_size); in alloc_htab_elem()
2080 ctx.key = elem->key; in __bpf_hash_map_seq_show()
2171 void *key, *val; in bpf_for_each_hash_elem() local
[all …]
H A Dlpm_trie.c182 *(__be64 *)key->data); in longest_prefix_match()
195 *(__be32 *)&key->data[i]); in longest_prefix_match()
207 *(__be16 *)&key->data[i]); in longest_prefix_match()
232 struct bpf_lpm_trie_key *key = _key; in trie_lookup_elem() local
312 struct bpf_lpm_trie_key *key = _key; in trie_update_elem() local
341 new_node->prefixlen = key->prefixlen; in trie_update_elem()
393 if (matchlen == key->prefixlen) { in trie_update_elem()
411 if (extract_bit(key->data, matchlen)) { in trie_update_elem()
440 struct bpf_lpm_trie_key *key = _key; in trie_delete_elem() local
467 node->prefixlen == key->prefixlen) in trie_delete_elem()
[all …]
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dlocal_kptr_stash.c12 long key; member
18 long key; member
44 __type(key, int);
61 res->key = val; in create_and_stash()
89 res->key = 41; in stash_plain()
103 int key = 1; in unstash_rb_node() local
105 mapval = bpf_map_lookup_elem(&some_nodes, &key); in unstash_rb_node()
111 retval = res->key; in unstash_rb_node()
123 int key = 0; in stash_test_ref_kfunc() local
125 mapval = bpf_map_lookup_elem(&some_nodes, &key); in stash_test_ref_kfunc()
H A Dmap_kptr.c14 __type(key, int);
21 __type(key, int);
28 __type(key, int);
35 __type(key, int);
42 __type(key, int);
50 __type(key, int);
58 __type(key, int);
65 __type(key, int);
73 __type(key, int);
195 int key = 0; in test_map_kptr() local
[all …]
H A Dtest_hash_large_key.c11 __type(key, struct bigelement);
18 __type(key, __u32);
32 struct bigelement *key; in bpf_hash_large_key_test() local
34 key = bpf_map_lookup_elem(&key_map, &zero); in bpf_hash_large_key_test()
35 if (!key) in bpf_hash_large_key_test()
38 key->c = 1; in bpf_hash_large_key_test()
39 if (bpf_map_update_elem(&hash_map, key, &value, BPF_ANY)) in bpf_hash_large_key_test()
H A Dstacktrace_map_skip.c13 __type(key, __u32);
20 __type(key, __u32);
27 __type(key, __u32);
39 __u32 key = 0, val = 0; in oncpu() local
49 key = bpf_get_stackid(ctx, &stackmap, TEST_STACK_DEPTH); in oncpu()
50 if ((int)key >= 0) { in oncpu()
52 bpf_map_update_elem(&stackid_hmap, &key, &val, 0); in oncpu()
53 stack_p = bpf_map_lookup_elem(&stack_amap, &key); in oncpu()
/openbmc/linux/drivers/net/ethernet/rocker/
H A Drocker_ofdpa.c96 struct ofdpa_flow_tbl_key key; member
137 } key; member
329 entry->key.vlan.vlan_id)) in ofdpa_cmd_flow_tbl_add_vlan()
461 entry->key.acl.eth_type)) in ofdpa_cmd_flow_tbl_add_acl()
464 entry->key.acl.vlan_id)) in ofdpa_cmd_flow_tbl_add_acl()
519 entry->key.tbl_id)) in ofdpa_cmd_flow_tbl_add()
749 if (memcmp(&found->key, &match->key, key_len) == 0) in ofdpa_flow_tbl_find()
1891 if (memcmp(&found->key, &match->key, sizeof(found->key)) == 0) in ofdpa_fdb_tbl_find()
1916 fdb->key_crc32 = crc32(~0, &fdb->key, sizeof(fdb->key)); in ofdpa_port_fdb()
1970 found->key.addr, in ofdpa_port_fdb_flush()
[all …]
/openbmc/linux/drivers/hid/
H A Dhid-zydacron.c114 unsigned key; in zc_raw_event() local
121 key = zc->last_key[index]; in zc_raw_event()
122 if (key) { in zc_raw_event()
123 input_event(zc->input_ep81, EV_KEY, key, 0); in zc_raw_event()
128 key = 0; in zc_raw_event()
134 key = KEY_MODE; in zc_raw_event()
138 key = KEY_SCREEN; in zc_raw_event()
142 key = KEY_INFO; in zc_raw_event()
146 key = KEY_RADIO; in zc_raw_event()
151 if (key) { in zc_raw_event()
[all …]
/openbmc/linux/fs/btrfs/
H A Dlru_cache.c23 static struct btrfs_lru_cache_entry *match_entry(struct list_head *head, u64 key, in match_entry() argument
29 if (entry->key == key && entry->gen == gen) in match_entry()
46 u64 key, u64 gen) in btrfs_lru_cache_lookup() argument
51 head = mtree_load(&cache->entries, key); in btrfs_lru_cache_lookup()
55 entry = match_entry(head, key, gen); in btrfs_lru_cache_lookup()
89 head = mtree_erase(&cache->entries, entry->key); in btrfs_lru_cache_remove()
110 const u64 key = new_entry->key; in btrfs_lru_cache_store() local
118 ret = mtree_insert(&cache->entries, key, head, gfp); in btrfs_lru_cache_store()
124 head = mtree_load(&cache->entries, key); in btrfs_lru_cache_store()
126 if (match_entry(head, key, new_entry->gen) != NULL) in btrfs_lru_cache_store()
/openbmc/linux/net/openvswitch/
H A Dconntrack.c111 switch (ntohs(key->eth.type)) { in key_to_nfproto()
197 key->ct_state = state; in __ovs_ct_update_key()
198 key->ct_zone = zone->id; in __ovs_ct_update_key()
229 key->ct_orig_proto = 0; in __ovs_ct_update_key()
279 struct sw_flow_key *key, in ovs_ct_fill_key() argument
350 key->ct.mark = new_mark; in ovs_ct_set_mark()
548 !!(key->ct_state & in ovs_ct_executed()
635 key->tp.src = src; in ovs_nat_update_key()
657 key->tp.dst = dst; in ovs_nat_update_key()
739 key->ct_state = 0; in __ovs_ct_lookup()
[all …]
/openbmc/linux/Documentation/security/keys/
H A Dtrusted-encrypted.rst110 a child key in the storage key hierarchy. Encryption and decryption of the
141 using a specified ‘master’ key. The ‘master’ key can either be a trusted-key or
143 rooted in a trusted key, they are only as secure as the user key encrypting
201 seal the key.
243 keyctl add encrypted name "new [format] key-type:master-key-name keylen"
245 keyctl add encrypted name "new [format] key-type:master-key-name keylen
248 keyctl update keyid "update key-type:master-key-name"
253 key-type:= 'trusted' | 'user'
319 trusted key provides strong guarantees that the EVM key has not been
322 encrypted key "evm" using the above trusted key "kmk":
[all …]
H A Decryptfs.rst11 using a key, the FEKEK, derived from a user prompted passphrase; in the latter
13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based
18 kernel key of the 'user' type, inserted in the user's session specific keyring
22 The 'encrypted' key type has been extended with the introduction of the new
26 kernel and protected by the parent master key.
42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring
44 keyctl update keyid "update key-type:master-key-name"
49 key-type:= 'trusted' | 'user'
53 Example of encrypted key usage with the eCryptfs filesystem:
55 Create an encrypted key "1000100010001000" of length 64 bytes with format
[all …]
/openbmc/u-boot/lib/efi_loader/
H A Defi_console.c454 struct efi_key_data key; member
660 key->key = pressed_key; in efi_cin_read_key()
676 if (item->key.key.unicode_char || item->key.key.scan_code) { in efi_cin_notify()
677 if (item->key.key.unicode_char != in efi_cin_notify()
679 item->key.key.scan_code != next_key.key.scan_code) in efi_cin_notify()
870 key_data->key.unicode_char, in efi_cin_register_key_notify()
871 key_data->key.scan_code, in efi_cin_register_key_notify()
979 struct efi_input_key *key) in efi_cin_read_key_stroke() argument
983 EFI_ENTRY("%p, %p", this, key); in efi_cin_read_key_stroke()
986 if (!this || !key) { in efi_cin_read_key_stroke()
[all …]
/openbmc/qemu/tests/unit/
H A Dtest-crypto-akcipher.c666 const uint8_t *key; member
696 .key = rsa1024_public_key,
704 .key = rsa1024_private_key,
712 .key = rsa2048_public_key,
720 .key = rsa2048_private_key,
728 .key = rsa_public_key_lack_element,
756 .key = NULL,
763 .key = NULL,
777 .key = rsa_public_key_extra_elem,
961 g_assert(key == NULL); in test_rsakey()
[all …]
/openbmc/linux/Documentation/driver-api/nvdimm/
H A Dsecurity.rst29 disable <keyid> - disable enabled security and remove key.
31 erase <keyid> - delete existing user encryption key.
34 master_erase <keyid> - delete existing user encryption key.
39 The key is associated to the payload by the DIMM id. For example:
73 what the key description is for the old key since we are only interested in the
109 Overwrite can be done without a key if security is not enabled. A key serial
110 of 0 can be passed in to indicate no key.
124 master passphrase key is passed to the kernel. The master passphrase key
125 is just another encrypted-key.
135 passphrase key is passed to the kernel. The master passphrase key is just
[all …]
/openbmc/linux/drivers/md/
H A Ddm-bio-prison-v1.c87 static void __setup_new_cell(struct dm_cell_key *key, in __setup_new_cell() argument
91 memcpy(&cell->key, key, sizeof(cell->key)); in __setup_new_cell()
128 if (WARN_ON_ONCE(key->block_end - key->block_begin > BIO_PRISON_MAX_RANGE)) in dm_cell_key_has_valid_range()
139 struct dm_cell_key *key, in __bio_detain() argument
151 r = cmp_keys(key, &cell->key); in __bio_detain()
166 __setup_new_cell(key, inmate, cell_prealloc); in __bio_detain()
176 struct dm_cell_key *key, in bio_detain() argument
182 unsigned l = lock_nr(key, prison->num_locks); in bio_detain()
192 struct dm_cell_key *key, in dm_bio_detain() argument
202 struct dm_cell_key *key, in dm_get_cell() argument
[all …]
/openbmc/linux/include/linux/
H A Dhashtable.h60 #define hash_add(hashtable, node, key) \ argument
61 hlist_add_head(node, &hashtable[hash_min(key, HASH_BITS(hashtable))])
69 #define hash_add_rcu(hashtable, node, key) \ argument
70 hlist_add_head_rcu(node, &hashtable[hash_min(key, HASH_BITS(hashtable))])
165 #define hash_for_each_possible(name, obj, member, key) \ argument
176 #define hash_for_each_possible_rcu(name, obj, member, key, cond...) \ argument
177 hlist_for_each_entry_rcu(obj, &name[hash_min(key, HASH_BITS(name))],\
191 #define hash_for_each_possible_rcu_notrace(name, obj, member, key) \ argument
193 &name[hash_min(key, HASH_BITS(name))], member)
204 #define hash_for_each_possible_safe(name, obj, tmp, member, key) \ argument
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D20734 def _filter(key, value): argument
35 if key == 'hash' and re.match('[0-9a-f]+', value):
131 for key in keys:
132 md5_keys[key] = subprocess.check_output(
133 'echo %s | base64 -d | md5sum -b | cut -d" " -f1' % key,
136 sha1_keys[key] = subprocess.check_output(
137 'echo %s | base64 -d | sha1sum -b | cut -d" " -f1' % key,
140 sha256_keys[key] = subprocess.check_output(
148 for key in keys:
157 'hash': md5_keys[key],
[all …]
/openbmc/linux/drivers/net/ethernet/netronome/nfp/nfpcore/
H A Dnfp_mutex.c19 u32 key; member
87 int target, unsigned long long address, u32 key) in nfp_cpp_mutex_init() argument
97 err = nfp_cpp_writel(cpp, muw, address + 4, key); in nfp_cpp_mutex_init()
124 unsigned long long address, u32 key) in nfp_cpp_mutex_alloc() argument
140 if (tmp != key) in nfp_cpp_mutex_alloc()
150 mutex->key = key; in nfp_cpp_mutex_alloc()
200 mutex->target, mutex->address, mutex->key); in nfp_cpp_mutex_lock()
222 u32 key, value; in nfp_cpp_mutex_unlock() local
237 if (key != mutex->key) in nfp_cpp_mutex_unlock()
268 u32 key, value, tmp; in nfp_cpp_mutex_trylock() local
[all …]
/openbmc/linux/net/ipv4/
H A Dfib_trie.c364 l->key = key; in leaf_new()
1130 tn = tnode_new(key, __fls(key ^ n->key), 1); in fib_insert_node()
1570 index = key ^ n->key; in fib_table_lookup()
1945 key = l->key + 1; in fib_trie_unmerge()
1946 if (key < l->key) in fib_trie_unmerge()
2224 key = l->key + 1; in fib_table_notify()
2226 if (key < l->key) in fib_table_notify()
2383 key = l->key + 1; in fib_table_dump()
2389 if (key < l->key) in fib_table_dump()
2863 key = iter->key; in fib_route_get_idx()
[all …]
/openbmc/linux/samples/bpf/
H A Dtracex2.bpf.c15 __type(key, long);
84 struct hist_key key; in BPF_KSYSCALL() local
86 key.index = log2l(count); in BPF_KSYSCALL()
87 key.pid_tgid = bpf_get_current_pid_tgid(); in BPF_KSYSCALL()
88 key.uid_gid = bpf_get_current_uid_gid(); in BPF_KSYSCALL()
89 bpf_get_current_comm(&key.comm, sizeof(key.comm)); in BPF_KSYSCALL()
91 value = bpf_map_lookup_elem(&my_hist_map, &key); in BPF_KSYSCALL()
95 bpf_map_update_elem(&my_hist_map, &key, &init_val, BPF_ANY); in BPF_KSYSCALL()

1...<<11121314151617181920>>...210