/openbmc/linux/crypto/asymmetric_keys/ |
H A D | Kconfig | 3 bool "Asymmetric (public-key cryptographic) key type" 6 This option provides support for a key type that holds the data for 7 the asymmetric keys used for public key cryptographic operations such 14 tristate "Asymmetric public-key crypto algorithm subtype" 33 data and provides the ability to instantiate a crypto key from a 34 public key packet found inside the certificate. 37 tristate "PKCS#8 private key parser" 43 private key data and provides the ability to instantiate a crypto key 57 tristate "PKCS#7 testing key type" 60 This option provides a type of key that can be loaded up from a [all …]
|
/openbmc/u-boot/lib/ |
H A D | hashtable.c | 156 free((void *)ep->key); in hdestroy_r() 232 && strcmp(item.key, htab->table[idx].entry.key) == 0) { in _compare_and_overwrite_entry() 288 hval += item.key[count]; in hsearch_r() 374 htab->table[idx].entry.key = strdup(item.key); in hsearch_r() 439 free((void *)ep->key); in _hdelete() 455 e.key = (char *)key; in hdelete_r() 467 "%s, skipping it!\n", key); in hdelete_r() 534 return (strcmp(e1->key, e2->key)); in cmpkey() 631 totlen += strlen(ep->key); in hexport_r() 694 s = list[i]->key; in hexport_r() [all …]
|
/openbmc/linux/drivers/accessibility/speakup/ |
H A D | keyhelp.c | 52 u_short *p_key, key; in build_key_data() local 89 key = (state_tbl[i] << 8) + ch; in build_key_data() 95 *p_key = key; in build_key_data() 100 static void say_key(int key) in say_key() argument 102 int i, state = key >> 8; in say_key() 104 key &= 0xff; in say_key() 109 if ((key > 0) && (key <= num_key_names)) in say_key() 172 if ((type != KT_SPKUP) && (key > 0) && (key <= num_key_names)) { in spk_handle_help() 183 kp = spk_our_keys[key] + 1; in spk_handle_help() 188 key += (state_tbl[i] << 8); in spk_handle_help() [all …]
|
/openbmc/linux/arch/riscv/kernel/ |
H A D | sys_riscv.c | 95 switch (pair->key) { in hwprobe_arch_id() 194 switch (pair->key) { in hwprobe_one_pair() 224 pair->key = -1; in hwprobe_one_pair() 271 if (get_user(pair.key, &pairs->key)) in do_riscv_hwprobe() 276 ret = put_user(pair.key, &pairs->key); in do_riscv_hwprobe() 295 int key; in init_hwprobe_vdso_data() local 301 for (key = 0; key <= RISCV_HWPROBE_MAX_KEY; key++) { in init_hwprobe_vdso_data() 302 pair.key = key; in init_hwprobe_vdso_data() 305 WARN_ON_ONCE(pair.key < 0); in init_hwprobe_vdso_data() 307 avd->all_cpu_hwprobe_values[key] = pair.value; in init_hwprobe_vdso_data() [all …]
|
/openbmc/linux/kernel/bpf/ |
H A D | hashtab.c | 128 char key[] __aligned(8); member 310 memcpy(l->key, key, htab->map.key_size); in prealloc_lru_pop() 635 void *key, u32 key_size) in lookup_elem_raw() argument 641 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_elem_raw() 652 u32 hash, void *key, in lookup_nulls_elem_raw() argument 660 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_nulls_elem_raw() 843 if (!key) in htab_map_get_next_key() 1042 memcpy(l_new->key, key, key_size); in alloc_htab_elem() 2080 ctx.key = elem->key; in __bpf_hash_map_seq_show() 2171 void *key, *val; in bpf_for_each_hash_elem() local [all …]
|
H A D | lpm_trie.c | 182 *(__be64 *)key->data); in longest_prefix_match() 195 *(__be32 *)&key->data[i]); in longest_prefix_match() 207 *(__be16 *)&key->data[i]); in longest_prefix_match() 232 struct bpf_lpm_trie_key *key = _key; in trie_lookup_elem() local 312 struct bpf_lpm_trie_key *key = _key; in trie_update_elem() local 341 new_node->prefixlen = key->prefixlen; in trie_update_elem() 393 if (matchlen == key->prefixlen) { in trie_update_elem() 411 if (extract_bit(key->data, matchlen)) { in trie_update_elem() 440 struct bpf_lpm_trie_key *key = _key; in trie_delete_elem() local 467 node->prefixlen == key->prefixlen) in trie_delete_elem() [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | local_kptr_stash.c | 12 long key; member 18 long key; member 44 __type(key, int); 61 res->key = val; in create_and_stash() 89 res->key = 41; in stash_plain() 103 int key = 1; in unstash_rb_node() local 105 mapval = bpf_map_lookup_elem(&some_nodes, &key); in unstash_rb_node() 111 retval = res->key; in unstash_rb_node() 123 int key = 0; in stash_test_ref_kfunc() local 125 mapval = bpf_map_lookup_elem(&some_nodes, &key); in stash_test_ref_kfunc()
|
H A D | map_kptr.c | 14 __type(key, int); 21 __type(key, int); 28 __type(key, int); 35 __type(key, int); 42 __type(key, int); 50 __type(key, int); 58 __type(key, int); 65 __type(key, int); 73 __type(key, int); 195 int key = 0; in test_map_kptr() local [all …]
|
H A D | test_hash_large_key.c | 11 __type(key, struct bigelement); 18 __type(key, __u32); 32 struct bigelement *key; in bpf_hash_large_key_test() local 34 key = bpf_map_lookup_elem(&key_map, &zero); in bpf_hash_large_key_test() 35 if (!key) in bpf_hash_large_key_test() 38 key->c = 1; in bpf_hash_large_key_test() 39 if (bpf_map_update_elem(&hash_map, key, &value, BPF_ANY)) in bpf_hash_large_key_test()
|
H A D | stacktrace_map_skip.c | 13 __type(key, __u32); 20 __type(key, __u32); 27 __type(key, __u32); 39 __u32 key = 0, val = 0; in oncpu() local 49 key = bpf_get_stackid(ctx, &stackmap, TEST_STACK_DEPTH); in oncpu() 50 if ((int)key >= 0) { in oncpu() 52 bpf_map_update_elem(&stackid_hmap, &key, &val, 0); in oncpu() 53 stack_p = bpf_map_lookup_elem(&stack_amap, &key); in oncpu()
|
/openbmc/linux/drivers/net/ethernet/rocker/ |
H A D | rocker_ofdpa.c | 96 struct ofdpa_flow_tbl_key key; member 137 } key; member 329 entry->key.vlan.vlan_id)) in ofdpa_cmd_flow_tbl_add_vlan() 461 entry->key.acl.eth_type)) in ofdpa_cmd_flow_tbl_add_acl() 464 entry->key.acl.vlan_id)) in ofdpa_cmd_flow_tbl_add_acl() 519 entry->key.tbl_id)) in ofdpa_cmd_flow_tbl_add() 749 if (memcmp(&found->key, &match->key, key_len) == 0) in ofdpa_flow_tbl_find() 1891 if (memcmp(&found->key, &match->key, sizeof(found->key)) == 0) in ofdpa_fdb_tbl_find() 1916 fdb->key_crc32 = crc32(~0, &fdb->key, sizeof(fdb->key)); in ofdpa_port_fdb() 1970 found->key.addr, in ofdpa_port_fdb_flush() [all …]
|
/openbmc/linux/drivers/hid/ |
H A D | hid-zydacron.c | 114 unsigned key; in zc_raw_event() local 121 key = zc->last_key[index]; in zc_raw_event() 122 if (key) { in zc_raw_event() 123 input_event(zc->input_ep81, EV_KEY, key, 0); in zc_raw_event() 128 key = 0; in zc_raw_event() 134 key = KEY_MODE; in zc_raw_event() 138 key = KEY_SCREEN; in zc_raw_event() 142 key = KEY_INFO; in zc_raw_event() 146 key = KEY_RADIO; in zc_raw_event() 151 if (key) { in zc_raw_event() [all …]
|
/openbmc/linux/fs/btrfs/ |
H A D | lru_cache.c | 23 static struct btrfs_lru_cache_entry *match_entry(struct list_head *head, u64 key, in match_entry() argument 29 if (entry->key == key && entry->gen == gen) in match_entry() 46 u64 key, u64 gen) in btrfs_lru_cache_lookup() argument 51 head = mtree_load(&cache->entries, key); in btrfs_lru_cache_lookup() 55 entry = match_entry(head, key, gen); in btrfs_lru_cache_lookup() 89 head = mtree_erase(&cache->entries, entry->key); in btrfs_lru_cache_remove() 110 const u64 key = new_entry->key; in btrfs_lru_cache_store() local 118 ret = mtree_insert(&cache->entries, key, head, gfp); in btrfs_lru_cache_store() 124 head = mtree_load(&cache->entries, key); in btrfs_lru_cache_store() 126 if (match_entry(head, key, new_entry->gen) != NULL) in btrfs_lru_cache_store()
|
/openbmc/linux/net/openvswitch/ |
H A D | conntrack.c | 111 switch (ntohs(key->eth.type)) { in key_to_nfproto() 197 key->ct_state = state; in __ovs_ct_update_key() 198 key->ct_zone = zone->id; in __ovs_ct_update_key() 229 key->ct_orig_proto = 0; in __ovs_ct_update_key() 279 struct sw_flow_key *key, in ovs_ct_fill_key() argument 350 key->ct.mark = new_mark; in ovs_ct_set_mark() 548 !!(key->ct_state & in ovs_ct_executed() 635 key->tp.src = src; in ovs_nat_update_key() 657 key->tp.dst = dst; in ovs_nat_update_key() 739 key->ct_state = 0; in __ovs_ct_lookup() [all …]
|
/openbmc/linux/Documentation/security/keys/ |
H A D | trusted-encrypted.rst | 110 a child key in the storage key hierarchy. Encryption and decryption of the 141 using a specified ‘master’ key. The ‘master’ key can either be a trusted-key or 143 rooted in a trusted key, they are only as secure as the user key encrypting 201 seal the key. 243 keyctl add encrypted name "new [format] key-type:master-key-name keylen" 245 keyctl add encrypted name "new [format] key-type:master-key-name keylen 248 keyctl update keyid "update key-type:master-key-name" 253 key-type:= 'trusted' | 'user' 319 trusted key provides strong guarantees that the EVM key has not been 322 encrypted key "evm" using the above trusted key "kmk": [all …]
|
H A D | ecryptfs.rst | 11 using a key, the FEKEK, derived from a user prompted passphrase; in the latter 13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based 18 kernel key of the 'user' type, inserted in the user's session specific keyring 22 The 'encrypted' key type has been extended with the introduction of the new 26 kernel and protected by the parent master key. 42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring 44 keyctl update keyid "update key-type:master-key-name" 49 key-type:= 'trusted' | 'user' 53 Example of encrypted key usage with the eCryptfs filesystem: 55 Create an encrypted key "1000100010001000" of length 64 bytes with format [all …]
|
/openbmc/u-boot/lib/efi_loader/ |
H A D | efi_console.c | 454 struct efi_key_data key; member 660 key->key = pressed_key; in efi_cin_read_key() 676 if (item->key.key.unicode_char || item->key.key.scan_code) { in efi_cin_notify() 677 if (item->key.key.unicode_char != in efi_cin_notify() 679 item->key.key.scan_code != next_key.key.scan_code) in efi_cin_notify() 870 key_data->key.unicode_char, in efi_cin_register_key_notify() 871 key_data->key.scan_code, in efi_cin_register_key_notify() 979 struct efi_input_key *key) in efi_cin_read_key_stroke() argument 983 EFI_ENTRY("%p, %p", this, key); in efi_cin_read_key_stroke() 986 if (!this || !key) { in efi_cin_read_key_stroke() [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-akcipher.c | 666 const uint8_t *key; member 696 .key = rsa1024_public_key, 704 .key = rsa1024_private_key, 712 .key = rsa2048_public_key, 720 .key = rsa2048_private_key, 728 .key = rsa_public_key_lack_element, 756 .key = NULL, 763 .key = NULL, 777 .key = rsa_public_key_extra_elem, 961 g_assert(key == NULL); in test_rsakey() [all …]
|
/openbmc/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 29 disable <keyid> - disable enabled security and remove key. 31 erase <keyid> - delete existing user encryption key. 34 master_erase <keyid> - delete existing user encryption key. 39 The key is associated to the payload by the DIMM id. For example: 73 what the key description is for the old key since we are only interested in the 109 Overwrite can be done without a key if security is not enabled. A key serial 110 of 0 can be passed in to indicate no key. 124 master passphrase key is passed to the kernel. The master passphrase key 125 is just another encrypted-key. 135 passphrase key is passed to the kernel. The master passphrase key is just [all …]
|
/openbmc/linux/drivers/md/ |
H A D | dm-bio-prison-v1.c | 87 static void __setup_new_cell(struct dm_cell_key *key, in __setup_new_cell() argument 91 memcpy(&cell->key, key, sizeof(cell->key)); in __setup_new_cell() 128 if (WARN_ON_ONCE(key->block_end - key->block_begin > BIO_PRISON_MAX_RANGE)) in dm_cell_key_has_valid_range() 139 struct dm_cell_key *key, in __bio_detain() argument 151 r = cmp_keys(key, &cell->key); in __bio_detain() 166 __setup_new_cell(key, inmate, cell_prealloc); in __bio_detain() 176 struct dm_cell_key *key, in bio_detain() argument 182 unsigned l = lock_nr(key, prison->num_locks); in bio_detain() 192 struct dm_cell_key *key, in dm_bio_detain() argument 202 struct dm_cell_key *key, in dm_get_cell() argument [all …]
|
/openbmc/linux/include/linux/ |
H A D | hashtable.h | 60 #define hash_add(hashtable, node, key) \ argument 61 hlist_add_head(node, &hashtable[hash_min(key, HASH_BITS(hashtable))]) 69 #define hash_add_rcu(hashtable, node, key) \ argument 70 hlist_add_head_rcu(node, &hashtable[hash_min(key, HASH_BITS(hashtable))]) 165 #define hash_for_each_possible(name, obj, member, key) \ argument 176 #define hash_for_each_possible_rcu(name, obj, member, key, cond...) \ argument 177 hlist_for_each_entry_rcu(obj, &name[hash_min(key, HASH_BITS(name))],\ 191 #define hash_for_each_possible_rcu_notrace(name, obj, member, key) \ argument 193 &name[hash_min(key, HASH_BITS(name))], member) 204 #define hash_for_each_possible_safe(name, obj, tmp, member, key) \ argument [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 207 | 34 def _filter(key, value): argument 35 if key == 'hash' and re.match('[0-9a-f]+', value): 131 for key in keys: 132 md5_keys[key] = subprocess.check_output( 133 'echo %s | base64 -d | md5sum -b | cut -d" " -f1' % key, 136 sha1_keys[key] = subprocess.check_output( 137 'echo %s | base64 -d | sha1sum -b | cut -d" " -f1' % key, 140 sha256_keys[key] = subprocess.check_output( 148 for key in keys: 157 'hash': md5_keys[key], [all …]
|
/openbmc/linux/drivers/net/ethernet/netronome/nfp/nfpcore/ |
H A D | nfp_mutex.c | 19 u32 key; member 87 int target, unsigned long long address, u32 key) in nfp_cpp_mutex_init() argument 97 err = nfp_cpp_writel(cpp, muw, address + 4, key); in nfp_cpp_mutex_init() 124 unsigned long long address, u32 key) in nfp_cpp_mutex_alloc() argument 140 if (tmp != key) in nfp_cpp_mutex_alloc() 150 mutex->key = key; in nfp_cpp_mutex_alloc() 200 mutex->target, mutex->address, mutex->key); in nfp_cpp_mutex_lock() 222 u32 key, value; in nfp_cpp_mutex_unlock() local 237 if (key != mutex->key) in nfp_cpp_mutex_unlock() 268 u32 key, value, tmp; in nfp_cpp_mutex_trylock() local [all …]
|
/openbmc/linux/net/ipv4/ |
H A D | fib_trie.c | 364 l->key = key; in leaf_new() 1130 tn = tnode_new(key, __fls(key ^ n->key), 1); in fib_insert_node() 1570 index = key ^ n->key; in fib_table_lookup() 1945 key = l->key + 1; in fib_trie_unmerge() 1946 if (key < l->key) in fib_trie_unmerge() 2224 key = l->key + 1; in fib_table_notify() 2226 if (key < l->key) in fib_table_notify() 2383 key = l->key + 1; in fib_table_dump() 2389 if (key < l->key) in fib_table_dump() 2863 key = iter->key; in fib_route_get_idx() [all …]
|
/openbmc/linux/samples/bpf/ |
H A D | tracex2.bpf.c | 15 __type(key, long); 84 struct hist_key key; in BPF_KSYSCALL() local 86 key.index = log2l(count); in BPF_KSYSCALL() 87 key.pid_tgid = bpf_get_current_pid_tgid(); in BPF_KSYSCALL() 88 key.uid_gid = bpf_get_current_uid_gid(); in BPF_KSYSCALL() 89 bpf_get_current_comm(&key.comm, sizeof(key.comm)); in BPF_KSYSCALL() 91 value = bpf_map_lookup_elem(&my_hist_map, &key); in BPF_KSYSCALL() 95 bpf_map_update_elem(&my_hist_map, &key, &init_val, BPF_ANY); in BPF_KSYSCALL()
|