/openbmc/linux/security/keys/ |
H A D | permission.c | 29 struct key *key; in key_task_permission() local 51 key = key_ref_to_ptr(key_ref); in key_task_permission() 54 if (uid_eq(key->uid, cred->fsuid)) { in key_task_permission() 55 kperm = key->perm >> 16; in key_task_permission() 61 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { in key_task_permission() 62 if (gid_eq(key->gid, cred->fsgid)) { in key_task_permission() 63 kperm = key->perm >> 8; in key_task_permission() 69 kperm = key->perm >> 8; in key_task_permission() 75 kperm = key->perm; in key_task_permission() 83 kperm |= key->perm >> 24; in key_task_permission() [all …]
|
H A D | user_defined.c | 101 int user_update(struct key *key, struct key_preparsed_payload *prep) in user_update() argument 112 key->expiry = prep->expiry; in user_update() 113 if (key_is_positive(key)) in user_update() 128 void user_revoke(struct key *key) in user_revoke() argument 133 key_payload_reserve(key, 0); in user_revoke() 136 rcu_assign_keypointer(key, NULL); in user_revoke() 146 void user_destroy(struct key *key) in user_destroy() argument 158 void user_describe(const struct key *key, struct seq_file *m) in user_describe() argument 160 seq_puts(m, key->description); in user_describe() 161 if (key_is_positive(key)) in user_describe() [all …]
|
/openbmc/qemu/net/ |
H A D | colo.c | 22 const ConnectionKey *key = opaque; in connection_key_hash() local 27 a += key->src.s_addr; in connection_key_hash() 28 b += key->dst.s_addr; in connection_key_hash() 29 c += (key->src_port | key->dst_port << 16); in connection_key_hash() 32 a += key->ip_proto; in connection_key_hash() 104 key->src = pkt->ip->ip_dst; in extract_ip_and_port() 105 key->dst = pkt->ip->ip_src; in extract_ip_and_port() 109 key->src = pkt->ip->ip_src; in extract_ip_and_port() 120 key->ip_proto = pkt->ip->ip_p; in fill_connection_key() 122 switch (key->ip_proto) { in fill_connection_key() [all …]
|
/openbmc/linux/net/sched/ |
H A D | cls_flower.c | 85 struct fl_flow_key key; member 120 struct fl_flow_key key; member 1153 u32 key, mask; in fl_set_key_flags() local 1204 opt = (struct geneve_opt *)&key->enc_opts.data[key->enc_opts.len]; in fl_set_geneve_opt() 1285 md = (struct vxlan_metadata *)&key->enc_opts.data[key->enc_opts.len]; in fl_set_vxlan_opt() 1322 md = (struct erspan_metadata *)&key->enc_opts.data[key->enc_opts.len]; in fl_set_erspan_opt() 1804 fl_set_key_pppoe(tb, &key->pppoe, &mask->pppoe, key, mask); in fl_set_key() 2338 err = fl_set_key(net, tb, &fnew->key, &mask->key, extack); in fl_change() 2977 u32 key, mask; in fl_dump_key_flags() local 2984 key = 0; in fl_dump_key_flags() [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 210.out | 29 key offset: 4096 33 key offset: 262144 36 key offset: 520192 39 key offset: 778240 53 master key iters: XXX 81 key offset: 4096 85 key offset: 69632 105 master key iters: XXX 136 key offset: 4096 160 master key iters: XXX [all …]
|
/openbmc/linux/include/linux/ |
H A D | btree-type.h | 40 unsigned long _key = key; in BTREE_FN() 47 unsigned long _key = key; in BTREE_FN() 54 unsigned long _key = key; in BTREE_FN() 60 unsigned long _key = key; in BTREE_FN() 69 *key = _key; in BTREE_FN() 75 unsigned long _key = *key; in BTREE_FN() 78 *key = _key; in BTREE_FN() 90 return btree_insert(&head->h, BTREE_TYPE_GEO, (unsigned long *)&key, in BTREE_FN() 107 return btree_last(&head->h, BTREE_TYPE_GEO, (unsigned long *)key); in BTREE_FN() 116 void VISITOR_FN(void *elem, unsigned long opaque, unsigned long *key, [all …]
|
/openbmc/openbmc/poky/meta/recipes-devtools/apt/apt/ |
H A D | triehash | 246 my ($self, $key) = @_; 247 my $length = length $key; 250 return (substr($key, 0, $split), substr($key, $split)); 258 if (length($key) == 0) { 283 if ($togo > length($key) || defined $self->{children}{$key}->{value}) { 284 my $child = $self->{children}{$key}->filter_depth($togo - length($key)); 308 $self->{children}{$key}->reinsert_value_nodes_into($trie, $prefix . $key); 324 my ($self, $key) = @_; 420 my ($self, $key) = @_; 476 …$fh } (' ' x $indent . "case %s:\n", $self->case_label(uc($key))) if lc($key) ne uc($key) && !(… [all …]
|
/openbmc/qemu/scsi/ |
H A D | utils.c | 106 sense.key = in_buf[2]; in scsi_parse_sense_buf() 113 sense.key = in_buf[1]; in scsi_parse_sense_buf() 129 buf[2] = sense.key; in scsi_build_sense_buf() 136 buf[1] = sense.key; in scsi_build_sense_buf() 157 .key = NO_SENSE , .asc = 0x00 , .ascq = 0x00 162 .key = NOT_READY, .asc = 0x04, .ascq = 0x03 167 .key = NOT_READY, .asc = 0x3a, .ascq = 0x00 172 .key = NOT_READY, .asc = 0x53, .ascq = 0x02 282 .key = NOT_READY, .asc = 0x04, .ascq = 0x00 357 switch (key) { in scsi_sense_is_guest_recoverable() [all …]
|
/openbmc/linux/drivers/nvme/common/ |
H A D | auth.c | 166 key = kzalloc(sizeof(*key), GFP_KERNEL); in nvme_auth_extract_key() 167 if (!key) in nvme_auth_extract_key() 169 key->key = kzalloc(allocated_len, GFP_KERNEL); in nvme_auth_extract_key() 170 if (!key->key) { in nvme_auth_extract_key() 204 crc = ~crc32(~0, key->key, key_len); in nvme_auth_extract_key() 216 kfree_sensitive(key->key); in nvme_auth_extract_key() 225 if (!key) in nvme_auth_free_key() 227 kfree_sensitive(key->key); in nvme_auth_free_key() 240 if (!key || !key->key) { in nvme_auth_transform_key() 245 transformed_key = kmemdup(key->key, key->len, GFP_KERNEL); in nvme_auth_transform_key() [all …]
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | asymmetric_type.c | 51 struct key *find_asymmetric_key(struct key *keyring, in find_asymmetric_key() 57 struct key *key; in find_asymmetric_key() local 130 return key; in find_asymmetric_key() 133 key_put(key); in find_asymmetric_key() 261 static bool asymmetric_key_cmp(const struct key *key, in asymmetric_key_cmp() argument 287 static bool asymmetric_key_cmp_name(const struct key *key, in asymmetric_key_cmp_name() argument 466 static void asymmetric_key_destroy(struct key *key) in asymmetric_key_destroy() argument 488 struct key *key) in asymmetric_restriction_alloc() argument 497 keyres->key = key; in asymmetric_restriction_alloc() 532 struct key *key; in asymmetric_lookup_restriction() local [all …]
|
H A D | pkcs7_trust.c | 24 struct key *trust_keyring) in pkcs7_validate_trust_one() 28 struct key *key; in pkcs7_validate_trust_one() local 52 if (!IS_ERR(key)) { in pkcs7_validate_trust_one() 62 if (key == ERR_PTR(-ENOMEM)) in pkcs7_validate_trust_one() 86 if (!IS_ERR(key)) { in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 93 return PTR_ERR(key); in pkcs7_validate_trust_one() 101 if (!IS_ERR(key)) { in pkcs7_validate_trust_one() 108 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() 109 return PTR_ERR(key); in pkcs7_validate_trust_one() [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | cg_storage_multi.c | 92 struct bpf_cgroup_storage_key key; in test_egress_only() local 120 &key, &expected_cgroup_value)) in test_egress_only() 143 &key, &expected_cgroup_value)) in test_egress_only() 148 &key, &expected_cgroup_value)) in test_egress_only() 162 struct bpf_cgroup_storage_key key; in test_isolated() local 199 &key, &expected_cgroup_value)) in test_isolated() 204 &key, &expected_cgroup_value)) in test_isolated() 241 &key, &expected_cgroup_value)) in test_isolated() 275 __u64 key; in test_shared() local 316 key = get_cgroup_id(CHILD_CGROUP); in test_shared() [all …]
|
/openbmc/linux/drivers/crypto/intel/qat/qat_4xxx/ |
H A D | adf_drv.c | 88 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_BANK_NUM, i); in adf_crypto_dev_config() 94 snprintf(key, sizeof(key), ADF_CY "%d" ADF_ETRMGR_CORE_AFFINITY, in adf_crypto_dev_config() 101 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, i); in adf_crypto_dev_config() 109 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, i); in adf_crypto_dev_config() 116 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_TX, i); in adf_crypto_dev_config() 123 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_TX, i); in adf_crypto_dev_config() 130 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_RX, i); in adf_crypto_dev_config() 137 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_RX, i); in adf_crypto_dev_config() 193 snprintf(key, sizeof(key), ADF_DC "%d" ADF_RING_DC_SIZE, i); in adf_comp_dev_config() 200 snprintf(key, sizeof(key), ADF_DC "%d" ADF_RING_DC_TX, i); in adf_comp_dev_config() [all …]
|
/openbmc/linux/net/rxrpc/ |
H A D | server_key.c | 101 static void rxrpc_destroy_s(struct key *key) in rxrpc_destroy_s() argument 106 sec->destroy_server_key(key); in rxrpc_destroy_s() 109 static void rxrpc_describe_s(const struct key *key, struct seq_file *m) in rxrpc_describe_s() argument 113 seq_puts(m, key->description); in rxrpc_describe_s() 115 sec->describe_server_key(key, m); in rxrpc_describe_s() 123 struct key *key; in rxrpc_server_keyring() local 136 if (IS_ERR(key)) { in rxrpc_server_keyring() 138 _leave(" = %ld", PTR_ERR(key)); in rxrpc_server_keyring() 139 return PTR_ERR(key); in rxrpc_server_keyring() 142 rx->securities = key; in rxrpc_server_keyring() [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-cipher.c | 82 .key = 137 .key = 196 .key = 225 .key = 238 .key = 390 .key = 407 .key = 424 .key = 648 nkey = unhex_string(data->key, &key); in test_cipher() 743 key, sizeof(key), in test_cipher_null_iv() [all …]
|
H A D | test-crypto-pbkdf.c | 37 const char *key; member 58 .key = "password", 72 .key = "password", 86 .key = "password", 100 .key = "password", 160 .key = "password", 172 .key = "password", 237 .key = "", 399 uint8_t key[32]; in test_pbkdf_timing() local 403 memset(key, 0x5d, sizeof(key)); in test_pbkdf_timing() [all …]
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum2_mr_tcam.c | 146 (char *) &key->source.addr4, in mlxsw_sp2_mr_tcam_rule_parse4() 149 (char *) &key->group.addr4, in mlxsw_sp2_mr_tcam_rule_parse4() 170 &key->group.addr6.s6_addr[0x0], in mlxsw_sp2_mr_tcam_rule_parse6() 173 &key->group.addr6.s6_addr[0x4], in mlxsw_sp2_mr_tcam_rule_parse6() 176 &key->group.addr6.s6_addr[0x8], in mlxsw_sp2_mr_tcam_rule_parse6() 179 &key->group.addr6.s6_addr[0xc], in mlxsw_sp2_mr_tcam_rule_parse6() 185 struct mlxsw_sp_mr_route_key *key, in mlxsw_sp2_mr_tcam_rule_parse() argument 193 key->vrid, GENMASK(7, 0)); in mlxsw_sp2_mr_tcam_rule_parse() 196 key->vrid >> 8, GENMASK(3, 0)); in mlxsw_sp2_mr_tcam_rule_parse() 197 switch (key->proto) { in mlxsw_sp2_mr_tcam_rule_parse() [all …]
|
/openbmc/linux/Documentation/security/keys/ |
H A D | request-key.rst | 5 The key request service is part of the key retention service (refer to 64 to prevent the key from going away, and returns the serial number of the key to 82 a suitable key there. If there is, it returns the key. If there isn't, 91 b) An authorisation key V that refers to key U and notes that process A 98 5) /sbin/request-key assumes the authority associated with key U. 112 instantiate key U, using key W as a reference (perhaps it contacts a 115 9) Upon instantiating key U, auth key V is automatically revoked so that it 121 This also extends further. If key W (step 7 above) didn't exist, key W would 136 authorisation key to negatively instantiate a key that's under construction. 154 1) When the key management code searches for a key (keyring_search_rcu) it [all …]
|
/openbmc/linux/tools/perf/arch/s390/util/ |
H A D | kvm-stat.c | 28 struct event_key *key) in event_icpt_insn_get_key() argument 33 key->key = icpt_insn_decoder(insn); in event_icpt_insn_get_key() 34 key->exit_reasons = sie_icpt_insn_codes; in event_icpt_insn_get_key() 39 struct event_key *key) in event_sigp_get_key() argument 41 key->key = evsel__intval(evsel, sample, "order_code"); in event_sigp_get_key() 47 struct event_key *key) in event_diag_get_key() argument 49 key->key = evsel__intval(evsel, sample, "code"); in event_diag_get_key() 50 key->exit_reasons = sie_diagnose_codes; in event_diag_get_key() 55 struct event_key *key) in event_icpt_prog_get_key() argument 57 key->key = evsel__intval(evsel, sample, "code"); in event_icpt_prog_get_key() [all …]
|
/openbmc/linux/kernel/sched/ |
H A D | wait_bit.c | 23 struct wait_bit_key *key = arg; in wake_bit_function() local 26 if (wait_bit->key.flags != key->flags || in wake_bit_function() 27 wait_bit->key.bit_nr != key->bit_nr || in wake_bit_function() 28 test_bit(key->bit_nr, key->flags)) in wake_bit_function() 48 if (test_bit(wbq_entry->key.bit_nr, wbq_entry->key.flags)) in __wait_on_bit() 50 } while (test_bit_acquire(wbq_entry->key.bit_nr, wbq_entry->key.flags) && !ret); in __wait_on_bit() 89 if (test_bit(wbq_entry->key.bit_nr, wbq_entry->key.flags)) { in __wait_on_bit_lock() 100 if (!test_and_set_bit(wbq_entry->key.bit_nr, wbq_entry->key.flags)) { in __wait_on_bit_lock() 167 if (wbq_entry->key.flags != key->flags || in var_wake_function() 168 wbq_entry->key.bit_nr != key->bit_nr) in var_wake_function() [all …]
|
/openbmc/linux/fs/btrfs/ |
H A D | tree-checker.c | 84 struct btrfs_key key; in file_extent_err() local 98 key.objectid, key.offset, &vaf); in file_extent_err() 273 key->offset); in check_extent_data_item() 313 key->offset, in check_extent_data_item() 399 if (unlikely(key->objectid != 0 || key->type != 0 || in check_inode_key() 434 key->offset); in check_inode_key() 653 key.objectid, key.offset, &vaf); in block_group_err() 1503 prev_key->offset, key->objectid, key->type, in check_extent_item() 1780 prev_key.offset, key.objectid, key.type, in __btrfs_check_leaf() 1781 key.offset); in __btrfs_check_leaf() [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_spin_lock_fail.c | 14 __type(key, int); 22 __type(key, int); 57 int key = 0; in lock_id_mapval_preserve() local 70 int key = 0; in lock_id_innermapval_preserve() local 76 f = bpf_map_lookup_elem(map, &key); in lock_id_innermapval_preserve() 127 int key = 0; in lock_id_mismatch_mapval_mapval() local 151 int key = 0; in lock_id_mismatch_innermapval_innermapval1() local 157 f1 = bpf_map_lookup_elem(map, &key); in lock_id_mismatch_innermapval_innermapval1() 160 f2 = bpf_map_lookup_elem(map, &key); in lock_id_mismatch_innermapval_innermapval1() 175 int key = 0; in lock_id_mismatch_innermapval_innermapval2() local [all …]
|
H A D | test_btf_map_in_map.c | 9 __type(key, int); 17 __type(key, int); 24 __type(key, int); 32 __type(key, int); 48 __type(key, int); 57 __type(key, int); 64 __type(key, int); 84 __type(key, int); 100 __type(key, int); 107 __type(key, int); [all …]
|
/openbmc/linux/drivers/crypto/caam/ |
H A D | caampkc.c | 67 struct caam_rsa_key *key = &ctx->key; in rsa_pub_unmap() local 79 struct caam_rsa_key *key = &ctx->key; in rsa_priv_f1_unmap() local 91 struct caam_rsa_key *key = &ctx->key; in rsa_priv_f2_unmap() local 108 struct caam_rsa_key *key = &ctx->key; in rsa_priv_f3_unmap() local 159 struct caam_rsa_key *key = &ctx->key; in rsa_priv_f_done() local 256 struct caam_rsa_key *key = &ctx->key; in rsa_edesc_alloc() local 410 struct caam_rsa_key *key = &ctx->key; in set_rsa_pub_pdb() local 455 struct caam_rsa_key *key = &ctx->key; in set_rsa_priv_f1_pdb() local 723 if (unlikely(!key->n || !key->e)) in caam_rsa_enc() 847 if (unlikely(!key->n || !key->d)) in caam_rsa_dec() [all …]
|
/openbmc/linux/crypto/ |
H A D | rsa.c | 38 return mpi_powm(c, m, key->e, key->n); in _rsa_enc() 63 ret = mpi_powm(m_or_m1_or_h, c, key->dp, key->p); in _rsa_dec_crt() 68 ret = mpi_powm(m2, c, key->dq, key->q); in _rsa_dec_crt() 74 mpi_mulm(m_or_m1_or_h, m12_or_qh, key->qinv, key->p); in _rsa_dec_crt() 180 key->d = NULL; in rsa_free_mpi_key() 181 key->e = NULL; in rsa_free_mpi_key() 182 key->n = NULL; in rsa_free_mpi_key() 183 key->p = NULL; in rsa_free_mpi_key() 184 key->q = NULL; in rsa_free_mpi_key() 185 key->dp = NULL; in rsa_free_mpi_key() [all …]
|