/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | bpf_iter_bpf_hash_map.c | 17 __type(key, struct key_t); 24 __type(key, __u64); 31 __type(key, struct key_t); 48 struct key_t *key = ctx->key; in dump_bpf_hash_map() local 63 if (key == (void *)0 || val == (void *)0) in dump_bpf_hash_map() 70 __builtin_memcpy(&tmp_key, key, sizeof(struct key_t)); in dump_bpf_hash_map() 78 key_sum_a += key->a; in dump_bpf_hash_map() 79 key_sum_b += key->b; in dump_bpf_hash_map() 80 key_sum_c += key->c; in dump_bpf_hash_map() 105 if (key == (void *)0 || val == (void *)0) { in dump_bpf_hash_map() [all …]
|
/openbmc/linux/net/rxrpc/ |
H A D | security.c | 72 struct key *key = call->key; in rxrpc_init_client_call_security() local 75 if (!key) in rxrpc_init_client_call_security() 78 ret = key_validate(key); in rxrpc_init_client_call_security() 101 struct key *key = conn->key; in rxrpc_init_client_conn_security() local 164 struct key *key = ERR_PTR(-EKEYREJECTED); in rxrpc_look_up_server_security() local 191 key = ERR_CAST(kref); in rxrpc_look_up_server_security() 195 key = key_ref_to_ptr(kref); in rxrpc_look_up_server_security() 197 ret = key_validate(key); in rxrpc_look_up_server_security() 199 key_put(key); in rxrpc_look_up_server_security() 200 key = ERR_PTR(ret); in rxrpc_look_up_server_security() [all …]
|
H A D | key.c | 414 static void rxrpc_destroy(struct key *key) in rxrpc_destroy() argument 450 struct key *key; in rxrpc_request_key() local 469 rx->key = key; in rxrpc_request_key() 484 struct key *key; in rxrpc_get_server_data_key() local 516 conn->key = key; in rxrpc_get_server_data_key() 522 key_put(key); in rxrpc_get_server_data_key() 538 struct key *key; in rxrpc_get_null_key() local 545 return key; in rxrpc_get_null_key() 550 key_put(key); in rxrpc_get_null_key() 554 return key; in rxrpc_get_null_key() [all …]
|
/openbmc/linux/samples/bpf/ |
H A D | test_lru_dist.c | 85 unsigned long long key; member 150 node->key = key; in pfect_lru_lookup_or_insert() 289 key, errno); in do_test_lru_dist() 354 for (key = 1; key <= 1000; key++) { in test_lru_loss0() 368 for (key = 1; key <= 1000; key++) { in test_lru_loss0() 370 if (key <= 100) in test_lru_loss0() 372 else if (key <= 900) in test_lru_loss0() 406 for (key = 1; key <= 1000; key++) in test_lru_loss1() 409 for (key = 1; key <= 1000; key++) { in test_lru_loss1() 455 key = stable_base; in do_test_parallel_lru_loss() [all …]
|
/openbmc/linux/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt_wep.c | 28 u8 key[WEP_KEY_LEN + 1]; member 70 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local 103 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt() 107 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 137 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local 147 key[0] = *pos++; in prism2_wep_decrypt() 148 key[1] = *pos++; in prism2_wep_decrypt() 149 key[2] = *pos++; in prism2_wep_decrypt() 157 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 192 memcpy(wep->key, key, len); in prism2_wep_set_key() [all …]
|
H A D | ieee80211_crypt_ccmp.c | 36 u8 key[CCMP_TK_LEN]; member 181 key->tx_pn[i]++; in ieee80211_ccmp_encrypt() 187 *pos++ = key->tx_pn[5]; in ieee80211_ccmp_encrypt() 188 *pos++ = key->tx_pn[4]; in ieee80211_ccmp_encrypt() 191 *pos++ = key->tx_pn[3]; in ieee80211_ccmp_encrypt() 192 *pos++ = key->tx_pn[2]; in ieee80211_ccmp_encrypt() 193 *pos++ = key->tx_pn[1]; in ieee80211_ccmp_encrypt() 194 *pos++ = key->tx_pn[0]; in ieee80211_ccmp_encrypt() 260 if (!key->key_set) { in ieee80211_ccmp_decrypt() 338 memcpy(data->key, key, CCMP_TK_LEN); in ieee80211_ccmp_set_key() [all …]
|
/openbmc/linux/lib/ |
H A D | btree.c | 141 val = key[i]; in dec_key() 142 key[i] = val - 1; in dec_key() 208 unsigned long *key) in btree_last() argument 225 unsigned long *key) in keycmp() argument 235 if (key[i]) in keyzero() 242 unsigned long *key) in btree_lookup_node() argument 264 unsigned long *key) in btree_lookup() argument 321 dec_key(geo, key); in btree_get_prev() 360 unsigned long *key) in getpos() argument 626 unsigned long *key) in btree_remove() argument [all …]
|
/openbmc/linux/tools/perf/ui/tui/ |
H A D | util.c | 28 int key; in popup_menu__run() local 36 switch (key) { in popup_menu__run() 45 key = -1; in popup_menu__run() 49 *keyp = key; in popup_menu__run() 60 return key; in popup_menu__run() 133 while (key != K_TIMER && key != K_ENTER && key != K_ESC) { in ui_browser__input_window() 144 buf[len] = key; in ui_browser__input_window() 155 key = K_ENTER; in ui_browser__input_window() 164 return key; in ui_browser__input_window() 249 int key; in __ui__warning() local [all …]
|
/openbmc/linux/lib/crypto/ |
H A D | poly1305-donna64.c | 13 void poly1305_core_setkey(struct poly1305_core_key *key, in poly1305_core_setkey() argument 22 key->key.r64[0] = t0 & 0xffc0fffffffULL; in poly1305_core_setkey() 23 key->key.r64[1] = ((t0 >> 44) | (t1 << 20)) & 0xfffffc0ffffULL; in poly1305_core_setkey() 24 key->key.r64[2] = ((t1 >> 24)) & 0x00ffffffc0fULL; in poly1305_core_setkey() 27 key->precomputed_s.r64[0] = key->key.r64[1] * 20; in poly1305_core_setkey() 28 key->precomputed_s.r64[1] = key->key.r64[2] * 20; in poly1305_core_setkey() 49 r0 = key->key.r64[0]; in poly1305_core_blocks() 50 r1 = key->key.r64[1]; in poly1305_core_blocks() 51 r2 = key->key.r64[2]; in poly1305_core_blocks() 57 s1 = key->precomputed_s.r64[0]; in poly1305_core_blocks() [all …]
|
/openbmc/qemu/hw/virtio/ |
H A D | cbor-helpers.c | 17 .key = cbor_move(key), in qemu_cbor_map_add() 23 cbor_incref(pair.key); in qemu_cbor_map_add() 47 key_cbor = cbor_build_string(key); in qemu_cbor_add_bool_to_map() 77 key_cbor = cbor_build_string(key); in qemu_cbor_add_uint8_to_map() 108 key_cbor = cbor_build_string(key); in qemu_cbor_add_map_to_map() 139 key_cbor = cbor_build_string(key); in qemu_cbor_add_bytestring_to_map() 168 key_cbor = cbor_build_string(key); in qemu_cbor_add_null_to_map() 198 key_cbor = cbor_build_string(key); in qemu_cbor_add_string_to_map() 228 key_cbor = cbor_build_string(key); in qemu_cbor_add_uint8_array_to_map() 269 key_cbor = cbor_build_uint8(key); in qemu_cbor_add_uint8_key_bytestring_to_map() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
H A D | 0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch | 26 key = pamsshagentauth_key_new(KEY_RSA1); 53 switch (key->type) { 71 if (key->type == KEY_RSA1) { 91 diff --git a/key.c b/key.c 93 --- a/key.c 94 +++ b/key.c 178 if (key->type == KEY_RSA1 && key->rsa != NULL) { 182 bits = BN_num_bits(key->rsa->n); 184 if (write_bignum(f, key->rsa->e) && 215 key = pamsshagentauth_key_new(type); [all …]
|
/openbmc/linux/net/mac80211/ |
H A D | wpa.c | 85 key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY]; in ieee80211_tx_h_michael_mic_add() 161 key = &rx->key->conf.key[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY]; in ieee80211_rx_h_michael_mic_verify() 197 struct ieee80211_key *key = tx->key; in tkip_encrypt_skb() local 269 struct ieee80211_key *key = rx->key; in ieee80211_crypto_tkip_decrypt() local 422 struct ieee80211_key *key = tx->key; in ccmp_encrypt_skb() local 511 struct ieee80211_key *key = rx->key; in ieee80211_crypto_ccmp_decrypt() local 622 struct ieee80211_key *key = tx->key; in gcmp_encrypt_skb() local 708 struct ieee80211_key *key = rx->key; in ieee80211_crypto_gcmp_decrypt() local 825 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_encrypt() local 873 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_256_encrypt() local [all …]
|
/openbmc/linux/include/keys/ |
H A D | big_key-type.h | 17 extern void big_key_revoke(struct key *key); 18 extern void big_key_destroy(struct key *key); 19 extern void big_key_describe(const struct key *big_key, struct seq_file *m); 20 extern long big_key_read(const struct key *key, char *buffer, size_t buflen); 21 extern int big_key_update(struct key *key, struct key_preparsed_payload *prep);
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum1_mr_tcam.c | 35 switch (key->proto) { in mlxsw_sp1_mr_tcam_route_replace() 38 key->vrid, in mlxsw_sp1_mr_tcam_route_replace() 40 ntohl(key->group.addr4), in mlxsw_sp1_mr_tcam_route_replace() 48 key->vrid, in mlxsw_sp1_mr_tcam_route_replace() 50 key->group.addr6, in mlxsw_sp1_mr_tcam_route_replace() 51 key->group_mask.addr6, in mlxsw_sp1_mr_tcam_route_replace() 52 key->source.addr6, in mlxsw_sp1_mr_tcam_route_replace() 53 key->source_mask.addr6, in mlxsw_sp1_mr_tcam_route_replace() 67 switch (key->proto) { in mlxsw_sp1_mr_tcam_route_remove() 133 key, prio); in mlxsw_sp1_mr_tcam_route_create() [all …]
|
/openbmc/linux/fs/btrfs/ |
H A D | root-tree.c | 144 key->objectid, key->type, key->offset, in btrfs_update_root() 177 key, sizeof(*item)); in btrfs_update_root() 215 struct btrfs_key key; in btrfs_find_orphan_roots() local 226 key.offset = 0; in btrfs_find_orphan_roots() 255 key.offset++; in btrfs_find_orphan_roots() 342 struct btrfs_key key; in btrfs_del_root_ref() local 352 key.offset = ref_id; in btrfs_del_root_ref() 382 key.offset = root_id; in btrfs_del_root_ref() 411 struct btrfs_key key; in btrfs_add_root_ref() local 424 key.offset = ref_id; in btrfs_add_root_ref() [all …]
|
/openbmc/openbmc/poky/scripts/ |
H A D | oe-depends-dot | 85 chain.append(key) 113 key = m.group(1) 117 key = key.split('.')[0] 119 if key == dep: 121 if key in depends: 122 if not key in depends[key]: 127 depends[key] = set() 152 if self.args.key not in depends: 157 if self.args.key in depends: 162 key_list = [self.args.key] [all …]
|
/openbmc/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_crypto.c | 134 char key[ADF_CFG_MAX_KEY_LEN_IN_BYTES]; in qat_crypto_create_instances() local 164 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_BANK_NUM, i); in qat_crypto_create_instances() 173 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_BANK_NUM, i); in qat_crypto_create_instances() 182 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, i); in qat_crypto_create_instances() 193 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, i); in qat_crypto_create_instances() 204 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_TX, i); in qat_crypto_create_instances() 206 msg_size, key, NULL, 0, &inst->sym_tx); in qat_crypto_create_instances() 211 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_TX, i); in qat_crypto_create_instances() 218 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_RX, i); in qat_crypto_create_instances() 220 msg_size, key, qat_alg_callback, 0, in qat_crypto_create_instances() [all …]
|
/openbmc/linux/net/tipc/ |
H A D | crypto.c | 1156 key = c->key; in tipc_crypto_key_attach() 1181 key.pending = key_next(key.active ?: key.passive); in tipc_crypto_key_attach() 1257 key = rx->key; in tipc_crypto_key_try_align() 1445 key = tx->key; in tipc_crypto_key_revoke() 1551 key = tx->key; in tipc_crypto_timeout() 1570 key = rx->key; in tipc_crypto_timeout() 1575 key.passive = key.active; in tipc_crypto_timeout() 1576 key.active = key.pending; in tipc_crypto_timeout() 1602 key.passive = key.active; in tipc_crypto_timeout() 1824 key = rx->key; in tipc_crypto_rcv() [all …]
|
/openbmc/linux/drivers/tty/ |
H A D | sysrq.c | 103 u8 loglevel = key - '0'; in sysrq_handle_loglevel() 536 switch (key) { in sysrq_key_table_key2index() 538 return key - '0'; in sysrq_key_table_key2index() 540 return key - 'a' + 10; in sysrq_key_table_key2index() 601 op_p->handler(key); in __handle_sysrq() 630 void handle_sysrq(u8 key) in handle_sysrq() argument 680 unsigned short key; in sysrq_parse_reset_sequence() local 685 key = sysrq_reset_seq[i]; in sysrq_parse_reset_sequence() 687 if (key == KEY_RESERVED || key > KEY_MAX) in sysrq_parse_reset_sequence() 760 u32 key; in sysrq_of_get_keyreset_config() local [all …]
|
/openbmc/bmcweb/redfish-core/include/utils/ |
H A D | json_utils.hpp | 193 if (!checkRange<Type>(*jsonPtr, key)) in unpackValueWithErrorCode() 207 if (!checkRange<Type>(*jsonPtr, key)) in unpackValueWithErrorCode() 502 std::string_view key; member 521 std::string_view key = unpackSpec.key; in readJsonHelperObject() local 527 key = key.substr(0, keysplitIndex); in readJsonHelperObject() 539 key = unpackSpec.key.substr(0, keysplitIndex + 1); in readJsonHelperObject() 552 if (!p.key.starts_with(key)) in readJsonHelperObject() 556 std::string_view thisLeftover = p.key.substr(key.size()); in readJsonHelperObject() 633 toPack[0].key = key; in packVariant() 797 if (key != "@odata.id") in objectKeyCmp() [all …]
|
/openbmc/skeleton/pystatemgr/ |
H A D | discover_system_state.py | 59 def getInterface(bus, objs, key): argument 61 objs[key]["bus_name"], objs[key]["object_name"], introspect=False 63 return dbus.Interface(obj, objs[key]["interface_name"]) 66 def getProperty(bus, objs, key, prop): argument 68 objs[key]["bus_name"], objs[key]["object_name"], introspect=False 71 return intf.Get(objs[key]["interface_name"], prop) 74 def setProperty(bus, objs, key, prop, prop_value): argument 75 obj = bus.get_object(objs[key]["bus_name"], objs[key]["object_name"]) 77 return intf.Set(objs[key]["interface_name"], prop, prop_value)
|
/openbmc/openbmc/poky/meta/recipes-core/meta/ |
H A D | signing-keys.bb | 27 # Export public key of the rpm signing key 29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'), 33 # Export public key of the ipk signing key 39 # Export public key of the feed signing key 41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'), 49 if [ -f "${B}/rpm-key" ]; then 52 if [ -f "${B}/ipk-key" ]; then 55 if [ -f "${B}/pf-key" ]; then 61 if [ -f "${B}/rpm-key" ]; then 64 if [ -f "${B}/ipk-key" ]; then [all …]
|
/openbmc/linux/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_wep.c | 23 u8 key[WEP_KEY_LEN + 1]; member 63 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local 99 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt() 103 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 132 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local 143 key[0] = *pos++; in prism2_wep_decrypt() 144 key[1] = *pos++; in prism2_wep_decrypt() 145 key[2] = *pos++; in prism2_wep_decrypt() 153 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 187 memcpy(wep->key, key, len); in prism2_wep_set_key() [all …]
|
/openbmc/linux/include/linux/ |
H A D | btree-128.h | 24 u64 key[2] = {k1, k2}; in btree_lookup128() local 31 u64 key[2] = {*k1, *k2}; in btree_get_prev128() local 35 (unsigned long *)&key); in btree_get_prev128() 36 *k1 = key[0]; in btree_get_prev128() 37 *k2 = key[1]; in btree_get_prev128() 44 u64 key[2] = {k1, k2}; in btree_insert128() local 52 u64 key[2] = {k1, k2}; in btree_update128() local 59 u64 key[2] = {k1, k2}; in btree_remove128() local 65 u64 key[2]; in btree_last128() local 70 *k1 = key[0]; in btree_last128() [all …]
|
/openbmc/linux/security/keys/ |
H A D | big_key.c | 165 void big_key_revoke(struct key *key) in big_key_revoke() argument 170 key_payload_reserve(key, 0); in big_key_revoke() 178 void big_key_destroy(struct key *key) in big_key_destroy() argument 194 int big_key_update(struct key *key, struct key_preparsed_payload *prep) in big_key_update() argument 202 if (key_is_positive(key)) in big_key_update() 203 big_key_destroy(key); in big_key_update() 205 return generic_key_instantiate(key, prep); in big_key_update() 211 void big_key_describe(const struct key *key, struct seq_file *m) in big_key_describe() argument 215 seq_puts(m, key->description); in big_key_describe() 217 if (key_is_positive(key)) in big_key_describe() [all …]
|