Home
last modified time | relevance | path

Searched refs:key (Results 126 – 150 of 5270) sorted by relevance

12345678910>>...211

/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dbpf_iter_bpf_hash_map.c17 __type(key, struct key_t);
24 __type(key, __u64);
31 __type(key, struct key_t);
48 struct key_t *key = ctx->key; in dump_bpf_hash_map() local
63 if (key == (void *)0 || val == (void *)0) in dump_bpf_hash_map()
70 __builtin_memcpy(&tmp_key, key, sizeof(struct key_t)); in dump_bpf_hash_map()
78 key_sum_a += key->a; in dump_bpf_hash_map()
79 key_sum_b += key->b; in dump_bpf_hash_map()
80 key_sum_c += key->c; in dump_bpf_hash_map()
105 if (key == (void *)0 || val == (void *)0) { in dump_bpf_hash_map()
[all …]
/openbmc/linux/net/rxrpc/
H A Dsecurity.c72 struct key *key = call->key; in rxrpc_init_client_call_security() local
75 if (!key) in rxrpc_init_client_call_security()
78 ret = key_validate(key); in rxrpc_init_client_call_security()
101 struct key *key = conn->key; in rxrpc_init_client_conn_security() local
164 struct key *key = ERR_PTR(-EKEYREJECTED); in rxrpc_look_up_server_security() local
191 key = ERR_CAST(kref); in rxrpc_look_up_server_security()
195 key = key_ref_to_ptr(kref); in rxrpc_look_up_server_security()
197 ret = key_validate(key); in rxrpc_look_up_server_security()
199 key_put(key); in rxrpc_look_up_server_security()
200 key = ERR_PTR(ret); in rxrpc_look_up_server_security()
[all …]
H A Dkey.c414 static void rxrpc_destroy(struct key *key) in rxrpc_destroy() argument
450 struct key *key; in rxrpc_request_key() local
469 rx->key = key; in rxrpc_request_key()
484 struct key *key; in rxrpc_get_server_data_key() local
516 conn->key = key; in rxrpc_get_server_data_key()
522 key_put(key); in rxrpc_get_server_data_key()
538 struct key *key; in rxrpc_get_null_key() local
545 return key; in rxrpc_get_null_key()
550 key_put(key); in rxrpc_get_null_key()
554 return key; in rxrpc_get_null_key()
[all …]
/openbmc/linux/samples/bpf/
H A Dtest_lru_dist.c85 unsigned long long key; member
150 node->key = key; in pfect_lru_lookup_or_insert()
289 key, errno); in do_test_lru_dist()
354 for (key = 1; key <= 1000; key++) { in test_lru_loss0()
368 for (key = 1; key <= 1000; key++) { in test_lru_loss0()
370 if (key <= 100) in test_lru_loss0()
372 else if (key <= 900) in test_lru_loss0()
406 for (key = 1; key <= 1000; key++) in test_lru_loss1()
409 for (key = 1; key <= 1000; key++) { in test_lru_loss1()
455 key = stable_base; in do_test_parallel_lru_loss()
[all …]
/openbmc/linux/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_crypt_wep.c28 u8 key[WEP_KEY_LEN + 1]; member
70 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local
103 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
107 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt()
137 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local
147 key[0] = *pos++; in prism2_wep_decrypt()
148 key[1] = *pos++; in prism2_wep_decrypt()
149 key[2] = *pos++; in prism2_wep_decrypt()
157 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt()
192 memcpy(wep->key, key, len); in prism2_wep_set_key()
[all …]
H A Dieee80211_crypt_ccmp.c36 u8 key[CCMP_TK_LEN]; member
181 key->tx_pn[i]++; in ieee80211_ccmp_encrypt()
187 *pos++ = key->tx_pn[5]; in ieee80211_ccmp_encrypt()
188 *pos++ = key->tx_pn[4]; in ieee80211_ccmp_encrypt()
191 *pos++ = key->tx_pn[3]; in ieee80211_ccmp_encrypt()
192 *pos++ = key->tx_pn[2]; in ieee80211_ccmp_encrypt()
193 *pos++ = key->tx_pn[1]; in ieee80211_ccmp_encrypt()
194 *pos++ = key->tx_pn[0]; in ieee80211_ccmp_encrypt()
260 if (!key->key_set) { in ieee80211_ccmp_decrypt()
338 memcpy(data->key, key, CCMP_TK_LEN); in ieee80211_ccmp_set_key()
[all …]
/openbmc/linux/lib/
H A Dbtree.c141 val = key[i]; in dec_key()
142 key[i] = val - 1; in dec_key()
208 unsigned long *key) in btree_last() argument
225 unsigned long *key) in keycmp() argument
235 if (key[i]) in keyzero()
242 unsigned long *key) in btree_lookup_node() argument
264 unsigned long *key) in btree_lookup() argument
321 dec_key(geo, key); in btree_get_prev()
360 unsigned long *key) in getpos() argument
626 unsigned long *key) in btree_remove() argument
[all …]
/openbmc/linux/tools/perf/ui/tui/
H A Dutil.c28 int key; in popup_menu__run() local
36 switch (key) { in popup_menu__run()
45 key = -1; in popup_menu__run()
49 *keyp = key; in popup_menu__run()
60 return key; in popup_menu__run()
133 while (key != K_TIMER && key != K_ENTER && key != K_ESC) { in ui_browser__input_window()
144 buf[len] = key; in ui_browser__input_window()
155 key = K_ENTER; in ui_browser__input_window()
164 return key; in ui_browser__input_window()
249 int key; in __ui__warning() local
[all …]
/openbmc/linux/lib/crypto/
H A Dpoly1305-donna64.c13 void poly1305_core_setkey(struct poly1305_core_key *key, in poly1305_core_setkey() argument
22 key->key.r64[0] = t0 & 0xffc0fffffffULL; in poly1305_core_setkey()
23 key->key.r64[1] = ((t0 >> 44) | (t1 << 20)) & 0xfffffc0ffffULL; in poly1305_core_setkey()
24 key->key.r64[2] = ((t1 >> 24)) & 0x00ffffffc0fULL; in poly1305_core_setkey()
27 key->precomputed_s.r64[0] = key->key.r64[1] * 20; in poly1305_core_setkey()
28 key->precomputed_s.r64[1] = key->key.r64[2] * 20; in poly1305_core_setkey()
49 r0 = key->key.r64[0]; in poly1305_core_blocks()
50 r1 = key->key.r64[1]; in poly1305_core_blocks()
51 r2 = key->key.r64[2]; in poly1305_core_blocks()
57 s1 = key->precomputed_s.r64[0]; in poly1305_core_blocks()
[all …]
/openbmc/qemu/hw/virtio/
H A Dcbor-helpers.c17 .key = cbor_move(key), in qemu_cbor_map_add()
23 cbor_incref(pair.key); in qemu_cbor_map_add()
47 key_cbor = cbor_build_string(key); in qemu_cbor_add_bool_to_map()
77 key_cbor = cbor_build_string(key); in qemu_cbor_add_uint8_to_map()
108 key_cbor = cbor_build_string(key); in qemu_cbor_add_map_to_map()
139 key_cbor = cbor_build_string(key); in qemu_cbor_add_bytestring_to_map()
168 key_cbor = cbor_build_string(key); in qemu_cbor_add_null_to_map()
198 key_cbor = cbor_build_string(key); in qemu_cbor_add_string_to_map()
228 key_cbor = cbor_build_string(key); in qemu_cbor_add_uint8_array_to_map()
269 key_cbor = cbor_build_uint8(key); in qemu_cbor_add_uint8_key_bytestring_to_map()
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/
H A D0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch26 key = pamsshagentauth_key_new(KEY_RSA1);
53 switch (key->type) {
71 if (key->type == KEY_RSA1) {
91 diff --git a/key.c b/key.c
93 --- a/key.c
94 +++ b/key.c
178 if (key->type == KEY_RSA1 && key->rsa != NULL) {
182 bits = BN_num_bits(key->rsa->n);
184 if (write_bignum(f, key->rsa->e) &&
215 key = pamsshagentauth_key_new(type);
[all …]
/openbmc/linux/net/mac80211/
H A Dwpa.c85 key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY]; in ieee80211_tx_h_michael_mic_add()
161 key = &rx->key->conf.key[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY]; in ieee80211_rx_h_michael_mic_verify()
197 struct ieee80211_key *key = tx->key; in tkip_encrypt_skb() local
269 struct ieee80211_key *key = rx->key; in ieee80211_crypto_tkip_decrypt() local
422 struct ieee80211_key *key = tx->key; in ccmp_encrypt_skb() local
511 struct ieee80211_key *key = rx->key; in ieee80211_crypto_ccmp_decrypt() local
622 struct ieee80211_key *key = tx->key; in gcmp_encrypt_skb() local
708 struct ieee80211_key *key = rx->key; in ieee80211_crypto_gcmp_decrypt() local
825 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_encrypt() local
873 struct ieee80211_key *key = tx->key; in ieee80211_crypto_aes_cmac_256_encrypt() local
[all …]
/openbmc/linux/include/keys/
H A Dbig_key-type.h17 extern void big_key_revoke(struct key *key);
18 extern void big_key_destroy(struct key *key);
19 extern void big_key_describe(const struct key *big_key, struct seq_file *m);
20 extern long big_key_read(const struct key *key, char *buffer, size_t buflen);
21 extern int big_key_update(struct key *key, struct key_preparsed_payload *prep);
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/
H A Dspectrum1_mr_tcam.c35 switch (key->proto) { in mlxsw_sp1_mr_tcam_route_replace()
38 key->vrid, in mlxsw_sp1_mr_tcam_route_replace()
40 ntohl(key->group.addr4), in mlxsw_sp1_mr_tcam_route_replace()
48 key->vrid, in mlxsw_sp1_mr_tcam_route_replace()
50 key->group.addr6, in mlxsw_sp1_mr_tcam_route_replace()
51 key->group_mask.addr6, in mlxsw_sp1_mr_tcam_route_replace()
52 key->source.addr6, in mlxsw_sp1_mr_tcam_route_replace()
53 key->source_mask.addr6, in mlxsw_sp1_mr_tcam_route_replace()
67 switch (key->proto) { in mlxsw_sp1_mr_tcam_route_remove()
133 key, prio); in mlxsw_sp1_mr_tcam_route_create()
[all …]
/openbmc/linux/fs/btrfs/
H A Droot-tree.c144 key->objectid, key->type, key->offset, in btrfs_update_root()
177 key, sizeof(*item)); in btrfs_update_root()
215 struct btrfs_key key; in btrfs_find_orphan_roots() local
226 key.offset = 0; in btrfs_find_orphan_roots()
255 key.offset++; in btrfs_find_orphan_roots()
342 struct btrfs_key key; in btrfs_del_root_ref() local
352 key.offset = ref_id; in btrfs_del_root_ref()
382 key.offset = root_id; in btrfs_del_root_ref()
411 struct btrfs_key key; in btrfs_add_root_ref() local
424 key.offset = ref_id; in btrfs_add_root_ref()
[all …]
/openbmc/openbmc/poky/scripts/
H A Doe-depends-dot85 chain.append(key)
113 key = m.group(1)
117 key = key.split('.')[0]
119 if key == dep:
121 if key in depends:
122 if not key in depends[key]:
127 depends[key] = set()
152 if self.args.key not in depends:
157 if self.args.key in depends:
162 key_list = [self.args.key]
[all …]
/openbmc/linux/drivers/crypto/intel/qat/qat_common/
H A Dqat_crypto.c134 char key[ADF_CFG_MAX_KEY_LEN_IN_BYTES]; in qat_crypto_create_instances() local
164 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_BANK_NUM, i); in qat_crypto_create_instances()
173 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_BANK_NUM, i); in qat_crypto_create_instances()
182 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, i); in qat_crypto_create_instances()
193 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, i); in qat_crypto_create_instances()
204 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_TX, i); in qat_crypto_create_instances()
206 msg_size, key, NULL, 0, &inst->sym_tx); in qat_crypto_create_instances()
211 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_TX, i); in qat_crypto_create_instances()
218 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_RX, i); in qat_crypto_create_instances()
220 msg_size, key, qat_alg_callback, 0, in qat_crypto_create_instances()
[all …]
/openbmc/linux/net/tipc/
H A Dcrypto.c1156 key = c->key; in tipc_crypto_key_attach()
1181 key.pending = key_next(key.active ?: key.passive); in tipc_crypto_key_attach()
1257 key = rx->key; in tipc_crypto_key_try_align()
1445 key = tx->key; in tipc_crypto_key_revoke()
1551 key = tx->key; in tipc_crypto_timeout()
1570 key = rx->key; in tipc_crypto_timeout()
1575 key.passive = key.active; in tipc_crypto_timeout()
1576 key.active = key.pending; in tipc_crypto_timeout()
1602 key.passive = key.active; in tipc_crypto_timeout()
1824 key = rx->key; in tipc_crypto_rcv()
[all …]
/openbmc/linux/drivers/tty/
H A Dsysrq.c103 u8 loglevel = key - '0'; in sysrq_handle_loglevel()
536 switch (key) { in sysrq_key_table_key2index()
538 return key - '0'; in sysrq_key_table_key2index()
540 return key - 'a' + 10; in sysrq_key_table_key2index()
601 op_p->handler(key); in __handle_sysrq()
630 void handle_sysrq(u8 key) in handle_sysrq() argument
680 unsigned short key; in sysrq_parse_reset_sequence() local
685 key = sysrq_reset_seq[i]; in sysrq_parse_reset_sequence()
687 if (key == KEY_RESERVED || key > KEY_MAX) in sysrq_parse_reset_sequence()
760 u32 key; in sysrq_of_get_keyreset_config() local
[all …]
/openbmc/bmcweb/redfish-core/include/utils/
H A Djson_utils.hpp193 if (!checkRange<Type>(*jsonPtr, key)) in unpackValueWithErrorCode()
207 if (!checkRange<Type>(*jsonPtr, key)) in unpackValueWithErrorCode()
502 std::string_view key; member
521 std::string_view key = unpackSpec.key; in readJsonHelperObject() local
527 key = key.substr(0, keysplitIndex); in readJsonHelperObject()
539 key = unpackSpec.key.substr(0, keysplitIndex + 1); in readJsonHelperObject()
552 if (!p.key.starts_with(key)) in readJsonHelperObject()
556 std::string_view thisLeftover = p.key.substr(key.size()); in readJsonHelperObject()
633 toPack[0].key = key; in packVariant()
797 if (key != "@odata.id") in objectKeyCmp()
[all …]
/openbmc/skeleton/pystatemgr/
H A Ddiscover_system_state.py59 def getInterface(bus, objs, key): argument
61 objs[key]["bus_name"], objs[key]["object_name"], introspect=False
63 return dbus.Interface(obj, objs[key]["interface_name"])
66 def getProperty(bus, objs, key, prop): argument
68 objs[key]["bus_name"], objs[key]["object_name"], introspect=False
71 return intf.Get(objs[key]["interface_name"], prop)
74 def setProperty(bus, objs, key, prop, prop_value): argument
75 obj = bus.get_object(objs[key]["bus_name"], objs[key]["object_name"])
77 return intf.Set(objs[key]["interface_name"], prop, prop_value)
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dsigning-keys.bb27 # Export public key of the rpm signing key
29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'),
33 # Export public key of the ipk signing key
39 # Export public key of the feed signing key
41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
49 if [ -f "${B}/rpm-key" ]; then
52 if [ -f "${B}/ipk-key" ]; then
55 if [ -f "${B}/pf-key" ]; then
61 if [ -f "${B}/rpm-key" ]; then
64 if [ -f "${B}/ipk-key" ]; then
[all …]
/openbmc/linux/drivers/staging/rtl8192e/
H A Drtllib_crypt_wep.c23 u8 key[WEP_KEY_LEN + 1]; member
63 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local
99 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
103 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt()
132 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local
143 key[0] = *pos++; in prism2_wep_decrypt()
144 key[1] = *pos++; in prism2_wep_decrypt()
145 key[2] = *pos++; in prism2_wep_decrypt()
153 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt()
187 memcpy(wep->key, key, len); in prism2_wep_set_key()
[all …]
/openbmc/linux/include/linux/
H A Dbtree-128.h24 u64 key[2] = {k1, k2}; in btree_lookup128() local
31 u64 key[2] = {*k1, *k2}; in btree_get_prev128() local
35 (unsigned long *)&key); in btree_get_prev128()
36 *k1 = key[0]; in btree_get_prev128()
37 *k2 = key[1]; in btree_get_prev128()
44 u64 key[2] = {k1, k2}; in btree_insert128() local
52 u64 key[2] = {k1, k2}; in btree_update128() local
59 u64 key[2] = {k1, k2}; in btree_remove128() local
65 u64 key[2]; in btree_last128() local
70 *k1 = key[0]; in btree_last128()
[all …]
/openbmc/linux/security/keys/
H A Dbig_key.c165 void big_key_revoke(struct key *key) in big_key_revoke() argument
170 key_payload_reserve(key, 0); in big_key_revoke()
178 void big_key_destroy(struct key *key) in big_key_destroy() argument
194 int big_key_update(struct key *key, struct key_preparsed_payload *prep) in big_key_update() argument
202 if (key_is_positive(key)) in big_key_update()
203 big_key_destroy(key); in big_key_update()
205 return generic_key_instantiate(key, prep); in big_key_update()
211 void big_key_describe(const struct key *key, struct seq_file *m) in big_key_describe() argument
215 seq_puts(m, key->description); in big_key_describe()
217 if (key_is_positive(key)) in big_key_describe()
[all …]

12345678910>>...211