Home
last modified time | relevance | path

Searched refs:key (Results 251 – 275 of 5248) sorted by relevance

1...<<11121314151617181920>>...210

/openbmc/linux/crypto/asymmetric_keys/
H A DKconfig3 bool "Asymmetric (public-key cryptographic) key type"
6 This option provides support for a key type that holds the data for
7 the asymmetric keys used for public key cryptographic operations such
14 tristate "Asymmetric public-key crypto algorithm subtype"
33 data and provides the ability to instantiate a crypto key from a
34 public key packet found inside the certificate.
37 tristate "PKCS#8 private key parser"
43 private key data and provides the ability to instantiate a crypto key
57 tristate "PKCS#7 testing key type"
60 This option provides a type of key that can be loaded up from a
[all …]
/openbmc/u-boot/lib/
H A Dhashtable.c156 free((void *)ep->key); in hdestroy_r()
232 && strcmp(item.key, htab->table[idx].entry.key) == 0) { in _compare_and_overwrite_entry()
288 hval += item.key[count]; in hsearch_r()
374 htab->table[idx].entry.key = strdup(item.key); in hsearch_r()
439 free((void *)ep->key); in _hdelete()
455 e.key = (char *)key; in hdelete_r()
467 "%s, skipping it!\n", key); in hdelete_r()
534 return (strcmp(e1->key, e2->key)); in cmpkey()
631 totlen += strlen(ep->key); in hexport_r()
694 s = list[i]->key; in hexport_r()
[all …]
/openbmc/linux/drivers/accessibility/speakup/
H A Dkeyhelp.c52 u_short *p_key, key; in build_key_data() local
89 key = (state_tbl[i] << 8) + ch; in build_key_data()
95 *p_key = key; in build_key_data()
100 static void say_key(int key) in say_key() argument
102 int i, state = key >> 8; in say_key()
104 key &= 0xff; in say_key()
109 if ((key > 0) && (key <= num_key_names)) in say_key()
172 if ((type != KT_SPKUP) && (key > 0) && (key <= num_key_names)) { in spk_handle_help()
183 kp = spk_our_keys[key] + 1; in spk_handle_help()
188 key += (state_tbl[i] << 8); in spk_handle_help()
[all …]
/openbmc/linux/arch/riscv/kernel/
H A Dsys_riscv.c95 switch (pair->key) { in hwprobe_arch_id()
194 switch (pair->key) { in hwprobe_one_pair()
224 pair->key = -1; in hwprobe_one_pair()
271 if (get_user(pair.key, &pairs->key)) in do_riscv_hwprobe()
276 ret = put_user(pair.key, &pairs->key); in do_riscv_hwprobe()
295 int key; in init_hwprobe_vdso_data() local
301 for (key = 0; key <= RISCV_HWPROBE_MAX_KEY; key++) { in init_hwprobe_vdso_data()
302 pair.key = key; in init_hwprobe_vdso_data()
305 WARN_ON_ONCE(pair.key < 0); in init_hwprobe_vdso_data()
307 avd->all_cpu_hwprobe_values[key] = pair.value; in init_hwprobe_vdso_data()
[all …]
/openbmc/linux/kernel/bpf/
H A Dhashtab.c128 char key[] __aligned(8); member
310 memcpy(l->key, key, htab->map.key_size); in prealloc_lru_pop()
635 void *key, u32 key_size) in lookup_elem_raw() argument
641 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_elem_raw()
652 u32 hash, void *key, in lookup_nulls_elem_raw() argument
660 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_nulls_elem_raw()
843 if (!key) in htab_map_get_next_key()
1042 memcpy(l_new->key, key, key_size); in alloc_htab_elem()
2080 ctx.key = elem->key; in __bpf_hash_map_seq_show()
2171 void *key, *val; in bpf_for_each_hash_elem() local
[all …]
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dlocal_kptr_stash.c12 long key; member
18 long key; member
44 __type(key, int);
61 res->key = val; in create_and_stash()
89 res->key = 41; in stash_plain()
103 int key = 1; in unstash_rb_node() local
105 mapval = bpf_map_lookup_elem(&some_nodes, &key); in unstash_rb_node()
111 retval = res->key; in unstash_rb_node()
123 int key = 0; in stash_test_ref_kfunc() local
125 mapval = bpf_map_lookup_elem(&some_nodes, &key); in stash_test_ref_kfunc()
H A Dmap_kptr.c14 __type(key, int);
21 __type(key, int);
28 __type(key, int);
35 __type(key, int);
42 __type(key, int);
50 __type(key, int);
58 __type(key, int);
65 __type(key, int);
73 __type(key, int);
195 int key = 0; in test_map_kptr() local
[all …]
H A Dtest_hash_large_key.c11 __type(key, struct bigelement);
18 __type(key, __u32);
32 struct bigelement *key; in bpf_hash_large_key_test() local
34 key = bpf_map_lookup_elem(&key_map, &zero); in bpf_hash_large_key_test()
35 if (!key) in bpf_hash_large_key_test()
38 key->c = 1; in bpf_hash_large_key_test()
39 if (bpf_map_update_elem(&hash_map, key, &value, BPF_ANY)) in bpf_hash_large_key_test()
H A Dstacktrace_map_skip.c13 __type(key, __u32);
20 __type(key, __u32);
27 __type(key, __u32);
39 __u32 key = 0, val = 0; in oncpu() local
49 key = bpf_get_stackid(ctx, &stackmap, TEST_STACK_DEPTH); in oncpu()
50 if ((int)key >= 0) { in oncpu()
52 bpf_map_update_elem(&stackid_hmap, &key, &val, 0); in oncpu()
53 stack_p = bpf_map_lookup_elem(&stack_amap, &key); in oncpu()
/openbmc/linux/drivers/hid/
H A Dhid-zydacron.c114 unsigned key; in zc_raw_event() local
121 key = zc->last_key[index]; in zc_raw_event()
122 if (key) { in zc_raw_event()
123 input_event(zc->input_ep81, EV_KEY, key, 0); in zc_raw_event()
128 key = 0; in zc_raw_event()
134 key = KEY_MODE; in zc_raw_event()
138 key = KEY_SCREEN; in zc_raw_event()
142 key = KEY_INFO; in zc_raw_event()
146 key = KEY_RADIO; in zc_raw_event()
151 if (key) { in zc_raw_event()
[all …]
/openbmc/linux/fs/btrfs/
H A Dlru_cache.c23 static struct btrfs_lru_cache_entry *match_entry(struct list_head *head, u64 key, in match_entry() argument
29 if (entry->key == key && entry->gen == gen) in match_entry()
46 u64 key, u64 gen) in btrfs_lru_cache_lookup() argument
51 head = mtree_load(&cache->entries, key); in btrfs_lru_cache_lookup()
55 entry = match_entry(head, key, gen); in btrfs_lru_cache_lookup()
89 head = mtree_erase(&cache->entries, entry->key); in btrfs_lru_cache_remove()
110 const u64 key = new_entry->key; in btrfs_lru_cache_store() local
118 ret = mtree_insert(&cache->entries, key, head, gfp); in btrfs_lru_cache_store()
124 head = mtree_load(&cache->entries, key); in btrfs_lru_cache_store()
126 if (match_entry(head, key, new_entry->gen) != NULL) in btrfs_lru_cache_store()
/openbmc/linux/drivers/net/ethernet/rocker/
H A Drocker_ofdpa.c96 struct ofdpa_flow_tbl_key key; member
137 } key; member
329 entry->key.vlan.vlan_id)) in ofdpa_cmd_flow_tbl_add_vlan()
461 entry->key.acl.eth_type)) in ofdpa_cmd_flow_tbl_add_acl()
464 entry->key.acl.vlan_id)) in ofdpa_cmd_flow_tbl_add_acl()
519 entry->key.tbl_id)) in ofdpa_cmd_flow_tbl_add()
749 if (memcmp(&found->key, &match->key, key_len) == 0) in ofdpa_flow_tbl_find()
1891 if (memcmp(&found->key, &match->key, sizeof(found->key)) == 0) in ofdpa_fdb_tbl_find()
1916 fdb->key_crc32 = crc32(~0, &fdb->key, sizeof(fdb->key)); in ofdpa_port_fdb()
1970 found->key.addr, in ofdpa_port_fdb_flush()
[all …]
/openbmc/linux/net/openvswitch/
H A Dconntrack.c111 switch (ntohs(key->eth.type)) { in key_to_nfproto()
202 key->ct_state = state; in __ovs_ct_update_key()
203 key->ct_zone = zone->id; in __ovs_ct_update_key()
234 key->ct_orig_proto = 0; in __ovs_ct_update_key()
284 struct sw_flow_key *key, in ovs_ct_fill_key() argument
355 key->ct.mark = new_mark; in ovs_ct_set_mark()
553 !!(key->ct_state & in ovs_ct_executed()
640 key->tp.src = src; in ovs_nat_update_key()
662 key->tp.dst = dst; in ovs_nat_update_key()
744 key->ct_state = 0; in __ovs_ct_lookup()
[all …]
/openbmc/linux/Documentation/security/keys/
H A Dtrusted-encrypted.rst110 a child key in the storage key hierarchy. Encryption and decryption of the
141 using a specified ‘master’ key. The ‘master’ key can either be a trusted-key or
143 rooted in a trusted key, they are only as secure as the user key encrypting
201 seal the key.
243 keyctl add encrypted name "new [format] key-type:master-key-name keylen"
245 keyctl add encrypted name "new [format] key-type:master-key-name keylen
248 keyctl update keyid "update key-type:master-key-name"
253 key-type:= 'trusted' | 'user'
319 trusted key provides strong guarantees that the EVM key has not been
322 encrypted key "evm" using the above trusted key "kmk":
[all …]
H A Decryptfs.rst11 using a key, the FEKEK, derived from a user prompted passphrase; in the latter
13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based
18 kernel key of the 'user' type, inserted in the user's session specific keyring
22 The 'encrypted' key type has been extended with the introduction of the new
26 kernel and protected by the parent master key.
42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring
44 keyctl update keyid "update key-type:master-key-name"
49 key-type:= 'trusted' | 'user'
53 Example of encrypted key usage with the eCryptfs filesystem:
55 Create an encrypted key "1000100010001000" of length 64 bytes with format
[all …]
/openbmc/u-boot/lib/efi_loader/
H A Defi_console.c454 struct efi_key_data key; member
660 key->key = pressed_key; in efi_cin_read_key()
676 if (item->key.key.unicode_char || item->key.key.scan_code) { in efi_cin_notify()
677 if (item->key.key.unicode_char != in efi_cin_notify()
679 item->key.key.scan_code != next_key.key.scan_code) in efi_cin_notify()
870 key_data->key.unicode_char, in efi_cin_register_key_notify()
871 key_data->key.scan_code, in efi_cin_register_key_notify()
979 struct efi_input_key *key) in efi_cin_read_key_stroke() argument
983 EFI_ENTRY("%p, %p", this, key); in efi_cin_read_key_stroke()
986 if (!this || !key) { in efi_cin_read_key_stroke()
[all …]
/openbmc/qemu/tests/unit/
H A Dtest-crypto-akcipher.c666 const uint8_t *key; member
696 .key = rsa1024_public_key,
704 .key = rsa1024_private_key,
712 .key = rsa2048_public_key,
720 .key = rsa2048_private_key,
728 .key = rsa_public_key_lack_element,
756 .key = NULL,
763 .key = NULL,
777 .key = rsa_public_key_extra_elem,
961 g_assert(key == NULL); in test_rsakey()
[all …]
/openbmc/linux/Documentation/driver-api/nvdimm/
H A Dsecurity.rst29 disable <keyid> - disable enabled security and remove key.
31 erase <keyid> - delete existing user encryption key.
34 master_erase <keyid> - delete existing user encryption key.
39 The key is associated to the payload by the DIMM id. For example:
73 what the key description is for the old key since we are only interested in the
109 Overwrite can be done without a key if security is not enabled. A key serial
110 of 0 can be passed in to indicate no key.
124 master passphrase key is passed to the kernel. The master passphrase key
125 is just another encrypted-key.
135 passphrase key is passed to the kernel. The master passphrase key is just
[all …]
/openbmc/linux/drivers/md/
H A Ddm-bio-prison-v1.c87 static void __setup_new_cell(struct dm_cell_key *key, in __setup_new_cell() argument
91 memcpy(&cell->key, key, sizeof(cell->key)); in __setup_new_cell()
128 if (WARN_ON_ONCE(key->block_end - key->block_begin > BIO_PRISON_MAX_RANGE)) in dm_cell_key_has_valid_range()
139 struct dm_cell_key *key, in __bio_detain() argument
151 r = cmp_keys(key, &cell->key); in __bio_detain()
166 __setup_new_cell(key, inmate, cell_prealloc); in __bio_detain()
176 struct dm_cell_key *key, in bio_detain() argument
182 unsigned l = lock_nr(key, prison->num_locks); in bio_detain()
192 struct dm_cell_key *key, in dm_bio_detain() argument
202 struct dm_cell_key *key, in dm_get_cell() argument
[all …]
/openbmc/linux/include/linux/
H A Dhashtable.h60 #define hash_add(hashtable, node, key) \ argument
61 hlist_add_head(node, &hashtable[hash_min(key, HASH_BITS(hashtable))])
69 #define hash_add_rcu(hashtable, node, key) \ argument
70 hlist_add_head_rcu(node, &hashtable[hash_min(key, HASH_BITS(hashtable))])
165 #define hash_for_each_possible(name, obj, member, key) \ argument
176 #define hash_for_each_possible_rcu(name, obj, member, key, cond...) \ argument
177 hlist_for_each_entry_rcu(obj, &name[hash_min(key, HASH_BITS(name))],\
191 #define hash_for_each_possible_rcu_notrace(name, obj, member, key) \ argument
193 &name[hash_min(key, HASH_BITS(name))], member)
204 #define hash_for_each_possible_safe(name, obj, tmp, member, key) \ argument
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D20734 def _filter(key, value): argument
35 if key == 'hash' and re.match('[0-9a-f]+', value):
131 for key in keys:
132 md5_keys[key] = subprocess.check_output(
133 'echo %s | base64 -d | md5sum -b | cut -d" " -f1' % key,
136 sha1_keys[key] = subprocess.check_output(
137 'echo %s | base64 -d | sha1sum -b | cut -d" " -f1' % key,
140 sha256_keys[key] = subprocess.check_output(
148 for key in keys:
157 'hash': md5_keys[key],
[all …]
/openbmc/linux/drivers/net/ethernet/netronome/nfp/nfpcore/
H A Dnfp_mutex.c19 u32 key; member
87 int target, unsigned long long address, u32 key) in nfp_cpp_mutex_init() argument
97 err = nfp_cpp_writel(cpp, muw, address + 4, key); in nfp_cpp_mutex_init()
124 unsigned long long address, u32 key) in nfp_cpp_mutex_alloc() argument
140 if (tmp != key) in nfp_cpp_mutex_alloc()
150 mutex->key = key; in nfp_cpp_mutex_alloc()
200 mutex->target, mutex->address, mutex->key); in nfp_cpp_mutex_lock()
222 u32 key, value; in nfp_cpp_mutex_unlock() local
237 if (key != mutex->key) in nfp_cpp_mutex_unlock()
268 u32 key, value, tmp; in nfp_cpp_mutex_trylock() local
[all …]
/openbmc/linux/net/ipv4/
H A Dfib_trie.c364 l->key = key; in leaf_new()
1130 tn = tnode_new(key, __fls(key ^ n->key), 1); in fib_insert_node()
1570 index = key ^ n->key; in fib_table_lookup()
1946 key = l->key + 1; in fib_trie_unmerge()
1947 if (key < l->key) in fib_trie_unmerge()
2225 key = l->key + 1; in fib_table_notify()
2227 if (key < l->key) in fib_table_notify()
2384 key = l->key + 1; in fib_table_dump()
2390 if (key < l->key) in fib_table_dump()
2864 key = iter->key; in fib_route_get_idx()
[all …]
/openbmc/linux/samples/bpf/
H A Dtracex2.bpf.c15 __type(key, long);
84 struct hist_key key; in BPF_KSYSCALL() local
86 key.index = log2l(count); in BPF_KSYSCALL()
87 key.pid_tgid = bpf_get_current_pid_tgid(); in BPF_KSYSCALL()
88 key.uid_gid = bpf_get_current_uid_gid(); in BPF_KSYSCALL()
89 bpf_get_current_comm(&key.comm, sizeof(key.comm)); in BPF_KSYSCALL()
91 value = bpf_map_lookup_elem(&my_hist_map, &key); in BPF_KSYSCALL()
95 bpf_map_update_elem(&my_hist_map, &key, &init_val, BPF_ANY); in BPF_KSYSCALL()
/openbmc/linux/lib/
H A Ddigsig.c67 static int digsig_verify_rsa(struct key *key, in digsig_verify_rsa() argument
84 down_read(&key->sem); in digsig_verify_rsa()
85 ukp = user_key_payload_locked(key); in digsig_verify_rsa()
179 up_read(&key->sem); in digsig_verify_rsa()
206 struct key *key; in digsig_verify() local
223 key = ERR_CAST(kref); in digsig_verify()
225 key = key_ref_to_ptr(kref); in digsig_verify()
227 key = request_key(&key_type_user, name, NULL); in digsig_verify()
229 if (IS_ERR(key)) { in digsig_verify()
231 return PTR_ERR(key); in digsig_verify()
[all …]

1...<<11121314151617181920>>...210