/openbmc/linux/fs/reiserfs/ |
H A D | prints.c | 35 version = le_key_version(key); in le_offset() 65 version = le_key_version(key); in le_type() 81 if (key) in scnprintf_le_key() 83 le32_to_cpu(key->k_dir_id), in scnprintf_le_key() 84 le32_to_cpu(key->k_objectid), le_offset(key), in scnprintf_le_key() 85 le_type(key)); in scnprintf_le_key() 93 if (key) in scnprintf_cpu_key() 95 key->on_disk_key.k_dir_id, in scnprintf_cpu_key() 97 reiserfs_cpu_offset(key), cpu_type(key)); in scnprintf_cpu_key() 444 struct reiserfs_key *key; in print_internal() local [all …]
|
/openbmc/u-boot/fs/ubifs/ |
H A D | tnc_misc.c | 138 cmp = keys_cmp(c, key, &zbr[mid].key); in ubifs_search_zbranch() 154 ubifs_assert(keys_cmp(c, key, &zbr[0].key) < 0); in ubifs_search_zbranch() 156 ubifs_assert(keys_cmp(c, key, &zbr[*n].key) > 0); in ubifs_search_zbranch() 158 ubifs_assert(keys_cmp(c, key, &zbr[*n + 1].key) < 0); in ubifs_search_zbranch() 299 key_read(c, &br->key, &zbr->key); in read_znode() 323 i, key_type(c, &zbr->key)); in read_znode() 331 type = key_type(c, &zbr->key); in read_znode() 359 key1 = &znode->zbranch[i].key; in read_znode() 452 union ubifs_key key1, *key = &zbr->key; in ubifs_tnc_read_node() local 469 dbg_tnck(key, "key "); in ubifs_tnc_read_node() [all …]
|
/openbmc/u-boot/cmd/ |
H A D | bootmenu.c | 104 *key = KEY_NONE; in bootmenu_autoboot_loop() 110 *key = KEY_NONE; in bootmenu_autoboot_loop() 128 *key = KEY_SELECT; in bootmenu_autoboot_loop() 148 *key = KEY_NONE; in bootmenu_loop() 155 *key = KEY_NONE; in bootmenu_loop() 165 *key = KEY_NONE; in bootmenu_loop() 173 *key = KEY_UP; in bootmenu_loop() 176 *key = KEY_DOWN; in bootmenu_loop() 179 *key = KEY_NONE; in bootmenu_loop() 186 *key = KEY_SELECT; in bootmenu_loop() [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | sockmap_listen.c | 104 u32 key; in test_insert() local 111 key = 0; in test_insert() 121 u32 key; in test_delete_after_insert() local 128 key = 0; in test_delete_after_insert() 140 u32 key; in test_delete_after_close() local 146 key = 0; in test_delete_after_close() 164 u32 key; in test_lookup_after_insert() local 171 key = 0; in test_lookup_after_insert() 193 u32 key; in test_lookup_after_delete() local 199 key = 0; in test_lookup_after_delete() [all …]
|
/openbmc/qemu/crypto/ |
H A D | cipher-nettle.c.inc | 534 des_set_key(&ctx->key, key); 560 des3_set_key(&ctx->key, key); 587 aes128_set_encrypt_key(&ctx->key[0], key); 588 aes128_set_decrypt_key(&ctx->key[1], key); 616 aes192_set_encrypt_key(&ctx->key[0], key); 617 aes192_set_decrypt_key(&ctx->key[1], key); 672 cast5_set_key(&ctx->key, nkey, key); 701 serpent_set_key(&ctx->key, nkey, key); 730 twofish_set_key(&ctx->key, nkey, key); 747 sm4_set_encrypt_key(&ctx->key[0], key); [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/phoronix-test-suite/files/ |
H A D | CVE-2022-40704.patch | 26 foreach($input_keys as $key) 28 - if(isset($_REQUEST[$key]) && !empty($_REQUEST[$key])) 29 + if(isset($_GET[$key]) && !empty($_GET[$key])) 31 - foreach(pts_arrays::to_array($_REQUEST[$key]) as $val_to_check) 32 + foreach(pts_arrays::to_array($_GET[$key]) as $val_to_check) 41 + if(isset($_POST[$key]) && !empty($_POST[$key])) 43 + foreach(pts_arrays::to_array($_POST[$key]) as $val_to_check)
|
/openbmc/linux/tools/perf/util/ |
H A D | bpf_map.c | 31 void *prev_key = NULL, *key, *value; in bpf_map__fprintf() local 42 key = malloc(bpf_map__key_size(map)); in bpf_map__fprintf() 43 if (key == NULL) in bpf_map__fprintf() 50 while ((err = bpf_map_get_next_key(fd, prev_key, key) == 0)) { in bpf_map__fprintf() 51 int intkey = *(int *)key; in bpf_map__fprintf() 53 if (!bpf_map_lookup_elem(fd, key, value)) { in bpf_map__fprintf() 61 prev_key = key; in bpf_map__fprintf() 69 free(key); in bpf_map__fprintf()
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | bpf_iter_bpf_percpu_hash_map.c | 18 __type(key, struct key_t); 32 struct key_t *key = ctx->key; in dump_bpf_percpu_hash_map() local 37 if (key == (void *)0 || pptr == (void *)0) in dump_bpf_percpu_hash_map() 40 key_sum_a += key->a; in dump_bpf_percpu_hash_map() 41 key_sum_b += key->b; in dump_bpf_percpu_hash_map() 42 key_sum_c += key->c; in dump_bpf_percpu_hash_map()
|
H A D | test_sockmap_update.c | 9 __type(key, __u32); 16 __type(key, __u32); 23 __type(key, __u32); 32 __u32 key = 0; in copy_sock_map() local 34 sk = bpf_map_lookup_elem(&src, &key); in copy_sock_map() 38 if (bpf_map_update_elem(&dst_sock_map, &key, sk, 0)) in copy_sock_map() 41 if (bpf_map_update_elem(&dst_sock_hash, &key, sk, 0)) in copy_sock_map()
|
/openbmc/qemu/hw/xen/ |
H A D | xen-bus-helper.c | 72 const char *node, const char *key, Error **errp, in xs_node_vprintf() argument 78 path = (strlen(node) != 0) ? g_strdup_printf("%s/%s", node, key) : in xs_node_vprintf() 79 g_strdup(key); in xs_node_vprintf() 94 const char *node, const char *key, Error **errp, in xs_node_printf() argument 100 xs_node_vprintf(h, tid, node, key, errp, fmt, ap); in xs_node_printf() 105 const char *node, const char *key, Error **errp, in xs_node_vscanf() argument 112 g_strdup(key); in xs_node_vscanf() 132 const char *node, const char *key, Error **errp, in xs_node_scanf() argument 139 rc = xs_node_vscanf(h, tid, node, key, errp, fmt, ap); in xs_node_scanf() 146 const char *key, xs_watch_fn fn, in xs_node_watch() argument [all …]
|
/openbmc/linux/kernel/bpf/ |
H A D | lpm_trie.c | 182 *(__be64 *)key->data); in longest_prefix_match() 195 *(__be32 *)&key->data[i]); in longest_prefix_match() 207 *(__be16 *)&key->data[i]); in longest_prefix_match() 232 struct bpf_lpm_trie_key_u8 *key = _key; in trie_lookup_elem() local 313 struct bpf_lpm_trie_key_u8 *key = _key; in trie_update_elem() local 342 new_node->prefixlen = key->prefixlen; in trie_update_elem() 394 if (matchlen == key->prefixlen) { in trie_update_elem() 412 if (extract_bit(key->data, matchlen)) { in trie_update_elem() 443 struct bpf_lpm_trie_key_u8 *key = _key; in trie_delete_elem() local 470 node->prefixlen == key->prefixlen) in trie_delete_elem() [all …]
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | x509_loader.c | 9 const struct key *keyring) in x509_load_certificate_list() 11 key_ref_t key; in x509_load_certificate_list() local 31 key = key_create_or_update(make_key_ref(keyring, 1), in x509_load_certificate_list() 41 if (IS_ERR(key)) { in x509_load_certificate_list() 43 PTR_ERR(key)); in x509_load_certificate_list() 46 key_ref_to_ptr(key)->description); in x509_load_certificate_list() 47 key_ref_put(key); in x509_load_certificate_list()
|
/openbmc/linux/net/mac80211/ |
H A D | wep.c | 94 struct ieee80211_key *key) in ieee80211_wep_remove_iv() argument 152 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 193 struct ieee80211_key *key) in ieee80211_wep_decrypt() argument 214 if (!key || keyidx != key->conf.keyidx) in ieee80211_wep_decrypt() 217 klen = 3 + key->conf.keylen; in ieee80211_wep_decrypt() 223 memcpy(rc4key + 3, key->conf.key, key->conf.keylen); in ieee80211_wep_decrypt() 276 if (ieee80211_wep_encrypt(tx->local, skb, tx->key->conf.key, in wep_encrypt_skb() 277 tx->key->conf.keylen, in wep_encrypt_skb() 278 tx->key->conf.keyidx)) in wep_encrypt_skb() 283 tx->key->conf.keylen, in wep_encrypt_skb() [all …]
|
/openbmc/linux/security/selinux/ss/ |
H A D | conditional.c | 179 kfree(key); in cond_destroy_bool() 210 char *key = NULL; in cond_read_bool() local 237 if (!key) in cond_read_bool() 239 rc = next_entry(key, fp, len); in cond_read_bool() 242 key[len] = '\0'; in cond_read_bool() 451 char *key = vkey; in cond_write_bool() local 459 len = strlen(key); in cond_write_bool() 466 rc = put_entry(key, 1, len, fp); in cond_write_bool() 562 if (!ctab || !key || !xpermd) in cond_compute_xperms() 579 if (!ctab || !key || !avd) in cond_compute_av() [all …]
|
/openbmc/linux/drivers/net/dsa/sja1105/ |
H A D | sja1105_flower.c | 123 rule->key.tc.pcp = tc; in sja1105_setup_tc_policer() 181 switch (key->type) { in sja1105_flower_policer() 221 if (match.key->n_proto) { in sja1105_flower_parse_key() 283 key->tc.pcp = pcp; in sja1105_flower_parse_key() 288 key->vl.dmac = dmac; in sja1105_flower_parse_key() 289 key->vl.vid = vid; in sja1105_flower_parse_key() 290 key->vl.pcp = pcp; in sja1105_flower_parse_key() 295 key->vl.dmac = dmac; in sja1105_flower_parse_key() 352 struct sja1105_key key; in sja1105_cls_flower_add() local 369 &key, in sja1105_cls_flower_add() [all …]
|
/openbmc/linux/drivers/infiniband/hw/bnxt_re/ |
H A D | qplib_res.h | 432 u32 key = 0; in bnxt_qplib_ring_db32() local 438 writel(key, info->db); in bnxt_qplib_ring_db32() 444 u64 key = 0; in bnxt_qplib_ring_db() local 447 key <<= 32; in bnxt_qplib_ring_db() 449 writeq(key, info->db); in bnxt_qplib_ring_db() 455 u64 key = 0; in bnxt_qplib_ring_prod_db() local 458 key <<= 32; in bnxt_qplib_ring_prod_db() 466 u64 key = 0; in bnxt_qplib_armen_db() local 469 key <<= 32; in bnxt_qplib_armen_db() 476 u64 key = 0; in bnxt_qplib_srq_arm_db() local [all …]
|
/openbmc/qemu/hw/nvram/ |
H A D | fw_cfg.c | 110 if (key & FW_CFG_ARCH_LOCAL) { in key_name() 280 s->cur_entry = key; in fw_cfg_select() 290 trace_fw_cfg_select(s, key, trace_key_name(key), ret); in fw_cfg_select() 626 key &= FW_CFG_ENTRY_MASK; in fw_cfg_update_mr() 706 key &= FW_CFG_ENTRY_MASK; in fw_cfg_add_bytes_callback() 725 key &= FW_CFG_ENTRY_MASK; in fw_cfg_modify_bytes_read() 741 trace_fw_cfg_add_bytes(key, trace_key_name(key), len); in fw_cfg_add_bytes() 749 trace_fw_cfg_add_string(key, trace_key_name(key), value); in fw_cfg_add_string() 768 trace_fw_cfg_add_i16(key, trace_key_name(key), value); in fw_cfg_add_i16() 788 trace_fw_cfg_add_i32(key, trace_key_name(key), value); in fw_cfg_add_i32() [all …]
|
/openbmc/openbmc/poky/bitbake/lib/bb/ |
H A D | persist_data.py | 160 def __getitem__(self, cursor, key): argument 165 raise KeyError(key) 169 def __delitem__(self, cursor, key): argument 170 if key not in self: 171 raise KeyError(key) 172 cursor.execute("DELETE from %s where key=?;" % self.table, [key]) 176 def __setitem__(self, cursor, key, value): argument 177 if not isinstance(key, str): 194 def __contains__(self, cursor, key): argument 238 def has_key(self, key): argument [all …]
|
/openbmc/openbmc/poky/meta/recipes-devtools/opkg/ |
H A D | opkg-keyrings_1.0.bb | 9 # files should not be named 'key-$name.gpg' to ensure they don't conflict 13 # OPKG_KEYRING_KEYS to contain a space-separated list of key names. For 14 # each name, 'gpg --export $name' will be ran to export the public key to a 15 # file named 'key-$name.gpg'. The public key must therefore be in the gpg 22 gpg --export ${name} > ${B}/key-${name}.gpg 29 install -m 0644 ${B}/key-${name}.gpg ${D}${datadir}/opkg/keyrings/ 35 # We need 'opkg-key' to run the postinst script 39 if test -x ${bindir}/opkg-key 41 ${bindir}/opkg-key populate
|
/openbmc/linux/drivers/net/wireguard/ |
H A D | allowedips.c | 38 return (key[node->bit_at_a] >> node->bit_at_b) & 1; in choose() 112 const u8 *key) in find_node() argument 116 while (node && prefix_matches(node, key, bits)) { in find_node() 195 copy_and_assign_cidr(node, key, cidr, bits); in add() 210 copy_and_assign_cidr(newnode, key, cidr, bits); in add() 215 const u8 bit = choose(node, key); in add() 222 cidr = min(cidr, common_bits(down, key, bits)); in add() 285 u8 key[4] __aligned(__alignof(u32)); in wg_allowedips_insert_v4() local 288 swap_endian(key, (const u8 *)ip, 32); in wg_allowedips_insert_v4() 296 u8 key[16] __aligned(__alignof(u64)); in wg_allowedips_insert_v6() local [all …]
|
/openbmc/linux/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | d3.c | 145 memcpy(&wkc.wep_key.key[3], key->key, key->keylen); in iwl_mvm_wowlan_program_keys() 555 &key->key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY], in iwl_mvm_wowlan_get_tkip_data() 579 &key->key[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY], in iwl_mvm_wowlan_get_tkip_data() 600 if (key->keyidx == 4 || key->keyidx == 5) in iwl_mvm_wowlan_gtk_type_iter() 602 if (key->keyidx == 6 || key->keyidx == 7) in iwl_mvm_wowlan_gtk_type_iter() 1825 (key->keyidx == 4 || key->keyidx == 5)) { in iwl_mvm_d3_find_last_keys() 1912 if (key->keyidx == 4 || key->keyidx == 5) { in iwl_mvm_d3_update_keys() 1936 u8 key[32]; in iwl_mvm_gtk_rekey() member 1970 memcpy(conf.conf.key, status->gtk[i].key, in iwl_mvm_gtk_rekey() 2138 memcpy(status->gtk[0].key, data->key, sizeof(data->key)); in iwl_mvm_convert_gtk_v2() [all …]
|
/openbmc/openbmc/poky/documentation/tools/ |
H A D | update-documentation-conf | 78 def sortkey(key): 80 return key.split('[')[0].replace('_', '-') 95 key = linesplit[0].rstrip() 96 lastletter = key[0] 99 if sortkey(dkey) < sortkey(key): 104 newvalue = infos.get(key, None) 106 del infos[key] 108 lines.append('%s = %s\n' % (key, newvalue)) 111 elif key in added: 135 for key in sorted(infos.keys()): [all …]
|
/openbmc/linux/samples/bpf/ |
H A D | tracex2_user.c | 45 struct hist_key key = {}, next_key; in print_hist_for_pid() local 54 while (bpf_map_get_next_key(fd, &key, &next_key) == 0) { in print_hist_for_pid() 56 key = next_key; in print_hist_for_pid() 69 key = next_key; in print_hist_for_pid() 84 struct hist_key key = {}, next_key; in print_hist() local 89 while (bpf_map_get_next_key(fd, &key, &next_key) == 0) { in print_hist() 97 key = next_key; in print_hist() 118 long key, next_key, value; in main() local 169 key = 0; in main() 173 key = next_key; in main() [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 207.out | 17 === Test host-key-check options === 19 --- no host key checking -- 21 …ments": {"job-id": "job0", "options": {"driver": "ssh", "location": {"host-key-check": {"mode": "n… 30 --- known_hosts key checking -- 32 …ments": {"job-id": "job0", "options": {"driver": "ssh", "location": {"host-key-check": {"mode": "k… 41 --- explicit md5 key checking -- 45 Job failed: remote host key fingerprint 'md5:HASH' does not match host_key_check 'md5:wrong' 58 --- explicit sha1 key checking -- 62 Job failed: remote host key fingerprint 'sha1:HASH' does not match host_key_check 'sha1:wrong' 75 --- explicit sha256 key checking -- [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 31 ClientAuthentication: The public key is used for TLS WWW client 33 CodeSigning: The public key is used for the signing of executable 39 DecipherOnly: The public key could be used for deciphering data 40 while performing key agreement. 41 DigitalSignature: The public key is used for verifying digital 44 EmailProtection: The public key is used for email protection. 45 EncipherOnly: The public key could be used for enciphering data 46 while performing key agreement. 47 KeyCertSign: The public key is used for verifying signatures on 48 public key certificates. [all …]
|