/openbmc/linux/crypto/ |
H A D | vmac.c | 431 const u8 *key, unsigned int keylen) in vmac_setkey() argument 442 err = crypto_cipher_setkey(tctx->cipher, key, keylen); in vmac_setkey()
|
/openbmc/linux/drivers/infiniband/hw/cxgb4/ |
H A D | mem.c | 280 static atomic_t key; in write_tpt_entry() local 306 *stag = (stag_idx << 8) | (atomic_inc_return(&key) & 0xff); in write_tpt_entry()
|
/openbmc/openbmc/poky/bitbake/lib/bb/ |
H A D | tinfoil.py | 900 for key, val in self.initial_options.items(): 901 setattr(opts[0], key, val)
|
/openbmc/entity-manager/ |
H A D | CONFIG_FORMAT.md | 254 The entity-manager can key off of different types and export devices for 293 around after key resorting.
|
/openbmc/linux/drivers/net/ethernet/sfc/ |
H A D | net_driver.h | 1416 const u32 *rx_indir_table, const u8 *key); 1421 const u8 *key);
|
/openbmc/linux/block/ |
H A D | kyber-iosched.c | 194 void *key); 696 void *key) in kyber_domain_wake() argument
|
/openbmc/linux/net/ipv6/ |
H A D | ioam6.c | 53 return (ns->id != *(__be16 *)arg->key); in ioam6_ns_cmpfn() 60 return (sc->id != *(u32 *)arg->key); in ioam6_sc_cmpfn()
|
/openbmc/linux/arch/arm/boot/dts/nxp/imx/ |
H A D | imx6qdl-gw5903.dtsi | 92 key-erased { 93 label = "key-erased";
|
H A D | imx7d-sdb.dts | 32 key-volume-up { 39 key-volume-down {
|
/openbmc/linux/arch/arm64/boot/dts/rockchip/ |
H A D | rk3399-roc-pc.dtsi | 57 key-power { 609 pwr_key_l: pwr-key-l {
|
/openbmc/qemu/accel/tcg/ |
H A D | tb-maint.c | 525 static gboolean page_entry_lock(gpointer key, gpointer value, gpointer data) in page_entry_lock() argument 533 static gboolean page_entry_unlock(gpointer key, gpointer value, gpointer data) in page_entry_unlock() argument
|
/openbmc/linux/kernel/ |
H A D | kthread.c | 778 struct lock_class_key *key) in __kthread_init_worker() argument 782 lockdep_set_class_and_name(&worker->lock, key, name); in __kthread_init_worker()
|
/openbmc/linux/drivers/net/wireless/ath/ath12k/ |
H A D | dp_rx.c | 1110 struct ieee80211_key_conf *key) in ath12k_dp_rx_peer_pn_replay_config() argument 1124 if (!(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) in ath12k_dp_rx_peer_pn_replay_config() 1134 switch (key->cipher) { in ath12k_dp_rx_peer_pn_replay_config() 2781 static int ath12k_dp_rx_h_michael_mic(struct crypto_shash *tfm, u8 *key, in ath12k_dp_rx_h_michael_mic() argument 2795 ret = crypto_shash_setkey(tfm, key, 8); in ath12k_dp_rx_h_michael_mic() 2834 u8 *key, *data; in ath12k_dp_rx_h_verify_tkip_mic() local 2854 key = &key_conf->key[NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY]; in ath12k_dp_rx_h_verify_tkip_mic() 2856 ret = ath12k_dp_rx_h_michael_mic(peer->tfm_mmic, key, hdr, data, data_len, mic); in ath12k_dp_rx_h_verify_tkip_mic()
|
/openbmc/linux/fs/ext4/ |
H A D | super.c | 2172 param->key); in ext4_parse_param() 2192 "Ignoring %s option on remount", param->key); in ext4_parse_param() 2200 param->key); in ext4_parse_param() 2410 param->key); in ext4_parse_param() 2427 param->key); in ext4_parse_param() 2451 char *key; in parse_options() local 2456 while ((key = strsep(&options, ",")) != NULL) { in parse_options() 2457 if (*key) { in parse_options() 2459 char *value = strchr(key, '='); in parse_options() 2465 if (value == key) in parse_options() [all …]
|
/openbmc/u-boot/tools/ |
H A D | mxsimage.c | 344 sb_aes_crypt(ictx, ictx->image_key, ictx->sb_dict_key.key, in sb_encrypt_key_dictionary_key() 345 sizeof(ictx->sb_dict_key.key)); in sb_encrypt_key_dictionary_key() 354 sb_aes_crypt(ictx, ictx->sb_dict_key.key, ictx->image_key, in sb_decrypt_key_dictionary_key() 355 sizeof(ictx->sb_dict_key.key)); in sb_decrypt_key_dictionary_key()
|
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/ |
H A D | wic.py | 320 bbvars = {key.lower(): value for key, value in bb_vars.items()} 423 bbvars = {key.lower(): value for key, value in bb_vars.items()}
|
/openbmc/linux/drivers/net/ethernet/marvell/octeontx2/nic/ |
H A D | cn10k_macsec.c | 1316 memcpy(&txsc->sa_key[sa_num], ctx->sa.key, secy->key_len); in cn10k_mdo_add_txsa() 1317 memcpy(&txsc->salt[sa_num], sw_tx_sa->key.salt.bytes, MACSEC_SALT_LEN); in cn10k_mdo_add_txsa() 1489 memcpy(&rxsc->sa_key[sa_num], ctx->sa.key, ctx->secy->key_len); in cn10k_mdo_add_rxsa() 1490 memcpy(&rxsc->salt[sa_num], rx_sa->key.salt.bytes, MACSEC_SALT_LEN); in cn10k_mdo_add_rxsa()
|
/openbmc/linux/arch/arm/boot/dts/samsung/ |
H A D | exynos4412-midas.dtsi | 138 key-down { 145 key-up { 152 key-power { 160 key-ok {
|
/openbmc/linux/net/mac80211/ |
H A D | mesh.c | 768 struct ieee80211_mesh_fast_tx_key key = { in ieee80211_mesh_xmit_fast() local 806 ether_addr_copy(key.addr, skb->data); in ieee80211_mesh_xmit_fast() 808 key.type = MESH_FAST_TX_TYPE_PROXIED; in ieee80211_mesh_xmit_fast() 809 entry = mesh_fast_tx_get(sdata, &key); in ieee80211_mesh_xmit_fast()
|
/openbmc/linux/tools/perf/ |
H A D | builtin-c2c.c | 2627 int key = -1; in perf_c2c__browse_cacheline() local 2656 key = hist_browser__run(browser, "? - help", true, 0); in perf_c2c__browse_cacheline() 2658 switch (key) { in perf_c2c__browse_cacheline() 2708 int key = -1; in perf_c2c__hists_browse() local 2725 key = hist_browser__run(browser, "? - help", true, 0); in perf_c2c__hists_browse() 2727 switch (key) { in perf_c2c__hists_browse()
|
/openbmc/linux/fs/ocfs2/dlm/ |
H A D | dlmmaster.c | 1322 ret = o2net_send_message(DLM_MASTER_REQUEST_MSG, dlm->key, &request, in dlm_do_master_request() 1685 tmpret = o2net_send_message(DLM_ASSERT_MASTER_MSG, dlm->key, in dlm_do_assert_master() 1690 DLM_ASSERT_MASTER_MSG, dlm->key, to); in dlm_do_assert_master() 2231 ret = o2net_send_message(DLM_DEREF_LOCKRES_MSG, dlm->key, in dlm_drop_lockres_ref() 2425 ret = o2net_send_message(DLM_DEREF_LOCKRES_DONE, dlm->key, in dlm_drop_lockres_ref_done() 3054 ret = o2net_send_message(DLM_MIGRATE_REQUEST_MSG, dlm->key, in dlm_do_migrate_request()
|
/openbmc/linux/net/tipc/ |
H A D | node.c | 2921 struct tipc_aead_key *key; in tipc_nl_retrieve_key() local 2926 if (nla_len(attr) < sizeof(*key)) in tipc_nl_retrieve_key() 2928 key = (struct tipc_aead_key *)nla_data(attr); in tipc_nl_retrieve_key() 2929 if (key->keylen > TIPC_AEAD_KEYLEN_MAX || in tipc_nl_retrieve_key() 2930 nla_len(attr) < tipc_aead_key_size(key)) in tipc_nl_retrieve_key() 2933 *pkey = key; in tipc_nl_retrieve_key()
|
/openbmc/linux/drivers/platform/x86/ |
H A D | sony-laptop.c | 205 int key; member 361 input_report_key(kp.dev, kp.key, 0); in do_sony_laptop_release_key() 404 kp.key = BTN_MIDDLE; in sony_laptop_report_input_event() 414 kp.key = sony_laptop_input_keycode_map[scancode]; in sony_laptop_report_input_event() 415 if (kp.key != KEY_UNKNOWN) in sony_laptop_report_input_event() 426 input_report_key(kp.dev, kp.key, 1); in sony_laptop_report_input_event() 549 input_report_key(kp.dev, kp.key, 0); in sony_laptop_remove_input()
|
/openbmc/linux/drivers/net/ethernet/intel/ice/ |
H A D | ice_ethtool.c | 3117 u8 *key, u8 *hfunc, u32 rss_context) in ice_get_rxfh_context() argument 3160 err = ice_get_rss_key(vsi, key); in ice_get_rxfh_context() 3192 ice_get_rxfh(struct net_device *netdev, u32 *indir, u8 *key, u8 *hfunc) in ice_get_rxfh() argument 3194 return ice_get_rxfh_context(netdev, indir, key, hfunc, 0); in ice_get_rxfh() 3208 ice_set_rxfh(struct net_device *netdev, const u32 *indir, const u8 *key, in ice_set_rxfh() argument 3232 if (key) { in ice_set_rxfh() 3240 memcpy(vsi->rss_hkey_user, key, ICE_VSIQF_HKEY_ARRAY_SIZE); in ice_set_rxfh()
|
/openbmc/linux/net/smc/ |
H A D | af_smc.c | 770 static void smc_fback_wakeup_waitqueue(struct smc_sock *smc, void *key) in smc_fback_wakeup_waitqueue() argument 780 if (!key) { in smc_fback_wakeup_waitqueue() 784 flags = key_to_poll(key); in smc_fback_wakeup_waitqueue() 795 unsigned int mode, int sync, void *key) in smc_fback_mark_woken() argument 801 mark->key = key; in smc_fback_mark_woken() 822 smc_fback_wakeup_waitqueue(smc, mark.key); in smc_fback_forward_wakeup()
|