/openbmc/linux/net/mac802154/ |
H A D | llsec.c | 21 static void llsec_key_put(struct mac802154_llsec_key *key); 45 struct ieee802154_llsec_key_entry *key, *kn; in mac802154_llsec_destroy() local 63 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { in mac802154_llsec_destroy() 66 mkey = container_of(key->key, struct mac802154_llsec_key, key); in mac802154_llsec_destroy() 67 list_del(&key->list); in mac802154_llsec_destroy() 69 kfree_sensitive(key); in mac802154_llsec_destroy() 117 struct mac802154_llsec_key *key; in llsec_key_alloc() local 120 key = kzalloc(sizeof(*key), GFP_KERNEL); in llsec_key_alloc() 121 if (!key) in llsec_key_alloc() 124 kref_init(&key->ref); in llsec_key_alloc() [all …]
|
/openbmc/openbmc/poky/bitbake/lib/bb/ |
H A D | COW.py | 54 def __setitem__(cls, key, value): argument 58 key += MUTABLE 59 setattr(cls, key, value) 61 def __getmutable__(cls, key, readonly=False): argument 62 nkey = key + MUTABLE 73 print("Warning: Doing a copy because %s is a mutable type." % key, file=cls.__warn__) 83 def __getreadonly__(cls, key, default=__getmarker__): argument 87 return cls.__getitem__(key, default, True) 89 def __getitem__(cls, key, default=__getmarker__, readonly=False): argument 92 value = getattr(cls, key) [all …]
|
/openbmc/linux/drivers/gpu/drm/ |
H A D | drm_hashtab.c | 62 void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key) in drm_ht_verbose_list() argument 69 hashed_key = hash_long(key, ht->order); in drm_ht_verbose_list() 70 DRM_DEBUG("Key is 0x%08lx, Hashed key is 0x%08x\n", key, hashed_key); in drm_ht_verbose_list() 73 DRM_DEBUG("count %d, key: 0x%08lx\n", count++, entry->key); in drm_ht_verbose_list() 77 unsigned long key) in drm_ht_find_key() argument 83 hashed_key = hash_long(key, ht->order); in drm_ht_find_key() 86 if (entry->key == key) in drm_ht_find_key() 88 if (entry->key > key) in drm_ht_find_key() 95 unsigned long key) in drm_ht_find_key_rcu() argument 101 hashed_key = hash_long(key, ht->order); in drm_ht_find_key_rcu() [all …]
|
/openbmc/linux/arch/powerpc/crypto/ |
H A D | aesp10-ppc.pl | 121 my ($zero,$in0,$in1,$key,$rcon,$mask,$tmp)=map("v$_",(0..6)); 174 lvsr $key,0,r9 # borrow $key 180 le?vxor $key,$key,$mask # adjust for byte swap 183 vperm $in0,$in0,$in1,$key # align [and byte swap in LE] 201 vperm $key,$in0,$in0,$mask # rotate-n-splat 206 vcipherlast $key,$key,$rcon 216 vxor $in0,$in0,$key 221 vperm $key,$in0,$in0,$mask # rotate-n-splat 226 vcipherlast $key,$key,$rcon 236 vxor $in0,$in0,$key [all …]
|
/openbmc/linux/kernel/ |
H A D | static_call_inline.c | 51 return (long)site->key + (long)&site->key; in __static_call_key() 72 site->key = (__static_call_key(site) | STATIC_CALL_SITE_INIT) - in static_call_set_init() 73 (long)&site->key; in static_call_set_init() 100 a->key = b->key - delta; in static_call_site_swap() 103 b->key = tmp.key + delta; in static_call_site_swap() 113 static inline bool static_call_key_has_mods(struct static_call_key *key) in static_call_key_has_mods() argument 115 return !(key->type & 1); in static_call_key_has_mods() 118 static inline struct static_call_mod *static_call_key_next(struct static_call_key *key) in static_call_key_next() argument 120 if (!static_call_key_has_mods(key)) in static_call_key_next() 123 return key->mods; in static_call_key_next() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
H A D | 0001-Adapt-to-OpenSSL-1.1.1.patch | 16 key.c | 133 ++++++++++++++++++++++++++++++++++++++++++++++++++-- 28 key = pamsshagentauth_key_new(KEY_RSA1); 31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e); 32 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n); 37 BN_num_bits(key->rsa->n), bits); 39 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa)); 40 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa)); 42 + keybits = BN_num_bits(RSA_get0_n(key->rsa)); 45 + BN_num_bits(RSA_get0_n(key->rsa)), bits); 55 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | test_maps.c | 39 long long key, next_key, first_key, value; in test_hashmap() local 42 fd = bpf_map_create(BPF_MAP_TYPE_HASH, NULL, sizeof(key), sizeof(value), 2, &map_opts); in test_hashmap() 48 key = 1; in test_hashmap() 51 assert(bpf_map_update_elem(fd, &key, &value, BPF_ANY) == 0); in test_hashmap() 55 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) < 0 && in test_hashmap() 60 assert(bpf_map_update_elem(fd, &key, &value, -1) < 0 && in test_hashmap() 64 assert(bpf_map_lookup_elem(fd, &key, &value) == 0 && value == 1234); in test_hashmap() 66 key = 2; in test_hashmap() 69 assert(bpf_map_update_elem(fd, &key, &value, BPF_ANY) == 0); in test_hashmap() 72 assert(bpf_map_lookup_and_delete_elem(fd, &key, &value) == 0 && value == 1234); in test_hashmap() [all …]
|
/openbmc/linux/drivers/staging/vt6655/ |
H A D | key.c | 18 struct ieee80211_key_conf *key, u32 key_type, in vnt_set_keymode() argument 26 u8 key_inx = key->keyidx; in vnt_set_keymode() 39 key->hw_key_idx = i; in vnt_set_keymode() 40 entry = key->hw_key_idx; in vnt_set_keymode() 50 key->hw_key_idx = entry; in vnt_set_keymode() 76 if (key->keylen == WLAN_KEY_LEN_WEP40) in vnt_set_keymode() 77 key->key[15] &= 0x7f; in vnt_set_keymode() 78 if (key->keylen == WLAN_KEY_LEN_WEP104) in vnt_set_keymode() 79 key->key[15] |= 0x80; in vnt_set_keymode() 83 bssid, (u32 *)key->key, priv->local_id); in vnt_set_keymode() [all …]
|
/openbmc/linux/include/keys/ |
H A D | user-type.h | 40 extern int user_update(struct key *key, struct key_preparsed_payload *prep); 41 extern void user_revoke(struct key *key); 42 extern void user_destroy(struct key *key); 43 extern void user_describe(const struct key *user, struct seq_file *m); 44 extern long user_read(const struct key *key, char *buffer, size_t buflen); 46 static inline const struct user_key_payload *user_key_payload_rcu(const struct key *key) in user_key_payload_rcu() argument 48 return (struct user_key_payload *)dereference_key_rcu(key); in user_key_payload_rcu() 51 static inline struct user_key_payload *user_key_payload_locked(const struct key *key) in user_key_payload_locked() argument 53 return (struct user_key_payload *)dereference_key_locked((struct key *)key); in user_key_payload_locked()
|
/openbmc/qemu/replay/ |
H A D | replay-input.c | 22 InputKeyEvent *key; in replay_save_input_event() local 30 key = evt->u.key.data; in replay_save_input_event() 31 replay_put_dword(key->key->type); in replay_save_input_event() 33 switch (key->key->type) { in replay_save_input_event() 35 replay_put_qword(key->key->u.number.data); in replay_save_input_event() 36 replay_put_byte(key->down); in replay_save_input_event() 39 replay_put_dword(key->key->u.qcode.data); in replay_save_input_event() 40 replay_put_byte(key->down); in replay_save_input_event() 80 InputKeyEvent key; in replay_read_input_event() local 81 key.key = &keyValue; in replay_read_input_event() [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | ffdc_cli_robot_script.py | 144 for key in dict_of_parm.keys(): 145 if HOST in key: 146 remote = dict_of_parm[key] 147 elif USER in key: 148 username = dict_of_parm[key] 149 elif PASSWD in key: 150 password = dict_of_parm[key] 151 elif PORT_SSH in key: 152 port_ssh = dict_of_parm[key] 153 elif PORT_HTTPS in key: [all …]
|
/openbmc/linux/net/sched/ |
H A D | cls_flower.c | 85 struct fl_flow_key key; member 120 struct fl_flow_key key; member 138 .key_offset = offsetof(struct fl_flow_mask, key), 151 const u8 *bytes = (const u8 *) &mask->key; in fl_mask_update_range() 152 size_t size = sizeof(mask->key); in fl_mask_update_range() 172 static void *fl_key_get_start(struct fl_flow_key *key, in fl_key_get_start() argument 175 return (u8 *) key + mask->range.start; in fl_key_get_start() 178 static void fl_set_masked_key(struct fl_flow_key *mkey, struct fl_flow_key *key, in fl_set_masked_key() argument 181 const long *lkey = fl_key_get_start(key, mask); in fl_set_masked_key() 182 const long *lmask = fl_key_get_start(&mask->key, mask); in fl_set_masked_key() [all …]
|
/openbmc/linux/lib/crypto/ |
H A D | poly1305-donna32.c | 13 void poly1305_core_setkey(struct poly1305_core_key *key, in poly1305_core_setkey() argument 17 key->key.r[0] = (get_unaligned_le32(&raw_key[0])) & 0x3ffffff; in poly1305_core_setkey() 18 key->key.r[1] = (get_unaligned_le32(&raw_key[3]) >> 2) & 0x3ffff03; in poly1305_core_setkey() 19 key->key.r[2] = (get_unaligned_le32(&raw_key[6]) >> 4) & 0x3ffc0ff; in poly1305_core_setkey() 20 key->key.r[3] = (get_unaligned_le32(&raw_key[9]) >> 6) & 0x3f03fff; in poly1305_core_setkey() 21 key->key.r[4] = (get_unaligned_le32(&raw_key[12]) >> 8) & 0x00fffff; in poly1305_core_setkey() 24 key->precomputed_s.r[0] = key->key.r[1] * 5; in poly1305_core_setkey() 25 key->precomputed_s.r[1] = key->key.r[2] * 5; in poly1305_core_setkey() 26 key->precomputed_s.r[2] = key->key.r[3] * 5; in poly1305_core_setkey() 27 key->precomputed_s.r[3] = key->key.r[4] * 5; in poly1305_core_setkey() [all …]
|
/openbmc/linux/fs/btrfs/tests/ |
H A D | extent-buffer-tests.c | 25 struct btrfs_key key; in test_btrfs_split_item() local 60 key.objectid = 0; in test_btrfs_split_item() 61 key.type = BTRFS_EXTENT_CSUM_KEY; in test_btrfs_split_item() 62 key.offset = 0; in test_btrfs_split_item() 68 btrfs_setup_item_for_insert(NULL, root, path, &key, value_len); in test_btrfs_split_item() 72 key.offset = 3; in test_btrfs_split_item() 79 ret = btrfs_split_item(NULL, root, path, &key, 17); in test_btrfs_split_item() 89 btrfs_item_key_to_cpu(eb, &key, 0); in test_btrfs_split_item() 90 if (key.objectid != 0 || key.type != BTRFS_EXTENT_CSUM_KEY || in test_btrfs_split_item() 91 key.offset != 0) { in test_btrfs_split_item() [all …]
|
/openbmc/qemu/util/ |
H A D | keyval.c | 113 static int key_to_index(const char *key, const char **end) in key_to_index() argument 118 if (*key < '0' || *key > '9') { in key_to_index() 121 ret = qemu_strtoul(key, end, 10, &index); in key_to_index() 147 const char *key, const char *key_cursor, in keyval_parse_put() argument 156 (int)(key_cursor - key), key); in keyval_parse_put() 188 const char *key, *key_end, *val_end, *s, *end; in keyval_parse_one() local 196 key = params; in keyval_parse_one() 199 if (len && key[len] != '=') { in keyval_parse_one() 200 if (starts_with_help_option(key) == len) { in keyval_parse_one() 202 s = key + len; in keyval_parse_one() [all …]
|
/openbmc/qemu/include/qapi/qmp/ |
H A D | qdict.h | 22 char *key; member 42 void qdict_put_obj(QDict *qdict, const char *key, QObject *value); 43 void qdict_del(QDict *qdict, const char *key); 44 int qdict_haskey(const QDict *qdict, const char *key); 45 QObject *qdict_get(const QDict *qdict, const char *key); 50 #define qdict_put(qdict, key, obj) \ argument 51 qdict_put_obj(qdict, key, QOBJECT(obj)) 53 void qdict_put_bool(QDict *qdict, const char *key, bool value); 54 void qdict_put_int(QDict *qdict, const char *key, int64_t value); 55 void qdict_put_null(QDict *qdict, const char *key); [all …]
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | public_key.c | 30 static void public_key_describe(const struct key *asymmetric_key, in public_key_describe() 33 struct public_key *key = asymmetric_key->payload.data[asym_crypto]; in public_key_describe() local 35 if (key) in public_key_describe() 36 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); in public_key_describe() 42 void public_key_free(struct public_key *key) in public_key_free() argument 44 if (key) { in public_key_free() 45 kfree_sensitive(key->key); in public_key_free() 46 kfree(key->params); in public_key_free() 47 kfree(key); in public_key_free() 161 struct public_key *pkey = params->key->payload.data[asym_crypto]; in software_key_query() [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | check-qdict.c | 73 const char *key = "test"; in qdict_get_test() local 76 qdict_put_int(tests_dict, key, value); in qdict_get_test() 78 obj = qdict_get(tests_dict, key); in qdict_get_test() 91 const char *key = "int"; in qdict_get_int_test() local 94 qdict_put_int(tests_dict, key, value); in qdict_get_int_test() 96 ret = qdict_get_int(tests_dict, key); in qdict_get_int_test() 106 const char *key = "int"; in qdict_get_try_int_test() local 109 qdict_put_int(tests_dict, key, value); in qdict_get_try_int_test() 112 ret = qdict_get_try_int(tests_dict, key, 0); in qdict_get_try_int_test() 127 const char *key = "key"; in qdict_get_str_test() local [all …]
|
/openbmc/linux/security/keys/ |
H A D | request_key_auth.c | 20 static int request_key_auth_instantiate(struct key *, 22 static void request_key_auth_describe(const struct key *, struct seq_file *); 23 static void request_key_auth_revoke(struct key *); 24 static void request_key_auth_destroy(struct key *); 25 static long request_key_auth_read(const struct key *, char *, size_t); 54 static int request_key_auth_instantiate(struct key *key, in request_key_auth_instantiate() argument 57 rcu_assign_keypointer(key, (struct request_key_auth *)prep->data); in request_key_auth_instantiate() 64 static void request_key_auth_describe(const struct key *key, in request_key_auth_describe() argument 67 struct request_key_auth *rka = dereference_key_rcu(key); in request_key_auth_describe() 73 seq_puts(m, key->description); in request_key_auth_describe() [all …]
|
/openbmc/linux/fs/btrfs/ |
H A D | free-space-tree.c | 27 struct btrfs_key key = { in btrfs_free_space_root() local 34 key.offset = block_group->global_root_id; in btrfs_free_space_root() 35 return btrfs_global_root(block_group->fs_info, &key); in btrfs_free_space_root() 75 struct btrfs_key key; in add_new_free_space_info() local 79 key.objectid = block_group->start; in add_new_free_space_info() 80 key.type = BTRFS_FREE_SPACE_INFO_KEY; in add_new_free_space_info() 81 key.offset = block_group->length; in add_new_free_space_info() 83 ret = btrfs_insert_empty_item(trans, root, path, &key, sizeof(*info)); in add_new_free_space_info() 108 struct btrfs_key key; in search_free_space_info() local 111 key.objectid = block_group->start; in search_free_space_info() [all …]
|
/openbmc/linux/crypto/ |
H A D | nhpoly1305.c | 42 static void nh_generic(const u32 *key, const u8 *message, size_t message_len, in nh_generic() argument 56 sums[0] += (u64)(u32)(m0 + key[ 0]) * (u32)(m2 + key[ 2]); in nh_generic() 57 sums[1] += (u64)(u32)(m0 + key[ 4]) * (u32)(m2 + key[ 6]); in nh_generic() 58 sums[2] += (u64)(u32)(m0 + key[ 8]) * (u32)(m2 + key[10]); in nh_generic() 59 sums[3] += (u64)(u32)(m0 + key[12]) * (u32)(m2 + key[14]); in nh_generic() 60 sums[0] += (u64)(u32)(m1 + key[ 1]) * (u32)(m3 + key[ 3]); in nh_generic() 61 sums[1] += (u64)(u32)(m1 + key[ 5]) * (u32)(m3 + key[ 7]); in nh_generic() 62 sums[2] += (u64)(u32)(m1 + key[ 9]) * (u32)(m3 + key[11]); in nh_generic() 63 sums[3] += (u64)(u32)(m1 + key[13]) * (u32)(m3 + key[15]); in nh_generic() 64 key += NH_MESSAGE_UNIT / sizeof(key[0]); in nh_generic() [all …]
|
/openbmc/openbmc/poky/meta/recipes-devtools/apt/apt/ |
H A D | triehash | 246 my ($self, $key) = @_; 247 my $length = length $key; 250 return (substr($key, 0, $split), substr($key, $split)); 256 my ($self, $key, $label, $value) = @_; 258 if (length($key) == 0) { 264 my ($child, $tail) = $self->split_key($key); 282 foreach my $key (sort keys %{$self->{children}}) { 283 if ($togo > length($key) || defined $self->{children}{$key}->{value}) { 284 my $child = $self->{children}{$key}->filter_depth($togo - length($key)); 286 $new->{children}{$key}= $child if defined $child; [all …]
|
/openbmc/u-boot/test/env/ |
H A D | hashtable.c | 23 char key[20]; in htab_fill() local 26 sprintf(key, "%d", (int)i); in htab_fill() 28 item.data = key; in htab_fill() 30 item.key = key; in htab_fill() 43 char key[20]; in htab_check_fill() local 46 sprintf(key, "%d", (int)i); in htab_check_fill() 49 item.data = key; in htab_check_fill() 50 item.key = key; in htab_check_fill() 53 ut_asserteq_str(key, ritem->key); in htab_check_fill() 54 ut_asserteq_str(key, ritem->data); in htab_check_fill() [all …]
|
/openbmc/linux/drivers/nvme/common/ |
H A D | auth.c | 156 struct nvme_dhchap_key *key; in nvme_auth_extract_key() local 166 key = kzalloc(sizeof(*key), GFP_KERNEL); in nvme_auth_extract_key() 167 if (!key) in nvme_auth_extract_key() 169 key->key = kzalloc(allocated_len, GFP_KERNEL); in nvme_auth_extract_key() 170 if (!key->key) { in nvme_auth_extract_key() 175 key_len = base64_decode(secret, allocated_len, key->key); in nvme_auth_extract_key() 204 crc = ~crc32(~0, key->key, key_len); in nvme_auth_extract_key() 206 if (get_unaligned_le32(key->key + key_len) != crc) { in nvme_auth_extract_key() 208 get_unaligned_le32(key->key + key_len), crc); in nvme_auth_extract_key() 212 key->len = key_len; in nvme_auth_extract_key() [all …]
|
/openbmc/qemu/scsi/ |
H A D | utils.c | 106 sense.key = in_buf[2]; in scsi_parse_sense_buf() 113 sense.key = in_buf[1]; in scsi_parse_sense_buf() 129 buf[2] = sense.key; in scsi_build_sense_buf() 136 buf[1] = sense.key; in scsi_build_sense_buf() 157 .key = NO_SENSE , .asc = 0x00 , .ascq = 0x00 162 .key = NOT_READY, .asc = 0x04, .ascq = 0x03 167 .key = NOT_READY, .asc = 0x3a, .ascq = 0x00 172 .key = NOT_READY, .asc = 0x53, .ascq = 0x02 177 .key = HARDWARE_ERROR, .asc = 0x44, .ascq = 0x00 182 .key = ILLEGAL_REQUEST, .asc = 0x20, .ascq = 0x00 [all …]
|