/openbmc/qemu/docs/system/devices/ |
H A D | usb-u2f.rst | 9 protocol. In case of a USB U2F security key, it is a USB HID device 12 QEMU supports both pass-through of a host U2F key device to a VM, 13 and software emulation of a U2F key. 19 U2F key on your host to a guest VM. All requests made from the guest 20 are passed through to the physical security key connected to the 24 U2F security key with several guest VMs, which is not possible with a 27 You can specify the host U2F key to use with the ``hidraw`` 45 for the U2F key emulation. libu2f-emu 52 * ec private key 77 * ``private-key.pem``: ec private key
|
/openbmc/linux/fs/xfs/ |
H A D | xfs_mru_cache.c | 239 radix_tree_delete(&mru->store, elem->key); in _xfs_mru_cache_clear_reap_list() 421 unsigned long key, in xfs_mru_cache_insert() argument 434 elem->key = key; in xfs_mru_cache_insert() 437 error = radix_tree_insert(&mru->store, key, elem); in xfs_mru_cache_insert() 455 unsigned long key) in xfs_mru_cache_remove() argument 464 elem = radix_tree_delete(&mru->store, key); in xfs_mru_cache_remove() 479 unsigned long key) in xfs_mru_cache_delete() argument 483 elem = xfs_mru_cache_remove(mru, key); in xfs_mru_cache_delete() 511 unsigned long key) in xfs_mru_cache_lookup() argument 520 elem = radix_tree_lookup(&mru->store, key); in xfs_mru_cache_lookup()
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 294.out | 5 == test that key 0 opens the image == 17 == test that key 0 doesn't open the image == 24 == test that key 0 still doesn't open the image (key material is erased) == 27 == test that key 1 still works ==
|
/openbmc/qemu/net/ |
H A D | colo.h | 93 void extract_ip_and_port(uint32_t tmp_ports, ConnectionKey *key, 95 void fill_connection_key(Packet *pkt, ConnectionKey *key, bool reverse); 96 Connection *connection_new(ConnectionKey *key); 99 ConnectionKey *key, 102 ConnectionKey *key);
|
/openbmc/openbmc/poky/meta/recipes-connectivity/bind/bind/ |
H A D | make-etc-initd-bind-stop-work.patch | 23 +include "/etc/bind/rndc.key" ; 26 + keys { rndc-key; }; 34 +include "/etc/bind/rndc.key"; 37 + default-key rndc-key;
|
/openbmc/phosphor-debug-collector/ |
H A D | dump_types.mako.hpp | 34 % for key, values in item.items(): 41 % for key in ERROR_TYPE_DICT: 42 % if key.upper() not in enum_values: 43 ${key.upper()}, 44 <% enum_values.add(key.upper()) %>
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_subprogs.c | 10 __type(key, __u32); 16 int key = 0; in sub1() local 18 bpf_map_lookup_elem(&array, &key); in sub1() 36 int key = 0; in sub4() local 38 bpf_map_lookup_elem(&array, &key); in sub4()
|
H A D | cb_refs.c | 13 __type(key, int); 18 static __noinline int cb1(void *map, void *key, void *value, void *ctx) in cb1() argument 40 static __always_inline int cb2(void *map, void *key, void *value, void *ctx) in cb2() argument 67 static __always_inline int cb(void *map, void *key, void *value, void *ctx) in cb() argument 72 static __always_inline int cb3(void *map, void *key, void *value, void *ctx) in cb3() argument
|
H A D | test_subskeleton_lib.c | 32 __type(key, __u32); 39 __type(key, __u32); 46 __u32 key = 1, value = 2; in lib_routine() local 49 bpf_map_update_elem(&map2, &key, &value, BPF_ANY); in lib_routine()
|
/openbmc/linux/include/linux/ |
H A D | pr.h | 14 u64 key; member 22 int (*pr_reserve)(struct block_device *bdev, u64 key, 24 int (*pr_release)(struct block_device *bdev, u64 key, 28 int (*pr_clear)(struct block_device *bdev, u64 key);
|
H A D | rbtree_latch.h | 66 int (*comp)(void *key, struct latch_tree_node *b); 106 __lt_find(void *key, struct latch_tree_root *ltr, int idx, in __lt_find() argument 107 int (*comp)(void *key, struct latch_tree_node *node)) in __lt_find() argument 115 c = comp(key, ltn); in __lt_find() 200 latch_tree_find(void *key, struct latch_tree_root *root, in latch_tree_find() argument 208 node = __lt_find(key, root, seq & 1, ops->comp); in latch_tree_find()
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlx4/ |
H A D | mr.c | 271 static u32 key_to_hw_index(u32 key) in key_to_hw_index() argument 273 return (key << 24) | (key >> 8); in key_to_hw_index() 297 int key = key_to_hw_index(mmr->key) & (dev->caps.num_mpts - 1); in mlx4_mr_hw_get_mpt() local 303 err = mlx4_HW2SW_MPT(dev, NULL, key); in mlx4_mr_hw_get_mpt() 315 key, NULL); in mlx4_mr_hw_get_mpt() 360 int key = key_to_hw_index(mmr->key) & (dev->caps.num_mpts - 1); in mlx4_mr_hw_write_mpt() local 552 key_to_hw_index(mr->key) & in mlx4_mr_free_reserved() 647 mpt_entry->key = cpu_to_be32(key_to_hw_index(mr->key)); in mlx4_mr_enable() 858 mpt_entry->key = cpu_to_be32(key_to_hw_index(mw->key)); in mlx4_mw_enable() 867 key_to_hw_index(mw->key) & in mlx4_mw_enable() [all …]
|
/openbmc/linux/drivers/firmware/arm_scmi/ |
H A D | notify.c | 136 #define KEY_XTRACT_PROTO_ID(key) FIELD_GET(PROTO_ID_MASK, (key)) argument 137 #define KEY_XTRACT_EVT_ID(key) FIELD_GET(EVT_ID_MASK, (key)) argument 138 #define KEY_XTRACT_SRC_ID(key) FIELD_GET(SRC_ID_MASK, (key)) argument 360 u32 key; member 466 u32 src_id, key; in scmi_process_event_payload() local 1004 hndl->key); in scmi_register_event_handler() 1010 hndl->key); in scmi_register_event_handler() 1080 hndl->key); in __scmi_event_handler_get_ops() 1587 hndl->key); in scmi_protocols_late_init() 1592 hndl->key); in scmi_protocols_late_init() [all …]
|
/openbmc/linux/lib/ |
H A D | test_rhashtable.c | 89 const struct test_obj_val *val = arg->key; in my_cmpfn() 145 struct test_obj_val key = { in test_rht_lookup() local 159 key.id); in test_rht_lookup() 246 struct test_obj_val key = { in test_rhashtable() local 313 struct test_obj_val key = { in test_rhltable() local 523 const char *key; in test_insert_dup() local 593 struct test_obj_val key = { in thread_lookup_test() local 600 pr_err(" found unexpected object %d-%d\n", key.tid, key.id); in thread_lookup_test() 603 pr_err(" object %d-%d not found!\n", key.tid, key.id); in thread_lookup_test() 605 } else if (obj && memcmp(&obj->value, &key, sizeof(key))) { in thread_lookup_test() [all …]
|
/openbmc/qemu/crypto/ |
H A D | akcipher-nettle.c.inc | 55 const uint8_t *key, size_t keylen, 85 const uint8_t *key, 90 QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE, key, keylen, errp); 108 error_setg(errp, "Failed to check RSA key"); 122 error_setg(errp, "Failed to check RSA key"); 135 const uint8_t *key, 140 QCRYPTO_AKCIPHER_KEY_TYPE_PUBLIC, key, keylen, errp); 149 error_setg(errp, "Failed to check RSA key"); 181 "key size: %zu", enc_len, rsa->pub.size); 388 const uint8_t *key, size_t keylen, [all …]
|
/openbmc/linux/arch/x86/crypto/ |
H A D | camellia_glue.c | 987 kl = get_unaligned_be64(key); in camellia_setup128() 988 kr = get_unaligned_be64(key + 8); in camellia_setup128() 1095 kl = get_unaligned_be64(key); in camellia_setup256() 1096 kr = get_unaligned_be64(key + 8); in camellia_setup256() 1097 krl = get_unaligned_be64(key + 16); in camellia_setup256() 1098 krr = get_unaligned_be64(key + 24); in camellia_setup256() 1223 memcpy(kk, key, 24); in camellia_setup192() 1224 memcpy((unsigned char *)&krl, key+16, 8); in camellia_setup192() 1240 camellia_setup128(key, cctx->key_table); in __camellia_setkey() 1243 camellia_setup192(key, cctx->key_table); in __camellia_setkey() [all …]
|
/openbmc/linux/drivers/scsi/ |
H A D | scsi_devinfo.c | 33 int key; /* unique numeric identifier */ member 276 if (devinfo_table->key == key) { in scsi_devinfo_lookup_by_key() 353 enum scsi_devinfo_key key) in scsi_dev_info_list_add_keyed() argument 357 scsi_devinfo_lookup_by_key(key); in scsi_dev_info_list_add_keyed() 420 scsi_devinfo_lookup_by_key(key); in scsi_dev_info_list_find() 500 enum scsi_devinfo_key key) in scsi_dev_info_list_del_keyed() argument 603 enum scsi_devinfo_key key) in scsi_get_device_flags_keyed() argument 612 if (key != SCSI_DEVINFO_GLOBAL) in scsi_get_device_flags_keyed() 787 scsi_devinfo_lookup_by_key(key); in scsi_dev_info_add_list() 801 devinfo_table->key = key; in scsi_dev_info_add_list() [all …]
|
/openbmc/linux/arch/arm64/crypto/ |
H A D | aes-neonbs-glue.c | 64 struct aesbs_ctx key; member 69 struct aesbs_ctx key; member 144 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_ctr_setkey() 149 aesbs_convert_key(ctx->key.rk, rk.key_enc, ctx->key.rounds); in aesbs_cbc_ctr_setkey() 171 ctx->enc, ctx->key.rounds, blocks, in cbc_encrypt() 197 ctx->key.rk, ctx->key.rounds, blocks, in cbc_decrypt() 224 aesbs_ctr_encrypt(dst, src, ctx->key.rk, ctx->key.rounds, in ctr_encrypt() 326 ctx->key.rounds, 1); in __xts_crypt() 329 fn(out, in, ctx->key.rk, ctx->key.rounds, blocks, in __xts_crypt() 339 ctx->key.rounds, nbytes, in __xts_crypt() [all …]
|
/openbmc/qemu/hw/usb/ |
H A D | u2f.h | 48 void (*recv_from_guest)(U2FKeyState *key, 50 void (*realize)(U2FKeyState *key, Error **errp); 51 void (*unrealize)(U2FKeyState *key); 73 void u2f_send_to_guest(U2FKeyState *key,
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/iniparser/iniparser/ |
H A D | CVE-2023-33461.patch | 22 @@ -456,7 +456,7 @@ long int iniparser_getlongint(const dictionary * d, const char * key, long int n 25 str = iniparser_getstring(d, key, INI_INVALID_KEY); 31 @@ -511,7 +511,7 @@ double iniparser_getdouble(const dictionary * d, const char * key, double notfou 34 str = iniparser_getstring(d, key, INI_INVALID_KEY); 40 @@ -553,7 +553,7 @@ int iniparser_getboolean(const dictionary * d, const char * key, int notfound) 43 c = iniparser_getstring(d, key, INI_INVALID_KEY);
|
/openbmc/linux/tools/testing/selftests/netfilter/ |
H A D | audit_logread.c | 48 int audit_send(int fd, uint16_t type, uint32_t key, uint32_t val) in audit_send() argument 59 .mask = key, in audit_send() 60 .enabled = key == AUDIT_STATUS_ENABLED ? val : 0, in audit_send() 61 .pid = key == AUDIT_STATUS_PID ? val : 0, in audit_send() 79 int audit_set(int fd, uint32_t key, uint32_t val) in audit_set() argument 84 ret = audit_send(fd, AUDIT_SET, key, val); in audit_set()
|
/openbmc/linux/Documentation/devicetree/bindings/input/ |
H A D | matrix-keymap.yaml | 13 A simple common binding for matrix-connected key boards. Currently targeted at 14 defining the keys in the scope of linux key codes since that is a stable and 18 cases where there is a modifier key such as a Fn key. Proposed names 27 column and linux key-code. The 32-bit big endian cell is packed as: 28 row << 24 | column << 16 | key-code
|
/openbmc/linux/crypto/ |
H A D | cipher.c | 20 static int setkey_unaligned(struct crypto_cipher *tfm, const u8 *key, in setkey_unaligned() argument 35 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 43 const u8 *key, unsigned int keylen) in crypto_cipher_setkey() argument 51 if ((unsigned long)key & alignmask) in crypto_cipher_setkey() 52 return setkey_unaligned(tfm, key, keylen); in crypto_cipher_setkey() 54 return cia->cia_setkey(crypto_cipher_tfm(tfm), key, keylen); in crypto_cipher_setkey()
|
/openbmc/linux/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-cmac.c | 162 rctx->cmd.u.aes.key = &ctx->u.aes.key_sg; in ccp_do_cmac_update() 256 static int ccp_aes_cmac_setkey(struct crypto_ahash *tfm, const u8 *key, in ccp_aes_cmac_setkey() argument 287 ret = aes_expandkey(&aes, key, key_len); in ccp_aes_cmac_setkey() 292 memset(ctx->u.aes.key, 0, sizeof(ctx->u.aes.key)); in ccp_aes_cmac_setkey() 293 aes_encrypt(&aes, ctx->u.aes.key, ctx->u.aes.key); in ccp_aes_cmac_setkey() 297 k0_hi = be64_to_cpu(*((__be64 *)ctx->u.aes.key)); in ccp_aes_cmac_setkey() 298 k0_lo = be64_to_cpu(*((__be64 *)ctx->u.aes.key + 1)); in ccp_aes_cmac_setkey() 302 if (ctx->u.aes.key[0] & 0x80) { in ccp_aes_cmac_setkey() 327 memset(ctx->u.aes.key, 0, sizeof(ctx->u.aes.key)); in ccp_aes_cmac_setkey() 328 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_cmac_setkey() [all …]
|
/openbmc/linux/drivers/net/wireless/ath/carl9170/ |
H A D | mac.c | 474 struct carl9170_set_key_cmd key = { }; in carl9170_upload_key() local 480 key.user = cpu_to_le16(id); in carl9170_upload_key() 481 key.keyId = cpu_to_le16(keyidx); in carl9170_upload_key() 482 key.type = cpu_to_le16(ktype); in carl9170_upload_key() 483 memcpy(&key.macAddr, mac, ETH_ALEN); in carl9170_upload_key() 485 memcpy(&key.key, keydata, keylen); in carl9170_upload_key() 488 sizeof(key), (u8 *)&key, 0, NULL); in carl9170_upload_key() 493 struct carl9170_disable_key_cmd key = { }; in carl9170_disable_key() local 495 key.user = cpu_to_le16(id); in carl9170_disable_key() 498 sizeof(key), (u8 *)&key, 0, NULL); in carl9170_disable_key()
|