/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum2_mr_tcam.c | 143 struct mlxsw_sp_mr_route_key *key) in mlxsw_sp2_mr_tcam_rule_parse4() argument 146 key->vrid, GENMASK(11, 0)); in mlxsw_sp2_mr_tcam_rule_parse4() 148 (char *) &key->source.addr4, in mlxsw_sp2_mr_tcam_rule_parse4() 149 (char *) &key->source_mask.addr4, 4); in mlxsw_sp2_mr_tcam_rule_parse4() 151 (char *) &key->group.addr4, in mlxsw_sp2_mr_tcam_rule_parse4() 152 (char *) &key->group_mask.addr4, 4); in mlxsw_sp2_mr_tcam_rule_parse4() 157 struct mlxsw_sp_mr_route_key *key) in mlxsw_sp2_mr_tcam_rule_parse6() argument 160 key->vrid, GENMASK(3, 0)); in mlxsw_sp2_mr_tcam_rule_parse6() 162 key->vrid >> 4, GENMASK(3, 0)); in mlxsw_sp2_mr_tcam_rule_parse6() 165 key->vrid >> 8, GENMASK(3, 0)); in mlxsw_sp2_mr_tcam_rule_parse6() [all …]
|
/openbmc/qemu/net/ |
H A D | colo.c | 22 const ConnectionKey *key = opaque; in connection_key_hash() local 26 a = b = c = JHASH_INITVAL + sizeof(*key); in connection_key_hash() 27 a += key->src.s_addr; in connection_key_hash() 28 b += key->dst.s_addr; in connection_key_hash() 29 c += (key->src_port | key->dst_port << 16); in connection_key_hash() 32 a += key->ip_proto; in connection_key_hash() 100 void extract_ip_and_port(uint32_t tmp_ports, ConnectionKey *key, in extract_ip_and_port() argument 104 key->src = pkt->ip->ip_dst; in extract_ip_and_port() 105 key->dst = pkt->ip->ip_src; in extract_ip_and_port() 106 key->src_port = ntohs(tmp_ports & 0xffff); in extract_ip_and_port() [all …]
|
/openbmc/linux/samples/bpf/ |
H A D | cpustat_kern.c | 56 __type(key, u32); 64 __type(key, u32); 72 __type(key, u32); 107 u32 key, cpu, pstate_idx; in bpf_prog1() local 115 key = cpu * MAP_OFF_NUM + MAP_OFF_CSTATE_TIME; in bpf_prog1() 116 cts = bpf_map_lookup_elem(&my_map, &key); in bpf_prog1() 120 key = cpu * MAP_OFF_NUM + MAP_OFF_CSTATE_IDX; in bpf_prog1() 121 cstate = bpf_map_lookup_elem(&my_map, &key); in bpf_prog1() 125 key = cpu * MAP_OFF_NUM + MAP_OFF_PSTATE_TIME; in bpf_prog1() 126 pts = bpf_map_lookup_elem(&my_map, &key); in bpf_prog1() [all …]
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | asymmetric_type.c | 51 struct key *find_asymmetric_key(struct key *keyring, in find_asymmetric_key() 57 struct key *key; in find_asymmetric_key() local 116 key = key_ref_to_ptr(ref); in find_asymmetric_key() 118 const struct asymmetric_key_ids *kids = asymmetric_key_ids(key); in find_asymmetric_key() 130 pr_devel("<==%s() = 0 [%x]\n", __func__, key_serial(key)); in find_asymmetric_key() 131 return key; in find_asymmetric_key() 134 key_put(key); in find_asymmetric_key() 262 static bool asymmetric_key_cmp(const struct key *key, in asymmetric_key_cmp() argument 265 const struct asymmetric_key_ids *kids = asymmetric_key_ids(key); in asymmetric_key_cmp() 275 static bool asymmetric_key_cmp_partial(const struct key *key, in asymmetric_key_cmp_partial() argument [all …]
|
H A D | pkcs7_trust.c | 24 struct key *trust_keyring) in pkcs7_validate_trust_one() 28 struct key *key; in pkcs7_validate_trust_one() local 50 key = find_asymmetric_key(trust_keyring, in pkcs7_validate_trust_one() 52 if (!IS_ERR(key)) { in pkcs7_validate_trust_one() 59 sinfo->index, x509->index, key_serial(key)); in pkcs7_validate_trust_one() 62 if (key == ERR_PTR(-ENOMEM)) in pkcs7_validate_trust_one() 82 key = find_asymmetric_key(trust_keyring, in pkcs7_validate_trust_one() 86 if (!IS_ERR(key)) { in pkcs7_validate_trust_one() 89 sinfo->index, x509->index, key_serial(key)); in pkcs7_validate_trust_one() 92 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() [all …]
|
/openbmc/linux/include/linux/ |
H A D | btree-type.h | 38 static inline void *BTREE_FN(lookup)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE key) in BTREE_FN() 40 unsigned long _key = key; in BTREE_FN() 44 static inline int BTREE_FN(insert)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE key, in BTREE_FN() 47 unsigned long _key = key; in BTREE_FN() 51 static inline int BTREE_FN(update)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE key, in BTREE_FN() 54 unsigned long _key = key; in BTREE_FN() 58 static inline void *BTREE_FN(remove)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE key) in BTREE_FN() 60 unsigned long _key = key; in BTREE_FN() 64 static inline void *BTREE_FN(last)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE *key) in BTREE_FN() 69 *key = _key; in BTREE_FN() [all …]
|
/openbmc/linux/include/crypto/ |
H A D | public_key.h | 23 void *key; member 37 extern void public_key_free(struct public_key *key); 57 struct key; 61 extern int restrict_link_by_signature(struct key *dest_keyring, 64 struct key *trust_keyring); 66 extern int restrict_link_by_key_or_keyring(struct key *dest_keyring, 69 struct key *trusted); 71 extern int restrict_link_by_key_or_keyring_chain(struct key *trust_keyring, 74 struct key *trusted); 77 extern int restrict_link_by_ca(struct key *dest_keyring, [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-cipher.c | 32 const char *key; member 48 .key = "2b7e151628aed2a6abf7158809cf4f3c", 65 .key = "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b", 82 .key = 101 .key = "2b7e151628aed2a6abf7158809cf4f3c", 119 .key = "8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b", 137 .key = 161 .key = "80c4a2e691d5b3f7", 170 .key = "80c4a2e691d5b3f7", 179 .key = "80c4a2e691d5b3f7", [all …]
|
H A D | test-crypto-pbkdf.c | 36 const char *key; member 57 .key = "password", 71 .key = "password", 85 .key = "password", 99 .key = "password", 113 .key = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" 128 .key = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" 143 .key = "\360\235\204\236", /* g-clef ("\xf09d849e) */ 159 .key = "password", 171 .key = "password", [all …]
|
/openbmc/linux/security/keys/ |
H A D | user_defined.c | 101 int user_update(struct key *key, struct key_preparsed_payload *prep) in user_update() argument 107 ret = key_payload_reserve(key, prep->datalen); in user_update() 112 key->expiry = prep->expiry; in user_update() 113 if (key_is_positive(key)) in user_update() 114 zap = dereference_key_locked(key); in user_update() 115 rcu_assign_keypointer(key, prep->payload.data[0]); in user_update() 128 void user_revoke(struct key *key) in user_revoke() argument 130 struct user_key_payload *upayload = user_key_payload_locked(key); in user_revoke() 133 key_payload_reserve(key, 0); in user_revoke() 136 rcu_assign_keypointer(key, NULL); in user_revoke() [all …]
|
H A D | permission.c | 29 struct key *key; in key_task_permission() local 51 key = key_ref_to_ptr(key_ref); in key_task_permission() 54 if (uid_eq(key->uid, cred->fsuid)) { in key_task_permission() 55 kperm = key->perm >> 16; in key_task_permission() 61 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { in key_task_permission() 62 if (gid_eq(key->gid, cred->fsgid)) { in key_task_permission() 63 kperm = key->perm >> 8; in key_task_permission() 67 ret = groups_search(cred->group_info, key->gid); in key_task_permission() 69 kperm = key->perm >> 8; in key_task_permission() 75 kperm = key->perm; in key_task_permission() [all …]
|
H A D | keyctl.c | 173 struct key *key; in SYSCALL_DEFINE4() local 222 key = request_key_and_link(ktype, description, NULL, callout_info, in SYSCALL_DEFINE4() 225 if (IS_ERR(key)) { in SYSCALL_DEFINE4() 226 ret = PTR_ERR(key); in SYSCALL_DEFINE4() 231 ret = wait_for_key_construction(key, 1); in SYSCALL_DEFINE4() 235 ret = key->serial; in SYSCALL_DEFINE4() 238 key_put(key); in SYSCALL_DEFINE4() 382 struct key *key; in keyctl_revoke_key() local 397 key = key_ref_to_ptr(key_ref); in keyctl_revoke_key() 399 if (test_bit(KEY_FLAG_KEEP, &key->flags)) in keyctl_revoke_key() [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | cg_storage_multi.c | 22 static bool assert_storage(struct bpf_map *map, const void *key, in assert_storage() argument 30 if (CHECK(bpf_map_lookup_elem(map_fd, key, &value) < 0, in assert_storage() 40 static bool assert_storage_noexist(struct bpf_map *map, const void *key) in assert_storage_noexist() argument 47 if (CHECK(bpf_map_lookup_elem(map_fd, key, &value) == 0, in assert_storage_noexist() 92 struct bpf_cgroup_storage_key key; in test_egress_only() local 96 key.attach_type = BPF_CGROUP_INET_EGRESS; in test_egress_only() 117 key.cgroup_inode_id = get_cgroup_id(PARENT_CGROUP); in test_egress_only() 120 &key, &expected_cgroup_value)) in test_egress_only() 122 key.cgroup_inode_id = get_cgroup_id(CHILD_CGROUP); in test_egress_only() 123 if (assert_storage_noexist(obj->maps.cgroup_storage, &key)) in test_egress_only() [all …]
|
/openbmc/linux/drivers/crypto/intel/qat/qat_4xxx/ |
H A D | adf_drv.c | 65 char key[ADF_CFG_MAX_KEY_LEN_IN_BYTES]; in adf_crypto_dev_config() local 81 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_BANK_NUM, i); in adf_crypto_dev_config() 83 key, &bank, ADF_DEC); in adf_crypto_dev_config() 88 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_BANK_NUM, i); in adf_crypto_dev_config() 90 key, &bank, ADF_DEC); in adf_crypto_dev_config() 94 snprintf(key, sizeof(key), ADF_CY "%d" ADF_ETRMGR_CORE_AFFINITY, in adf_crypto_dev_config() 97 key, &val, ADF_DEC); in adf_crypto_dev_config() 101 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, i); in adf_crypto_dev_config() 104 key, &val, ADF_DEC); in adf_crypto_dev_config() 109 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, i); in adf_crypto_dev_config() [all …]
|
/openbmc/linux/include/keys/ |
H A D | system_keyring.h | 22 extern int restrict_link_by_builtin_trusted(struct key *keyring, 25 struct key *restriction_key); 26 int restrict_link_by_digsig_builtin(struct key *dest_keyring, 29 struct key *restriction_key); 30 extern __init int load_module_cert(struct key *keyring); 36 static inline __init int load_module_cert(struct key *keyring) in load_module_cert() 45 struct key *keyring, 48 struct key *restriction_key); 49 int restrict_link_by_digsig_builtin_and_secondary(struct key *keyring, 52 struct key *restriction_key); [all …]
|
/openbmc/linux/Documentation/security/keys/ |
H A D | request-key.rst | 5 The key request service is part of the key retention service (refer to 12 struct key *request_key(const struct key_type *type, 18 struct key *request_key_tag(const struct key_type *type, 25 struct key *request_key_with_auxdata(const struct key_type *type, 34 struct key *request_key_rcu(const struct key_type *type, 46 does not need to link the key to a keyring to prevent it from being immediately 47 destroyed. The kernel interface returns a pointer directly to the key, and 48 it's up to the caller to destroy the key. 56 NULL). This is only useful for those key types that define their own upcall 57 mechanism rather than using /sbin/request-key. [all …]
|
/openbmc/openbmc/poky/meta/lib/oe/ |
H A D | data.py | 10 def typed_value(key, d): argument 13 var_type = d.getVarFlag(key, 'type') 14 flags = d.getVarFlags(key) 22 return oe.maketype.create(d.getVar(key) or '', var_type, **flags) 24 bb.msg.fatal("Data", "%s: %s" % (key, str(exc))) 30 for key in d.keys(): 31 if key.startswith("_"): 33 elif key.startswith("BB"): 35 elif key.startswith("B_pn"): 37 elif key.startswith("do_"): [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 210.out | 10 …"job0", "options": {"driver": "luks", "file": "imgfile", "iter-time": 10, "key-secret": "keysec0",… 15 image: json:{"driver": "IMGFMT", "file": {"driver": "file", "filename": "TEST_IMG"}, "key-secret": … 30 key offset: 4096 34 key offset: 262144 37 key offset: 520192 40 key offset: 778240 43 key offset: 1036288 46 key offset: 1294336 49 key offset: 1552384 52 key offset: 1810432 [all …]
|
/openbmc/linux/drivers/crypto/caam/ |
H A D | caampkc.c | 67 struct caam_rsa_key *key = &ctx->key; in rsa_pub_unmap() local 70 dma_unmap_single(dev, pdb->n_dma, key->n_sz, DMA_TO_DEVICE); in rsa_pub_unmap() 71 dma_unmap_single(dev, pdb->e_dma, key->e_sz, DMA_TO_DEVICE); in rsa_pub_unmap() 79 struct caam_rsa_key *key = &ctx->key; in rsa_priv_f1_unmap() local 82 dma_unmap_single(dev, pdb->n_dma, key->n_sz, DMA_TO_DEVICE); in rsa_priv_f1_unmap() 83 dma_unmap_single(dev, pdb->d_dma, key->d_sz, DMA_TO_DEVICE); in rsa_priv_f1_unmap() 91 struct caam_rsa_key *key = &ctx->key; in rsa_priv_f2_unmap() local 93 size_t p_sz = key->p_sz; in rsa_priv_f2_unmap() 94 size_t q_sz = key->q_sz; in rsa_priv_f2_unmap() 96 dma_unmap_single(dev, pdb->d_dma, key->d_sz, DMA_TO_DEVICE); in rsa_priv_f2_unmap() [all …]
|
/openbmc/linux/fs/btrfs/ |
H A D | tree-checker.c | 85 struct btrfs_key key; in file_extent_err() local 89 btrfs_item_key_to_cpu(eb, &key, slot); in file_extent_err() 99 key.objectid, key.offset, &vaf); in file_extent_err() 119 struct btrfs_key *key, in file_extent_end() argument 127 end = ALIGN(key->offset + len, leaf->fs_info->sectorsize); in file_extent_end() 130 end = key->offset + len; in file_extent_end() 145 struct btrfs_key key; in dir_item_err() local 149 btrfs_item_key_to_cpu(eb, &key, slot); in dir_item_err() 159 key.objectid, &vaf); in dir_item_err() 173 struct btrfs_key *key, int slot, in check_prev_ino() argument [all …]
|
/openbmc/linux/net/openvswitch/ |
H A D | actions.c | 73 struct sw_flow_key key[OVS_DEFERRED_ACTION_THRESHOLD]; member 87 struct sw_flow_key *key = NULL; in clone_key() local 90 key = &keys->key[level - 1]; in clone_key() 91 *key = *key_; in clone_key() 94 return key; in clone_key() 126 const struct sw_flow_key *key, in add_deferred_actions() argument 139 da->pkt_key = *key; in add_deferred_actions() 145 static void invalidate_flow_key(struct sw_flow_key *key) in invalidate_flow_key() argument 147 key->mac_proto |= SW_FLOW_KEY_INVALID; in invalidate_flow_key() 150 static bool is_flow_key_valid(const struct sw_flow_key *key) in is_flow_key_valid() argument [all …]
|
/openbmc/pldm/requester/ |
H A D | handler.hpp | 60 std::size_t operator()(const RequestKey& key) const in operator ()() 62 return (key.eid << 24 | key.instanceId << 16 | key.type << 8 | in operator ()() 63 key.command); in operator ()() 87 RequestKey key; //!< Responder MCTP endpoint ID member 154 void instanceIdExpiryCallBack(RequestKey key) in instanceIdExpiryCallBack() argument 156 auto eid = key.eid; in instanceIdExpiryCallBack() 157 if (this->handlers.contains(key)) in instanceIdExpiryCallBack() 161 "EID", key.eid, "INSTANCEID", key.instanceId); in instanceIdExpiryCallBack() 163 timerInstance] = this->handlers[key]; in instanceIdExpiryCallBack() 176 key, in instanceIdExpiryCallBack() [all …]
|
/openbmc/linux/fs/nfs/ |
H A D | dns_resolve.c | 75 struct nfs_dns_ent *key; in nfs_dns_ent_update() local 78 key = container_of(ckey, struct nfs_dns_ent, h); in nfs_dns_ent_update() 80 memcpy(&new->addr, &key->addr, key->addrlen); in nfs_dns_ent_update() 81 new->addrlen = key->addrlen; in nfs_dns_ent_update() 88 struct nfs_dns_ent *key; in nfs_dns_ent_init() local 91 key = container_of(ckey, struct nfs_dns_ent, h); in nfs_dns_ent_init() 94 new->hostname = kmemdup_nul(key->hostname, key->namelen, GFP_KERNEL); in nfs_dns_ent_init() 96 new->namelen = key->namelen; in nfs_dns_ent_init() 134 static unsigned int nfs_dns_hash(const struct nfs_dns_ent *key) in nfs_dns_hash() argument 136 return hash_str(key->hostname, NFS_DNS_HASHBITS); in nfs_dns_hash() [all …]
|
/openbmc/linux/kernel/sched/ |
H A D | wait_bit.c | 23 struct wait_bit_key *key = arg; in wake_bit_function() local 26 if (wait_bit->key.flags != key->flags || in wake_bit_function() 27 wait_bit->key.bit_nr != key->bit_nr || in wake_bit_function() 28 test_bit(key->bit_nr, key->flags)) in wake_bit_function() 31 return autoremove_wake_function(wq_entry, mode, sync, key); in wake_bit_function() 48 if (test_bit(wbq_entry->key.bit_nr, wbq_entry->key.flags)) in __wait_on_bit() 49 ret = (*action)(&wbq_entry->key, mode); in __wait_on_bit() 50 } while (test_bit_acquire(wbq_entry->key.bit_nr, wbq_entry->key.flags) && !ret); in __wait_on_bit() 75 wq_entry.key.timeout = jiffies + timeout; in out_of_line_wait_on_bit_timeout() 89 if (test_bit(wbq_entry->key.bit_nr, wbq_entry->key.flags)) { in __wait_on_bit_lock() [all …]
|
/openbmc/linux/net/rxrpc/ |
H A D | server_key.c | 29 static void rxrpc_destroy_s(struct key *); 30 static void rxrpc_describe_s(const struct key *, struct seq_file *); 101 static void rxrpc_destroy_s(struct key *key) in rxrpc_destroy_s() argument 103 const struct rxrpc_security *sec = key->payload.data[1]; in rxrpc_destroy_s() 106 sec->destroy_server_key(key); in rxrpc_destroy_s() 109 static void rxrpc_describe_s(const struct key *key, struct seq_file *m) in rxrpc_describe_s() argument 111 const struct rxrpc_security *sec = key->payload.data[1]; in rxrpc_describe_s() 113 seq_puts(m, key->description); in rxrpc_describe_s() 115 sec->describe_server_key(key, m); in rxrpc_describe_s() 123 struct key *key; in rxrpc_server_keyring() local [all …]
|