/openbmc/linux/drivers/input/keyboard/ |
H A D | ipaq-micro-keys.c | 43 struct ipaq_micro_keys *keys = data; in micro_key_receive() local 50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 51 input_sync(keys->input); in micro_key_receive() 55 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument 57 spin_lock(&keys->micro->lock); in micro_key_start() 58 keys->micro->key = micro_key_receive; in micro_key_start() 59 keys->micro->key_data = keys; in micro_key_start() 60 spin_unlock(&keys->micro->lock); in micro_key_start() 63 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument 65 spin_lock(&keys->micro->lock); in micro_key_stop() [all …]
|
H A D | mtk-pmic-keys.c | 121 struct mtk_pmic_keys *keys; member 133 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member 142 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument 150 kregs_home = keys->keys[MTK_PMIC_HOMEKEY_INDEX].regs; in mtk_pmic_keys_lp_reset_setup() 151 kregs_pwr = keys->keys[MTK_PMIC_PWRKEY_INDEX].regs; in mtk_pmic_keys_lp_reset_setup() 153 error = of_property_read_u32(keys->dev->of_node, "power-off-time-sec", in mtk_pmic_keys_lp_reset_setup() 161 error = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 185 regmap_update_bits(keys->regmap, regs->pmic_rst_reg, mask, value); in mtk_pmic_keys_lp_reset_setup() 193 regmap_read(info->keys->regmap, info->regs->deb_reg, &key_deb); in mtk_pmic_keys_irq_handler_thread() 199 input_report_key(info->keys->input_dev, info->keycode, pressed); in mtk_pmic_keys_irq_handler_thread() [all …]
|
H A D | Makefile | 8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 30 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 31 obj-$(CONFIG_KEYBOARD_IQS62X) += iqs62x-keys.o 40 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 47 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o 67 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | bpf_flow.c | 75 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, in export_flow_keys() argument 78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 81 memcpy(&val, keys, sizeof(val)); in export_flow_keys() 118 struct bpf_flow_keys *keys = skb->flow_keys; in parse_eth_proto() local 137 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 140 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 146 struct bpf_flow_keys *keys = skb->flow_keys; in _dissect() local 148 if (keys->n_proto == bpf_htons(ETH_P_IP)) { in _dissect() 161 return parse_eth_proto(skb, keys->n_proto); in _dissect() 167 struct bpf_flow_keys *keys = skb->flow_keys; in parse_ip_proto() local [all …]
|
/openbmc/linux/arch/arm64/include/asm/ |
H A D | pointer_auth.h | 57 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_init_kernel() argument 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 63 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_switch_kernel() argument 68 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel() 74 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys) in ptrauth_keys_install_user() argument 77 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user() 78 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user() 79 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user() 83 __ptrauth_key_install_nosync(APGA, keys->apga); in ptrauth_keys_install_user() 86 static inline void ptrauth_keys_init_user(struct ptrauth_keys_user *keys) in ptrauth_keys_init_user() argument [all …]
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 49 static void get_keys(int fd, uint32_t *keys) in get_keys() argument 55 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) in get_keys() 62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 67 static void set_keys(int fd, uint32_t *keys) in set_keys() argument 72 if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, in set_keys() 79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 80 keys[6], keys[7]); in set_keys() 83 keys[0], keys[1], keys[2], keys[3]); in set_keys() 96 uint32_t keys[8]; in build_rcv_fd() local [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/map_tests/ |
H A D | htab_map_batch_ops.c | 14 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 29 keys[i] = i + 1; in map_batch_update() 37 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 42 int *keys, void *values, bool is_pcpu) in map_batch_verify() argument 56 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j), in map_batch_verify() 59 i, j, keys[i], bpf_percpu(v[i], j)); in map_batch_verify() 62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 64 "error: i %d key %d value %d\n", i, keys[i], in map_batch_verify() 81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local 98 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch() [all …]
|
H A D | array_map_batch_ops.c | 15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 26 keys[i] = i; in map_batch_update() 36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 40 static void map_batch_verify(int *visited, __u32 max_entries, int *keys, in map_batch_verify() argument 52 CHECK(keys[i] + j + 1 != value, in map_batch_verify() 55 j, keys[i], value); in map_batch_verify() 58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify() 72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local 92 keys = calloc(max_entries, sizeof(*keys)); in __test_map_lookup_and_update_batch() [all …]
|
H A D | lpm_trie_map_batch_ops.c | 23 struct test_lpm_key *keys, int *values) in map_batch_update() argument 34 keys[i].prefix = 32; in map_batch_update() 36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update() 40 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument 53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify() 69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local 86 keys = malloc(max_entries * sizeof(struct test_lpm_key)); in test_lpm_trie_map_batch_ops() 89 CHECK(!keys || !values || !visited, "malloc()", "error:%s\n", in test_lpm_trie_map_batch_ops() 94 map_batch_update(map_fd, max_entries, keys, values); in test_lpm_trie_map_batch_ops() [all …]
|
/openbmc/linux/arch/arm64/kernel/ |
H A D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys() 46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys() 67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument 78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys() [all …]
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_sensor.c | 71 req_data[0] = sensor->cmn.keys.sensor_num; in ipmi_sensor_get_sensor_reading_factors() 76 req.msg.lun = sensor->cmn.keys.lun; in ipmi_sensor_get_sensor_reading_factors() 85 id, sensor->cmn.keys.sensor_num); in ipmi_sensor_get_sensor_reading_factors() 199 sr->s_id, sensor->keys.sensor_num); in ipmi_sensor_print_fc_discrete() 266 sensor->keys.sensor_num, sensor->keys.owner_id, in ipmi_sensor_print_fc_threshold() 267 sensor->keys.lun, sensor->keys.channel); in ipmi_sensor_print_fc_threshold() 312 sr->s_id, sensor->keys.sensor_num); in ipmi_sensor_print_fc_threshold() 381 sensor->keys. in ipmi_sensor_print_fc_threshold() 386 sensor->keys.owner_id, in ipmi_sensor_print_fc_threshold() 387 sensor->keys.lun, in ipmi_sensor_print_fc_threshold() [all …]
|
/openbmc/qemu/tests/bench/ |
H A D | qtree-bench.c | 81 size_t *keys = g_malloc_n(n_elems, sizeof(*keys)); in init_empty_tree_and_keys() local 83 keys[i] = i; in init_empty_tree_and_keys() 99 *ret_keys = keys; in init_empty_tree_and_keys() 126 size_t *keys; in run_benchmark() local 128 init_empty_tree_and_keys(impl, &tree, &keys, n_elems); in run_benchmark() 133 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 136 q_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() 151 value = g_tree_lookup(tree, &keys[i]); in run_benchmark() 154 value = q_tree_lookup(tree, &keys[i]); in run_benchmark() 166 g_tree_insert(tree, &keys[i], &keys[i]); in run_benchmark() [all …]
|
/openbmc/linux/drivers/md/bcache/ |
H A D | btree.c | 115 if (b->level && b->keys.nsets) in bch_btree_init_next() 116 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 118 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() 121 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next() 164 iter->b = &b->keys; in bch_btree_node_read_done() 171 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done() 199 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done() 209 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done() 211 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done() 214 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done() [all …]
|
H A D | debug.c | 44 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify() 45 inmemory = b->keys.set->data; in bch_btree_verify() 50 v->keys.ops = b->keys.ops; in bch_btree_verify() 65 sorted = v->keys.set->data; in bch_btree_verify() 67 if (inmemory->keys != sorted->keys || in bch_btree_verify() 78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 164 struct keybuf keys; member [all …]
|
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/ |
H A D | pkgdata.py | 132 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 133 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output) 139 self.assertIn('libz1', list(files.keys()), "listed pkgs. files: %s" %result.output) 140 self.assertIn('libz-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 153 self.assertIn('zlib-dbg', list(files.keys()), "listed pkgs. files: %s" %result.output) 154 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output) 155 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output) 156 self.assertIn('zlib-staticdev', list(files.keys()), "listed pkgs. files: %s" %result.output) 157 self.assertIn('zlib', list(files.keys()), "listed pkgs. files: %s" %result.output) 158 self.assertNotIn('zlib-locale', list(files.keys()), "listed pkgs. files: %s" %result.output) [all …]
|
/openbmc/linux/drivers/net/ethernet/cisco/enic/ |
H A D | enic_clsf.c | 21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t() 39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search() 163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 165 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search() [all …]
|
/openbmc/linux/drivers/mfd/ |
H A D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 55 keys.buttons = buttons; in ucb1x00_assabet_add() 56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 57 keys.poll_interval = 50; in ucb1x00_assabet_add() 58 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
/openbmc/linux/security/integrity/ |
H A D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which 73 be added. This keyring shall contain just MOK keys. Unlike keys 74 in the platform keyring, keys contained in the .machine keyring will [all …]
|
/openbmc/linux/drivers/md/persistent-data/ |
H A D | dm-btree.c | 50 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch() 104 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 367 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw() 375 uint64_t *keys, void *value_le) in dm_btree_lookup() argument 397 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup() 402 if (rkey != keys[level]) { in dm_btree_lookup() 462 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single() 471 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument 480 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next() 486 if (*rkey != keys[level]) { in dm_btree_lookup_next() [all …]
|
/openbmc/linux/security/keys/ |
H A D | Kconfig | 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 60 bool "Large payload keys" 65 This option provides support for holding large keys within the kernel 76 keys in the kernel. Trusted keys are random number symmetric keys, 83 source "security/keys/trusted-keys/Kconfig" 96 This option provides support for create/encrypting/decrypting keys 97 in the kernel. Encrypted keys are instantiated using kernel 106 bool "Allow encrypted keys with user decrypted data" [all …]
|
/openbmc/qemu/ui/ |
H A D | kbd-state.c | 15 DECLARE_BITMAP(keys, Q_KEY_CODE__MAX); 23 if (test_bit(qcode1, kbd->keys) || test_bit(qcode2, kbd->keys)) { in qkbd_state_modifier_update() 37 return test_bit(qcode, kbd->keys); in qkbd_state_key_get() 42 bool state = test_bit(qcode, kbd->keys); in qkbd_state_key_event() 62 set_bit(qcode, kbd->keys); in qkbd_state_key_event() 64 clear_bit(qcode, kbd->keys); in qkbd_state_key_event() 114 if (test_bit(qcode, kbd->keys)) { in qkbd_state_lift_all_keys()
|
/openbmc/linux/net/core/ |
H A D | flow_dissector.c | 1733 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument 1737 switch (keys->control.addr_type) { in __flow_hash_consistentify() 1739 if ((__force u32)keys->addrs.v4addrs.dst < in __flow_hash_consistentify() 1740 (__force u32)keys->addrs.v4addrs.src) in __flow_hash_consistentify() 1741 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1743 if ((__force u16)keys->ports.dst < in __flow_hash_consistentify() 1744 (__force u16)keys->ports.src) { in __flow_hash_consistentify() 1745 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1749 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify() 1750 &keys->addrs.v6addrs.src, in __flow_hash_consistentify() [all …]
|
/openbmc/openbmc/poky/bitbake/lib/bb/ |
H A D | data.py | 66 def keys(d): function 68 return d.keys() 102 for s in savedenv.keys(): 183 keys = sorted((key for key in d.keys() if not key.startswith("__")), key=isfunc) 184 grouped = groupby(keys, isfunc) 185 for isfunc, keys in grouped: 186 for key in sorted(keys): 190 return (key for key in d.keys() if not key.startswith('__') and 209 …keys = (key for key in d.keys() if not key.startswith("__") and not d.getVarFlag(key, "func", Fals… 210 for key in sorted(keys): [all …]
|
/openbmc/linux/drivers/crypto/nx/ |
H A D | nx-aes-xcbc.c | 64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 79 len = sizeof(keys); in nx_xcbc_empty() 81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 84 if (len != sizeof(keys)) in nx_xcbc_empty() 87 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty() 90 if (len != sizeof(keys)) in nx_xcbc_empty() 102 keys[1][0] ^= 0x80; in nx_xcbc_empty() 104 len = sizeof(keys[1]); in nx_xcbc_empty() [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | openbmc_ffdc_list.py | 355 return FFDC_BMC_CMD.keys() 364 return FFDC_GET_REQUEST.keys() 373 return FFDC_GET_REDFISH_REQUEST.keys() 382 return FFDC_BMC_FILE.keys() 391 return FFDC_METHOD_CALL.keys() 400 return FFDC_METHOD_CALL[index].keys() 418 return FFDC_OS_ALL_DISTROS_FILE.keys() 437 return eval(distro_file).keys()
|