/u-boot/boot/ |
H A D | expo.c | 218 int expo_send_key(struct expo *exp, int key) argument 229 ret = scene_send_key(scn, key, &exp->action); 231 return log_msg_ret("key", ret);
|
H A D | scene.c | 578 * @scn: Scene to receive the key 579 * @key: Key to send (KEYCODE_UP) 583 static void send_key_obj(struct scene *scn, struct scene_obj *obj, int key, argument 586 switch (key) { 626 int scene_send_key(struct scene *scn, int key, struct expo_action *event) argument 647 send_key_obj(scn, obj, key, event); 660 ret = scene_menu_send_key(scn, menu, key, event); 662 return log_msg_ret("key", ret); 669 ret = scene_textline_send_key(scn, tline, key, event); 671 return log_msg_ret("key", re [all...] |
H A D | expo_build.c | 262 uint label, key, desc; local 269 ret = add_txt_str_list(info, node, scn, "key-label", i, 0); 271 return log_msg_ret("key", ret); 272 key = max(0, ret); 280 fdt32_to_cpu(item_ids[i]), key, label,
|
/u-boot/cmd/ |
H A D | eficonfig.c | 158 * with any key press. 174 "%s\n\n Press any key to continue", 3, 4, msg); 226 * eficonfig_choice_entry() - user key input handler 229 * Return: key string to identify the selected entry 236 enum bootmenu_key key = BKEY_NONE; local 242 key = bootmenu_loop((struct bootmenu_data *)efi_menu, cch); 244 switch (key) { 249 /* no menu key selected, regenerate menu */ 255 /* no menu key selected, regenerate menu */ 261 return entry->key; 1837 enum bootmenu_key key = BKEY_NONE; local [all...] |
H A D | eeprom.c | 289 ulong i2c_addr, int layout_ver, char *key, 332 layout.update(&layout, key, value); 288 eeprom_execute_command(enum eeprom_action action, int i2c_bus, ulong i2c_addr, int layout_ver, char *key, char *value, ulong addr, ulong off, ulong cnt) argument
|
/u-boot/drivers/block/ |
H A D | ide.c | 268 log_debug("1 returned sense key %x status %02x\n", 315 log_debug("2 returned sense key %x status %x\n", err, c); 335 u8 res, key, asc, ascq; local 349 log_debug("(auto_req)atapi_issue returned sense key %x\n", res); 357 key = (sense_data[2] & 0xf); 362 log_debug(" Sense page: %02X key %02X ASC %02X ASCQ %02X\n", 363 sense_data[0], key, asc, ascq); 365 if (!key) 368 if (key == 6 || asc == 0x29 || asc == 0x28) { /* Unit Attention */ 391 printf("ERROR: Unknown Sense key [all...] |
/u-boot/api/ |
H A D | api.c | 535 search.key = var; 547 buflen = strlen(match->key) + strlen(match->data) + 2; 549 snprintf(var, buflen, "%s=%s", match->key, match->data);
|
/u-boot/include/linux/ |
H A D | edd.h | 71 __u16 key; /* = 0xBEDD */ member in struct:edd_device_params
|
/u-boot/tools/ |
H A D | mxsimage.h | 54 /* Offset to the key dictionary in 16b blocks. */ 90 /* The AES key encrypted by image key (zero). */ 91 uint8_t key[SB_BLOCK_SIZE]; member in struct:sb_key_dictionary_key
|
H A D | mkeficapsule.c | 44 {"private-key", required_argument, NULL, 'p'}, 65 "\t-p, --private-key <privkey file> private key file\n" 79 * @key_file: Path to a private key file 203 gnutls_datum_t key; local 219 ret = read_bin_file(ctx->key_file, &key.data, &file_size); 224 key.size = file_size; 247 /* load a private key */ 248 ret = gnutls_privkey_import_x509_raw(pkey, &key, GNUTLS_X509_FMT_PEM, 326 * free(key [all...] |
H A D | qconfig.py | 855 key: defconfig name, e.g. "MPC8548CDS_legacy_defconfig" 857 key: CONFIG option 860 key: CONFIG option 866 # key is defconfig name, value is dict of (CONFIG_xxx, value) 954 # This will hold the results: key=config, value=defconfigs containing it 1009 key=lambda k: len(imply_configs[k]), reverse=True) 1078 key: CONFIG option 1180 key (ConfigUse): object 1183 key (str): filename 1225 key (ConfigUs [all...] |
/u-boot/include/ |
H A D | tpm_api.h | 120 * @param data output buffer for the public endorsement key 206 * the usage of the parent key. 209 * @param parent_handle handle of the parent key. 210 * @param key pointer to the key structure (TPM_KEY or TPM_KEY12). 211 * @param key_length size of the key structure 212 * @param parent_key_usage_auth usage auth for the parent key 213 * @param key_handle pointer to the key handle 216 u32 tpm_load_key2_oiap(struct udevice *dev, u32 parent_handle, const void *key, 222 * authenticating the usage of the key [all...] |
/u-boot/include/dm/ |
H A D | uclass.h | 159 * @key: ID to look up 165 int uclass_get(enum uclass_id key, struct uclass **ucp);
|
/u-boot/tools/buildman/ |
H A D | boards.py | 250 for key, symbol in list(self._SYMBOL_TABLE.items()): 253 params[key] = value 255 params[key] = '-' 299 key: Board-target name (e.g. 'snow') 489 key is board.target 716 key: 'arch', 'cpu', 'soc', 'vendor', 'board', 'target', 718 value: string value of the key 819 output_lines.sort(key=str.lower) 842 key: 'arch', 'cpu', 'soc', 'vendor', 'board', 'config', 844 value: string value of the key [all...] |
/u-boot/test/py/tests/ |
H A D | test_usb.py | 159 for key in range(int(storage_device)): 160 devices[key] = {} 185 for key in range(int(storage_device)): 186 devices[key] = {}
|
H A D | test_gpt.py | 27 string value from each specified key in the partition description, or a 28 key with with the value True for a boolean flag 38 key, value = option.split("=") 39 part[key] = value
|
/u-boot/scripts/ |
H A D | gen_compile_commands.py | 226 json.dump(sorted(compile_commands, key=lambda x: x["file"]), f, indent=2, sort_keys=True)
|
/u-boot/drivers/tee/ |
H A D | sandbox.c | 264 e.key = name; 292 e.key = name; 296 hdelete_r(e.key, &state->pstorage_htab, 0); 298 e.key = name;
|
/u-boot/drivers/misc/ |
H A D | cros_ec_sandbox.c | 35 * into key scan data, passed back from the EC as key scan messages. The 36 * key layout is read from the device tree. 60 /* A single entry of the key matrix */ 62 int row; /* key matrix row */ 63 int col; /* key matrix column */ 64 int keycode; /* corresponding linux key code */ 106 struct ec_keymatrix_entry *matrix; /* the key matrix info */ 213 * Read the key matrix from the device tree 275 int key[ local [all...] |
/u-boot/scripts/kconfig/ |
H A D | qconf.h | 28 QList<int> readSizes(const QString& key, bool *ok); 29 bool writeSizes(const QString& key, const QList<int>& value);
|
/u-boot/drivers/crypto/fsl/ |
H A D | desc_constr.h | 234 APPEND_CMD_PTR(key, KEY) 320 APPEND_CMD_PTR_TO_IMM2(key, KEY);
|
/u-boot/lib/ecdsa/ |
H A D | ecdsa-libcrypto.c | 6 * key size. The signature will be (2 * key_size_bits) / 8 bytes. 9 * - Verification uses private key. This is not technically required, but a 11 * - Handling of keys and key paths: 12 * - The '-K' key directory option must contain path to the key file, 13 * instead of the key directory. 14 * - No assumptions are made about the file extension of the key 15 * - The 'key-name-hint' property is only used for naming devicetree nodes, 105 /* ECDSA key size in bytes */ 106 static size_t ecdsa_key_size_bytes(const EC_KEY *key) argument [all...] |
/u-boot/scripts/kconfig/lxdialog/ |
H A D | util.c | 543 * out one menu too much. Filter away all escaped key sequences since 549 int key; local 555 key = wgetch(win); 562 if (key == KEY_ESC && key2 == ERR) 564 else if (key != ERR && key != KEY_ESC && key2 == ERR) 565 ungetch(key);
|
/u-boot/fs/btrfs/ |
H A D | disk-io.c | 261 * Obvious sys_chunk_array corruptions, it must hold at least one key 486 * check to get raw eb with bad key order and fix it. 488 * possible, or bad key order can go into tools like 841 struct btrfs_key key; local 866 ret = get_default_subvolume(fs_info, &key); 872 key.objectid = BTRFS_FS_TREE_OBJECTID; 873 key.type = BTRFS_ROOT_ITEM_KEY; 874 key.offset = (u64)-1; 877 fs_info->fs_root = btrfs_read_fs_root(fs_info, &key);
|
/u-boot/fs/ubifs/ |
H A D | sb.c | 80 union ubifs_key key; local 276 ino_key_init(c, &key, UBIFS_ROOT_INO); 278 key_write_idx(c, &key, &br->key); 295 ino_key_init_flash(c, &ino->key, UBIFS_ROOT_INO); 603 ubifs_err(c, "unsupported key format");
|