Searched refs:key (Results 126 - 150 of 201) sorted by relevance

123456789

/u-boot/boot/
H A Dexpo.c218 int expo_send_key(struct expo *exp, int key) argument
229 ret = scene_send_key(scn, key, &exp->action);
231 return log_msg_ret("key", ret);
H A Dscene.c578 * @scn: Scene to receive the key
579 * @key: Key to send (KEYCODE_UP)
583 static void send_key_obj(struct scene *scn, struct scene_obj *obj, int key, argument
586 switch (key) {
626 int scene_send_key(struct scene *scn, int key, struct expo_action *event) argument
647 send_key_obj(scn, obj, key, event);
660 ret = scene_menu_send_key(scn, menu, key, event);
662 return log_msg_ret("key", ret);
669 ret = scene_textline_send_key(scn, tline, key, event);
671 return log_msg_ret("key", re
[all...]
H A Dexpo_build.c262 uint label, key, desc; local
269 ret = add_txt_str_list(info, node, scn, "key-label", i, 0);
271 return log_msg_ret("key", ret);
272 key = max(0, ret);
280 fdt32_to_cpu(item_ids[i]), key, label,
/u-boot/cmd/
H A Deficonfig.c158 * with any key press.
174 "%s\n\n Press any key to continue", 3, 4, msg);
226 * eficonfig_choice_entry() - user key input handler
229 * Return: key string to identify the selected entry
236 enum bootmenu_key key = BKEY_NONE; local
242 key = bootmenu_loop((struct bootmenu_data *)efi_menu, cch);
244 switch (key) {
249 /* no menu key selected, regenerate menu */
255 /* no menu key selected, regenerate menu */
261 return entry->key;
1837 enum bootmenu_key key = BKEY_NONE; local
[all...]
H A Deeprom.c289 ulong i2c_addr, int layout_ver, char *key,
332 layout.update(&layout, key, value);
288 eeprom_execute_command(enum eeprom_action action, int i2c_bus, ulong i2c_addr, int layout_ver, char *key, char *value, ulong addr, ulong off, ulong cnt) argument
/u-boot/drivers/block/
H A Dide.c268 log_debug("1 returned sense key %x status %02x\n",
315 log_debug("2 returned sense key %x status %x\n", err, c);
335 u8 res, key, asc, ascq; local
349 log_debug("(auto_req)atapi_issue returned sense key %x\n", res);
357 key = (sense_data[2] & 0xf);
362 log_debug(" Sense page: %02X key %02X ASC %02X ASCQ %02X\n",
363 sense_data[0], key, asc, ascq);
365 if (!key)
368 if (key == 6 || asc == 0x29 || asc == 0x28) { /* Unit Attention */
391 printf("ERROR: Unknown Sense key
[all...]
/u-boot/api/
H A Dapi.c535 search.key = var;
547 buflen = strlen(match->key) + strlen(match->data) + 2;
549 snprintf(var, buflen, "%s=%s", match->key, match->data);
/u-boot/include/linux/
H A Dedd.h71 __u16 key; /* = 0xBEDD */ member in struct:edd_device_params
/u-boot/tools/
H A Dmxsimage.h54 /* Offset to the key dictionary in 16b blocks. */
90 /* The AES key encrypted by image key (zero). */
91 uint8_t key[SB_BLOCK_SIZE]; member in struct:sb_key_dictionary_key
H A Dmkeficapsule.c44 {"private-key", required_argument, NULL, 'p'},
65 "\t-p, --private-key <privkey file> private key file\n"
79 * @key_file: Path to a private key file
203 gnutls_datum_t key; local
219 ret = read_bin_file(ctx->key_file, &key.data, &file_size);
224 key.size = file_size;
247 /* load a private key */
248 ret = gnutls_privkey_import_x509_raw(pkey, &key, GNUTLS_X509_FMT_PEM,
326 * free(key
[all...]
H A Dqconfig.py855 key: defconfig name, e.g. "MPC8548CDS_legacy_defconfig"
857 key: CONFIG option
860 key: CONFIG option
866 # key is defconfig name, value is dict of (CONFIG_xxx, value)
954 # This will hold the results: key=config, value=defconfigs containing it
1009 key=lambda k: len(imply_configs[k]), reverse=True)
1078 key: CONFIG option
1180 key (ConfigUse): object
1183 key (str): filename
1225 key (ConfigUs
[all...]
/u-boot/include/
H A Dtpm_api.h120 * @param data output buffer for the public endorsement key
206 * the usage of the parent key.
209 * @param parent_handle handle of the parent key.
210 * @param key pointer to the key structure (TPM_KEY or TPM_KEY12).
211 * @param key_length size of the key structure
212 * @param parent_key_usage_auth usage auth for the parent key
213 * @param key_handle pointer to the key handle
216 u32 tpm_load_key2_oiap(struct udevice *dev, u32 parent_handle, const void *key,
222 * authenticating the usage of the key
[all...]
/u-boot/include/dm/
H A Duclass.h159 * @key: ID to look up
165 int uclass_get(enum uclass_id key, struct uclass **ucp);
/u-boot/tools/buildman/
H A Dboards.py250 for key, symbol in list(self._SYMBOL_TABLE.items()):
253 params[key] = value
255 params[key] = '-'
299 key: Board-target name (e.g. 'snow')
489 key is board.target
716 key: 'arch', 'cpu', 'soc', 'vendor', 'board', 'target',
718 value: string value of the key
819 output_lines.sort(key=str.lower)
842 key: 'arch', 'cpu', 'soc', 'vendor', 'board', 'config',
844 value: string value of the key
[all...]
/u-boot/test/py/tests/
H A Dtest_usb.py159 for key in range(int(storage_device)):
160 devices[key] = {}
185 for key in range(int(storage_device)):
186 devices[key] = {}
H A Dtest_gpt.py27 string value from each specified key in the partition description, or a
28 key with with the value True for a boolean flag
38 key, value = option.split("=")
39 part[key] = value
/u-boot/scripts/
H A Dgen_compile_commands.py226 json.dump(sorted(compile_commands, key=lambda x: x["file"]), f, indent=2, sort_keys=True)
/u-boot/drivers/tee/
H A Dsandbox.c264 e.key = name;
292 e.key = name;
296 hdelete_r(e.key, &state->pstorage_htab, 0);
298 e.key = name;
/u-boot/drivers/misc/
H A Dcros_ec_sandbox.c35 * into key scan data, passed back from the EC as key scan messages. The
36 * key layout is read from the device tree.
60 /* A single entry of the key matrix */
62 int row; /* key matrix row */
63 int col; /* key matrix column */
64 int keycode; /* corresponding linux key code */
106 struct ec_keymatrix_entry *matrix; /* the key matrix info */
213 * Read the key matrix from the device tree
275 int key[ local
[all...]
/u-boot/scripts/kconfig/
H A Dqconf.h28 QList<int> readSizes(const QString& key, bool *ok);
29 bool writeSizes(const QString& key, const QList<int>& value);
/u-boot/drivers/crypto/fsl/
H A Ddesc_constr.h234 APPEND_CMD_PTR(key, KEY)
320 APPEND_CMD_PTR_TO_IMM2(key, KEY);
/u-boot/lib/ecdsa/
H A Decdsa-libcrypto.c6 * key size. The signature will be (2 * key_size_bits) / 8 bytes.
9 * - Verification uses private key. This is not technically required, but a
11 * - Handling of keys and key paths:
12 * - The '-K' key directory option must contain path to the key file,
13 * instead of the key directory.
14 * - No assumptions are made about the file extension of the key
15 * - The 'key-name-hint' property is only used for naming devicetree nodes,
105 /* ECDSA key size in bytes */
106 static size_t ecdsa_key_size_bytes(const EC_KEY *key) argument
[all...]
/u-boot/scripts/kconfig/lxdialog/
H A Dutil.c543 * out one menu too much. Filter away all escaped key sequences since
549 int key; local
555 key = wgetch(win);
562 if (key == KEY_ESC && key2 == ERR)
564 else if (key != ERR && key != KEY_ESC && key2 == ERR)
565 ungetch(key);
/u-boot/fs/btrfs/
H A Ddisk-io.c261 * Obvious sys_chunk_array corruptions, it must hold at least one key
486 * check to get raw eb with bad key order and fix it.
488 * possible, or bad key order can go into tools like
841 struct btrfs_key key; local
866 ret = get_default_subvolume(fs_info, &key);
872 key.objectid = BTRFS_FS_TREE_OBJECTID;
873 key.type = BTRFS_ROOT_ITEM_KEY;
874 key.offset = (u64)-1;
877 fs_info->fs_root = btrfs_read_fs_root(fs_info, &key);
/u-boot/fs/ubifs/
H A Dsb.c80 union ubifs_key key; local
276 ino_key_init(c, &key, UBIFS_ROOT_INO);
278 key_write_idx(c, &key, &br->key);
295 ino_key_init_flash(c, &ino->key, UBIFS_ROOT_INO);
603 ubifs_err(c, "unsupported key format");

Completed in 151 milliseconds

123456789