Searched refs:keys (Results 1 - 25 of 361) sorted by relevance

1234567891011>>

/linux-master/drivers/input/keyboard/
H A Dipaq-micro-keys.c43 struct ipaq_micro_keys *keys = data; local
50 input_report_key(keys->input, keys->codes[key], down);
51 input_sync(keys->input);
55 static void micro_key_start(struct ipaq_micro_keys *keys) argument
57 spin_lock(&keys->micro->lock);
58 keys->micro->key = micro_key_receive;
59 keys->micro->key_data = keys;
60 spin_unlock(&keys
63 micro_key_stop(struct ipaq_micro_keys *keys) argument
73 struct ipaq_micro_keys *keys = input_get_drvdata(input); local
82 struct ipaq_micro_keys *keys = input_get_drvdata(input); local
89 struct ipaq_micro_keys *keys; local
132 struct ipaq_micro_keys *keys = dev_get_drvdata(dev); local
141 struct ipaq_micro_keys *keys = dev_get_drvdata(dev); local
[all...]
H A Dmtk-pmic-keys.c121 struct mtk_pmic_keys *keys; member in struct:mtk_pmic_keys_info
133 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member in struct:mtk_pmic_keys
142 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, argument
150 kregs_home = keys->keys[MTK_PMIC_HOMEKEY_INDEX].regs;
151 kregs_pwr = keys->keys[MTK_PMIC_PWRKEY_INDEX].regs;
153 error = of_property_read_u32(keys->dev->of_node, "power-off-time-sec",
161 error = of_property_read_u32(keys->dev->of_node,
185 regmap_update_bits(keys
208 mtk_pmic_key_setup(struct mtk_pmic_keys *keys, struct mtk_pmic_keys_info *info) argument
250 struct mtk_pmic_keys *keys = dev_get_drvdata(dev); local
266 struct mtk_pmic_keys *keys = dev_get_drvdata(dev); local
313 struct mtk_pmic_keys *keys; local
[all...]
/linux-master/include/keys/
H A Dtrusted_tee.h12 #include <keys/trusted-type.h>
/linux-master/arch/arm64/include/asm/
H A Dpointer_auth.h33 * We give each process its own keys, which are shared by all threads. The keys
57 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys) argument
60 get_random_bytes(&keys->apia, sizeof(keys->apia));
63 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys) argument
68 __ptrauth_key_install_nosync(APIA, keys->apia);
74 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys) argument
77 __ptrauth_key_install_nosync(APIB, keys->apib);
78 __ptrauth_key_install_nosync(APDA, keys
86 ptrauth_keys_init_user(struct ptrauth_keys_user *keys) argument
[all...]
/linux-master/tools/testing/selftests/bpf/progs/
H A Dbpf_flow.c75 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, argument
78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport;
81 memcpy(&val, keys, sizeof(val));
118 struct bpf_flow_keys *keys = skb->flow_keys; local
137 return export_flow_keys(keys, BPF_DROP);
140 return export_flow_keys(keys, BPF_DROP);
146 struct bpf_flow_keys *keys = skb->flow_keys; local
148 if (keys->n_proto == bpf_htons(ETH_P_IP)) {
161 return parse_eth_proto(skb, keys
167 struct bpf_flow_keys *keys = skb->flow_keys; local
258 struct bpf_flow_keys *keys = skb->flow_keys; local
278 struct bpf_flow_keys *keys = skb->flow_keys; local
326 struct bpf_flow_keys *keys = skb->flow_keys; local
348 struct bpf_flow_keys *keys = skb->flow_keys; local
366 struct bpf_flow_keys *keys = skb->flow_keys; local
394 struct bpf_flow_keys *keys = skb->flow_keys; local
406 struct bpf_flow_keys *keys = skb->flow_keys; local
[all...]
/linux-master/fs/bcachefs/
H A Dbtree_journal_iter.c13 * For managing keys we read from the journal: until journal replay works normal
14 * btree lookups need to be able to find and return keys from the journal where
34 static inline size_t idx_to_pos(struct journal_keys *keys, size_t idx) argument
36 size_t gap_size = keys->size - keys->nr;
38 if (idx >= keys->gap)
43 static inline struct journal_key *idx_to_key(struct journal_keys *keys, size_t idx) argument
45 return keys->data + idx_to_pos(keys, idx);
48 static size_t __bch2_journal_key_search(struct journal_keys *keys, argument
71 bch2_journal_key_search(struct journal_keys *keys, enum btree_id id, unsigned level, struct bpos pos) argument
83 struct journal_keys *keys = &c->journal_keys; local
135 struct journal_keys *keys = iter->keys; local
152 struct journal_keys *keys = &c->journal_keys; local
176 struct journal_keys *keys = &c->journal_keys; local
202 struct journal_keys *keys = &c->journal_keys; local
295 struct journal_keys *keys = &trans->c->journal_keys; local
311 struct journal_keys *keys = &c->journal_keys; local
524 struct journal_keys *keys = &c->journal_keys; local
544 __journal_keys_sort(struct journal_keys *keys) argument
565 struct journal_keys *keys = &c->journal_keys; local
612 struct journal_keys *keys = &c->journal_keys; local
[all...]
H A Dkeylist_types.h7 struct bkey_i *keys; member in union:keylist::__anon1647
H A Dbtree_write_buffer.h11 return wb->inc.keys.nr + wb->flushing.keys.nr > wb->inc.keys.size / 4;
18 return wb->inc.keys.nr > wb->inc.keys.size * 3 / 4;
45 struct btree_write_buffered_key *wb_k = &darray_top(dst->wb->keys);
49 dst->wb->keys.nr++;
H A Dkeylist.h34 return l->top == l->keys;
49 return l->keys;
53 for (struct bkey_i *_k = (_keylist)->keys; \
57 static inline u64 keylist_sectors(struct keylist *keys) argument
61 for_each_keylist_key(keys, k)
/linux-master/security/keys/encrypted-keys/
H A DMakefile3 # Makefile for encrypted keys
6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o
8 encrypted-keys-y := encrypted.o ecryptfs_format.o
11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
H A Dmasterkey_trusted.c11 * See Documentation/security/keys/trusted-encrypted.rst
16 #include <keys/trusted-type.h>
17 #include <keys/encrypted-type.h>
23 * Trusted keys are sealed to PCRs and other metadata. Although userspace
/linux-master/arch/arm64/kernel/
H A Dpointer_auth.c13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; local
25 ptrauth_keys_init_user(keys);
37 get_random_bytes(&keys->apia, sizeof(keys->apia));
39 get_random_bytes(&keys->apib, sizeof(keys->apib));
41 get_random_bytes(&keys->apda, sizeof(keys->apda));
43 get_random_bytes(&keys->apdb, sizeof(keys
67 ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, unsigned long enabled) argument
[all...]
/linux-master/tools/testing/selftests/bpf/map_tests/
H A Dhtab_map_batch_ops.c14 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, argument
29 keys[i] = i + 1;
37 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts);
42 int *keys, void *values, bool is_pcpu)
56 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j),
59 i, j, keys[i], bpf_percpu(v[i], j));
62 CHECK(keys[i] + 1 != ((int *)values)[i],
64 "error: i %d key %d value %d\n", i, keys[i],
73 "error: keys array at index %d missing\n", i);
81 int map_fd, *keys, *visite local
41 map_batch_verify(int *visited, __u32 max_entries, int *keys, void *values, bool is_pcpu) argument
[all...]
H A Darray_map_batch_ops.c15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, argument
26 keys[i] = i;
36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts);
40 static void map_batch_verify(int *visited, __u32 max_entries, int *keys, argument
52 CHECK(keys[i] + j + 1 != value,
55 j, keys[i], value);
58 CHECK(keys[i] + 1 != values[i], "key/value checking",
59 "error: i %d key %d value %lld\n", i, keys[i],
66 "error: keys array at index %d missing\n", i);
72 int map_fd, *keys, *visite local
[all...]
H A Dlpm_trie_map_batch_ops.c23 struct test_lpm_key *keys, int *values)
34 keys[i].prefix = 32;
36 inet_pton(AF_INET, buff, &keys[i].ipv4);
40 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts);
45 struct test_lpm_key *keys, int *values)
53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32);
62 "error: keys array at index %d missing\n", i);
69 struct test_lpm_key *keys, key; local
86 keys = malloc(max_entries * sizeof(struct test_lpm_key));
89 CHECK(!keys || !value
22 map_batch_update(int map_fd, __u32 max_entries, struct test_lpm_key *keys, int *values) argument
44 map_batch_verify(int *visited, __u32 max_entries, struct test_lpm_key *keys, int *values) argument
[all...]
/linux-master/tools/testing/selftests/net/
H A Dtcp_fastopen_backup_key.c5 * New keys are 'rotated' in two steps:
7 * 2) Make new key the primary by swapping the backup and primary keys
49 static void get_keys(int fd, uint32_t *keys) argument
55 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len))
62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2,
63 keys + 3, keys + 4, keys
67 set_keys(int fd, uint32_t *keys) argument
96 uint32_t keys[8]; local
215 uint32_t keys[8]; local
[all...]
/linux-master/tools/testing/selftests/bpf/
H A Dflow_dissector_load.h18 struct bpf_map *prog_array, *keys; local
44 keys = bpf_object__find_map_by_name(*obj, keys_map_name);
45 if (!keys)
48 *keys_fd = bpf_map__fd(keys);
/linux-master/drivers/md/dm-vdo/indexer/
H A Dradix-sort.h23 int __must_check uds_radix_sort(struct radix_sorter *sorter, const unsigned char *keys[],
/linux-master/crypto/asymmetric_keys/
H A Dasymmetric_keys.h8 #include <keys/asymmetric-type.h>
/linux-master/drivers/mfd/
H A Ducb1x00-assabet.c41 struct gpio_keys_platform_data keys; local
46 memset(&keys, 0, sizeof(keys));
55 keys.buttons = buttons;
56 keys.nbuttons = ARRAY_SIZE(buttons);
57 keys.poll_interval = 50;
58 keys.name = "ucb1x00";
60 pdev = platform_device_register_data(&ucb->dev, "gpio-keys", -1,
61 &keys, sizeof(keys));
[all...]
/linux-master/security/integrity/platform_certs/
H A Dload_ipl_s390.c9 #include <keys/asymmetric-type.h>
10 #include <keys/system_keyring.h>
/linux-master/drivers/net/ethernet/cisco/enic/
H A Denic_clsf.c15 * @keys: flow_keys of ipv4 5tuple
21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) argument
26 switch (keys->basic.ip_proto) {
38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src);
39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst);
40 data.u.ipv4.src_port = ntohs(keys->ports.src);
41 data.u.ipv4.dst_port = ntohs(keys->ports.dst);
162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src &&
163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst &&
164 tpos->keys
174 struct flow_keys keys; local
[all...]
/linux-master/tools/perf/scripts/python/
H A Dcheck-perf-trace.py73 keys = unhandled.keys()
74 if not keys:
83 for event_name in keys:
H A Dfailed-syscalls-by-pid.py69 comm_keys = syscalls.keys()
71 pid_keys = syscalls[comm].keys()
74 id_keys = syscalls[comm][pid].keys()
77 ret_keys = syscalls[comm][pid][id].keys()
/linux-master/include/crypto/
H A Dauthenc.h29 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key,

Completed in 431 milliseconds

1234567891011>>