/linux-master/drivers/input/keyboard/ |
H A D | ipaq-micro-keys.c | 43 struct ipaq_micro_keys *keys = data; local 50 input_report_key(keys->input, keys->codes[key], down); 51 input_sync(keys->input); 55 static void micro_key_start(struct ipaq_micro_keys *keys) argument 57 spin_lock(&keys->micro->lock); 58 keys->micro->key = micro_key_receive; 59 keys->micro->key_data = keys; 60 spin_unlock(&keys 63 micro_key_stop(struct ipaq_micro_keys *keys) argument 73 struct ipaq_micro_keys *keys = input_get_drvdata(input); local 82 struct ipaq_micro_keys *keys = input_get_drvdata(input); local 89 struct ipaq_micro_keys *keys; local 132 struct ipaq_micro_keys *keys = dev_get_drvdata(dev); local 141 struct ipaq_micro_keys *keys = dev_get_drvdata(dev); local [all...] |
H A D | mtk-pmic-keys.c | 121 struct mtk_pmic_keys *keys; member in struct:mtk_pmic_keys_info 133 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member in struct:mtk_pmic_keys 142 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, argument 150 kregs_home = keys->keys[MTK_PMIC_HOMEKEY_INDEX].regs; 151 kregs_pwr = keys->keys[MTK_PMIC_PWRKEY_INDEX].regs; 153 error = of_property_read_u32(keys->dev->of_node, "power-off-time-sec", 161 error = of_property_read_u32(keys->dev->of_node, 185 regmap_update_bits(keys 208 mtk_pmic_key_setup(struct mtk_pmic_keys *keys, struct mtk_pmic_keys_info *info) argument 250 struct mtk_pmic_keys *keys = dev_get_drvdata(dev); local 266 struct mtk_pmic_keys *keys = dev_get_drvdata(dev); local 313 struct mtk_pmic_keys *keys; local [all...] |
/linux-master/include/keys/ |
H A D | trusted_tee.h | 12 #include <keys/trusted-type.h>
|
/linux-master/arch/arm64/include/asm/ |
H A D | pointer_auth.h | 33 * We give each process its own keys, which are shared by all threads. The keys 57 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys) argument 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); 63 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys) argument 68 __ptrauth_key_install_nosync(APIA, keys->apia); 74 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys) argument 77 __ptrauth_key_install_nosync(APIB, keys->apib); 78 __ptrauth_key_install_nosync(APDA, keys 86 ptrauth_keys_init_user(struct ptrauth_keys_user *keys) argument [all...] |
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | bpf_flow.c | 75 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, argument 78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; 81 memcpy(&val, keys, sizeof(val)); 118 struct bpf_flow_keys *keys = skb->flow_keys; local 137 return export_flow_keys(keys, BPF_DROP); 140 return export_flow_keys(keys, BPF_DROP); 146 struct bpf_flow_keys *keys = skb->flow_keys; local 148 if (keys->n_proto == bpf_htons(ETH_P_IP)) { 161 return parse_eth_proto(skb, keys 167 struct bpf_flow_keys *keys = skb->flow_keys; local 258 struct bpf_flow_keys *keys = skb->flow_keys; local 278 struct bpf_flow_keys *keys = skb->flow_keys; local 326 struct bpf_flow_keys *keys = skb->flow_keys; local 348 struct bpf_flow_keys *keys = skb->flow_keys; local 366 struct bpf_flow_keys *keys = skb->flow_keys; local 394 struct bpf_flow_keys *keys = skb->flow_keys; local 406 struct bpf_flow_keys *keys = skb->flow_keys; local [all...] |
/linux-master/fs/bcachefs/ |
H A D | btree_journal_iter.c | 13 * For managing keys we read from the journal: until journal replay works normal 14 * btree lookups need to be able to find and return keys from the journal where 34 static inline size_t idx_to_pos(struct journal_keys *keys, size_t idx) argument 36 size_t gap_size = keys->size - keys->nr; 38 if (idx >= keys->gap) 43 static inline struct journal_key *idx_to_key(struct journal_keys *keys, size_t idx) argument 45 return keys->data + idx_to_pos(keys, idx); 48 static size_t __bch2_journal_key_search(struct journal_keys *keys, argument 71 bch2_journal_key_search(struct journal_keys *keys, enum btree_id id, unsigned level, struct bpos pos) argument 83 struct journal_keys *keys = &c->journal_keys; local 135 struct journal_keys *keys = iter->keys; local 152 struct journal_keys *keys = &c->journal_keys; local 176 struct journal_keys *keys = &c->journal_keys; local 202 struct journal_keys *keys = &c->journal_keys; local 295 struct journal_keys *keys = &trans->c->journal_keys; local 311 struct journal_keys *keys = &c->journal_keys; local 524 struct journal_keys *keys = &c->journal_keys; local 544 __journal_keys_sort(struct journal_keys *keys) argument 565 struct journal_keys *keys = &c->journal_keys; local 612 struct journal_keys *keys = &c->journal_keys; local [all...] |
H A D | keylist_types.h | 7 struct bkey_i *keys; member in union:keylist::__anon1647
|
H A D | btree_write_buffer.h | 11 return wb->inc.keys.nr + wb->flushing.keys.nr > wb->inc.keys.size / 4; 18 return wb->inc.keys.nr > wb->inc.keys.size * 3 / 4; 45 struct btree_write_buffered_key *wb_k = &darray_top(dst->wb->keys); 49 dst->wb->keys.nr++;
|
H A D | keylist.h | 34 return l->top == l->keys; 49 return l->keys; 53 for (struct bkey_i *_k = (_keylist)->keys; \ 57 static inline u64 keylist_sectors(struct keylist *keys) argument 61 for_each_keylist_key(keys, k)
|
/linux-master/security/keys/encrypted-keys/ |
H A D | Makefile | 3 # Makefile for encrypted keys 6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 8 encrypted-keys-y := encrypted.o ecryptfs_format.o 11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|
H A D | masterkey_trusted.c | 11 * See Documentation/security/keys/trusted-encrypted.rst 16 #include <keys/trusted-type.h> 17 #include <keys/encrypted-type.h> 23 * Trusted keys are sealed to PCRs and other metadata. Although userspace
|
/linux-master/arch/arm64/kernel/ |
H A D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; local 25 ptrauth_keys_init_user(keys); 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); 43 get_random_bytes(&keys->apdb, sizeof(keys 67 ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, unsigned long enabled) argument [all...] |
/linux-master/tools/testing/selftests/bpf/map_tests/ |
H A D | htab_map_batch_ops.c | 14 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, argument 29 keys[i] = i + 1; 37 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); 42 int *keys, void *values, bool is_pcpu) 56 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j), 59 i, j, keys[i], bpf_percpu(v[i], j)); 62 CHECK(keys[i] + 1 != ((int *)values)[i], 64 "error: i %d key %d value %d\n", i, keys[i], 73 "error: keys array at index %d missing\n", i); 81 int map_fd, *keys, *visite local 41 map_batch_verify(int *visited, __u32 max_entries, int *keys, void *values, bool is_pcpu) argument [all...] |
H A D | array_map_batch_ops.c | 15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, argument 26 keys[i] = i; 36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); 40 static void map_batch_verify(int *visited, __u32 max_entries, int *keys, argument 52 CHECK(keys[i] + j + 1 != value, 55 j, keys[i], value); 58 CHECK(keys[i] + 1 != values[i], "key/value checking", 59 "error: i %d key %d value %lld\n", i, keys[i], 66 "error: keys array at index %d missing\n", i); 72 int map_fd, *keys, *visite local [all...] |
H A D | lpm_trie_map_batch_ops.c | 23 struct test_lpm_key *keys, int *values) 34 keys[i].prefix = 32; 36 inet_pton(AF_INET, buff, &keys[i].ipv4); 40 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); 45 struct test_lpm_key *keys, int *values) 53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); 62 "error: keys array at index %d missing\n", i); 69 struct test_lpm_key *keys, key; local 86 keys = malloc(max_entries * sizeof(struct test_lpm_key)); 89 CHECK(!keys || !value 22 map_batch_update(int map_fd, __u32 max_entries, struct test_lpm_key *keys, int *values) argument 44 map_batch_verify(int *visited, __u32 max_entries, struct test_lpm_key *keys, int *values) argument [all...] |
/linux-master/tools/testing/selftests/net/ |
H A D | tcp_fastopen_backup_key.c | 5 * New keys are 'rotated' in two steps: 7 * 2) Make new key the primary by swapping the backup and primary keys 49 static void get_keys(int fd, uint32_t *keys) argument 55 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) 62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, 63 keys + 3, keys + 4, keys 67 set_keys(int fd, uint32_t *keys) argument 96 uint32_t keys[8]; local 215 uint32_t keys[8]; local [all...] |
/linux-master/tools/testing/selftests/bpf/ |
H A D | flow_dissector_load.h | 18 struct bpf_map *prog_array, *keys; local 44 keys = bpf_object__find_map_by_name(*obj, keys_map_name); 45 if (!keys) 48 *keys_fd = bpf_map__fd(keys);
|
/linux-master/drivers/md/dm-vdo/indexer/ |
H A D | radix-sort.h | 23 int __must_check uds_radix_sort(struct radix_sorter *sorter, const unsigned char *keys[],
|
/linux-master/crypto/asymmetric_keys/ |
H A D | asymmetric_keys.h | 8 #include <keys/asymmetric-type.h>
|
/linux-master/drivers/mfd/ |
H A D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; local 46 memset(&keys, 0, sizeof(keys)); 55 keys.buttons = buttons; 56 keys.nbuttons = ARRAY_SIZE(buttons); 57 keys.poll_interval = 50; 58 keys.name = "ucb1x00"; 60 pdev = platform_device_register_data(&ucb->dev, "gpio-keys", -1, 61 &keys, sizeof(keys)); [all...] |
/linux-master/security/integrity/platform_certs/ |
H A D | load_ipl_s390.c | 9 #include <keys/asymmetric-type.h> 10 #include <keys/system_keyring.h>
|
/linux-master/drivers/net/ethernet/cisco/enic/ |
H A D | enic_clsf.c | 15 * @keys: flow_keys of ipv4 5tuple 21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) argument 26 switch (keys->basic.ip_proto) { 38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); 39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); 40 data.u.ipv4.src_port = ntohs(keys->ports.src); 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); 162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && 163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && 164 tpos->keys 174 struct flow_keys keys; local [all...] |
/linux-master/tools/perf/scripts/python/ |
H A D | check-perf-trace.py | 73 keys = unhandled.keys() 74 if not keys: 83 for event_name in keys:
|
H A D | failed-syscalls-by-pid.py | 69 comm_keys = syscalls.keys() 71 pid_keys = syscalls[comm].keys() 74 id_keys = syscalls[comm][pid].keys() 77 ret_keys = syscalls[comm][pid][id].keys()
|
/linux-master/include/crypto/ |
H A D | authenc.h | 29 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key,
|