| /linux-6.15/drivers/input/keyboard/ |
| H A D | ipaq-micro-keys.c | 50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 60 keys->micro->key_data = keys; in micro_key_start() 75 micro_key_start(keys); in micro_key_open() 84 micro_key_stop(keys); in micro_key_close() 93 keys = devm_kzalloc(&pdev->dev, sizeof(*keys), GFP_KERNEL); in micro_key_probe() 94 if (!keys) in micro_key_probe() 100 if (!keys->input) in micro_key_probe() 107 if (!keys->codes) in micro_key_probe() 110 keys->input->keycode = keys->codes; in micro_key_probe() 119 input_set_drvdata(keys->input, keys); in micro_key_probe() [all …]
|
| H A D | mtk-pmic-keys.c | 213 info->keys = keys; in mtk_pmic_key_setup() 254 if (keys->keys[index].wakeup) { in mtk_pmic_keys_suspend() 256 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_suspend() 270 if (keys->keys[index].wakeup) { in mtk_pmic_keys_resume() 272 if (keys->keys[index].irq_r > 0) in mtk_pmic_keys_resume() 349 keys->keys[index].irq = in mtk_pmic_keys_probe() 351 if (keys->keys[index].irq < 0) in mtk_pmic_keys_probe() 352 return keys->keys[index].irq; in mtk_pmic_keys_probe() 358 if (keys->keys[index].irq_r < 0) in mtk_pmic_keys_probe() 359 return keys->keys[index].irq_r; in mtk_pmic_keys_probe() [all …]
|
| H A D | Makefile | 8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 30 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 31 obj-$(CONFIG_KEYBOARD_IQS62X) += iqs62x-keys.o 41 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 47 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o 66 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
| /linux-6.15/tools/testing/selftests/bpf/progs/ |
| H A D | bpf_flow.c | 78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 182 keys->is_encap = true; in parse_ip_proto() 188 keys->is_encap = true; in parse_ip_proto() 210 keys->is_encap = true; in parse_ip_proto() 237 keys->sport = tcp->source; in parse_ip_proto() 238 keys->dport = tcp->dest; in parse_ip_proto() 247 keys->dport = udp->dest; in parse_ip_proto() 301 keys->is_frag = true; in PROG() 312 if (!(keys->flags & in PROG() 340 if (keys->flow_label && keys->flags & BPF_FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL) in PROG() [all …]
|
| /linux-6.15/fs/bcachefs/ |
| H A D | btree_journal_iter.c | 216 size_t gap_end = keys->gap + (keys->size - keys->nr); in journal_iters_fix() 278 idx -= keys->size - keys->nr; in bch2_journal_key_insert_take() 282 if (keys->nr == keys->size) { in bch2_journal_key_insert_take() 306 keys->gap = keys->nr; in bch2_journal_key_insert_take() 314 keys->data[keys->gap++] = n; in bch2_journal_key_insert_take() 664 move_gap(keys, keys->nr); in bch2_journal_keys_put() 678 keys->nr = keys->gap = keys->size = 0; in bch2_journal_keys_put() 755 keys->gap = keys->nr; in bch2_journal_keys_sort() 768 move_gap(keys, keys->nr); in bch2_shoot_down_journal_keys() 777 keys->nr = keys->gap = dst; in bch2_shoot_down_journal_keys() [all …]
|
| H A D | btree_write_buffer.c | 223 if (!wb->inc.keys.nr) in move_keys_from_inc_to_flushing() 229 darray_resize(&wb->flushing.keys, min_t(size_t, 1U << 20, wb->flushing.keys.nr + wb->inc.keys.nr)); in move_keys_from_inc_to_flushing() 232 if (!wb->flushing.keys.nr && wb->sorted.size >= wb->inc.keys.nr) { in move_keys_from_inc_to_flushing() 233 swap(wb->flushing.keys, wb->inc.keys); in move_keys_from_inc_to_flushing() 247 sizeof(wb->inc.keys.data[0]) * (wb->inc.keys.nr - nr)); in move_keys_from_inc_to_flushing() 250 wb->inc.keys.nr -= nr; in move_keys_from_inc_to_flushing() 252 if (!wb->inc.keys.nr) in move_keys_from_inc_to_flushing() 489 wb->flushing.keys.nr = dst - wb->flushing.keys.data; in bch2_btree_write_buffer_flush_locked() 563 *did_work |= wb->inc.keys.nr || wb->flushing.keys.nr; in btree_write_buffer_flush_seq() 754 dst->wb->keys.nr++; in bch2_journal_key_to_wb_slowpath() [all …]
|
| /linux-6.15/arch/arm64/include/asm/ |
| H A D | pointer_auth.h | 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 68 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel() 77 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user() 78 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user() 79 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user() 89 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_user() 90 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init_user() 91 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init_user() 92 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_keys_init_user() 96 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_keys_init_user() [all …]
|
| /linux-6.15/tools/testing/selftests/net/ |
| H A D | tcp_fastopen_backup_key.c | 62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 80 keys[6], keys[7]); in set_keys() 83 keys[0], keys[1], keys[2], keys[3]); in set_keys() 96 uint32_t keys[8]; in build_rcv_fd() local 122 keys[i] = rand(); in build_rcv_fd() 215 uint32_t keys[8]; in rotate_key() local 225 get_keys(fd, keys); in rotate_key() 227 set_keys(fd, keys); in rotate_key() [all …]
|
| /linux-6.15/tools/testing/selftests/bpf/map_tests/ |
| H A D | htab_map_batch_ops.c | 29 keys[i] = i + 1; in map_batch_update() 62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local 98 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch() 124 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 143 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 154 &batch, keys + total, in __test_map_lookup_and_delete_batch() 189 keys + total, in __test_map_lookup_and_delete_batch() 209 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_delete_batch() 217 &batch, keys + total, in __test_map_lookup_and_delete_batch() [all …]
|
| H A D | array_map_batch_ops.c | 15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 26 keys[i] = i; in map_batch_update() 52 CHECK(keys[i] + j + 1 != value, in map_batch_verify() 55 j, keys[i], value); in map_batch_verify() 58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify() 72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local 92 keys = calloc(max_entries, sizeof(*keys)); in __test_map_lookup_and_update_batch() 103 memset(keys, 0, max_entries * sizeof(*keys)); in __test_map_lookup_and_update_batch() 114 &batch, keys + total, in __test_map_lookup_and_update_batch() [all …]
|
| H A D | lpm_trie_map_batch_ops.c | 23 struct test_lpm_key *keys, int *values) in map_batch_update() argument 34 keys[i].prefix = 32; in map_batch_update() 36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update() 45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument 53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify() 69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local 94 map_batch_update(map_fd, max_entries, keys, values); in test_lpm_trie_map_batch_ops() 95 map_batch_verify(visited, max_entries, keys, values); in test_lpm_trie_map_batch_ops() 96 memset(keys, 0, max_entries * sizeof(*keys)); in test_lpm_trie_map_batch_ops() 107 keys + total, values + total, &count, &opts); in test_lpm_trie_map_batch_ops() [all …]
|
| /linux-6.15/arch/arm64/kernel/ |
| H A D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys() 46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys() 67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument 78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys() [all …]
|
| /linux-6.15/drivers/md/bcache/ |
| H A D | btree.c | 1333 for (t = b->keys.set; t <= &b->keys.set[b->keys.nsets]; t++) in btree_gc_mark_node() 1345 if ((keys - good_keys) * 2 > keys) in btree_gc_mark_node() 1381 keys += r[nodes++].keys; in btree_gc_coalesce() 1441 keys = n2->keys; in btree_gc_coalesce() 1456 n1->keys += keys; in btree_gc_coalesce() 1457 r[i].keys = n1->keys; in btree_gc_coalesce() 1464 n2->keys -= keys; in btree_gc_coalesce() 2310 btree_bset_first(n2)->keys = btree_bset_first(n1)->keys - keys; in btree_split() 2311 btree_bset_first(n1)->keys = keys; in btree_split() 2508 op.keys = keys; in bch_btree_insert() [all …]
|
| H A D | debug.c | 45 inmemory = b->keys.set->data; in bch_btree_verify() 50 v->keys.ops = b->keys.ops; in bch_btree_verify() 65 sorted = v->keys.set->data; in bch_btree_verify() 67 if (inmemory->keys != sorted->keys || in bch_btree_verify() 78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 164 struct keybuf keys; member 201 bch_keybuf_del(&i->keys, w); in bch_dump_read() [all …]
|
| /linux-6.15/drivers/net/ethernet/cisco/enic/ |
| H A D | enic_clsf.c | 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 174 struct flow_keys keys; in enic_rx_flow_steer() local 181 res = skb_flow_dissect_flow_keys(skb, &keys, 0); in enic_rx_flow_steer() 183 (keys.basic.ip_proto != IPPROTO_TCP && in enic_rx_flow_steer() 184 keys.basic.ip_proto != IPPROTO_UDP)) in enic_rx_flow_steer() 214 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer() 267 res = enic_addfltr_5t(enic, &keys, rxq_index); in enic_rx_flow_steer() [all …]
|
| /linux-6.15/drivers/mfd/ |
| H A D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 55 keys.buttons = buttons; in ucb1x00_assabet_add() 56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 57 keys.poll_interval = 50; in ucb1x00_assabet_add() 58 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
| /linux-6.15/security/integrity/ |
| H A D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 73 be added. This keyring shall contain just MOK keys. Unlike keys 86 other MOK keys load into the platform keyring. 89 bool "Only CA keys without DigitialSignature usage set" [all …]
|
| /linux-6.15/drivers/md/persistent-data/ |
| H A D | dm-btree.c | 104 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 402 if (rkey != keys[level]) { in dm_btree_lookup() 513 memcpy(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in copy_entries() 527 memmove(dest->keys + dest_offset, src->keys + src_offset, count * sizeof(uint64_t)); in move_entries() 779 pn->keys[middle_index] = rn->keys[0]; in split_two_into_three() 865 memcpy(ln->keys, pn->keys, nr_left * sizeof(pn->keys[0])); in btree_split_beneath() 882 memcpy(rn->keys, pn->keys + nr_left, nr_right * sizeof(pn->keys[0])); in btree_split_beneath() 897 pn->keys[0] = ln->keys[0]; in btree_split_beneath() 902 pn->keys[1] = rn->keys[0]; in btree_split_beneath() 1231 (le64_to_cpu(node->keys[index]) != keys[level])); in need_insert() [all …]
|
| /linux-6.15/security/keys/ |
| H A D | Kconfig | 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 60 bool "Large payload keys" 76 keys in the kernel. Trusted keys are random number symmetric keys, 83 source "security/keys/trusted-keys/Kconfig" 97 in the kernel. Encrypted keys are instantiated using kernel 106 bool "Allow encrypted keys with user decrypted data" 116 bool "Diffie-Hellman operations on retained keys" 123 public keys and shared secrets using values stored as keys [all …]
|
| /linux-6.15/tools/testing/selftests/net/tcp_ao/ |
| H A D | key-management.c | 427 struct test_key *keys; member 488 free(collection.keys); in init_default_key_collection() 489 collection.keys = NULL; in init_default_key_collection() 501 collection.keys = reallocarray(collection.keys, nr_keys, key_sz); in init_default_key_collection() 502 if (!collection.keys) in init_default_key_collection() 688 if (!keys) in verify_keys() 692 keys->get_all = 1; in verify_keys() 695 free(keys); in verify_keys() 724 dump_key = lookup_key(keys, keys->nkeys, sndid, rcvid); in verify_keys() 790 free(keys); in verify_keys() [all …]
|
| /linux-6.15/net/core/ |
| H A D | flow_dissector.c | 1775 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1779 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1793 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1829 struct flow_keys *keys, in ___skb_get_hash() argument 1869 struct flow_keys keys; in __skb_get_hash_symmetric_net() local 1873 memset(&keys, 0, sizeof(keys)); in __skb_get_hash_symmetric_net() 1893 struct flow_keys keys; in __skb_get_hash_net() local 1896 memset(&keys, 0, sizeof(keys)); in __skb_get_hash_net() 1899 &keys, NULL, 0, 0, 0, in __skb_get_hash_net() 1913 struct flow_keys keys; in skb_get_hash_perturb() local [all …]
|
| /linux-6.15/crypto/krb5/ |
| H A D | krb5_api.c | 162 const struct krb5_buffer *keys, in krb5_prepare_encryption() argument 176 ret = crypto_aead_setkey(ci, keys->data, keys->len); in krb5_prepare_encryption() 211 struct krb5_buffer keys = {}; in crypto_krb5_prepare_encryption() local 214 ret = krb5->profile->derive_encrypt_keys(krb5, TK, usage, &keys, gfp); in crypto_krb5_prepare_encryption() 218 ci = krb5_prepare_encryption(krb5, &keys, gfp); in crypto_krb5_prepare_encryption() 224 kfree(keys.data); in crypto_krb5_prepare_encryption() 227 kfree(keys.data); in crypto_krb5_prepare_encryption() 279 struct krb5_buffer keys = {}; in crypto_krb5_prepare_checksum() local 288 ci = krb5_prepare_checksum(krb5, &keys, gfp); in crypto_krb5_prepare_checksum() 294 kfree(keys.data); in crypto_krb5_prepare_checksum() [all …]
|
| /linux-6.15/drivers/crypto/nx/ |
| H A D | nx-aes-xcbc.c | 64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 79 len = sizeof(keys); in nx_xcbc_empty() 81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 84 if (len != sizeof(keys)) in nx_xcbc_empty() 90 if (len != sizeof(keys)) in nx_xcbc_empty() 102 keys[1][0] ^= 0x80; in nx_xcbc_empty() 104 len = sizeof(keys[1]); in nx_xcbc_empty() 107 memcpy(csbcpb->cpb.aes_ecb.key, keys[0], AES_BLOCK_SIZE); in nx_xcbc_empty() [all …]
|
| /linux-6.15/Documentation/devicetree/bindings/input/ |
| H A D | mediatek,pmic-keys.yaml | 4 $id: http://devicetree.org/schemas/input/mediatek,pmic-keys.yaml# 27 - mediatek,mt6323-keys 28 - mediatek,mt6328-keys 29 - mediatek,mt6331-keys 30 - mediatek,mt6357-keys 31 - mediatek,mt6358-keys 32 - mediatek,mt6359-keys 33 - mediatek,mt6397-keys
|
| /linux-6.15/lib/ |
| H A D | test_static_keys.c | 55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 61 if (previous != keys[i].key) { in invert_keys() 62 invert_key(keys[i].key); in invert_keys() 63 previous = keys[i].key; in invert_keys() 68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 74 ret = static_key_enabled(keys[i].key); in verify_keys() 75 init = keys[i].init_state; in verify_keys() 78 ret = keys[i].test_key(); in verify_keys() 79 if (static_key_enabled(keys[i].key)) { in verify_keys()
|