| /kernel/linux/linux-5.10/include/linux/platform_data/ |
| D | keyboard-spear.h | 20 KEY(0, 0, KEY_ESC), \ 21 KEY(0, 1, KEY_1), \ 22 KEY(0, 2, KEY_2), \ 23 KEY(0, 3, KEY_3), \ 24 KEY(0, 4, KEY_4), \ 25 KEY(0, 5, KEY_5), \ 26 KEY(0, 6, KEY_6), \ 27 KEY(0, 7, KEY_7), \ 28 KEY(0, 8, KEY_8), \ 29 KEY(1, 0, KEY_9), \ [all …]
|
| /kernel/linux/linux-4.19/include/linux/platform_data/ |
| D | keyboard-spear.h | 20 KEY(0, 0, KEY_ESC), \ 21 KEY(0, 1, KEY_1), \ 22 KEY(0, 2, KEY_2), \ 23 KEY(0, 3, KEY_3), \ 24 KEY(0, 4, KEY_4), \ 25 KEY(0, 5, KEY_5), \ 26 KEY(0, 6, KEY_6), \ 27 KEY(0, 7, KEY_7), \ 28 KEY(0, 8, KEY_8), \ 29 KEY(1, 0, KEY_9), \ [all …]
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | key.c | 2 /* Basic authentication token and access key management 27 unsigned int key_quota_root_maxkeys = 1000000; /* root's key count quota */ 28 unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */ 29 unsigned int key_quota_maxkeys = 200; /* general key count quota */ 30 unsigned int key_quota_maxbytes = 20000; /* general key space quota */ 35 /* We serialise key instantiation and link */ 39 void __key_check(const struct key *key) in __key_check() argument 41 printk("__key_check: key %p {%08x} should be {%08x}\n", in __key_check() 42 key, key->magic, KEY_DEBUG_MAGIC); in __key_check() 48 * Get the key quota record for a user, allocating a new record if one doesn't [all …]
|
| D | request_key.c | 2 /* Request a key from userspace 7 * See Documentation/security/keys/request-key.rst 20 #define key_negative_timeout 60 /* default timeout on a negative key's existence */ 22 static struct key *check_cached_key(struct keyring_search_context *ctx) in check_cached_key() 25 struct key *key = current->cached_requested_key; in check_cached_key() local 27 if (key && in check_cached_key() 28 ctx->match_data.cmp(key, &ctx->match_data) && in check_cached_key() 29 !(key->flags & ((1 << KEY_FLAG_INVALIDATED) | in check_cached_key() 31 return key_get(key); in check_cached_key() 36 static void cache_requested_key(struct key *key) in cache_requested_key() argument [all …]
|
| /kernel/linux/linux-4.19/security/keys/ |
| D | key.c | 1 /* Basic authentication token and access key management 30 unsigned int key_quota_root_maxkeys = 1000000; /* root's key count quota */ 31 unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */ 32 unsigned int key_quota_maxkeys = 200; /* general key count quota */ 33 unsigned int key_quota_maxbytes = 20000; /* general key space quota */ 38 /* We serialise key instantiation and link */ 42 void __key_check(const struct key *key) in __key_check() argument 44 printk("__key_check: key %p {%08x} should be {%08x}\n", in __key_check() 45 key, key->magic, KEY_DEBUG_MAGIC); in __key_check() 51 * Get the key quota record for a user, allocating a new record if one doesn't [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
| D | test_lru_map.c | 42 static int bpf_map_lookup_elem_with_ref_bit(int fd, unsigned long long key, in bpf_map_lookup_elem_with_ref_bit() argument 50 BPF_LD_IMM64(BPF_REG_3, key), in bpf_map_lookup_elem_with_ref_bit() 114 printf("key:%llu not found from map. %s(%d)\n", in map_subset() 119 printf("key:%llu value0:%llu != value1:%llu\n", in map_subset() 152 * Add key=1 (+1 key) 153 * Add key=2 (+1 key) 154 * Lookup Key=1 155 * Add Key=3 156 * => Key=2 will be removed by LRU 157 * Iterate map. Only found key=1 and key=3 [all …]
|
| /kernel/linux/linux-5.10/drivers/staging/wfx/ |
| D | key.c | 3 * Key management related functions. 11 #include "key.h" 29 WARN(!(wdev->key_map & BIT(idx)), "inconsistent key allocation"); in wfx_free_key() 34 struct ieee80211_key_conf *key, u8 *peer_addr) in fill_wep_pair() argument 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 44 struct ieee80211_key_conf *key) in fill_wep_group() argument 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 47 msg->key_id = key->keyidx; in fill_wep_group() [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
| D | test_tunnel_kern.c | 49 struct bpf_tunnel_key key; in _gre_set_tunnel() local 51 __builtin_memset(&key, 0x0, sizeof(key)); in _gre_set_tunnel() 52 key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */ in _gre_set_tunnel() 53 key.tunnel_id = 2; in _gre_set_tunnel() 54 key.tunnel_tos = 0; in _gre_set_tunnel() 55 key.tunnel_ttl = 64; in _gre_set_tunnel() 57 ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key), in _gre_set_tunnel() 71 struct bpf_tunnel_key key; in _gre_get_tunnel() local 72 char fmt[] = "key %d remote ip 0x%x\n"; in _gre_get_tunnel() 74 ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0); in _gre_get_tunnel() [all …]
|
| /kernel/linux/linux-4.19/Documentation/security/keys/ |
| D | core.rst | 2 Kernel Key Retention Service 9 Keyrings are permitted; these are a special type of key that can hold links to 13 The key service can be configured on by enabling: 15 "Security options"/"Enable access key retention support" (CONFIG_KEYS) 22 Key Overview 26 tokens, keyrings, etc.. These are represented in the kernel by struct key. 28 Each key has a number of attributes: 32 - A description (for matching a key in a search). 39 * Each key is issued a serial number of type key_serial_t that is unique for 40 the lifetime of that key. All serial numbers are positive non-zero 32-bit [all …]
|
| /kernel/linux/linux-4.19/fs/ubifs/ |
| D | key.h | 24 * This header contains various key-related definitions and helper function. 25 * UBIFS allows several key schemes, so we access key fields only via these 26 * helpers. At the moment only one key scheme is supported. 28 * Simple key scheme 32 * in case of direntry key). Next 3 bits are node type. The last 29 bits are 38 * Lot's of the key helpers require a struct ubifs_info *c as the first parameter. 40 * different c->key_format. But right now, there is only one key type, UBIFS_SIMPLE_KEY_FMT. 97 * ino_key_init - initialize inode key. 99 * @key: key to initialize 103 union ubifs_key *key, ino_t inum) in ino_key_init() argument [all …]
|
| /kernel/linux/linux-5.10/fs/ubifs/ |
| D | key.h | 12 * This header contains various key-related definitions and helper function. 13 * UBIFS allows several key schemes, so we access key fields only via these 14 * helpers. At the moment only one key scheme is supported. 16 * Simple key scheme 20 * in case of direntry key). Next 3 bits are node type. The last 29 bits are 26 * Lot's of the key helpers require a struct ubifs_info *c as the first parameter. 28 * different c->key_format. But right now, there is only one key type, UBIFS_SIMPLE_KEY_FMT. 85 * ino_key_init - initialize inode key. 87 * @key: key to initialize 91 union ubifs_key *key, ino_t inum) in ino_key_init() argument [all …]
|
| /kernel/linux/linux-4.19/include/linux/ |
| D | key.h | 1 /* Authentication token and access key management 32 /* key handle serial number */ 35 /* key handle permissions mask */ 38 struct key; 44 #define KEY_POS_VIEW 0x01000000 /* possessor can view a key's attributes */ 45 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */ 46 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */ 47 #define KEY_POS_SEARCH 0x08000000 /* possessor can find a key in search / search a keyring */ 48 #define KEY_POS_LINK 0x10000000 /* possessor can create a link to a key/keyring */ 49 #define KEY_POS_SETATTR 0x20000000 /* possessor can set key attributes */ [all …]
|
| /kernel/linux/linux-4.19/tools/testing/selftests/bpf/ |
| D | test_tunnel_kern.c | 50 struct bpf_tunnel_key key; in _gre_set_tunnel() local 52 __builtin_memset(&key, 0x0, sizeof(key)); in _gre_set_tunnel() 53 key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */ in _gre_set_tunnel() 54 key.tunnel_id = 2; in _gre_set_tunnel() 55 key.tunnel_tos = 0; in _gre_set_tunnel() 56 key.tunnel_ttl = 64; in _gre_set_tunnel() 58 ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key), in _gre_set_tunnel() 72 struct bpf_tunnel_key key; in _gre_get_tunnel() local 73 char fmt[] = "key %d remote ip 0x%x\n"; in _gre_get_tunnel() 75 ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0); in _gre_get_tunnel() [all …]
|
| D | test_lru_map.c | 53 printf("key:%llu not found from map. %s(%d)\n", in map_subset() 58 printf("key:%llu value0:%llu != value1:%llu\n", in map_subset() 91 * Add key=1 (+1 key) 92 * Add key=2 (+1 key) 93 * Lookup Key=1 94 * Add Key=3 95 * => Key=2 will be removed by LRU 96 * Iterate map. Only found key=1 and key=3 100 unsigned long long key, value[nr_cpus]; in test_lru_sanity0() local 120 /* insert key=1 element */ in test_lru_sanity0() [all …]
|
| /kernel/linux/linux-4.19/net/mac80211/ |
| D | key.c | 34 * DOC: Key handling basics 36 * Key handling in mac80211 is done based on per-interface (sub_if_data) 38 * each station key also belongs to that interface. 41 * that are implemented in software, for each key the hardware is asked 42 * to enable that key for offloading but if it cannot do that the key is 45 * There is currently no way of knowing whether a key is handled in SW 48 * All key management is internally protected by a mutex. Within all 49 * other parts of mac80211, key references are, just as STA structure 51 * unprotected, namely the key->sta dereferences within the hardware 53 * remove the key which waits for an RCU grace period. [all …]
|
| /kernel/linux/linux-5.10/Documentation/security/keys/ |
| D | core.rst | 2 Kernel Key Retention Service 9 Keyrings are permitted; these are a special type of key that can hold links to 13 The key service can be configured on by enabling: 15 "Security options"/"Enable access key retention support" (CONFIG_KEYS) 22 Key Overview 26 tokens, keyrings, etc.. These are represented in the kernel by struct key. 28 Each key has a number of attributes: 32 - A description (for matching a key in a search). 39 * Each key is issued a serial number of type key_serial_t that is unique for 40 the lifetime of that key. All serial numbers are positive non-zero 32-bit [all …]
|
| D | request-key.rst | 2 Key Request Service 5 The key request service is part of the key retention service (refer to 12 struct key *request_key(const struct key_type *type, 18 struct key *request_key_tag(const struct key_type *type, 25 struct key *request_key_with_auxdata(const struct key_type *type, 34 struct key *request_key_rcu(const struct key_type *type, 46 does not need to link the key to a keyring to prevent it from being immediately 47 destroyed. The kernel interface returns a pointer directly to the key, and 48 it's up to the caller to destroy the key. 56 NULL). This is only useful for those key types that define their own upcall [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | key.h | 2 /* Authentication token and access key management 27 /* key handle serial number */ 30 /* key handle permissions mask */ 33 struct key; 40 #define KEY_POS_VIEW 0x01000000 /* possessor can view a key's attributes */ 41 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */ 42 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */ 43 #define KEY_POS_SEARCH 0x08000000 /* possessor can find a key in search / search a keyring */ 44 #define KEY_POS_LINK 0x10000000 /* possessor can create a link to a key/keyring */ 45 #define KEY_POS_SETATTR 0x20000000 /* possessor can set key attributes */ [all …]
|
| /kernel/linux/linux-5.10/net/mac80211/ |
| D | key.c | 32 * DOC: Key handling basics 34 * Key handling in mac80211 is done based on per-interface (sub_if_data) 36 * each station key also belongs to that interface. 39 * that are implemented in software, for each key the hardware is asked 40 * to enable that key for offloading but if it cannot do that the key is 43 * There is currently no way of knowing whether a key is handled in SW 46 * All key management is internally protected by a mutex. Within all 47 * other parts of mac80211, key references are, just as STA structure 49 * unprotected, namely the key->sta dereferences within the hardware 51 * remove the key which waits for an RCU grace period. [all …]
|
| /kernel/linux/linux-5.10/crypto/ |
| D | rsa_helper.c | 3 * RSA key extract helper 19 struct rsa_key *key = context; in rsa_get_n() local 23 /* invalid key provided */ in rsa_get_n() 33 /* In FIPS mode only allow key size 2K and higher */ in rsa_get_n() 35 pr_err("RSA: key size not allowed in FIPS mode\n"); in rsa_get_n() 40 key->n = value; in rsa_get_n() 41 key->n_sz = vlen; in rsa_get_n() 49 struct rsa_key *key = context; in rsa_get_e() local 51 /* invalid key provided */ in rsa_get_e() 52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() [all …]
|
| /kernel/linux/linux-4.19/crypto/ |
| D | rsa_helper.c | 2 * RSA key extract helper 24 struct rsa_key *key = context; in rsa_get_n() local 28 /* invalid key provided */ in rsa_get_n() 38 /* In FIPS mode only allow key size 2K and higher */ in rsa_get_n() 40 pr_err("RSA: key size not allowed in FIPS mode\n"); in rsa_get_n() 45 key->n = value; in rsa_get_n() 46 key->n_sz = vlen; in rsa_get_n() 54 struct rsa_key *key = context; in rsa_get_e() local 56 /* invalid key provided */ in rsa_get_e() 57 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() [all …]
|
| /kernel/linux/linux-5.10/arch/s390/include/uapi/asm/ |
| D | pkey.h | 23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */ 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 26 #define MAXCLRKEYSIZE 32 /* a clear key value may be up to 32 bytes */ 28 #define MINEP11AESKEYBLOBSIZE 256 /* min EP11 AES key blob size */ 29 #define MAXEP11AESKEYBLOBSIZE 320 /* max EP11 AES key blob size */ 31 /* Minimum size of a key blob */ 50 /* the newer ioctls use a pkey_key_size enum for key size information */ 78 /* Struct to hold a CCA AES secure key blob */ 80 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */ [all …]
|
| /kernel/linux/linux-4.19/kernel/ |
| D | jump_label.c | 39 if (jea->key < jeb->key) in jump_label_cmp() 42 if (jea->key > jeb->key) in jump_label_cmp() 58 static void jump_label_update(struct static_key *key); 69 int static_key_count(struct static_key *key) in static_key_count() argument 75 int n = atomic_read(&key->enabled); in static_key_count() 81 void static_key_slow_inc_cpuslocked(struct static_key *key) in static_key_slow_inc_cpuslocked() argument 85 STATIC_KEY_CHECK_USE(key); in static_key_slow_inc_cpuslocked() 92 * static_key_enabled(&key) for jumps to be updated properly. in static_key_slow_inc_cpuslocked() 94 * So give a special meaning to negative key->enabled: it sends in static_key_slow_inc_cpuslocked() 99 for (v = atomic_read(&key->enabled); v > 0; v = v1) { in static_key_slow_inc_cpuslocked() [all …]
|
| /kernel/linux/linux-5.10/security/selinux/ss/ |
| D | avtab.c | 71 struct avtab_key *key, struct avtab_datum *datum) in avtab_insert_node() argument 78 newnode->key = *key; in avtab_insert_node() 80 if (key->specified & AVTAB_XPERMS) { in avtab_insert_node() 106 static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_datum *datum) in avtab_insert() argument 110 u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD); in avtab_insert() 115 hvalue = avtab_hash(key, h->mask); in avtab_insert() 119 if (key->source_type == cur->key.source_type && in avtab_insert() 120 key->target_type == cur->key.target_type && in avtab_insert() 121 key->target_class == cur->key.target_class && in avtab_insert() 122 (specified & cur->key.specified)) { in avtab_insert() [all …]
|
| /kernel/linux/linux-4.19/security/selinux/ss/ |
| D | avtab.c | 71 struct avtab_key *key, struct avtab_datum *datum) in avtab_insert_node() argument 78 newnode->key = *key; in avtab_insert_node() 80 if (key->specified & AVTAB_XPERMS) { in avtab_insert_node() 108 static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_datum *datum) in avtab_insert() argument 112 u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD); in avtab_insert() 117 hvalue = avtab_hash(key, h->mask); in avtab_insert() 121 if (key->source_type == cur->key.source_type && in avtab_insert() 122 key->target_type == cur->key.target_type && in avtab_insert() 123 key->target_class == cur->key.target_class && in avtab_insert() 124 (specified & cur->key.specified)) { in avtab_insert() [all …]
|