| /kernel/linux/linux-4.19/drivers/input/keyboard/ |
| D | ipaq-micro-keys.c | 46 struct ipaq_micro_keys *keys = data; in micro_key_receive() local 53 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 54 input_sync(keys->input); in micro_key_receive() 58 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument 60 spin_lock(&keys->micro->lock); in micro_key_start() 61 keys->micro->key = micro_key_receive; in micro_key_start() 62 keys->micro->key_data = keys; in micro_key_start() 63 spin_unlock(&keys->micro->lock); in micro_key_start() 66 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument 68 spin_lock(&keys->micro->lock); in micro_key_stop() [all …]
|
| D | mtk-pmic-keys.c | 88 struct mtk_pmic_keys *keys; member 99 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member 108 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument 114 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 119 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 123 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 130 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 133 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 138 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 141 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() [all …]
|
| /kernel/linux/linux-5.10/drivers/input/keyboard/ |
| D | ipaq-micro-keys.c | 43 struct ipaq_micro_keys *keys = data; in micro_key_receive() local 50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 51 input_sync(keys->input); in micro_key_receive() 55 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument 57 spin_lock(&keys->micro->lock); in micro_key_start() 58 keys->micro->key = micro_key_receive; in micro_key_start() 59 keys->micro->key_data = keys; in micro_key_start() 60 spin_unlock(&keys->micro->lock); in micro_key_start() 63 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument 65 spin_lock(&keys->micro->lock); in micro_key_stop() [all …]
|
| D | mtk-pmic-keys.c | 78 struct mtk_pmic_keys *keys; member 89 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member 98 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument 104 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 109 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 113 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 120 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 123 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 128 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 131 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
| D | bpf_flow.c | 74 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, in export_flow_keys() argument 77 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 80 memcpy(&val, keys, sizeof(val)); in export_flow_keys() 117 struct bpf_flow_keys *keys = skb->flow_keys; in parse_eth_proto() local 136 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 139 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 145 struct bpf_flow_keys *keys = skb->flow_keys; in _dissect() local 147 return parse_eth_proto(skb, keys->n_proto); in _dissect() 153 struct bpf_flow_keys *keys = skb->flow_keys; in parse_ip_proto() local 165 return export_flow_keys(keys, BPF_DROP); in parse_ip_proto() [all …]
|
| /kernel/linux/linux-4.19/security/keys/ |
| D | Kconfig | 5 config KEYS config 10 access keys in the kernel. 12 It also includes provision of methods by which such keys might be 17 a searchable sequence of keys. Each process is equipped with access 25 depends on COMPAT && KEYS 29 depends on KEYS 45 bool "Large payload keys" 46 depends on KEYS 52 This option provides support for holding large keys within the kernel 59 tristate "TRUSTED KEYS" [all …]
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | Kconfig | 6 config KEYS config 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 26 depends on KEYS 44 depends on KEYS 60 bool "Large payload keys" 61 depends on KEYS 65 This option provides support for holding large keys within the kernel 72 tristate "TRUSTED KEYS" [all …]
|
| /kernel/linux/linux-4.19/certs/ |
| D | Kconfig | 19 bool "Provide system-wide ring of trusted keys" 20 depends on KEYS 23 Provide a system keyring to which trusted keys can be added. Keys in 24 the keyring are considered to be trusted. Keys may be added at will 26 userspace may only add extra keys if those keys can be verified by 27 keys already in the keyring. 29 Keys in this keyring are used by module signature checking. 32 string "Additional X.509 keys for default system keyring" 40 NOTE: If you previously provided keys for the system keyring in the 61 bool "Provide a keyring to which extra trustable keys may be added" [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/include/asm/ |
| D | pointer_auth.h | 22 * We give each process its own keys, which are shared by all threads. The keys 37 static inline void ptrauth_keys_init_user(struct ptrauth_keys_user *keys) in ptrauth_keys_init_user() argument 40 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_user() 41 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init_user() 42 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init_user() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_keys_init_user() 47 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_keys_init_user() 57 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_init_kernel() argument 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 63 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_switch_kernel() argument [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/net/ |
| D | tcp_fastopen_backup_key.c | 5 * New keys are 'rotated' in two steps: 7 * 2) Make new key the primary by swapping the backup and primary keys 51 static void get_keys(int fd, uint32_t *keys) in get_keys() argument 57 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) in get_keys() 64 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 65 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 69 static void set_keys(int fd, uint32_t *keys) in set_keys() argument 74 if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, in set_keys() 81 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 82 keys[6], keys[7]); in set_keys() [all …]
|
| /kernel/linux/linux-5.10/certs/ |
| D | Kconfig | 19 bool "Provide system-wide ring of trusted keys" 20 depends on KEYS 23 Provide a system keyring to which trusted keys can be added. Keys in 24 the keyring are considered to be trusted. Keys may be added at will 26 userspace may only add extra keys if those keys can be verified by 27 keys already in the keyring. 29 Keys in this keyring are used by module signature checking. 32 string "Additional X.509 keys for default system keyring" 40 NOTE: If you previously provided keys for the system keyring in the 61 bool "Provide a keyring to which extra trustable keys may be added" [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/map_tests/ |
| D | htab_map_batch_ops.c | 13 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 28 keys[i] = i + 1; in map_batch_update() 36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 41 int *keys, void *values, bool is_pcpu) in map_batch_verify() argument 55 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j), in map_batch_verify() 58 i, j, keys[i], bpf_percpu(v[i], j)); in map_batch_verify() 61 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 63 "error: i %d key %d value %d\n", i, keys[i], in map_batch_verify() 72 "error: keys array at index %d missing\n", i); in map_batch_verify() 80 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local [all …]
|
| D | array_map_batch_ops.c | 12 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 22 keys[i] = i; in map_batch_update() 26 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 31 int *keys, int *values) in map_batch_verify() argument 37 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 38 "error: i %d key %d value %d\n", i, keys[i], values[i]); in map_batch_verify() 43 "error: keys array at index %d missing\n", i); in map_batch_verify() 55 int map_fd, *keys, *values, *visited; in test_array_map_batch_ops() local 71 keys = malloc(max_entries * sizeof(int)); in test_array_map_batch_ops() 74 CHECK(!keys || !values || !visited, "malloc()", "error:%s\n", in test_array_map_batch_ops() [all …]
|
| /kernel/linux/linux-4.19/Documentation/security/keys/ |
| D | trusted-encrypted.rst | 2 Trusted and Encrypted Keys 5 Trusted and Encrypted Keys are two new key types added to the existing kernel 6 key ring service. Both of these new types are variable length symmetric keys, 7 and in both cases all keys are created in the kernel, and user space sees, 8 stores, and loads only encrypted blobs. Trusted Keys require the availability 10 Keys can be used on any system. All user level blobs, are displayed and loaded 13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 17 (future) PCR values, so keys are easily migrated to new pcr values, such as 21 By default, trusted keys are sealed under the SRK, which has the default 53 TPM_STORED_DATA format. The key length for new keys are always in bytes. [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/kernel/ |
| D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys()
|
| /kernel/linux/linux-5.10/lib/ |
| D | test_static_keys.c | 3 * Kernel module for testing static keys. 14 /* old keys */ 55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 61 if (previous != keys[i].key) { in invert_keys() 62 invert_key(keys[i].key); in invert_keys() 63 previous = keys[i].key; in invert_keys() 68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 74 ret = static_key_enabled(keys[i].key); in verify_keys() 75 init = keys[i].init_state; in verify_keys() 78 ret = keys[i].test_key(); in verify_keys() [all …]
|
| /kernel/linux/linux-5.10/Documentation/security/keys/ |
| D | trusted-encrypted.rst | 2 Trusted and Encrypted Keys 5 Trusted and Encrypted Keys are two new key types added to the existing kernel 6 key ring service. Both of these new types are variable length symmetric keys, 7 and in both cases all keys are created in the kernel, and user space sees, 8 stores, and loads only encrypted blobs. Trusted Keys require the availability 10 Keys can be used on any system. All user level blobs, are displayed and loaded 13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 17 (future) PCR values, so keys are easily migrated to new pcr values, such as 24 By default, trusted keys are sealed under the SRK, which has the default 77 TPM_STORED_DATA format. The key length for new keys are always in bytes. [all …]
|
| /kernel/linux/linux-4.19/lib/ |
| D | test_static_keys.c | 2 * Kernel module for testing static keys. 22 /* old keys */ 63 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 69 if (previous != keys[i].key) { in invert_keys() 70 invert_key(keys[i].key); in invert_keys() 71 previous = keys[i].key; in invert_keys() 76 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 82 ret = static_key_enabled(keys[i].key); in verify_keys() 83 init = keys[i].init_state; in verify_keys() 86 ret = keys[i].test_key(); in verify_keys() [all …]
|
| /kernel/linux/linux-5.10/drivers/md/bcache/ |
| D | btree.c | 18 * as keys are inserted we only sort the pages that have not yet been written. 52 * Check for bad keys in replay 115 if (b->level && b->keys.nsets) in bch_btree_init_next() 116 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 118 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() 121 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next() 164 iter->b = &b->keys; in bch_btree_node_read_done() 171 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done() 199 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done() 209 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done() [all …]
|
| /kernel/linux/linux-4.19/drivers/md/bcache/ |
| D | btree.c | 18 * as keys are inserted we only sort the pages that have not yet been written. 52 * Check for bad keys in replay 171 if (b->level && b->keys.nsets) in bch_btree_init_next() 172 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 174 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() 177 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next() 215 iter->b = &b->keys; in bch_btree_node_read_done() 222 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done() 250 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done() 260 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done() [all …]
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/cisco/enic/ |
| D | enic_clsf.c | 15 * @keys: flow_keys of ipv4 5tuple 21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t() 39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search() 163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() [all …]
|
| /kernel/linux/linux-4.19/drivers/net/ethernet/cisco/enic/ |
| D | enic_clsf.c | 15 * @keys: flow_keys of ipv4 5tuple 21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 37 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t() 38 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t() 39 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 40 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 161 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search() 162 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search() 163 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() [all …]
|
| /kernel/linux/linux-5.10/security/integrity/ |
| D | Kconfig | 22 select KEYS 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which 76 bool "Enable loading of platform and blacklisted keys for POWER" [all …]
|
| /kernel/linux/linux-4.19/net/core/ |
| D | flow_dissector.c | 594 * @flow_dissector: list of keys to dissect 601 * The function will try to retrieve individual keys into target specified 1143 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument 1147 switch (keys->control.addr_type) { in __flow_hash_consistentify() 1149 addr_diff = (__force u32)keys->addrs.v4addrs.dst - in __flow_hash_consistentify() 1150 (__force u32)keys->addrs.v4addrs.src; in __flow_hash_consistentify() 1153 ((__force u16)keys->ports.dst < in __flow_hash_consistentify() 1154 (__force u16)keys->ports.src))) { in __flow_hash_consistentify() 1155 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1156 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() [all …]
|
| /kernel/linux/linux-5.10/fs/xfs/ |
| D | xfs_fsmap.c | 173 struct xfs_fsmap *keys, 406 struct xfs_fsmap *keys, in xfs_getfsmap_logdev() argument 413 /* Set up search keys */ in xfs_getfsmap_logdev() 414 info->low.rm_startblock = XFS_BB_TO_FSBT(mp, keys[0].fmr_physical); in xfs_getfsmap_logdev() 415 info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset); in xfs_getfsmap_logdev() 416 error = xfs_fsmap_owner_to_rmap(&info->low, keys); in xfs_getfsmap_logdev() 420 xfs_getfsmap_set_irec_flags(&info->low, &keys[0]); in xfs_getfsmap_logdev() 422 error = xfs_fsmap_owner_to_rmap(&info->high, keys + 1); in xfs_getfsmap_logdev() 435 if (keys[0].fmr_physical > 0) in xfs_getfsmap_logdev() 475 struct xfs_fsmap *keys, in __xfs_getfsmap_rtdev() argument [all …]
|