| /kernel/linux/linux-5.10/security/keys/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 3 # Key management configuration 7 bool "Enable access key retention support" 17 Furthermore, a special type of key is available that acts as keyring: 19 to five standard keyrings: UID-specific, GID-specific, session, 25 bool "Enable temporary caching of the last request_key() result" 33 This allows the key used for multiple step processes where each step 34 wants to request a key that is likely the same as the one requested 39 key. Pathwalk will call multiple methods for each dentry traversed 43 bool "Enable register of persistent per-UID keyrings" [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ux500/cryp/ |
| D | cryp.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * Copyright (C) ST-Ericsson SA 2010 4 * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson. 5 * Author: Jonas Linde <jonas.linde@stericsson.com> for ST-Ericsson. 6 * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson. 7 * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. 8 * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. 21 /* CRYP enable/disable */ 27 /* CRYP Start Computation enable/disable */ 33 /* CRYP Init Signal enable/disable */ [all …]
|
| /kernel/linux/linux-6.6/security/keys/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 3 # Key management configuration 7 bool "Enable access key retention support" 17 Furthermore, a special type of key is available that acts as keyring: 19 to five standard keyrings: UID-specific, GID-specific, session, 25 bool "Enable temporary caching of the last request_key() result" 33 This allows the key used for multiple step processes where each step 34 wants to request a key that is likely the same as the one requested 39 key. Pathwalk will call multiple methods for each dentry traversed 43 bool "Enable register of persistent per-UID keyrings" [all …]
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/ |
| D | sysrq.rst | 1 Linux Magic System Request Key Hacks 6 What is the magic SysRq key? 9 It is a 'magical' key combo you can hit which the kernel will respond to 12 How do I enable the magic SysRq key? 15 You need to say "yes" to 'Magic SysRq key (CONFIG_MAGIC_SYSRQ)' when 18 the SysRq key. The default value in this file is set by the 22 - 0 - disable sysrq completely 23 - 1 - enable all functions of sysrq 24 - >1 - bitmask of allowed sysrq functions (see below for detailed function 27 2 = 0x2 - enable control of console logging level [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/ |
| D | sysrq.rst | 1 Linux Magic System Request Key Hacks 6 What is the magic SysRq key? 9 It is a 'magical' key combo you can hit which the kernel will respond to 12 How do I enable the magic SysRq key? 15 You need to say "yes" to 'Magic SysRq key (CONFIG_MAGIC_SYSRQ)' when 18 the SysRq key. The default value in this file is set by the 22 - 0 - disable sysrq completely 23 - 1 - enable all functions of sysrq 24 - >1 - bitmask of allowed sysrq functions (see below for detailed function 27 2 = 0x2 - enable control of console logging level [all …]
|
| /kernel/linux/linux-5.10/Documentation/ABI/testing/ |
| D | evm | 7 HMAC-sha1 value across the extended attributes, storing the 11 an HMAC-sha1 generated locally with a 12 trusted/encrypted key stored in the Kernel Key 15 asymmetric key. These keys are loaded onto root's 23 0 Enable HMAC validation and creation 24 1 Enable digital signature validation 25 2 Permit modification of EVM-protected metadata at 35 will enable HMAC validation and creation 41 will enable HMAC and digital signature validation and 48 will enable digital signature validation, permit [all …]
|
| /kernel/linux/linux-6.6/include/linux/input/ |
| D | adp5589.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright 2010-2011 Analog Devices Inc. 47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1) 76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1) 114 * ---------------- BIT ------------------ 131 * ---- BIT -- ----------- 149 unsigned keypad_en_mask; /* Keypad (Rows/Columns) enable mask */ 152 bool repeat; /* Enable key repeat */ 153 bool en_keylock; /* Enable key lock feature (ADP5589 only)*/ 154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */ [all …]
|
| /kernel/linux/linux-5.10/include/linux/input/ |
| D | adp5589.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright 2010-2011 Analog Devices Inc. 47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1) 76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1) 114 * ---------------- BIT ------------------ 131 * ---- BIT -- ----------- 149 unsigned keypad_en_mask; /* Keypad (Rows/Columns) enable mask */ 152 bool repeat; /* Enable key repeat */ 153 bool en_keylock; /* Enable key lock feature (ADP5589 only)*/ 154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */ [all …]
|
| /kernel/linux/linux-6.6/Documentation/ABI/testing/ |
| D | evm | 8 HMAC-sha1 value across the extended attributes, storing the 12 an HMAC-sha1 generated locally with a 13 trusted/encrypted key stored in the Kernel Key 16 asymmetric key. These keys are loaded onto root's 24 0 Enable HMAC validation and creation 25 1 Enable digital signature validation 26 2 Permit modification of EVM-protected metadata at 36 will enable HMAC validation and creation 42 will enable HMAC and digital signature validation and 49 will enable digital signature validation, permit [all …]
|
| /kernel/linux/linux-5.10/include/linux/platform_data/ |
| D | adp5588.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 5 * Copyright 2009-2010 Analog Devices Inc. 14 #define KEY_LCK_EC_STAT 0x03 /* Key Lock and Event Counter Register */ 15 #define Key_EVENTA 0x04 /* Key Event Register A */ 16 #define Key_EVENTB 0x05 /* Key Event Register B */ 17 #define Key_EVENTC 0x06 /* Key Event Register C */ 18 #define Key_EVENTD 0x07 /* Key Event Register D */ 19 #define Key_EVENTE 0x08 /* Key Event Register E */ 20 #define Key_EVENTF 0x09 /* Key Event Register F */ 21 #define Key_EVENTG 0x0A /* Key Event Register G */ [all …]
|
| /kernel/linux/linux-6.6/drivers/input/misc/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 37 tristate "AB8500 Pon (PowerOn) Key" 40 Say Y here to use the PowerOn Key for ST-Ericsson's AB8500 41 Mix-Sig PMIC. 44 will be called ab8500-ponkey. 64 module will be called ad714x-i2c. 74 module will be called ad714x-spi. 81 Say Y to enable support for reporting power button status on 85 will be called ariel-pwrbutton. 92 Say Y to enable support for the haptics module in Arizona CODECs. [all …]
|
| /kernel/linux/linux-5.10/drivers/input/misc/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 37 tristate "AB8500 Pon (PowerOn) Key" 40 Say Y here to use the PowerOn Key for ST-Ericsson's AB8500 41 Mix-Sig PMIC. 44 will be called ab8500-ponkey. 64 module will be called ad714x-i2c. 74 module will be called ad714x-spi. 81 Say Y to enable support for the haptics module in Arizona CODECs. 84 module will be called arizona-haptics. 114 Say Y here to enable support for the NI Ettus Research [all …]
|
| /kernel/linux/linux-5.10/arch/c6x/platforms/ |
| D | dscr.c | 1 // SPDX-License-Identifier: GPL-2.0-only 13 * registers often protected by a lock register. One or more key values must 15 * The configuration register may be used to enable (and disable in some 18 * bits are write once. That is, you may be able to enable a device, but 48 * registers, the key value must first be written to the lockreg. 53 u32 key; /* unlock key */ member 57 * This describes a contiguous area of like control bits used to enable/disable 67 u8 enable_only; /* bits are write-once to enable only */ 68 u8 enable; /* value used to enable device */ member 86 u8 enable; /* value indicating enabled state */ member [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/kvm/s390x/ |
| D | tprot.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 14 #define CR0_FETCH_PROTECTION_OVERRIDE (1UL << (63 - 38)) 15 #define CR0_STORAGE_PROTECTION_OVERRIDE (1UL << (63 - 39)) 22 static int set_storage_key(void *addr, uint8_t key) in set_storage_key() argument 31 "0: sske %[key], %[addr]\n" in set_storage_key() 34 : [key] "r" (key) in set_storage_key() 37 return -not_mapped; in set_storage_key() 47 static enum permission test_protection(void *addr, uint8_t key) in test_protection() argument 52 "tprot %[addr], 0(%[key])\n" in test_protection() 56 [key] "a" (key) in test_protection() [all …]
|
| /kernel/linux/linux-5.10/drivers/input/keyboard/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 24 board-specific setup logic must also provide a configuration data 38 be called adp5520-keys. 48 module will be called adp5588-keys. 58 module will be called adp5589-keys. 81 You will also need to enable appropriate SPI master controllers: 122 Say Y here if you have a PA-RISC machine and want to use an AT or 124 PA-RISC keyboards. 134 built-in keyboard (as opposed to an external keyboard). 145 Left 102nd key (the key to the right of Left Shift) [all …]
|
| D | davinci_keyscan.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * DaVinci Key Scan Driver for TI platforms 9 * Initial Code: Sandeep Paulraj <s-paulraj@ti.com> 22 #include <linux/platform_data/keyscan-davinci.h> 24 /* Key scan registers */ 37 /* Key Control Register (KEYCTRL) */ 65 struct device *dev = &davinci_ks->input->dev; in davinci_ks_initialize() 66 struct davinci_ks_platform_data *pdata = davinci_ks->pdata; in davinci_ks_initialize() 69 /* Enable all interrupts */ in davinci_ks_initialize() 71 davinci_ks->base + DAVINCI_KEYSCAN_INTENA); in davinci_ks_initialize() [all …]
|
| D | pxa27x_keypad.c | 1 // SPDX-License-Identifier: GPL-2.0-only 29 #include <linux/platform_data/keypad-pxa27x.h> 34 #define KPDK 0x0008 /* Keypad Direct Key register */ 36 #define KPMK 0x0018 /* Keypad Matrix Key register */ 39 /* Keypad Automatic Scan Multiple Key Presser register 0-3 */ 47 #define KPC_MKRN(n) ((((n) - 1) & 0x7) << 26) /* matrix key row number */ 48 #define KPC_MKCN(n) ((((n) - 1) & 0x7) << 23) /* matrix key column number */ 49 #define KPC_DKN(n) ((((n) - 1) & 0x7) << 6) /* direct key number */ 54 #define KPC_IMKP (0x1 << 21) /* Ignore Multiple Key Press */ 59 #define KPC_ME (0x1 << 12) /* Matrix Keypad Enable */ [all …]
|
| /kernel/linux/linux-6.6/drivers/input/keyboard/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 24 board-specific setup logic must also provide a configuration data 38 be called adp5520-keys. 51 module will be called adp5588-keys. 61 module will be called adp5589-keys. 84 You will also need to enable appropriate SPI master controllers: 126 Say Y here if you have a PA-RISC machine and want to use an AT or 128 PA-RISC keyboards. 138 built-in keyboard (as opposed to an external keyboard). 149 Left 102nd key (the key to the right of Left Shift) [all …]
|
| D | pxa27x_keypad.c | 1 // SPDX-License-Identifier: GPL-2.0-only 29 #include <linux/platform_data/keypad-pxa27x.h> 34 #define KPDK 0x0008 /* Keypad Direct Key register */ 36 #define KPMK 0x0018 /* Keypad Matrix Key register */ 39 /* Keypad Automatic Scan Multiple Key Presser register 0-3 */ 47 #define KPC_MKRN(n) ((((n) - 1) & 0x7) << 26) /* matrix key row number */ 48 #define KPC_MKCN(n) ((((n) - 1) & 0x7) << 23) /* matrix key column number */ 49 #define KPC_DKN(n) ((((n) - 1) & 0x7) << 6) /* direct key number */ 54 #define KPC_IMKP (0x1 << 21) /* Ignore Multiple Key Press */ 59 #define KPC_ME (0x1 << 12) /* Matrix Keypad Enable */ [all …]
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/laptops/ |
| D | thinkpad-acpi.rst | 9 - Borislav Deianov <borislav@users.sf.net> 10 - Henrique de Moraes Holschuh <hmh@hmh.eng.br> 12 http://ibm-acpi.sf.net/ 19 This driver used to be named ibm-acpi until kernel 2.6.21 and release 20 0.13-20070314. It used to be in the drivers/acpi tree, but it was 21 moved to the drivers/misc tree and renamed to thinkpad-acpi for kernel 25 The driver is named "thinkpad-acpi". In some places, like module 29 "tpacpi" is used as a shorthand where "thinkpad-acpi" would be too 33 ------ 38 - Fn key combinations [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/laptops/ |
| D | thinkpad-acpi.rst | 9 - Borislav Deianov <borislav@users.sf.net> 10 - Henrique de Moraes Holschuh <hmh@hmh.eng.br> 12 http://ibm-acpi.sf.net/ 19 This driver used to be named ibm-acpi until kernel 2.6.21 and release 20 0.13-20070314. It used to be in the drivers/acpi tree, but it was 21 moved to the drivers/misc tree and renamed to thinkpad-acpi for kernel 25 The driver is named "thinkpad-acpi". In some places, like module 29 "tpacpi" is used as a shorthand where "thinkpad-acpi" would be too 33 ------ 38 - Fn key combinations [all …]
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/c6x/ |
| D | dscr.txt | 2 ------------------------------------ 10 more key values must be written to a lock register in order to unlock the 12 enable (and disable in some cases) SoC pin drivers, select peripheral clock 19 For device state control (enable/disable), each device control is assigned an 24 - compatible: must be "ti,c64x+dscr" 25 - reg: register area base and size 34 - ti,dscr-devstat 37 - ti,dscr-silicon-rev 40 - ti,dscr-rmii-resets 44 - ti,dscr-locked-regs [all …]
|
| /kernel/linux/linux-6.6/security/keys/trusted-keys/ |
| D | Kconfig | 2 bool "TPM-based trusted keys" 13 Enable use of the Trusted Platform Module (TPM) as trusted key 15 which will be generated and RSA-sealed by the TPM. 20 bool "TEE-based trusted keys" 24 Enable use of the Trusted Execution Environment (TEE) as trusted 25 key backend. 28 bool "CAAM-based trusted keys" 33 Enable use of NXP's Cryptographic Accelerator and Assurance Module 34 (CAAM) as trusted key backend.
|
| /kernel/linux/linux-6.6/Documentation/driver-api/nvdimm/ |
| D | security.rst | 6 --------------- 16 ------------------ 28 update <old_keyid> <new_keyid> - enable or update passphrase. 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. 36 3. Key Management [all …]
|
| /kernel/linux/linux-5.10/Documentation/driver-api/nvdimm/ |
| D | security.rst | 6 --------------- 16 ------------------ 28 update <old_keyid> <new_keyid> - enable or update passphrase. 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. 36 3. Key Management [all …]
|