| /kernel/linux/linux-5.10/include/linux/platform_data/ |
| D | keyboard-spear.h | 20 KEY(0, 0, KEY_ESC), \ 21 KEY(0, 1, KEY_1), \ 22 KEY(0, 2, KEY_2), \ 23 KEY(0, 3, KEY_3), \ 24 KEY(0, 4, KEY_4), \ 25 KEY(0, 5, KEY_5), \ 26 KEY(0, 6, KEY_6), \ 27 KEY(0, 7, KEY_7), \ 28 KEY(0, 8, KEY_8), \ 29 KEY(1, 0, KEY_9), \ [all …]
|
| /kernel/linux/linux-6.6/include/linux/platform_data/ |
| D | keyboard-spear.h | 20 KEY(0, 0, KEY_ESC), \ 21 KEY(0, 1, KEY_1), \ 22 KEY(0, 2, KEY_2), \ 23 KEY(0, 3, KEY_3), \ 24 KEY(0, 4, KEY_4), \ 25 KEY(0, 5, KEY_5), \ 26 KEY(0, 6, KEY_6), \ 27 KEY(0, 7, KEY_7), \ 28 KEY(0, 8, KEY_8), \ 29 KEY(1, 0, KEY_9), \ [all …]
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | key.c | 2 /* Basic authentication token and access key management 27 unsigned int key_quota_root_maxkeys = 1000000; /* root's key count quota */ 28 unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */ 29 unsigned int key_quota_maxkeys = 200; /* general key count quota */ 30 unsigned int key_quota_maxbytes = 20000; /* general key space quota */ 35 /* We serialise key instantiation and link */ 39 void __key_check(const struct key *key) in __key_check() argument 41 printk("__key_check: key %p {%08x} should be {%08x}\n", in __key_check() 42 key, key->magic, KEY_DEBUG_MAGIC); in __key_check() 48 * Get the key quota record for a user, allocating a new record if one doesn't [all …]
|
| D | request_key.c | 2 /* Request a key from userspace 7 * See Documentation/security/keys/request-key.rst 20 #define key_negative_timeout 60 /* default timeout on a negative key's existence */ 22 static struct key *check_cached_key(struct keyring_search_context *ctx) in check_cached_key() 25 struct key *key = current->cached_requested_key; in check_cached_key() local 27 if (key && in check_cached_key() 28 ctx->match_data.cmp(key, &ctx->match_data) && in check_cached_key() 29 !(key->flags & ((1 << KEY_FLAG_INVALIDATED) | in check_cached_key() 31 return key_get(key); in check_cached_key() 36 static void cache_requested_key(struct key *key) in cache_requested_key() argument [all …]
|
| /kernel/linux/linux-6.6/security/keys/ |
| D | key.c | 2 /* Basic authentication token and access key management 27 unsigned int key_quota_root_maxkeys = 1000000; /* root's key count quota */ 28 unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */ 29 unsigned int key_quota_maxkeys = 200; /* general key count quota */ 30 unsigned int key_quota_maxbytes = 20000; /* general key space quota */ 35 /* We serialise key instantiation and link */ 39 void __key_check(const struct key *key) in __key_check() argument 41 printk("__key_check: key %p {%08x} should be {%08x}\n", in __key_check() 42 key, key->magic, KEY_DEBUG_MAGIC); in __key_check() 48 * Get the key quota record for a user, allocating a new record if one doesn't [all …]
|
| D | request_key.c | 2 /* Request a key from userspace 7 * See Documentation/security/keys/request-key.rst 20 #define key_negative_timeout 60 /* default timeout on a negative key's existence */ 22 static struct key *check_cached_key(struct keyring_search_context *ctx) in check_cached_key() 25 struct key *key = current->cached_requested_key; in check_cached_key() local 27 if (key && in check_cached_key() 28 ctx->match_data.cmp(key, &ctx->match_data) && in check_cached_key() 29 !(key->flags & ((1 << KEY_FLAG_INVALIDATED) | in check_cached_key() 31 return key_get(key); in check_cached_key() 36 static void cache_requested_key(struct key *key) in cache_requested_key() argument [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
| D | test_lru_map.c | 42 static int bpf_map_lookup_elem_with_ref_bit(int fd, unsigned long long key, in bpf_map_lookup_elem_with_ref_bit() argument 48 BPF_LD_IMM64(BPF_REG_3, key), in bpf_map_lookup_elem_with_ref_bit() 103 printf("key:%llu not found from map. %s(%d)\n", in map_subset() 108 printf("key:%llu value0:%llu != value1:%llu\n", in map_subset() 154 * Add key=1 (+1 key) 155 * Add key=2 (+1 key) 156 * Lookup Key=1 157 * Add Key=3 158 * => Key=2 will be removed by LRU 159 * Iterate map. Only found key=1 and key=3 [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
| D | test_lru_map.c | 42 static int bpf_map_lookup_elem_with_ref_bit(int fd, unsigned long long key, in bpf_map_lookup_elem_with_ref_bit() argument 50 BPF_LD_IMM64(BPF_REG_3, key), in bpf_map_lookup_elem_with_ref_bit() 114 printf("key:%llu not found from map. %s(%d)\n", in map_subset() 119 printf("key:%llu value0:%llu != value1:%llu\n", in map_subset() 152 * Add key=1 (+1 key) 153 * Add key=2 (+1 key) 154 * Lookup Key=1 155 * Add Key=3 156 * => Key=2 will be removed by LRU 157 * Iterate map. Only found key=1 and key=3 [all …]
|
| /kernel/linux/linux-6.6/drivers/net/wireless/silabs/wfx/ |
| D | key.c | 3 * Key management related functions. 11 #include "key.h" 29 WARN(!(wdev->key_map & BIT(idx)), "inconsistent key allocation"); in wfx_free_key() 34 struct ieee80211_key_conf *key, u8 *peer_addr) in fill_wep_pair() argument 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 44 struct ieee80211_key_conf *key) in fill_wep_group() argument 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 47 msg->key_id = key->keyidx; in fill_wep_group() [all …]
|
| /kernel/linux/linux-5.10/drivers/staging/wfx/ |
| D | key.c | 3 * Key management related functions. 11 #include "key.h" 29 WARN(!(wdev->key_map & BIT(idx)), "inconsistent key allocation"); in wfx_free_key() 34 struct ieee80211_key_conf *key, u8 *peer_addr) in fill_wep_pair() argument 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 44 struct ieee80211_key_conf *key) in fill_wep_group() argument 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 47 msg->key_id = key->keyidx; in fill_wep_group() [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | test_tunnel_kern.c | 73 __type(key, __u32); 81 struct bpf_tunnel_key key; in gre_set_tunnel() local 83 __builtin_memset(&key, 0x0, sizeof(key)); in gre_set_tunnel() 84 key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */ in gre_set_tunnel() 85 key.tunnel_id = 2; in gre_set_tunnel() 86 key.tunnel_tos = 0; in gre_set_tunnel() 87 key.tunnel_ttl = 64; in gre_set_tunnel() 89 ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key), in gre_set_tunnel() 103 struct bpf_tunnel_key key; in gre_set_tunnel_no_key() local 105 __builtin_memset(&key, 0x0, sizeof(key)); in gre_set_tunnel_no_key() [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
| D | test_tunnel_kern.c | 49 struct bpf_tunnel_key key; in _gre_set_tunnel() local 51 __builtin_memset(&key, 0x0, sizeof(key)); in _gre_set_tunnel() 52 key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */ in _gre_set_tunnel() 53 key.tunnel_id = 2; in _gre_set_tunnel() 54 key.tunnel_tos = 0; in _gre_set_tunnel() 55 key.tunnel_ttl = 64; in _gre_set_tunnel() 57 ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key), in _gre_set_tunnel() 71 struct bpf_tunnel_key key; in _gre_get_tunnel() local 72 char fmt[] = "key %d remote ip 0x%x\n"; in _gre_get_tunnel() 74 ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0); in _gre_get_tunnel() [all …]
|
| /kernel/linux/linux-6.6/fs/ubifs/ |
| D | key.h | 12 * This header contains various key-related definitions and helper function. 13 * UBIFS allows several key schemes, so we access key fields only via these 14 * helpers. At the moment only one key scheme is supported. 16 * Simple key scheme 20 * in case of direntry key). Next 3 bits are node type. The last 29 bits are 26 * Lot's of the key helpers require a struct ubifs_info *c as the first parameter. 28 * different c->key_format. But right now, there is only one key type, UBIFS_SIMPLE_KEY_FMT. 85 * ino_key_init - initialize inode key. 87 * @key: key to initialize 91 union ubifs_key *key, ino_t inum) in ino_key_init() argument [all …]
|
| /kernel/linux/linux-5.10/fs/ubifs/ |
| D | key.h | 12 * This header contains various key-related definitions and helper function. 13 * UBIFS allows several key schemes, so we access key fields only via these 14 * helpers. At the moment only one key scheme is supported. 16 * Simple key scheme 20 * in case of direntry key). Next 3 bits are node type. The last 29 bits are 26 * Lot's of the key helpers require a struct ubifs_info *c as the first parameter. 28 * different c->key_format. But right now, there is only one key type, UBIFS_SIMPLE_KEY_FMT. 85 * ino_key_init - initialize inode key. 87 * @key: key to initialize 91 union ubifs_key *key, ino_t inum) in ino_key_init() argument [all …]
|
| /kernel/linux/linux-6.6/net/mac80211/ |
| D | key.c | 32 * DOC: Key handling basics 34 * Key handling in mac80211 is done based on per-interface (sub_if_data) 36 * each station key also belongs to that interface. 39 * that are implemented in software, for each key the hardware is asked 40 * to enable that key for offloading but if it cannot do that the key is 43 * There is currently no way of knowing whether a key is handled in SW 46 * All key management is internally protected by a mutex. Within all 47 * other parts of mac80211, key references are, just as STA structure 49 * unprotected, namely the key->sta dereferences within the hardware 51 * remove the key which waits for an RCU grace period. [all …]
|
| /kernel/linux/linux-5.10/Documentation/security/keys/ |
| D | core.rst | 2 Kernel Key Retention Service 9 Keyrings are permitted; these are a special type of key that can hold links to 13 The key service can be configured on by enabling: 15 "Security options"/"Enable access key retention support" (CONFIG_KEYS) 22 Key Overview 26 tokens, keyrings, etc.. These are represented in the kernel by struct key. 28 Each key has a number of attributes: 32 - A description (for matching a key in a search). 39 * Each key is issued a serial number of type key_serial_t that is unique for 40 the lifetime of that key. All serial numbers are positive non-zero 32-bit [all …]
|
| /kernel/linux/linux-6.6/Documentation/security/keys/ |
| D | core.rst | 2 Kernel Key Retention Service 9 Keyrings are permitted; these are a special type of key that can hold links to 13 The key service can be configured on by enabling: 15 "Security options"/"Enable access key retention support" (CONFIG_KEYS) 22 Key Overview 26 tokens, keyrings, etc.. These are represented in the kernel by struct key. 28 Each key has a number of attributes: 32 - A description (for matching a key in a search). 39 * Each key is issued a serial number of type key_serial_t that is unique for 40 the lifetime of that key. All serial numbers are positive non-zero 32-bit [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | key.h | 2 /* Authentication token and access key management 27 /* key handle serial number */ 30 /* key handle permissions mask */ 33 struct key; 40 #define KEY_POS_VIEW 0x01000000 /* possessor can view a key's attributes */ 41 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */ 42 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */ 43 #define KEY_POS_SEARCH 0x08000000 /* possessor can find a key in search / search a keyring */ 44 #define KEY_POS_LINK 0x10000000 /* possessor can create a link to a key/keyring */ 45 #define KEY_POS_SETATTR 0x20000000 /* possessor can set key attributes */ [all …]
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | key.h | 2 /* Authentication token and access key management 27 /* key handle serial number */ 30 /* key handle permissions mask */ 33 struct key; 40 #define KEY_POS_VIEW 0x01000000 /* possessor can view a key's attributes */ 41 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */ 42 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */ 43 #define KEY_POS_SEARCH 0x08000000 /* possessor can find a key in search / search a keyring */ 44 #define KEY_POS_LINK 0x10000000 /* possessor can create a link to a key/keyring */ 45 #define KEY_POS_SETATTR 0x20000000 /* possessor can set key attributes */ [all …]
|
| /kernel/linux/linux-5.10/net/mac80211/ |
| D | key.c | 32 * DOC: Key handling basics 34 * Key handling in mac80211 is done based on per-interface (sub_if_data) 36 * each station key also belongs to that interface. 39 * that are implemented in software, for each key the hardware is asked 40 * to enable that key for offloading but if it cannot do that the key is 43 * There is currently no way of knowing whether a key is handled in SW 46 * All key management is internally protected by a mutex. Within all 47 * other parts of mac80211, key references are, just as STA structure 49 * unprotected, namely the key->sta dereferences within the hardware 51 * remove the key which waits for an RCU grace period. [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | rsa_helper.c | 3 * RSA key extract helper 19 struct rsa_key *key = context; in rsa_get_n() local 23 /* invalid key provided */ in rsa_get_n() 33 /* In FIPS mode only allow key size 2K and higher */ in rsa_get_n() 35 pr_err("RSA: key size not allowed in FIPS mode\n"); in rsa_get_n() 40 key->n = value; in rsa_get_n() 41 key->n_sz = vlen; in rsa_get_n() 49 struct rsa_key *key = context; in rsa_get_e() local 51 /* invalid key provided */ in rsa_get_e() 52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() [all …]
|
| /kernel/linux/linux-5.10/crypto/ |
| D | rsa_helper.c | 3 * RSA key extract helper 19 struct rsa_key *key = context; in rsa_get_n() local 23 /* invalid key provided */ in rsa_get_n() 33 /* In FIPS mode only allow key size 2K and higher */ in rsa_get_n() 35 pr_err("RSA: key size not allowed in FIPS mode\n"); in rsa_get_n() 40 key->n = value; in rsa_get_n() 41 key->n_sz = vlen; in rsa_get_n() 49 struct rsa_key *key = context; in rsa_get_e() local 51 /* invalid key provided */ in rsa_get_e() 52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() [all …]
|
| /kernel/linux/linux-5.10/arch/s390/include/uapi/asm/ |
| D | pkey.h | 23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */ 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 26 #define MAXCLRKEYSIZE 32 /* a clear key value may be up to 32 bytes */ 28 #define MINEP11AESKEYBLOBSIZE 256 /* min EP11 AES key blob size */ 29 #define MAXEP11AESKEYBLOBSIZE 320 /* max EP11 AES key blob size */ 31 /* Minimum size of a key blob */ 50 /* the newer ioctls use a pkey_key_size enum for key size information */ 78 /* Struct to hold a CCA AES secure key blob */ 80 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */ [all …]
|
| /kernel/linux/linux-6.6/arch/s390/include/uapi/asm/ |
| D | pkey.h | 23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */ 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 26 #define MAXCLRKEYSIZE 32 /* a clear key value may be up to 32 bytes */ 28 #define MINEP11AESKEYBLOBSIZE 256 /* min EP11 AES key blob size */ 29 #define MAXEP11AESKEYBLOBSIZE 336 /* max EP11 AES key blob size */ 31 /* Minimum size of a key blob */ 55 /* the newer ioctls use a pkey_key_size enum for key size information */ 83 /* Struct to hold a CCA AES secure key blob */ 85 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */ [all …]
|
| /kernel/linux/linux-5.10/security/selinux/ss/ |
| D | avtab.c | 71 struct avtab_key *key, struct avtab_datum *datum) in avtab_insert_node() argument 78 newnode->key = *key; in avtab_insert_node() 80 if (key->specified & AVTAB_XPERMS) { in avtab_insert_node() 106 static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_datum *datum) in avtab_insert() argument 110 u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD); in avtab_insert() 115 hvalue = avtab_hash(key, h->mask); in avtab_insert() 119 if (key->source_type == cur->key.source_type && in avtab_insert() 120 key->target_type == cur->key.target_type && in avtab_insert() 121 key->target_class == cur->key.target_class && in avtab_insert() 122 (specified & cur->key.specified)) { in avtab_insert() [all …]
|