Home
last modified time | relevance | path

Searched +full:unlock +full:- +full:keys (Results 1 – 25 of 225) sorted by relevance

123456789

/kernel/linux/linux-5.10/Documentation/driver-api/nvdimm/
Dsecurity.rst6 ---------------
11 "unlock unit", "freeze lock", "secure erase", and "overwrite". A security_ops
16 ------------------
28 update <old_keyid> <new_keyid> - enable or update passphrase.
29 disable <keyid> - disable enabled security and remove key.
30 freeze - freeze changing of security states.
31 erase <keyid> - delete existing user encryption key.
32 overwrite <keyid> - wipe the entire nvdimm.
33 master_update <keyid> <new_keyid> - enable or update master passphrase.
34 master_erase <keyid> - delete existing user encryption key.
[all …]
/kernel/linux/linux-6.6/Documentation/driver-api/nvdimm/
Dsecurity.rst6 ---------------
11 "unlock unit", "freeze lock", "secure erase", and "overwrite". A security_ops
16 ------------------
28 update <old_keyid> <new_keyid> - enable or update passphrase.
29 disable <keyid> - disable enabled security and remove key.
30 freeze - freeze changing of security states.
31 erase <keyid> - delete existing user encryption key.
32 overwrite <keyid> - wipe the entire nvdimm.
33 master_update <keyid> <new_keyid> - enable or update master passphrase.
34 master_erase <keyid> - delete existing user encryption key.
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/input/
Dadi,adp5588.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Nuno Sá <nuno.sa@analog.com>
14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf
17 - $ref: matrix-keymap.yaml#
18 - $ref: input.yaml#
23 - adi,adp5587
24 - adi,adp5588
29 vcc-supply:
[all …]
/kernel/linux/linux-6.6/drivers/input/keyboard/
Dadp5588-keys.c1 // SPDX-License-Identifier: GPL-2.0-or-later
8 * Copyright (C) 2008-2010 Analog Devices Inc.
24 #include <linux/pinctrl/pinconf-generic.h>
46 #define UNLOCK1 0x0F /* Unlock Key1 */
47 #define UNLOCK2 0x10 /* Unlock Key2 */
126 * 128 so it fits matrix-keymap maximum number of keys when the full
158 #define ADP5588_ROWS_MAX (GPI_PIN_ROW7 - GPI_PIN_ROW0 + 1)
159 #define ADP5588_COLS_MAX (GPI_PIN_COL9 - GPI_PIN_COL0 + 1)
161 #define ADP5588_GPIMAPSIZE_MAX (GPI_PIN_END - GPI_PIN_BASE + 1)
167 #define KP_SEL(x) (BIT(x) - 1) /* 2^x-1 */
[all …]
/kernel/linux/linux-6.6/drivers/crypto/intel/qat/qat_common/
Dqat_algs.c1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only)
2 /* Copyright(c) 2014 - 2020 Intel Corporation */
18 #include <linux/dma-mapping.h>
44 (GET_HW_DATA(accel_dev)->accel_capabilities_mask & \
79 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */
107 return -EFAULT; in qat_get_inter_state_size()
116 SHASH_DESC_ON_STACK(shash, ctx->hash_tfm); in qat_alg_do_precomputes()
117 int block_size = crypto_shash_blocksize(ctx->hash_tfm); in qat_alg_do_precomputes()
118 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes()
123 memset(ctx->ipad, 0, block_size); in qat_alg_do_precomputes()
[all …]
/kernel/linux/linux-5.10/drivers/crypto/qat/qat_common/
Dqat_algs.c1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only)
2 /* Copyright(c) 2014 - 2020 Intel Corporation */
15 #include <linux/dma-mapping.h>
66 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */
92 return -EFAULT; in qat_get_inter_state_size()
94 return -EFAULT; in qat_get_inter_state_size()
102 SHASH_DESC_ON_STACK(shash, ctx->hash_tfm); in qat_alg_do_precomputes()
103 int block_size = crypto_shash_blocksize(ctx->hash_tfm); in qat_alg_do_precomputes()
104 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes()
109 memset(ctx->ipad, 0, block_size); in qat_alg_do_precomputes()
[all …]
/kernel/linux/linux-5.10/net/sched/
Dact_pedit.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * Authors: Jamal Hadi Salim (2002-4)
44 int err = -EINVAL; in tcf_pedit_keys_ex_parse()
52 return ERR_PTR(-ENOMEM); in tcf_pedit_keys_ex_parse()
60 err = -EINVAL; in tcf_pedit_keys_ex_parse()
63 n--; in tcf_pedit_keys_ex_parse()
66 err = -EINVAL; in tcf_pedit_keys_ex_parse()
78 err = -EINVAL; in tcf_pedit_keys_ex_parse()
82 k->htype = nla_get_u16(tb[TCA_PEDIT_KEY_EX_HTYPE]); in tcf_pedit_keys_ex_parse()
83 k->cmd = nla_get_u16(tb[TCA_PEDIT_KEY_EX_CMD]); in tcf_pedit_keys_ex_parse()
[all …]
/kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlxsw/
Dspectrum_acl_bloom_filter.c1 // SPDX-License-Identifier: BSD-3-Clause OR GPL-2.0
19 /* Bloom filter uses a crc-16 hash over chunks of data which contain 4 key
20 * blocks, eRP ID and region ID. In Spectrum-2 and above, region key is combined
25 * +-------------------------+------------------------+------------------------+
26 * | Chunk 2 Key blocks 11-8 | Chunk 1 Key blocks 7-4 | Chunk 0 Key blocks 3-0 |
27 * +-------------------------+------------------------+------------------------+
31 /* Spectrum-2 and Spectrum-3 chunks */
39 * +---------+----------------------+-----------------------------------+
41 * +---------+-----------+----------+-----------------------------------+
43 * +---------+-----------+----------+-----------------------------------+
[all …]
/kernel/linux/linux-5.10/net/bluetooth/
Dmgmt.c2 BlueZ - Bluetooth protocol stack for Linux
5 Copyright (C) 2011-2012 Intel Corporation
314 rp->version = MGMT_VERSION; in mgmt_fill_version_info()
315 rp->revision = cpu_to_le16(MGMT_REVISION); in mgmt_fill_version_info()
353 return -ENOMEM; in read_commands()
355 rp->num_commands = cpu_to_le16(num_commands); in read_commands()
356 rp->num_events = cpu_to_le16(num_events); in read_commands()
359 __le16 *opcode = rp->opcodes; in read_commands()
367 __le16 *opcode = rp->opcodes; in read_commands()
398 if (d->dev_type == HCI_PRIMARY && in read_index_list()
[all …]
/kernel/linux/linux-5.10/fs/crypto/
Dkeysetup.c1 // SPDX-License-Identifier: GPL-2.0
18 .friendly_name = "AES-256-XTS",
26 .friendly_name = "AES-256-CTS-CBC",
33 .friendly_name = "AES-128-CBC-ESSIV",
41 .friendly_name = "AES-128-CTS-CBC",
65 if (S_ISREG(inode->i_mode)) in select_encryption_mode()
68 if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode)) in select_encryption_mode()
72 inode->i_ino, (inode->i_mode & S_IFMT)); in select_encryption_mode()
73 return ERR_PTR(-EINVAL); in select_encryption_mode()
84 tfm = crypto_alloc_skcipher(mode->cipher_str, 0, 0); in fscrypt_allocate_skcipher()
[all …]
/kernel/linux/linux-6.6/crypto/
Daf_alg.c1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * af_alg: User-space algorithm interface
5 * This file provides the user-space API for algorithms.
16 #include <linux/key-type.h>
25 #include <keys/user-type.h>
26 #include <keys/trusted-type.h>
27 #include <keys/encrypted-type.h>
45 const struct af_alg_type *type = ERR_PTR(-ENOENT); in alg_get_type()
50 if (strcmp(node->type->name, name)) in alg_get_type()
53 if (try_module_get(node->type->owner)) in alg_get_type()
[all …]
/kernel/linux/linux-6.6/include/linux/input/
Dadp5589.h1 /* SPDX-License-Identifier: GPL-2.0-only */
5 * Copyright 2010-2011 Analog Devices Inc.
47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1)
76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1)
114 * ---------------- BIT ------------------
131 * ---- BIT -- -----------
154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */
155 unsigned char unlock_key2; /* Unlock Key 2 (ADP5589 only) */
156 …unsigned char unlock_timer; /* Time in seconds [0..7] between the two unlock keys 0=disable (ADP55…
166 unsigned pullup_en_100k; /* Pull-Up 100k Enable Mask */
[all …]
/kernel/linux/linux-5.10/include/linux/input/
Dadp5589.h1 /* SPDX-License-Identifier: GPL-2.0-only */
5 * Copyright 2010-2011 Analog Devices Inc.
47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1)
76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1)
114 * ---------------- BIT ------------------
131 * ---- BIT -- -----------
154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */
155 unsigned char unlock_key2; /* Unlock Key 2 (ADP5589 only) */
156 …unsigned char unlock_timer; /* Time in seconds [0..7] between the two unlock keys 0=disable (ADP55…
166 unsigned pullup_en_100k; /* Pull-Up 100k Enable Mask */
[all …]
/kernel/linux/linux-6.6/drivers/net/ethernet/fungible/funeth/
Dfuneth_main.c1 // SPDX-License-Identifier: (GPL-2.0-only OR BSD-3-Clause)
43 const int *keys, const u64 *data) in fun_port_write_cmds() argument
55 return -EINVAL; in fun_port_write_cmds()
61 fp->netdev->dev_port); in fun_port_write_cmds()
64 FUN_ADMIN_WRITE48_REQ_INIT(keys[i], data[i]); in fun_port_write_cmds()
66 return fun_submit_admin_sync_cmd(fp->fdev, &cmd.req.common, in fun_port_write_cmds()
77 const int *keys, u64 *data) in fun_port_read_cmds() argument
91 return -EINVAL; in fun_port_read_cmds()
97 fp->netdev->dev_port); in fun_port_read_cmds()
99 cmd.req.u.read.read48[i] = FUN_ADMIN_READ48_REQ_INIT(keys[i]); in fun_port_read_cmds()
[all …]
/kernel/linux/linux-5.10/security/integrity/evm/
Devm_crypto.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2005-2010 IBM Corporation
17 #include <keys/encrypted-type.h>
22 #define EVMKEY "evm-key"
39 * evm_set_key() - set EVM HMAC key from the kernel
44 * without using the "encrypted" key subsystem keys. It can be used
46 * keys.
54 rc = -EBUSY; in evm_set_key()
57 rc = -EINVAL; in evm_set_key()
82 return ERR_PTR(-ENOKEY); in init_desc()
[all …]
/kernel/linux/linux-6.6/fs/crypto/
Dkeysetup.c1 // SPDX-License-Identifier: GPL-2.0
18 .friendly_name = "AES-256-XTS",
26 .friendly_name = "AES-256-CTS-CBC",
33 .friendly_name = "AES-128-CBC-ESSIV",
41 .friendly_name = "AES-128-CTS-CBC",
48 .friendly_name = "SM4-XTS",
56 .friendly_name = "SM4-CTS-CBC",
71 .friendly_name = "AES-256-HCTR2",
87 if (S_ISREG(inode->i_mode)) in select_encryption_mode()
90 if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode)) in select_encryption_mode()
[all …]
/kernel/linux/linux-5.10/net/batman-adv/
Dhash.h1 /* SPDX-License-Identifier: GPL-2.0 */
2 /* Copyright (C) 2006-2020 B.A.T.M.A.N. contributors:
22 * keys
38 * struct batadv_hashtable - Wrapper of simple hlist based hashtable
65 * batadv_hash_add() - adds data to the hashtable
73 * and -1 on error.
82 int ret = -1; in batadv_hash_add()
90 index = choose(data, hash->size); in batadv_hash_add()
91 head = &hash->table[index]; in batadv_hash_add()
92 list_lock = &hash->list_locks[index]; in batadv_hash_add()
[all …]
/kernel/linux/linux-6.6/net/batman-adv/
Dhash.h1 /* SPDX-License-Identifier: GPL-2.0 */
22 * keys
38 * struct batadv_hashtable - Wrapper of simple hlist based hashtable
65 * batadv_hash_add() - adds data to the hashtable
73 * and -1 on error.
82 int ret = -1; in batadv_hash_add()
90 index = choose(data, hash->size); in batadv_hash_add()
91 head = &hash->table[index]; in batadv_hash_add()
92 list_lock = &hash->list_locks[index]; in batadv_hash_add()
101 goto unlock; in batadv_hash_add()
[all …]
/kernel/linux/linux-6.6/security/keys/
Dkeyctl.c1 // SPDX-License-Identifier: GPL-2.0-or-later
4 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
24 #include <keys/request_key_auth-type.h>
55 return -EINVAL; in key_get_type_from_user()
57 return -EPERM; in key_get_type_from_user()
58 type[len - 1] = '\0'; in key_get_type_from_user()
85 ret = -EINVAL; in SYSCALL_DEFINE5()
86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5()
106 ret = -EPERM; in SYSCALL_DEFINE5()
115 ret = -ENOMEM; in SYSCALL_DEFINE5()
[all …]
/kernel/linux/linux-5.10/security/keys/
Dkeyctl.c1 // SPDX-License-Identifier: GPL-2.0-or-later
4 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.
24 #include <keys/request_key_auth-type.h>
55 return -EINVAL; in key_get_type_from_user()
57 return -EPERM; in key_get_type_from_user()
58 type[len - 1] = '\0'; in key_get_type_from_user()
85 ret = -EINVAL; in SYSCALL_DEFINE5()
86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5()
106 ret = -EPERM; in SYSCALL_DEFINE5()
115 ret = -ENOMEM; in SYSCALL_DEFINE5()
[all …]
/kernel/linux/linux-6.6/security/integrity/evm/
Devm_crypto.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2005-2010 IBM Corporation
19 #include <keys/encrypted-type.h>
24 #define EVMKEY "evm-key"
41 * evm_set_key() - set EVM HMAC key from the kernel
46 * without using the "encrypted" key subsystem keys. It can be used
48 * keys.
56 rc = -EBUSY; in evm_set_key()
59 rc = -EINVAL; in evm_set_key()
84 return ERR_PTR(-ENOKEY); in init_desc()
[all …]
/kernel/linux/linux-6.6/net/bluetooth/
Dmgmt.c2 BlueZ - Bluetooth protocol stack for Linux
5 Copyright (C) 2011-2012 Intel Corporation
291 case -EPERM: in mgmt_errno_status()
293 case -EINVAL: in mgmt_errno_status()
295 case -EOPNOTSUPP: in mgmt_errno_status()
297 case -EBUSY: in mgmt_errno_status()
299 case -ETIMEDOUT: in mgmt_errno_status()
301 case -ENOMEM: in mgmt_errno_status()
303 case -EISCONN: in mgmt_errno_status()
305 case -ENOTCONN: in mgmt_errno_status()
[all …]
/kernel/linux/linux-6.6/drivers/crypto/marvell/octeontx2/
Dotx2_cptvf_algs.c1 // SPDX-License-Identifier: GPL-2.0-only
64 return -ENODEV; in get_se_device()
89 req = container_of(cpt_req->areq, struct aead_request, base); in validate_hmac_cipher_null()
92 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null()
93 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null()
95 return -EBADMSG; in validate_hmac_cipher_null()
108 cpt_req = inst_info->req; in otx2_cpt_aead_callback()
115 if (cpt_req->req_type == in otx2_cpt_aead_callback()
117 !cpt_req->is_enc) in otx2_cpt_aead_callback()
120 pdev = inst_info->pdev; in otx2_cpt_aead_callback()
[all …]
/kernel/linux/linux-6.6/include/net/netfilter/
Dnf_flow_table.h7 #include <linux/rhashtable-types.h>
90 return flowtable->flags & NF_FLOWTABLE_HW_OFFLOAD; in nf_flowtable_hw_offload()
132 /* All members above are keys for lookups, see flow_offload_hash(). */
195 return (__s32)(timeout - nf_flowtable_time_stamp); in nf_flow_timeout_delta()
227 struct flow_block *block = &flow_table->flow_block; in nf_flow_table_offload_add_cb()
231 down_write(&flow_table->flow_block_lock); in nf_flow_table_offload_add_cb()
234 err = -EEXIST; in nf_flow_table_offload_add_cb()
235 goto unlock; in nf_flow_table_offload_add_cb()
241 goto unlock; in nf_flow_table_offload_add_cb()
244 list_add_tail(&block_cb->list, &block->cb_list); in nf_flow_table_offload_add_cb()
[all …]
/kernel/linux/linux-5.10/drivers/md/bcache/
Dbtree.h1 /* SPDX-License-Identifier: GPL-2.0 */
8 * At a high level, bcache's btree is relatively standard b+ tree. All keys and
13 * the key is the highest key in the child node - except that the highest key in
15 * of the child node - this would allow us to have variable sized btree nodes
21 * overlapping extents - when we read in a btree node from disk, the first thing
22 * we do is resort all the sets of keys with a mergesort, and in the same pass
35 * disk if necessary. This function is almost never called directly though - the
37 * unlock the node after the function returns.
39 * The root is special cased - it's taken out of the cache's lru (thus pinning
43 * points to - the btree_root() macro handles this.
[all …]

123456789