| /kernel/linux/linux-5.10/Documentation/driver-api/nvdimm/ |
| D | security.rst | 6 --------------- 11 "unlock unit", "freeze lock", "secure erase", and "overwrite". A security_ops 16 ------------------ 28 update <old_keyid> <new_keyid> - enable or update passphrase. 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. [all …]
|
| /kernel/linux/linux-6.6/Documentation/driver-api/nvdimm/ |
| D | security.rst | 6 --------------- 11 "unlock unit", "freeze lock", "secure erase", and "overwrite". A security_ops 16 ------------------ 28 update <old_keyid> <new_keyid> - enable or update passphrase. 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. [all …]
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/input/ |
| D | adi,adp5588.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Nuno Sá <nuno.sa@analog.com> 14 https://www.analog.com/media/en/technical-documentation/data-sheets/ADP5588.pdf 17 - $ref: matrix-keymap.yaml# 18 - $ref: input.yaml# 23 - adi,adp5587 24 - adi,adp5588 29 vcc-supply: [all …]
|
| /kernel/linux/linux-6.6/drivers/input/keyboard/ |
| D | adp5588-keys.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 8 * Copyright (C) 2008-2010 Analog Devices Inc. 24 #include <linux/pinctrl/pinconf-generic.h> 46 #define UNLOCK1 0x0F /* Unlock Key1 */ 47 #define UNLOCK2 0x10 /* Unlock Key2 */ 126 * 128 so it fits matrix-keymap maximum number of keys when the full 158 #define ADP5588_ROWS_MAX (GPI_PIN_ROW7 - GPI_PIN_ROW0 + 1) 159 #define ADP5588_COLS_MAX (GPI_PIN_COL9 - GPI_PIN_COL0 + 1) 161 #define ADP5588_GPIMAPSIZE_MAX (GPI_PIN_END - GPI_PIN_BASE + 1) 167 #define KP_SEL(x) (BIT(x) - 1) /* 2^x-1 */ [all …]
|
| /kernel/linux/linux-6.6/drivers/crypto/intel/qat/qat_common/ |
| D | qat_algs.c | 1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only) 2 /* Copyright(c) 2014 - 2020 Intel Corporation */ 18 #include <linux/dma-mapping.h> 44 (GET_HW_DATA(accel_dev)->accel_capabilities_mask & \ 79 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */ 107 return -EFAULT; in qat_get_inter_state_size() 116 SHASH_DESC_ON_STACK(shash, ctx->hash_tfm); in qat_alg_do_precomputes() 117 int block_size = crypto_shash_blocksize(ctx->hash_tfm); in qat_alg_do_precomputes() 118 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes() 123 memset(ctx->ipad, 0, block_size); in qat_alg_do_precomputes() [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/qat/qat_common/ |
| D | qat_algs.c | 1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only) 2 /* Copyright(c) 2014 - 2020 Intel Corporation */ 15 #include <linux/dma-mapping.h> 66 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */ 92 return -EFAULT; in qat_get_inter_state_size() 94 return -EFAULT; in qat_get_inter_state_size() 102 SHASH_DESC_ON_STACK(shash, ctx->hash_tfm); in qat_alg_do_precomputes() 103 int block_size = crypto_shash_blocksize(ctx->hash_tfm); in qat_alg_do_precomputes() 104 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes() 109 memset(ctx->ipad, 0, block_size); in qat_alg_do_precomputes() [all …]
|
| /kernel/linux/linux-5.10/net/sched/ |
| D | act_pedit.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 5 * Authors: Jamal Hadi Salim (2002-4) 44 int err = -EINVAL; in tcf_pedit_keys_ex_parse() 52 return ERR_PTR(-ENOMEM); in tcf_pedit_keys_ex_parse() 60 err = -EINVAL; in tcf_pedit_keys_ex_parse() 63 n--; in tcf_pedit_keys_ex_parse() 66 err = -EINVAL; in tcf_pedit_keys_ex_parse() 78 err = -EINVAL; in tcf_pedit_keys_ex_parse() 82 k->htype = nla_get_u16(tb[TCA_PEDIT_KEY_EX_HTYPE]); in tcf_pedit_keys_ex_parse() 83 k->cmd = nla_get_u16(tb[TCA_PEDIT_KEY_EX_CMD]); in tcf_pedit_keys_ex_parse() [all …]
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlxsw/ |
| D | spectrum_acl_bloom_filter.c | 1 // SPDX-License-Identifier: BSD-3-Clause OR GPL-2.0 19 /* Bloom filter uses a crc-16 hash over chunks of data which contain 4 key 20 * blocks, eRP ID and region ID. In Spectrum-2 and above, region key is combined 25 * +-------------------------+------------------------+------------------------+ 26 * | Chunk 2 Key blocks 11-8 | Chunk 1 Key blocks 7-4 | Chunk 0 Key blocks 3-0 | 27 * +-------------------------+------------------------+------------------------+ 31 /* Spectrum-2 and Spectrum-3 chunks */ 39 * +---------+----------------------+-----------------------------------+ 41 * +---------+-----------+----------+-----------------------------------+ 43 * +---------+-----------+----------+-----------------------------------+ [all …]
|
| /kernel/linux/linux-5.10/net/bluetooth/ |
| D | mgmt.c | 2 BlueZ - Bluetooth protocol stack for Linux 5 Copyright (C) 2011-2012 Intel Corporation 314 rp->version = MGMT_VERSION; in mgmt_fill_version_info() 315 rp->revision = cpu_to_le16(MGMT_REVISION); in mgmt_fill_version_info() 353 return -ENOMEM; in read_commands() 355 rp->num_commands = cpu_to_le16(num_commands); in read_commands() 356 rp->num_events = cpu_to_le16(num_events); in read_commands() 359 __le16 *opcode = rp->opcodes; in read_commands() 367 __le16 *opcode = rp->opcodes; in read_commands() 398 if (d->dev_type == HCI_PRIMARY && in read_index_list() [all …]
|
| /kernel/linux/linux-5.10/fs/crypto/ |
| D | keysetup.c | 1 // SPDX-License-Identifier: GPL-2.0 18 .friendly_name = "AES-256-XTS", 26 .friendly_name = "AES-256-CTS-CBC", 33 .friendly_name = "AES-128-CBC-ESSIV", 41 .friendly_name = "AES-128-CTS-CBC", 65 if (S_ISREG(inode->i_mode)) in select_encryption_mode() 68 if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode)) in select_encryption_mode() 72 inode->i_ino, (inode->i_mode & S_IFMT)); in select_encryption_mode() 73 return ERR_PTR(-EINVAL); in select_encryption_mode() 84 tfm = crypto_alloc_skcipher(mode->cipher_str, 0, 0); in fscrypt_allocate_skcipher() [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | af_alg.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * af_alg: User-space algorithm interface 5 * This file provides the user-space API for algorithms. 16 #include <linux/key-type.h> 25 #include <keys/user-type.h> 26 #include <keys/trusted-type.h> 27 #include <keys/encrypted-type.h> 45 const struct af_alg_type *type = ERR_PTR(-ENOENT); in alg_get_type() 50 if (strcmp(node->type->name, name)) in alg_get_type() 53 if (try_module_get(node->type->owner)) in alg_get_type() [all …]
|
| /kernel/linux/linux-6.6/include/linux/input/ |
| D | adp5589.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright 2010-2011 Analog Devices Inc. 47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1) 76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1) 114 * ---------------- BIT ------------------ 131 * ---- BIT -- ----------- 154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */ 155 unsigned char unlock_key2; /* Unlock Key 2 (ADP5589 only) */ 156 …unsigned char unlock_timer; /* Time in seconds [0..7] between the two unlock keys 0=disable (ADP55… 166 unsigned pullup_en_100k; /* Pull-Up 100k Enable Mask */ [all …]
|
| /kernel/linux/linux-5.10/include/linux/input/ |
| D | adp5589.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright 2010-2011 Analog Devices Inc. 47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1) 76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1) 114 * ---------------- BIT ------------------ 131 * ---- BIT -- ----------- 154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */ 155 unsigned char unlock_key2; /* Unlock Key 2 (ADP5589 only) */ 156 …unsigned char unlock_timer; /* Time in seconds [0..7] between the two unlock keys 0=disable (ADP55… 166 unsigned pullup_en_100k; /* Pull-Up 100k Enable Mask */ [all …]
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/fungible/funeth/ |
| D | funeth_main.c | 1 // SPDX-License-Identifier: (GPL-2.0-only OR BSD-3-Clause) 43 const int *keys, const u64 *data) in fun_port_write_cmds() argument 55 return -EINVAL; in fun_port_write_cmds() 61 fp->netdev->dev_port); in fun_port_write_cmds() 64 FUN_ADMIN_WRITE48_REQ_INIT(keys[i], data[i]); in fun_port_write_cmds() 66 return fun_submit_admin_sync_cmd(fp->fdev, &cmd.req.common, in fun_port_write_cmds() 77 const int *keys, u64 *data) in fun_port_read_cmds() argument 91 return -EINVAL; in fun_port_read_cmds() 97 fp->netdev->dev_port); in fun_port_read_cmds() 99 cmd.req.u.read.read48[i] = FUN_ADMIN_READ48_REQ_INIT(keys[i]); in fun_port_read_cmds() [all …]
|
| /kernel/linux/linux-5.10/security/integrity/evm/ |
| D | evm_crypto.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2005-2010 IBM Corporation 17 #include <keys/encrypted-type.h> 22 #define EVMKEY "evm-key" 39 * evm_set_key() - set EVM HMAC key from the kernel 44 * without using the "encrypted" key subsystem keys. It can be used 46 * keys. 54 rc = -EBUSY; in evm_set_key() 57 rc = -EINVAL; in evm_set_key() 82 return ERR_PTR(-ENOKEY); in init_desc() [all …]
|
| /kernel/linux/linux-6.6/fs/crypto/ |
| D | keysetup.c | 1 // SPDX-License-Identifier: GPL-2.0 18 .friendly_name = "AES-256-XTS", 26 .friendly_name = "AES-256-CTS-CBC", 33 .friendly_name = "AES-128-CBC-ESSIV", 41 .friendly_name = "AES-128-CTS-CBC", 48 .friendly_name = "SM4-XTS", 56 .friendly_name = "SM4-CTS-CBC", 71 .friendly_name = "AES-256-HCTR2", 87 if (S_ISREG(inode->i_mode)) in select_encryption_mode() 90 if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode)) in select_encryption_mode() [all …]
|
| /kernel/linux/linux-5.10/net/batman-adv/ |
| D | hash.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* Copyright (C) 2006-2020 B.A.T.M.A.N. contributors: 22 * keys 38 * struct batadv_hashtable - Wrapper of simple hlist based hashtable 65 * batadv_hash_add() - adds data to the hashtable 73 * and -1 on error. 82 int ret = -1; in batadv_hash_add() 90 index = choose(data, hash->size); in batadv_hash_add() 91 head = &hash->table[index]; in batadv_hash_add() 92 list_lock = &hash->list_locks[index]; in batadv_hash_add() [all …]
|
| /kernel/linux/linux-6.6/net/batman-adv/ |
| D | hash.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 22 * keys 38 * struct batadv_hashtable - Wrapper of simple hlist based hashtable 65 * batadv_hash_add() - adds data to the hashtable 73 * and -1 on error. 82 int ret = -1; in batadv_hash_add() 90 index = choose(data, hash->size); in batadv_hash_add() 91 head = &hash->table[index]; in batadv_hash_add() 92 list_lock = &hash->list_locks[index]; in batadv_hash_add() 101 goto unlock; in batadv_hash_add() [all …]
|
| /kernel/linux/linux-6.6/security/keys/ |
| D | keyctl.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 4 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved. 24 #include <keys/request_key_auth-type.h> 55 return -EINVAL; in key_get_type_from_user() 57 return -EPERM; in key_get_type_from_user() 58 type[len - 1] = '\0'; in key_get_type_from_user() 85 ret = -EINVAL; in SYSCALL_DEFINE5() 86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5() 106 ret = -EPERM; in SYSCALL_DEFINE5() 115 ret = -ENOMEM; in SYSCALL_DEFINE5() [all …]
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | keyctl.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 4 * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved. 24 #include <keys/request_key_auth-type.h> 55 return -EINVAL; in key_get_type_from_user() 57 return -EPERM; in key_get_type_from_user() 58 type[len - 1] = '\0'; in key_get_type_from_user() 85 ret = -EINVAL; in SYSCALL_DEFINE5() 86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5() 106 ret = -EPERM; in SYSCALL_DEFINE5() 115 ret = -ENOMEM; in SYSCALL_DEFINE5() [all …]
|
| /kernel/linux/linux-6.6/security/integrity/evm/ |
| D | evm_crypto.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2005-2010 IBM Corporation 19 #include <keys/encrypted-type.h> 24 #define EVMKEY "evm-key" 41 * evm_set_key() - set EVM HMAC key from the kernel 46 * without using the "encrypted" key subsystem keys. It can be used 48 * keys. 56 rc = -EBUSY; in evm_set_key() 59 rc = -EINVAL; in evm_set_key() 84 return ERR_PTR(-ENOKEY); in init_desc() [all …]
|
| /kernel/linux/linux-6.6/net/bluetooth/ |
| D | mgmt.c | 2 BlueZ - Bluetooth protocol stack for Linux 5 Copyright (C) 2011-2012 Intel Corporation 291 case -EPERM: in mgmt_errno_status() 293 case -EINVAL: in mgmt_errno_status() 295 case -EOPNOTSUPP: in mgmt_errno_status() 297 case -EBUSY: in mgmt_errno_status() 299 case -ETIMEDOUT: in mgmt_errno_status() 301 case -ENOMEM: in mgmt_errno_status() 303 case -EISCONN: in mgmt_errno_status() 305 case -ENOTCONN: in mgmt_errno_status() [all …]
|
| /kernel/linux/linux-6.6/drivers/crypto/marvell/octeontx2/ |
| D | otx2_cptvf_algs.c | 1 // SPDX-License-Identifier: GPL-2.0-only 64 return -ENODEV; in get_se_device() 89 req = container_of(cpt_req->areq, struct aead_request, base); in validate_hmac_cipher_null() 92 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null() 93 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null() 95 return -EBADMSG; in validate_hmac_cipher_null() 108 cpt_req = inst_info->req; in otx2_cpt_aead_callback() 115 if (cpt_req->req_type == in otx2_cpt_aead_callback() 117 !cpt_req->is_enc) in otx2_cpt_aead_callback() 120 pdev = inst_info->pdev; in otx2_cpt_aead_callback() [all …]
|
| /kernel/linux/linux-6.6/include/net/netfilter/ |
| D | nf_flow_table.h | 7 #include <linux/rhashtable-types.h> 90 return flowtable->flags & NF_FLOWTABLE_HW_OFFLOAD; in nf_flowtable_hw_offload() 132 /* All members above are keys for lookups, see flow_offload_hash(). */ 195 return (__s32)(timeout - nf_flowtable_time_stamp); in nf_flow_timeout_delta() 227 struct flow_block *block = &flow_table->flow_block; in nf_flow_table_offload_add_cb() 231 down_write(&flow_table->flow_block_lock); in nf_flow_table_offload_add_cb() 234 err = -EEXIST; in nf_flow_table_offload_add_cb() 235 goto unlock; in nf_flow_table_offload_add_cb() 241 goto unlock; in nf_flow_table_offload_add_cb() 244 list_add_tail(&block_cb->list, &block->cb_list); in nf_flow_table_offload_add_cb() [all …]
|
| /kernel/linux/linux-5.10/drivers/md/bcache/ |
| D | btree.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 8 * At a high level, bcache's btree is relatively standard b+ tree. All keys and 13 * the key is the highest key in the child node - except that the highest key in 15 * of the child node - this would allow us to have variable sized btree nodes 21 * overlapping extents - when we read in a btree node from disk, the first thing 22 * we do is resort all the sets of keys with a mergesort, and in the same pass 35 * disk if necessary. This function is almost never called directly though - the 37 * unlock the node after the function returns. 39 * The root is special cased - it's taken out of the cache's lru (thus pinning 43 * points to - the btree_root() macro handles this. [all …]
|