Home
last modified time | relevance | path

Searched +full:key +full:- +full:up (Results 1 – 25 of 230) sorted by relevance

12345678910

/Documentation/devicetree/bindings/input/
Dgpio-keys.yaml1 # SPDX-License-Identifier: GPL-2.0-only
3 ---
4 $id: http://devicetree.org/schemas/input/gpio-keys.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Rob Herring <robh@kernel.org>
15 - gpio-keys
16 - gpio-keys-polled
23 poll-interval: true
26 …"^(button|event|key|switch|(button|event|key|switch)-[a-z0-9-]+|[a-z0-9-]+-(button|event|key|switc…
35 - items:
[all …]
Dqcom,pm8921-pwrkey.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/input/qcom,pm8921-pwrkey.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Qualcomm PM8921 PMIC Power Key
10 - Bjorn Andersson <andersson@kernel.org>
13 - $ref: input.yaml#
18 - enum:
19 - qcom,pm8921-pwrkey
20 - qcom,pm8058-pwrkey
[all …]
Dqcom,pm8941-pwrkey.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/input/qcom,pm8941-pwrkey.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Qualcomm PM8941 PMIC Power Key
10 - Courtney Cavin <courtney.cavin@sonymobile.com>
11 - Vinod Koul <vkoul@kernel.org>
14 - $ref: input.yaml#
19 - qcom,pm8941-pwrkey
20 - qcom,pm8941-resin
[all …]
Dpxa27x-keypad.txt4 - compatible : should be "marvell,pxa27x-keypad"
5 - reg : Address and length of the register set for the device
6 - interrupts : The interrupt for the keypad controller
7 - marvell,debounce-interval : How long time the key will be
9 is debounce interval for direct key and bit[15:0] is debounce
10 interval for matrix key. The value is in binary number of 2ms
13 Please refer to matrix-keymap.txt
16 - marvell,direct-key-count : How many direct keyes are used.
17 - marvell,direct-key-mask : The mask indicates which keyes
18 are used. If bit[X] of the mask is set, the direct key X
[all …]
Dadc-keys.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/input/adc-keys.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Alexandre Belloni <alexandre.belloni@bootlin.com>
13 - $ref: input.yaml#
17 const: adc-keys
19 io-channels:
22 io-channel-names:
25 keyup-threshold-microvolt:
[all …]
/Documentation/networking/
Ddns_resolver.rst1 .. SPDX-License-Identifier: GPL-2.0
9 - Overview.
10 - Compilation.
11 - Setting up.
12 - Usage.
13 - Mechanism.
14 - Debugging.
21 by way of requesting a key of key type dns_resolver. These queries are
22 upcalled to userspace through /sbin/request-key.
25 request-key. It is under development and does not yet provide the full feature
[all …]
Dfib_trie.rst1 .. SPDX-License-Identifier: GPL-2.0
4 LC-trie implementation notes
8 ----------
10 An end node with data. This has a copy of the relevant key, along
16 indexed through a subset of the key. See Level Compression.
19 ------------------------
21 The number of bits in the key segment used for indexing into the
22 child array - the "child index". See Level Compression.
25 The position (in the key) of the key segment used for indexing into
30 a segment of the key specified by the parent's "pos" and "bits"
[all …]
Dopenvswitch.rst1 .. SPDX-License-Identifier: GPL-2.0
8 flow-level packet processing on selected network devices. It can be
10 VLAN processing, network access control, flow-based network control,
22 extracting its flow key and looking it up in the flow table. If there
25 its processing, userspace will likely set up a flow to handle further
26 packets of the same type entirely in-kernel).
29 Flow key compatibility
30 ----------------------
35 versions to parse additional protocols as part of the flow key. It
39 applications to work with any version of the flow key, past or future.
[all …]
/Documentation/crypto/
Dasymmetric-keys.rst1 .. SPDX-License-Identifier: GPL-2.0
4 Asymmetric / Public-key Cryptography Key Type
9 - Overview.
10 - Key identification.
11 - Accessing asymmetric keys.
12 - Signature verification.
13 - Asymmetric key subtypes.
14 - Instantiation data parsers.
15 - Keyring link restrictions.
21 The "asymmetric" key type is designed to be a container for the keys used in
[all …]
Ddescore-readme.rst1 .. SPDX-License-Identifier: GPL-2.0
13 ------------------------------------------------------------------------------
15 des - fast & portable DES encryption & decryption.
42 2. PORTABILITY to any byte-addressable host with a 32bit unsigned C type
43 3. Plug-compatible replacement for KERBEROS's low-level routines.
46 register-starved machines. My discussions with Richard Outerbridge,
51 up in a parameterized fashion so it can easily be modified by speed-daemon
58 compile on a SPARCStation 1 (cc -O4, gcc -O2):
60 this code (byte-order independent):
62 - 30us per encryption (options: 64k tables, no IP/FP)
[all …]
/Documentation/userspace-api/media/rc/
Drc-tables.rst1 .. SPDX-License-Identifier: GPL-2.0 OR GFDL-1.1-no-invariants-or-later
20 layer. This means that the IR key strokes will look like normal keyboard
21 key strokes (if CONFIG_INPUT_KEYBOARD is enabled). Using the event
30 .. flat-table:: IR default keymapping
31 :header-rows: 0
32 :stub-columns: 0
36 - .. row 1
38 - Key code
40 - Meaning
42 - Key examples on IR
[all …]
/Documentation/security/keys/
Drequest-key.rst2 Key Request Service
5 The key request service is part of the key retention service (refer to
12 struct key *request_key(const struct key_type *type,
18 struct key *request_key_tag(const struct key_type *type,
25 struct key *request_key_with_auxdata(const struct key_type *type,
34 struct key *request_key_rcu(const struct key_type *type,
45 The main difference between the access points is that the in-kernel interface
46 does not need to link the key to a keyring to prevent it from being immediately
47 destroyed. The kernel interface returns a pointer directly to the key, and
48 it's up to the caller to destroy the key.
[all …]
Dcore.rst2 Kernel Key Retention Service
5 This service allows cryptographic keys, authentication tokens, cross-domain
9 Keyrings are permitted; these are a special type of key that can hold links to
13 The key service can be configured on by enabling:
15 "Security options"/"Enable access key retention support" (CONFIG_KEYS)
22 Key Overview
26 tokens, keyrings, etc.. These are represented in the kernel by struct key.
28 Each key has a number of attributes:
30 - A serial number.
31 - A type.
[all …]
/Documentation/core-api/
Dassoc_array.rst20 Rather, the array is made up of metadata blocks that point to objects.
24 4. Index keys must be unique. Inserting an object with the same key as one
35 key order.
43 10. Objects in the array can be looked up by means of their index key.
45 11. Objects can be looked up while the array is being modified, provided the
46 RCU readlock is being held by the thread doing the look up.
48 The implementation uses a tree of 16-pointer nodes internally that are indexed
49 on each level by nibbles from the index key in the same manner as in a radix
51 what would otherwise be a series of single-occupancy nodes. Further, nodes
68 ./script/config -e ASSOCIATIVE_ARRAY
[all …]
/Documentation/admin-guide/
Dsysrq.rst1 Linux Magic System Request Key Hacks
6 What is the magic SysRq key?
9 It is a 'magical' key combo you can hit which the kernel will respond to
10 regardless of whatever else it is doing, unless it is completely locked up.
12 How do I enable the magic SysRq key?
15 You need to say "yes" to 'Magic SysRq key (CONFIG_MAGIC_SYSRQ)' when
18 the SysRq key. The default value in this file is set by the
22 - 0 - disable sysrq completely
23 - 1 - enable all functions of sysrq
24 - >1 - bitmask of allowed sysrq functions (see below for detailed function
[all …]
/Documentation/input/devices/
Datarikbd.rst12 provides a convenient connection point for a mouse and switch-type joysticks.
13 The ikbd processor also maintains a time-of-day clock with one second
18 The ikbd communicates with the main processor over a high speed bi-directional
27 The keyboard always returns key make/break scan codes. The ikbd generates
28 keyboard scan codes for each key press and release. The key scan make (key
30 ISO key position in the scan code table should exist even if no keyswitch
31 exists in that position on a particular keyboard. The break code for each key
41 0xF8-0xFB relative mouse position records (lsbs determined by
43 0xFC time-of-day
49 The two shift keys return different scan codes in this mode. The ENTER key
[all …]
/Documentation/admin-guide/laptops/
Dthinkpad-acpi.rst9 - Borislav Deianov <borislav@users.sf.net>
10 - Henrique de Moraes Holschuh <hmh@hmh.eng.br>
12 http://ibm-acpi.sf.net/
19 This driver used to be named ibm-acpi until kernel 2.6.21 and release
20 0.13-20070314. It used to be in the drivers/acpi tree, but it was
21 moved to the drivers/misc tree and renamed to thinkpad-acpi for kernel
25 The driver is named "thinkpad-acpi". In some places, like module
29 "tpacpi" is used as a shorthand where "thinkpad-acpi" would be too
33 ------
38 - Fn key combinations
[all …]
/Documentation/bpf/
Dmap_cpumap.rst1 .. SPDX-License-Identifier: GPL-2.0-only
9 - ``BPF_MAP_TYPE_CPUMAP`` was introduced in kernel version 4.15
11 .. kernel-doc:: kernel/bpf/cpumap.c
14 An example use-case for this map type is software based Receive Side Scaling (RSS).
16 The CPUMAP represents the CPUs in the system indexed as the map-key, and the
17 map-value is the config setting (per CPUMAP entry). Each CPUMAP entry has a dedicated
32 ----------
35 .. code-block:: c
37 long bpf_redirect_map(struct bpf_map *map, u32 key, u64 flags)
39 Redirect the packet to the endpoint referenced by ``map`` at index ``key``.
[all …]
Dmap_devmap.rst1 .. SPDX-License-Identifier: GPL-2.0-only
9 - ``BPF_MAP_TYPE_DEVMAP`` was introduced in kernel version 4.14
10 - ``BPF_MAP_TYPE_DEVMAP_HASH`` was introduced in kernel version 5.4
14 ``BPF_MAP_TYPE_DEVMAP`` is backed by an array that uses the key as
16 is backed by a hash table that uses a key to lookup a reference to a net device.
17 The user provides either <``key``/ ``ifindex``> or <``key``/ ``struct bpf_devmap_val``>
21 - The key to a hash map doesn't have to be an ``ifindex``.
22 - While ``BPF_MAP_TYPE_DEVMAP_HASH`` allows for densely packing the net devices
23 it comes at the cost of a hash of the key when performing a look up.
31 ----------
[all …]
/Documentation/process/
Dmaintainer-pgp-guide.rst12 Linux Foundation. Please read that document for more in-depth discussion
15 .. _`Protecting Code Integrity`: https://github.com/lfit/itpol/blob/master/protecting-code-integrit…
22 communication channels between developers via PGP-signed email exchange.
26 - Distributed source repositories (git)
27 - Periodic release snapshots (tarballs)
35 - git repositories provide PGP signatures on all tags
36 - tarballs provide detached PGP signatures with all downloads
41 -------------------------------------------
64 ----------------------
70 $ gpg --version | head -n1
[all …]
/Documentation/filesystems/
Dafs.rst1 .. SPDX-License-Identifier: GPL-2.0
9 - Overview.
10 - Usage.
11 - Mountpoints.
12 - Dynamic root.
13 - Proc filesystem.
14 - The cell database.
15 - Security.
16 - The @sys substitution.
45 CONFIG_AF_RXRPC - The RxRPC protocol transport
[all …]
Dfscrypt.rst2 Filesystem-level encryption (fscrypt)
11 Note: "fscrypt" in this document refers to the kernel-level portion,
14 covers the kernel-level portion. For command-line examples of how to
18 `fscryptctl <https://github.com/google/fscryptctl>`_ or `Android's key
20 <https://source.android.com/security/encryption/file-based>`_, over
25 Unlike dm-crypt, fscrypt operates at the filesystem level rather than
28 filesystem. This is useful for multi-user systems where each user's
29 data-at-rest needs to be cryptographically isolated from the others.
34 directly into supported filesystems --- currently ext4, F2FS, UBIFS,
44 fscrypt does not support encrypting files in-place. Instead, it
[all …]
/Documentation/driver-api/nvdimm/
Dsecurity.rst6 ---------------
16 ------------------
28 update <old_keyid> <new_keyid> - enable or update passphrase.
29 disable <keyid> - disable enabled security and remove key.
30 freeze - freeze changing of security states.
31 erase <keyid> - delete existing user encryption key.
32 overwrite <keyid> - wipe the entire nvdimm.
33 master_update <keyid> <new_keyid> - enable or update master passphrase.
34 master_erase <keyid> - delete existing user encryption key.
36 3. Key Management
[all …]
/Documentation/networking/pse-pd/
Dintroduction.rst1 .. SPDX-License-Identifier: GPL-2.0
7 --------
15 ----------------
22 with single balanced twisted-pair PHYs, as per Clause 104 of IEEE 802.3. PoDL
26 IEEE 802.3-2018 Addendums and Related Clauses
27 ---------------------------------------------
29 Key addenda to the IEEE 802.3-2018 standard relevant to power delivery over
32 - **802.3af (Approved in 2003-06-12)**: Known as PoE in the market, detailed in
33 Clause 33, delivering up to 15.4W of power.
34 - **802.3at (Approved in 2009-09-11)**: Marketed as PoE+, enhancing PoE as
[all …]
/Documentation/devicetree/bindings/sound/
Dnuvoton,nau8821.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Seven Lee <wtli@nuvoton.com>
13 - $ref: dai-common.yaml#
25 nuvoton,jkdet-enable:
29 nuvoton,jkdet-pull-enable:
30 description: Enable JKDET pin pull. If set - pin pull enabled,
34 nuvoton,jkdet-pull-up:
35 description: Pull-up JKDET pin. If set then JKDET pin is pull up,
[all …]

12345678910